Companies the world over are encouraging employees to be cautious of potential threats which may target endpoints. Ways to do this is by deploying effective end-point security, mobile security controls, user behaviour analysis and more.
No company, big or small, is safe from cyberattacks. No method of attack, unremarkable or ambitious, is off the table. This past weekend has, if anything, reinforced this notion, with the likes of Uber and Take-Two Interactive Software Inc being targetted by hackers.
While in Uber's case, an unspecified amount of data was stolen, Take Two's Rockstar Games was compromised and three gigabytes of data, including over 90 videos of the highly anticipated, under-development Grand Theft Auto VI, was stolen. The stolen data also includes source code of GTA VI and the wildly popular GTA V.
Meanwhile, on Wednesday, Take Two's other game developer, 2K Games, had its help desk compromised, with the company issuing a public appeal for its users not to click on any link sent from their official account.
Given all this, how does a company secure its data? Rockstar Games, perhaps, could have benefited by following the zero-trust philosophy, but there really isn't any single way to keep yourself safe when hackers are becoming bolder and more innovative.
According to Kunal Bajaj, Chief Business Officer at eSec Forte Technologies, the most basic way to protect data is by raising awareness among a company's employees.
"Companies the world over are encouraging their employees to be cautious of potential threats which may target the endpoints. Ways to do this is by deploying effective end-point security, mobile security controls, user behaviour analysis and more," Bajaj said.
He added, in addition to all these, many companies are integrating flexible technologies and modular approaches so as to reduce exposure and decrease reaction time.
In Rockstar's case, the hack was a simple case of data theft, even though the hacker, who went by "Tea Pot", told Rockstar they were ready to negotiate, failing which they would release the game's source code.
Bajaj continued, a weak framework on cybersecurity often leads to instances of data theft. In Rockstar's case, the hacker accessed an unsecured Slack channel and got an employee to share secure access credentials.
"Organisations and individuals who are not serious about their privacy and data often fall prey to hackers and scammers," he elaborated. "Unprotected systems, weak passwords, and unawareness of cybersecurity laws are some other prominent factors that lead to data theft. In order to keep yourself safe from data theft, it is very essential to adopt a comprehensive data security policy, both as an individual and as an organisation," shared.
Another method to protect data is information security, Bajaj said. "Information security is a set of processes and tools that are deployed to protect sensitive information. But information security is a part of the cybersecurity framework and should not be used as a replacement for a wider and holistic cybersecurity," he added.
Also read: If security is 'slack' — what happened at Rockstar Games could happen to your company too
First Published: Sept 22, 2022 3:13 PM IST
Check out our in-depth Market Coverage, Business News & get real-time Stock Market Updates on CNBC-TV18. Also, Watch our channels CNBC-TV18, CNBC Awaaz and CNBC Bajar Live on-the-go!
Recommended ArticlesView All
Nifty Bank hits a record high - Here's what lies ahead for the index
May 29, 2023 IST2 Min(s) Read
The Untold: Generics vs Branded Generics—here’s how India’s drug price ‘control’ kills the patient
May 29, 2023 IST7 Min(s) Read
World View: G20 energy transition meet— the critical role of natural gas in India's adaptation
May 29, 2023 IST5 Min(s) Read
Zoomed Out: Politics, not economics, may explain demonetisation and 2000-Rupee withdrawal better
May 28, 2023 IST5 Min(s) Read