Saturday , July 27 2024
The content is written by Muhibbul Muktadir Tanim.

Cyber Resilience: Elevating Bangladesh’s Corporate Culture Safeguard

Bangladesh’s use of technology in the digital era brings up a major challenge in cybersecurity. Previous cyberattacks have shown the need for stronger protection.

The incidents in 2014 and 2016 caused significant financial losses in the banking sector, showing the importance of improving cybersecurity.

Malware Attacks Increase 30% in First Half of 2024

Malware based threats increased by 30% in the first half of 2024 compared to the same period in 2023, according...
Read More
Malware Attacks Increase 30% in First Half of 2024

New DNS Vulnerability “TuDoor” Threatens Internet Security

A new critical vulnerability in the Domain Name System (DNS) has been found. This vulnerability allows a specialized attack called...
Read More
New DNS Vulnerability “TuDoor” Threatens Internet Security

Acronis Urged Users to Patch Vulnerability

A serious vulnerability, CVE-2023-45249 (CVSS 9.8), has been found in Acronis Cyber Infrastructure (ACI), a widely used software-defined infrastructure solution...
Read More
Acronis Urged Users to Patch Vulnerability

OpenAI to test search engine called SearchGPT

OpenAI is testing a new search engine "SearchGPT" using generative artificial intelligence to challenge Google's dominance in the online search...
Read More
OpenAI to test search engine called SearchGPT

CISA Unveils advisories for Two Industrial Control Systems

CISA released two advisories about security issues for Industrial Control Systems (ICS) on July 25, 2024. These advisories offer important...
Read More
CISA Unveils advisories for Two Industrial Control Systems

Researchers unveil ConfusedFunction Vulnerability in Google Cloud Platform

Tenable security researchers found a vulnerability in Google Cloud Platform's Cloud Functions service that could allow an attacker to access...
Read More
Researchers unveil ConfusedFunction Vulnerability in Google Cloud Platform

BD CIRT published advisory on Web Application and Database Security

BDG e-GOV CIRT's Cyber Threat Intelligence Unit has noticed a concerning increase in cyber-attacks against web applications and database servers...
Read More
BD CIRT published advisory on Web Application and Database Security

GitLab fixed six security flaws and recommends updating shortly

GitLab released a security update today to fix six vulnerabilities in its software. Although none of the flaws are critical,...
Read More
GitLab fixed six security flaws and recommends updating shortly

Researchers Unveil Massive Quad7 Botnet Targeting Microsoft 365

Sekoia.io and Intrinsec analyzed the Quad7 (7777) botnet, which uses TCP port 7777 on infected routers to carry out brute-force...
Read More
Researchers Unveil Massive Quad7 Botnet Targeting Microsoft 365

Threat Actor announce new DDoS Panel “Cliver”

A threat actor has announced a new DDoS tool called Cliver, which offers strong attack methods for disrupting web services,...
Read More
Threat Actor announce new DDoS Panel “Cliver”

More recent disruptions, such as ransomware in the national airline and a government website breach in 2023, highlight the urgent need for IT experts to make cybersecurity a top priority. As businesses use more technology, it is crucial for them to integrate strong cybersecurity into their corporate culture to protect against evolving threats.

ALSO READ:

Public private partnership is essential to increase cyber awareness

Bangladesh is a prime target for cyber threats because of its geopolitical position. The cybersecurity challenges have become worse due to regional conflicts and the global pandemic. This has led to more cyberattacks on government, private, and financial institutions.

As a cybersecurity expert, enthusiast, IT professional, and technological leader, it is imperative to address these challenges within the context of Bangladesh’s corporate culture. Here are key guidelines for corporate leaders and directors to improve cybersecurity culture and fortify their organizations:

Raise Awareness and Provide Training:
* Conduct regular cybersecurity awareness programs tailored to the organization’s needs.
* Empower employees with training sessions, making them an integral part of the defense against cyber threats.

Leadership Engagement:
* Secure leadership buy-in to prioritize and set an example for the entire organization.
* Actively involve top-level management in cybersecurity initiatives to demonstrate its importance.

Emphasize Accountability:
* Leverage the existing culture of responsibility by making individuals accountable for their cybersecurity actions.
* Encourage employees to report suspicious activities and reward proactive contributions to organizational security.

Cultural Adaptation:
* Align security policies and practices with the existing corporate culture.
* Strike a balance between security measures and workplace norms for effective implementation.

Invest in Technology and Infrastructure:
* Allocate resources to acquire and implement robust cybersecurity tools and infrastructure.
* Ensure IT professionals have access to the latest security technologies to enhance defense mechanisms.

Develop an Incident Response Plan:
* Establish a well-defined incident response plan for detecting, containing, and recovering from cybersecurity incidents.
* Regularly test and refine these procedures to ensure their effectiveness.

Encourage Collaboration and Information Sharing:
* Foster collaboration between departments and organizations.
* Form alliances or industry-specific cybersecurity forums for sharing threat intelligence and best practices.

By incorporating these guidelines into the fabric of Bangladeshi corporate culture, organizations can fortify their defenses against the ever-evolving landscape of cyber threats, ensuring a secure and resilient digital future.

Writer:
Muhibbul Muktadir Tanim
Senior Manager, IT Infrastructure & Systems Management, icddr,b

Check Also

Tesla Global Supply Analyst
A Bangladeshi girl journey at TESLA

In Bangladesh, many people don’t prioritize Industrial and Production Engineering. However, it is more important …

Leave a Reply

Your email address will not be published. Required fields are marked *