Why It’s Time To Rethink Cyber Security At The Organisational Level

Image Source: Twitter

In the current era, where everything is getting connected, right from your mobile phones speaking to your smart televisions or an air conditioner, a sensor monitoring your health and fitness levels, a smart home system which is listening and acting to your voice commands, a personal assistant system like “Google Assistant”, “Siri” or “Alexa” responding to your instructions etc., this is made possible by using some of the prominent technology innovations like Cloud Computing, Smartphones, Internet of Things and various social media platforms which are offering many features for people to share more and more personal information. As per a recent study, by 2020, there will be 20.4 billion connected devices and the number may go even higher. These technologies advancements are generating unprecedented amounts of data streams which is challenging the privacy and safety of personal and corporate data/information.

The new mantra as it is said “Data is currency”, which means data or information is gaining prominence and helping mankind to take more objective decisions which is backed up by facts and figures. Adding to this technology like Big Data, Machine Learning and Artificial Intelligence are helping to quickly process this data and getting meaningful aggregations and inferences out of it adding to the quick decision-making process.

As it’s said by a prominent professional:


Sign up for your weekly dose of what's up in emerging technology.

“Personal data is the new oil of the internet and the new currency of the digital world” Meglena Kuneva

“It’s valuable, but if unrefined it cannot really be used. It has to be changed into gas, plastic, chemicals, etc. to create a valuable entity that drives profitable activity; so, data must be broken down, analyzed for it to have value.” Clive Humby

Download our Mobile App

As the saying goes there are “two sides of the same coin”. On one end data/information is used to make constructive decisions for business advancement and personal convenience and at the same time hackers are seeing opportunities to use the same data/information as a new medium of ransom. In the recent times we’ve seen many breaches being reported and most of this information is available on Darknet at a reasonable price for various stakeholders to misuse it for making personal gains.

Also to add, with increased regulation from state actors (like GDPR, California data protection law, HIPPA, Personal Information Protection and Electronic Documents Act etc.), safeguarding sensitive personally identifiable information or personally identifiable information (SPII / PII) has become a prime challenge for many organizations looking at varied facets of threats available in the market. There are companies in the past who have been subjected to legal prosecutions resulting in ending up paying huge fines for not complying with these standards.

In the current context where the same version of confidential/sensitive data is spread across an organization and sits in various places (databases, cloud platforms, collaboration tools, file system, endpoints, e-mails etc.), it is getting very challenging for security professionals, security architects and security engineers to come up with a single solution to address all security gaps at various levels. More and more lack of some basic controls like data/information not appropriately classified, not enough awareness among the employees how to handle various types of data/information are making things even more challenging for security professionals to safeguard data/information.


In this ever-changing era, it’s a challenge for security professionals to keep up with the pace of offering in the security services. It’s a racing game between convenience vis-a-vis cybersecurity. One thing which is very prominent and consistent for the security professional is to stick to the basics. As the saying goes “You can only protect if you know what you have to protect”.

In a similar vein, at a personal level, an individual has to maintain a level of hygiene to what extent they want to be in the public domain. As we all know, once you are in public domain whether it is true or false it’s very difficult to change the status quo. They should constantly educate themselves on the implications of sharing such information and what implications it can bring to them.

More Great AIM Stories

Visweswara Rao
Visweswara Rao Sreemanthula is Business Security Manager at CDK Global (India) Pvt. Ltd., a global leader in integrated information technology and digital marketing solutions to the automotive retail industry. He has 12 years of rich professional experience in diversified global experience in IT industry. At CDK Global, Visweswara Rao is responsible for setting up various security operations functions out of India (Product Security, Cyber Incident Management, Security Engineering, IT Operational risk, Culture of Security and Corporate security). He is responsible for built in a risk driven resiliency program targeting people, process and technology. Rolling out global secure developer and awareness trainings.

AIM Upcoming Events

Regular Passes expire on 3rd Mar

Conference, in-person (Bangalore)
Rising 2023 | Women in Tech Conference
16-17th Mar, 2023

Early Bird Passes expire on 17th Feb

Conference, in-person (Bangalore)
Data Engineering Summit (DES) 2023
27-28th Apr, 2023

Conference, Virtual
Deep Learning DevCon 2023
27 May, 2023

3 Ways to Join our Community

Telegram group

Discover special offers, top stories, upcoming events, and more.

Discord Server

Stay Connected with a larger ecosystem of data science and ML Professionals

Subscribe to our Daily newsletter

Get our daily awesome stories & videos in your inbox