How a Pandemic has Changed the Cybersecurity Landscape in the Healthcare Sector?

Earlier in April, Interpol warned that there is going to be a considerable rise in ransomware threats in multiple sectors, including healthcare. Cybercriminals across the country are taking advantage of the vulnerable situation due to COVID-19. The Healthcare sector has always been vulnerable to cyber threats. 


Hospitals contain a large amount of personal and valuable data, and they work on thin margins even prior to the pandemic. This implies that healthcare sectors have always been skimp on security resources. This has made hospitals an important target this year when the global health care sector is the focal point. 

Read More

ARCON PAM offers IT security shield to mid-scale and large companies - backbone of any economy

How can cyber security boost the economy?

The financial sector in Bangladesh is evolving faster than ever. The economy is one of the fastest growing 

in 2020. Cybersecurity has become very important as the country’s digitalisation pace has necessitated the need to secure information assets. A compromise of credentials, or an illegitimate access to privileged accounts can inflict heavy financial losses (data breach) to organizations, which could have strong repercussions on the economy. Therefore the economic well-being of any country is directly proportional to cyber security preparedness.

Read More

The Rise of AI in Cybersecurity ARCON Blog

The Rise of AI in Cybersecurity

The sudden technological rise has enabled enterprises and agencies to conduct business and communicate like never before. However, this has made cyberspace an increasingly belligerent environment, with hackers constantly trying to break into the business networks and systems. The goal is simple – extract data and sell it to the highest bidder. Our world runs on data today, and if the systems are compromised, it can wreak havoc on businesses. Billions of dollars are on the line to protect company data, but with increasing cyberspace vulnerabilities, experts and businesses are facing the daunting reality. This is where the need for a technological prodigy comes into consideration.

Read More

Importance of Information Security in CSR

What is CSR?

The concept of Corporate Social Responsibility (CSR) was first discussed in the 1950s though it was widely acknowledged much later during the late 1990s. The core idea of CSR is to integrate business with responsibilities towards our society and environment. CSR, in this way, is considered as the most convincing way to achieve a balance between economic, environmental and social imperatives while at the same time addressing the expectations of shareholders and stakeholders. Organizations try to enhance the reputation of a company with active CSR, although the concept of CSR goes beyond that.

Read More

Resistance to cultural change plays spoilsport to strengthen enterprise IT security (Part – 2)

How can we overcome cultural resistance?

In our previous blog (posted on 30th August 2019) we discussed how resistance to IT cultural changes can obstruct organizations from strengthening their enterprise security posture. In this blog, we are going to discuss five ways how this crisis situation can be handled effectively by assuaging the workforce’s fear and misconceptions.

Read More

Resistance to cultural change plays spoilsport to strengthen enterprise IT security (Part – 1)

Recently, while interviewing some of the global CIOs and CISOs in an event regarding the reason of extensive privileged account compromise, we came across a very interesting point of view, which was highlighted by a few of the respondents. Work culture and employee mindset can be a big barrier in establishing a robust IT security framework in enterprises. Let us see how it can play spoilsport while strengthening enterprise IT security.

Read More

Identify Suspicious User Activities

Spot your malicious insider(s) with ARCON | UBA

Recently, a Government organization from Healthcare industry in APAC region revealed that almost 14,000 health records were leaked online because of a malicious insider. The organization never thought that they could lose their sensitive health records to someone trustworthy (apparently) in unbelievably nasty way. Couple of months back this incident shook the cyber world and forced every global organization to reinforce security audit of their IT infrastructure, employee roles, their activities and access control mechanisms.

Read More

4 critical scenarios why Privileged Access Management will take center stage in 2019

Privileged Access Management (PAM) has become an integral part of overall cyber security framework for any modern-day organization. As privileged accounts provide access to confidential information, securing them from any untoward incident (abuse of privileged credentials or accounts) remains one of the major concerns for the Security and Risk management pros.

Read More

IT Central Station Users Share What They Love about ARCON

Over the last few months, the team at IT Central Station reached out to ARCON Privileged Access Management customers with one goal: to find out what they really think about their experiences with ARCON.


As the leading user review platform for enterprise technology solutions, we are always on the hunt for user feedback that can help our growing community of tech professionals make future buying decisions for their companies. Dubbed as “The Yelp of Enterprise Technology” by the Wall Street Journal, we have created a long-standing reputation of offering trusted, current and relevant information about enterprise technology solutions without vendor bias.

Read More

Thwart digital threats with behavioural analytics

Enterprises are allotting more budgets on emerging technologies that are proactive in detecting current and emerging threats. For 2018-19, the CISOs, CTOs and CIOs are eyeing on tools that use machine learning algorithms to secure companies’ digital assets, enterprise network and privilege accounts.

The expenditure on cyber security has seen a significant rise in the recent past especially after Facebook data breach, Uber data theft or even Bangladesh bank heist incidents. The digital threats are omnipresent, where the perpetrators siphon off digital money and crucial data in a day or may be for months. Worried CIOs are imploring the management to let them invest in cutting-edge technologies that can protect the privileged accounts and thwart threats.

Proactive protection is the safest way out

Read More