Monday , May 27 2024
The content is written by Muhibbul Muktadir Tanim.

Cyber Resilience: Elevating Bangladesh’s Corporate Culture Safeguard

Bangladesh’s use of technology in the digital era brings up a major challenge in cybersecurity. Previous cyberattacks have shown the need for stronger protection.

The incidents in 2014 and 2016 caused significant financial losses in the banking sector, showing the importance of improving cybersecurity.

Researcher claimed: Biometrics of Indian Forces Exposed

Jeremiah Fowler, a security researcher, claimed to discover a major vulnerability in India's data security. He found an unprotected database...
Read More
Researcher claimed: Biometrics of Indian Forces Exposed

NSA Releases Guidance on Zero Trust Maturity

The NSA released an information sheet called "Advancing Zero Trust Maturity Throughout the Application and Workload Pillar." This sheet will...
Read More
NSA Releases Guidance on Zero Trust Maturity

Data protection is sovereignty: Mohammad A. Arafat
INFOCOM Dhaka ends promoting cyber resiliency

The two day long 7th edition of INFOCOM, India's biggest business, technology, and leadership event, themed "Sustainable Disruption", concluded today...
Read More
Data protection is sovereignty: Mohammad A. Arafat  INFOCOM Dhaka ends promoting cyber resiliency

Phoenix Summit 2024
Two days phoenix summit ended successfully at Dhaka

TheTeamPhoenix, a non-profit organization, successfully hosted Phoenix Summit 2024, the largest cyber security event in Bangladesh, from May 23-24. This...
Read More
Phoenix Summit 2024  Two days phoenix summit ended successfully at Dhaka

CISA Added Apache Flink CVE-2020-17519 Vulnerability to KEV

CISA warns Apache Flink users about a critical vulnerability. Cybercriminals are exploiting this flaw to compromise systems. Apache Flink is...
Read More
CISA Added Apache Flink CVE-2020-17519 Vulnerability to KEV

Cisco released software updates for CVE 2024-20360

Cisco, a global network solutions leader, has reported a security issue with its Firepower Management Center (FMC) software. This vulnerability,...
Read More
Cisco released software updates for CVE 2024-20360

Ivanti Patches Critical RCE Flaws in Endpoint Manager

Ivanti on Tuesday declare to patch for several products, including fixes for critical vulnerabilities in Endpoint Manager (EPM). Ivanti resolved...
Read More
Ivanti Patches Critical RCE Flaws in Endpoint Manager

German police warn of cyberattacks via Office 365

ompanies in Germany are facing a new wave of cyberattacks. The State Criminal Police Office of North Rhine-Westphalia has issued...
Read More
German police warn of cyberattacks via Office 365

Hacktivists group target Philippines government ransomware attack

SentinelOne researchers found that the Ikaruz Red Team is targeting the Philippines government using different ransomware builders like LockBit, Vice...
Read More
Hacktivists group target Philippines government ransomware attack

CISA ALERT
CISA Warns Exploiting NextGen Healthcare Mirth Connect Flaw

The US cybersecurity agency, CISA, added a flaw in NextGen Healthcare's Mirth Connect product to its catalog of Known Exploited...
Read More
CISA ALERT  CISA Warns Exploiting NextGen Healthcare Mirth Connect Flaw

More recent disruptions, such as ransomware in the national airline and a government website breach in 2023, highlight the urgent need for IT experts to make cybersecurity a top priority. As businesses use more technology, it is crucial for them to integrate strong cybersecurity into their corporate culture to protect against evolving threats.

ALSO READ:

Public private partnership is essential to increase cyber awareness

Bangladesh is a prime target for cyber threats because of its geopolitical position. The cybersecurity challenges have become worse due to regional conflicts and the global pandemic. This has led to more cyberattacks on government, private, and financial institutions.

As a cybersecurity expert, enthusiast, IT professional, and technological leader, it is imperative to address these challenges within the context of Bangladesh’s corporate culture. Here are key guidelines for corporate leaders and directors to improve cybersecurity culture and fortify their organizations:

Raise Awareness and Provide Training:
* Conduct regular cybersecurity awareness programs tailored to the organization’s needs.
* Empower employees with training sessions, making them an integral part of the defense against cyber threats.

Leadership Engagement:
* Secure leadership buy-in to prioritize and set an example for the entire organization.
* Actively involve top-level management in cybersecurity initiatives to demonstrate its importance.

Emphasize Accountability:
* Leverage the existing culture of responsibility by making individuals accountable for their cybersecurity actions.
* Encourage employees to report suspicious activities and reward proactive contributions to organizational security.

Cultural Adaptation:
* Align security policies and practices with the existing corporate culture.
* Strike a balance between security measures and workplace norms for effective implementation.

Invest in Technology and Infrastructure:
* Allocate resources to acquire and implement robust cybersecurity tools and infrastructure.
* Ensure IT professionals have access to the latest security technologies to enhance defense mechanisms.

Develop an Incident Response Plan:
* Establish a well-defined incident response plan for detecting, containing, and recovering from cybersecurity incidents.
* Regularly test and refine these procedures to ensure their effectiveness.

Encourage Collaboration and Information Sharing:
* Foster collaboration between departments and organizations.
* Form alliances or industry-specific cybersecurity forums for sharing threat intelligence and best practices.

By incorporating these guidelines into the fabric of Bangladeshi corporate culture, organizations can fortify their defenses against the ever-evolving landscape of cyber threats, ensuring a secure and resilient digital future.

Writer:
Muhibbul Muktadir Tanim
Senior Manager, IT Infrastructure & Systems Management, icddr,b

Check Also

ONLINE ALERT
When your phone camera spy on you!

We all love snapping pics on our phones, right? They help us catch life’s fun, …

Leave a Reply

Your email address will not be published. Required fields are marked *