Your Data Is at Grave Risk: Here Are 6 Ways to Protect It From Hackers

Data breaches take place almost daily but remain undetected for almost 270 days on an average.

Advertisement
By Naveen Jaiswal | Updated: 4 June 2021 19:24 IST
Highlights
  • Air India confirmed it was targeted in a 'highly sophisticated' attack
  • Data breaches can prove expensive to users
  • A nuanced cloud strategy is required to protect user data

The coronavirus pandemic has increased cyber-attacks to a large extent

This was one email that Air India customers certainly did not expect or ever want. On 22 May, the airlines revealed that 10 years' worth of its customer data including credit cards, passports and phone numbers were leaked in a massive cyber-attack on its data processor in February. The incident has affected around 45 lakh customers registered between 26 August 2011, and 3 February 2021, according to Air India.

The 'highly sophisticated' attack was targeted at Geneva-based passenger system operator SITA that serves the Star Alliance of airlines including Singapore Airlines, Lufthansa, and United besides Air India. The leaked data, according to Air India, included names, date of birth, contact information and ticket information, frequent flyer numbers and credit card data but not passwords. This hardly would provide any comfort to the airlines' customers.

This wasn't the first data breach, and it certainly won't be the last. For instance, there was a sense of deja vu this April when Alon Gal, a security researcher at cybersecurity firm HudsonRock, tweeted that personal data from 533 million Facebook accounts was leaked online for free. A Business Insider report later said it verified several of the records, which were from 106 countries, including 6 million in India. The data included user "...phone numbers, Facebook IDs, full names, locations, birthdates, bios, and — in some cases — email addresses.”

Advertisement

According to 2019 Q3 Data Breach QuickView Report, there were 5,183 breaches reported in the first nine months of 2019 exposing 7.9 billion records. The numbers have only increased exponentially since then.

Advertisement

For instance, data from over 500 million LinkedIn users—including user IDs, full names, email addresses, phone numbers, professional titles, and other work-related data—has been hacked, according to security news and research group CyberNews.

While LinkedIn clarified that the data set does not include sensitive information like credit card information or social security numbers, the fact remains that the leaked data could help hackers use the email addresses and phone numbers to spam or even loot people online. Users can see if their data has been compromised by the incident by accessing sites like Have I Been Pwned, which list major data breaches.

Advertisement

Our own research reveals that data breaches take place almost daily but remain undetected for almost 270 days on an average.

Data breaches can prove expensive to users since hackers are bound to use the information for social engineering (advanced phishing), scamming, ransomware, spamming and marketing, causing users immense amount of distress and financial losses too in many cases. Companies, too, must bear the brunt in terms of brand reputation and penalties. The UK's data privacy watchdog, the Information Commissioner's Office (ICO), for instance, fined the Marriott Hotels chain GBP 18.4 million (roughly Rs. 190.30 crores) last year for a major data breach that may have affected up to 339 million guests in 2018.

Advertisement

The pandemic, which has accelerated the process of digitalisation in enterprises, has ironically accentuated these cyber maladies too. Moreover, as workers increasingly work from home, they begin accessing more data in the cloud, calling for increasing security measures in companies and on user devices that access this data.

In this context, it's first important to define the cloud. Companies may be using public cloud services that could include software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS). They could also host their data on their premises – a trend known as private cloud. Or they could be using a combination of both the private and public cloud services--a trend known as Hybrid cloud.

Each of these situations demand a nuanced cloud strategy since the cloud provider and cloud customer will share different levels of responsibility for security of the data. Further, the solution that a security vendor will provide needs to detect and respond to security risks in real-time, regardless of where the user is operating from – home, office or travelling.

While no vendor can claim to possess any silver bullet that can provide blanket cloud security, it's important that companies know the location of their data; what data they have stored in the cloud; who has access to it and whom are they sharing it with, and on which device.

Here's what works for most clients.

First, the solution should provide an intuitive user-interface that enables visual analytics, a multi-dimensional view of the data, and tools to slice and dice information in ways that will enable companies take speedier action when an anomaly is detected.

