• WELCOME TO

    VISTA InfoSec Blog

    Trusted Advisors, Assured Compliance.
  • DO YOU NEED
    BFSI Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Government Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Healthcare Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Retail Security Solutions
    Check out our options and features.
    Get Started Now!
  • DO YOU NEED A NEW
    Energy & Utilities Security Solutions
    Check out our options and features.
    Get Started Now!
June 26, 2019 - Two US cities opt to pay $1m to ransomware operators  |  June 24, 2019 - Google Calendar Being Used For Phishing: How To Stay Safe From This Hack  |  June 24, 2019 - Google Calendar Being Used For Phishing: How To Stay Safe From This Hack  |  June 23, 2019 - Heads-up] The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike Backs  |  June 23, 2019 - The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike Backs  |  June 21, 2019 - Backdoor Built into Android Firmware  |  June 15, 2019 - RBI asks banks to grout ATMs to wall, pillar or floor to enhance security.  |  June 11, 2019 - Microsoft Warns of Large Spam Campaign Hitting Europe (InfoRiskToday)  |  June 10, 2019 - MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge  |  June 09, 2019 - Cryptocurrency Company Hacks Itself Before Hackers Can Hack It  |  June 09, 2019 - Germany: Backdoor found in four smartphone models; 20,000 users infected (ZDNet)  |  June 07, 2019 - Baltimore Ransomware Attack Costing City $18 Million (InfoRiskToday)  |  June 07, 2019 - Ransomware succeeds because targets don’t learn from history  |  June 06, 2019 - BlueKeep Bug: Even NSA Wants You To Install Windows Updates  |  June 06, 2019 - The Cybersecurity 202: Trump’s ban on U.S. companies supplying Huawei will not make the country safer, experts say  |  June 05, 2019 - How to Protect Yourself or Your Business from Ransomware in 2 Steps  |  June 05, 2019 - How to Protect Yourself or Your Business from Ransomware in 2 Steps  |  June 01, 2019 - Ransomware isn’t just a big city problem  |  May 30, 2019 - PHP Security Guide  |  May 29, 2019 - Microsoft’s Election Guard a Trojan Horse for a Military-Industrial Takeover of US Elections  |  May 09, 2019 - What is phishing?  |  May 09, 2019 - Free IT Security Tools  |  April 21, 2019 - When Your Sandbox Fails  |  April 18, 2019 - Email – From Novelty to Nefarious  |  April 18, 2019 - Better protection against Man in the Middle phishing attacks  |  April 17, 2019 - Cyberspies Hijacked the Internet Domains of Entire Countries  |  April 16, 2019 - Bad security hygiene still a major risk for enterprise IT networks  |  April 16, 2019 - Is your DDos Mitigation Strategy Terabit-Proof?  |  April 08, 2019 - Data breach legislation proposes jail time for CIO, HR execs  |  April 07, 2019 - Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak (SecurityWeek)  |  April 01, 2019 - Sacked IT guy annihilates 23 of his ex-employer’s AWS servers  |  March 23, 2019 - Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’  |  March 20, 2019 - Google hit with €1.5bn fine from EU over advertising  |  March 18, 2019 - Hackers Bypass Multi-factor Authentication to Hack Office 365 & G Suite Cloud Accounts Using IMAP Protocol  |  March 14, 2019 - Times Internet's lifestyle websites are offline in Europe due to GDPR non-compliance  |  March 14, 2019 - The 3 Most Common Social Engineering Cyber Attacks  |  March 13, 2019 - 76% Indian businesses hit by cyberattacks: Sophos’ EDR survey  |  March 11, 2019 - PayPal, Square vulnerabilities impact mobile point-of-sale machines  |  March 09, 2019 - Israeli cyberattack firm woos investors amid a human rights firestorm  |  March 06, 2019 - Nearly 70 percent of organizations have understaffed Cybersecurity teams: ISACA  |  March 06, 2019 - Huawei a threat, deeply tied to Chinese intel:US  |  March 02, 2019 - RBI slaps fine on four banks  |  March 01, 2019 - 40% of malicious URLs were found on good domains  |  February 28, 2019 - Webinar - New Kid on the block - SOC for Cybersecurity  |  February 27, 2019 - Retailers have become the top target for credential stuffing attacks  |  February 26, 2019 - Most IoT devices are being compromised by exploiting rudimentary vulnerabilities  |  February 22, 2019 - Russian hackers can breach an entire computer network in 18 minutes  |  January 24, 2019 - Webinar - Designing your Cyber Security framework using NIST guidelines Timing: 4.30 to 5.10 IST & BST :2.00 to 2.40 EST  |  December 15, 2018 - Sebi eases norms around cyber security ops for small market intermediaries  |  December 14, 2018 - Predicting cyberattacks: the need for new cyber security tools  |  December 13, 2018 - Three cybersecurity tips to help train your employees Advice, Technology Dec  |  December 12, 2018 - Cybersecurity, trade tensions rank as top threats to markets in 2019, survey finds  | 

