• WELCOME TO

    VISTA InfoSec Blog

    Trusted Advisors, Assured Compliance.
  • DO YOU NEED
    BFSI Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Government Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Healthcare Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Retail Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Energy & Utilities Security Solutions
    Check out our options and features.
    Get Started Now!

NESA COMPLIANCE – For the Integrity of Information

Share Button

The National Electronic Security Authority (NESA) is the United Arab Emirates (UAE) federal authority responsible for the advancement of the nation’s cyber security. NESA has produced a set of standards and guidelines for government entities in critical sectors in order to protect the UAE’s critical data/information infrastructure. This aligns UAE organizations and government with a […]

RBI Cyber Security Framework for UCBs

Share Button

Two months after malware attack on Cosmos Bank, on Oct 19, 2018, the RBI came out with new norms to scale up the cyber-security and resilience framework at the urban cooperative banks (UCBs). According to the circular, all 1500 UCBs should immediately put in place a Cyber Security policy, duly approved by their Board/Administrator, giving a framework and […]

Setting up ELK Stack on Ubuntu 16.04

Share Button

    ELK stands for Elasticsearch, Logstash and Kibana and its a robust open source solution for searching, analyzing and visualizing data. Elasticsearch is a distributed, RESTful search and analytics engine based on Lucene, Logstash is a data processing pipeline for managing events and logs and Kibana is a web application for visualizing data in […]

GDPR & Application Compliance

Share Button

Is your application be it desktop or mobile GDPR ready? The question seems rhetorical especially since the act seems to be geared towards protecting the privacy of data subjects in any of the EU member states. On the face of it, the Act does appear to be more process oriented and towards making safeguarding the […]

6 Decryptors to Recover Your Data Affected by Ransomware

Share Button

2017 was the year of ransomware. Global ransomware cost has increased 15 times in a period of two years. In 2017, in just 4 days, $1 billion in damages were caused by the WannaCry outbreak. Global ransomware costs are expected to cross the mark of $5 billion this year. While a huge number of ransomwares […]

Everything You Need to Know About Ransomware

Share Button

Ransomware: Ransom + Malware. Ransomware is a kind of malware in which the data files on a victim’s computer is encrypted, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. Ransomware are of 5 types: I. Encrypting ransomware Similar to WannaCry & Petya, this kind of ransomware […]

Fileless Malware: Your Halloween Nightmare

Share Button

Whenever you buy a new laptop or desktop, you always make sure to drag one antivirus product off the shelf and drop it in your cart. It is a well-known prescription to avoid malwares or viruses. No- one has to be a cyber-security expert to crack that! Every traditional antivirus program depends on the presence […]

WPA2 “KRACK”ed: Your wireless may have been compromised

Share Button

Introduction Since 2004, almost all of the Wi-Fi networks in our homes and companies have been stopping the hackers from reading, stealing, or manipulating the data. This was all achieved by the current industry standard, known as WPA2 (Wi-Fi Protected Access 2), which encrypts the data traffic. This WPA2, as it turns out, can be […]

GDPR & Personal Data: Everything you need to know.

Share Button

In this new electronic age, the key to freedom is privacy. Internet, in the name of connecting with different people, has struck hard on privacy. Personal data of several million users stored electronically is a very valuable asset which is later used by the companies to create complicated algorithms which, in the end, help them […]

ATM- Hardware & Software Security Guidelines

Share Button

The recent hack of 3.2 million cards in India proved that hackers have identified and rightly so that the weak link in the chain are the channel banking In the past, ATM machines were primarily used to deliver cash in the form of bank notes and to debit the corresponding bank account. However, ATM machines […]