Second, cloud-native applications rely on the environment for telemetry – the automatic collection and transmission of data to centralised locations for subsequent analysis. Hence, the solution should allow not only for cloud telemetry but also for telemetry for the data that resides on end-point devices like smartphones, tablets and laptops that are being used by workers who are travelling or at home. Third, these endpoint devices can be powered by Linux, Windows, or Mac, which implies that solution should be operating system agnostic.

Fourth, companies should include Cyber Situational Awareness (CSA) capabilities in their arsenal. CSA is critical when talking about cybersecurity, simply because like in traditional warfare, cybersecurity teams need to understand where the threats reside, where they are coming from, and how they mutate over time, among other things.

Fifth, it's important to note that artificial intelligence (AI) systems can be used to identify and predict attack patterns, thus dramatically decreasing the response time. The problem, though, is that if a company is using a basic machine learning (ML) system, which has been trained on historic data, this system will be unable to spot new threats since hackers too are using AI systems.

Sixth, retraining your workforce, as consultancy firm McKinsey notes, is another critical aspect of cybersecurity. This is important since the typical technology workforce of an enterprise is trained in developing business applications in the traditional IT framework but most of them need to be reskilled or upskilled for the cloud environment, McKinsey insists.

All these issues become critical since with the fifth generation, or 5G networks soon to replace 4G networks, cloud security will become more vital especially when it comes to protecting end-user devices. The reason is that 5G connects more devices than earlier technologies, expanding the surface for cyber-attacks and making it riskier for companies.

Naveen Jaiswal is the Founder & Director of Vehere.

Disclaimer: The opinions expressed within this article are the personal opinions of the author. NDTV is not responsible for the accuracy, completeness, suitability, or validity of any information on this article. All information is provided on an as-is basis. The information, facts or opinions appearing in the article do not reflect the views of NDTV and NDTV does not assume any responsibility or liability for the same.


Interested in cryptocurrency? We discuss all things crypto with WazirX CEO Nischal Shetty and WeekendInvesting founder Alok Jain on Orbital, the Gadgets 360 podcast. Orbital is available on Apple Podcasts, Google Podcasts, Spotify, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement
Popular Mobile Brands
  1. Oppo F31 Series Launched With 7,000mAh Battery: Check Price, Features
  2. Gemini Overtakes ChatGPT on App Store, Reaches the Top Spot
  3. iOS 26 Update for iPhone Releases Today: Everything You Need to Know
  4. These Realme Phones Will Be Discounted During the Flipkart Big Billion Days Sale
  5. Butterfly-Shaped Hole in the Sun Could Spark Solar Storms Worldwide
  6. Nothing Phone 3 Price Will Drop to Rs 34,999 on Flipkart, But There's a Catch
  7. Realme P3 Lite 5G With 6,000mAh Battery Launched in India at This Price
  8. Apple Might Launch the iPhone 17e and Nine Other New Products by Early 2026
  9. You May Not Get iPhone 17, iPhone Air Orders on Time Due to This Reason
  1. Flipkart Big Billion Days Sale: Nothing Announces Offers on Phone 3a Pro, CMF Phone 2 Pro, Nothing Ear, and More
  2. Bitcoin Steadies Above $116,400 as Ether and Other Altcoins Show Resilience
  3. Oppo F31 Pro+ 5G Launched in India With 7,000mAh Battery Alongside Oppo F31 Pro 5G, F31 5G: Price, Features
  4. Apple Reportedly Plans to Launch iPhone 17e, MacBook Air M5, and More Products by Early 2026
  5. Oppo Find X9 Pro Camera Samples Teased; Oppo Find X9 Series Confirmed to Launch in October
  6. Google Gemini Ranks at the top of the iOS App Store, Overtakes ChatGPT for the First Time
  7. Final Fantasy Remake Trilogy Is Coming to Switch 2 and Xbox, Starting With First Game Next Year
  8. Nothing Phone 3 to Go on Sale at Rs 34,999 During Flipkart Big Billion Days Sale: Here's How to Avail of This Offer
  9. Realme P3 Lite 5G Launched in India With MediaTek Dimensity 6300 SoC, 6,000mAh Battery: Price, Features
  10. iPhone 17, iPhone 17 Pro Max, and iPhone Air Shortage in India Leads to Order Delays
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.