Monday , March 24 2025
The content is written by Muhibbul Muktadir Tanim.

Cyber Resilience: Elevating Bangladesh’s Corporate Culture Safeguard

Bangladesh’s use of technology in the digital era brings up a major challenge in cybersecurity. Previous cyberattacks have shown the need for stronger protection.

The incidents in 2014 and 2016 caused significant financial losses in the banking sector, showing the importance of improving cybersecurity.

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft

Russian zero-day seller to offer up to $4 million for Telegram exploits

Operation Zero, a Russian zero-day broker, is offering up to $4 million for Telegram exploits. They seek $500K for one-click...
Read More
Russian zero-day seller to offer up to $4 million for Telegram exploits

Cybercriminals Exploit Checkpoint’s Driver in a BYOVD Attack

Threat actors are exploiting a component of CheckPoint's ZoneAlarm antivirus to bypass Windows security measures. Nima Bagheri, a security researcher...
Read More
Cybercriminals Exploit Checkpoint’s Driver in a BYOVD Attack

IBM and Veeam Release Patches in AIX System and Backup

IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings,...
Read More
IBM and Veeam Release Patches in AIX System and Backup

WhatsApp patched zero-click flaw exploited in spyware attacks

WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware following reports from security researchers at the...
Read More
WhatsApp patched zero-click flaw exploited in spyware attacks

CVE-2025-24472
CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass...
Read More
CVE-2025-24472  CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

11 state hackers exploit new Windows zero-day since 2017

11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows....
Read More
11 state hackers exploit new Windows zero-day since 2017

Hackers Exploit ChatGPT with CVE-2024-27564

Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research...
Read More
Hackers Exploit ChatGPT with CVE-2024-27564

(CVE-2024-540385)
CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote...
Read More
(CVE-2024-540385)  CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

CVE-2025-24813
Apache Tomcat Flaw Exploited In The Wild

CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a...
Read More
CVE-2025-24813  Apache Tomcat Flaw Exploited In The Wild

More recent disruptions, such as ransomware in the national airline and a government website breach in 2023, highlight the urgent need for IT experts to make cybersecurity a top priority. As businesses use more technology, it is crucial for them to integrate strong cybersecurity into their corporate culture to protect against evolving threats.

ALSO READ:

Public private partnership is essential to increase cyber awareness

Bangladesh is a prime target for cyber threats because of its geopolitical position. The cybersecurity challenges have become worse due to regional conflicts and the global pandemic. This has led to more cyberattacks on government, private, and financial institutions.

As a cybersecurity expert, enthusiast, IT professional, and technological leader, it is imperative to address these challenges within the context of Bangladesh’s corporate culture. Here are key guidelines for corporate leaders and directors to improve cybersecurity culture and fortify their organizations:

Raise Awareness and Provide Training:
* Conduct regular cybersecurity awareness programs tailored to the organization’s needs.
* Empower employees with training sessions, making them an integral part of the defense against cyber threats.

Leadership Engagement:
* Secure leadership buy-in to prioritize and set an example for the entire organization.
* Actively involve top-level management in cybersecurity initiatives to demonstrate its importance.

Emphasize Accountability:
* Leverage the existing culture of responsibility by making individuals accountable for their cybersecurity actions.
* Encourage employees to report suspicious activities and reward proactive contributions to organizational security.

Cultural Adaptation:
* Align security policies and practices with the existing corporate culture.
* Strike a balance between security measures and workplace norms for effective implementation.

Invest in Technology and Infrastructure:
* Allocate resources to acquire and implement robust cybersecurity tools and infrastructure.
* Ensure IT professionals have access to the latest security technologies to enhance defense mechanisms.

Develop an Incident Response Plan:
* Establish a well-defined incident response plan for detecting, containing, and recovering from cybersecurity incidents.
* Regularly test and refine these procedures to ensure their effectiveness.

Encourage Collaboration and Information Sharing:
* Foster collaboration between departments and organizations.
* Form alliances or industry-specific cybersecurity forums for sharing threat intelligence and best practices.

By incorporating these guidelines into the fabric of Bangladeshi corporate culture, organizations can fortify their defenses against the ever-evolving landscape of cyber threats, ensuring a secure and resilient digital future.

Writer:
Muhibbul Muktadir Tanim
Senior Manager, IT Infrastructure & Systems Management, icddr,b

Check Also

Telco

Global Telco Market expected reach a CAGR of 10.5%
Global Cyber Attack in Telecom Sector Market Synopsis

The Global Cyber Attack in Telecom Sector Market is projected to grow at a rate …

Leave a Reply

Your email address will not be published. Required fields are marked *