News


Selecting SOC 2 Principles

Share Button

Selecting SOC2 Principles Once you as an organization are determined to pursue SOC 2 attestation, one of the key things which causes confusion and sometimes a show stopper is deciding which of the five Trust Services Principles (recently updated to Trust Services Criteria) you want to include in your SOC 2 attestation. SOC 2 reports […]

SOC 1 Vs SOC 2

Share Button

 Which SOC Report Do I Need? As a service organization, you are familiar with audit requests from clients who are required to meet specific compliance and audit requirements. You have most likely been asked whether your organization is SOC 1 Compliant or SOC 2 Compliant. Question is: What are the differences between a SOC 1 […]

What is a Firewall Risk Assessment?

Share Button

What is a Firewall Risk Assessment? A firewall risk assessment is a detailed assessment approach of a firewall topology and configuration that has been implemented to protect your information, systems, applications, and overall business operations.     Is firewall risk assessment helpful for my organization? The assessment will help your organization improve and maintain the […]

WHY SHOULD I DO SOC2?

Share Button

WHY SHOULD I DO SOC2     Interesting question and rightly so… it’s expensive and painful to achieve with more than 400 control requirements which encompass the length and breadth of your company’s operations.   Achieving a SOC2 certification for your organization gives your company an edge over your competitors by assuring your clients, customers or […]

CYBER SECURITY & CYBER RESILIENCE FRAMEWORK FOR STOCK BROKERS / DEPOSITORY PARTICIPANTS

Share Button

Central Depository Services (India) Limited has come out with new norms to scale up the Cyber Security & Cyber Resilience Framework for Stock Brokers/ Depository Participants are advised to take note of the same and ensure compliance. According to the circular, the Rapid growth of Technology have enforced, all enterprises to have robust cyber security and […]

NESA COMPLIANCE – For the Integrity of Information

Share Button

The National Electronic Security Authority (NESA) is the United Arab Emirates (UAE) federal authority responsible for the advancement of the nation’s cyber security. NESA has produced a set of standards and guidelines for government entities in critical sectors in order to protect the UAE’s critical data/information infrastructure. This aligns UAE organizations and government with a […]

RBI Cyber Security Framework for UCBs

Share Button

Two months after malware attack on Cosmos Bank, on Oct 19, 2018, the RBI came out with new norms to scale up the cyber-security and resilience framework at the urban cooperative banks (UCBs). According to the circular, all 1500 UCBs should immediately put in place a Cyber Security policy, duly approved by their Board/Administrator, giving a framework and […]

Setting up ELK Stack on Ubuntu 16.04

Share Button

    ELK stands for Elasticsearch, Logstash and Kibana and its a robust open source solution for searching, analyzing and visualizing data. Elasticsearch is a distributed, RESTful search and analytics engine based on Lucene, Logstash is a data processing pipeline for managing events and logs and Kibana is a web application for visualizing data in […]

GDPR & Application Compliance

Share Button

Is your application be it desktop or mobile GDPR ready? The question seems rhetorical especially since the act seems to be geared towards protecting the privacy of data subjects in any of the EU member states. On the face of it, the Act does appear to be more process oriented and towards making safeguarding the […]

6 Decryptors to Recover Your Data Affected by Ransomware

Share Button

2017 was the year of ransomware. Global ransomware cost has increased 15 times in a period of two years. In 2017, in just 4 days, $1 billion in damages were caused by the WannaCry outbreak. Global ransomware costs are expected to cross the mark of $5 billion this year. While a huge number of ransomwares […]