• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Products  /  Data Security Compliance for NBFCs
Data Security Compliance for NBFCs
20 December 2018

Data Security Compliance for NBFCs

Written by Seqrite
Seqrite
Products
19
Shares

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry out financial services ranging from asset finance, investment, loans, infrastructure finance and much more. They complement the banking sector by connecting the vast unbanked segments of the society, especially small and medium enterprises (MSMEs).

NBFCs have seen great growth in the last few years. According to a report from The Associated Chambers of Commerce and Industry of India (ASSOCHAM), their contribution to the economy grew from 8.4% in 2006 to above 14% in March 2015. NBFCs also recorded a compound annual growth rate (CAGR) of 19% over the past few years.

Regulating NBFCs

Of course, with their sustained success, it has also become important to regulate NBFCs in terms of cybersecurity and information technology. After all, NBFCs are financial institutions which deal with the financial details of millions of individuals in a country like India. Since they may not have the power or financial clout of an international bank, they may not have the resources to invest in a cybersecurity framework which can be disastrous. On the other hand, the financial services sector is an extremely attractive target for hackers. According to PricewaterhouseCoopers’ Global Economic Crime and Fraud Survey 2018, cyber crime was the third most reported fraud across the financial sector.

Recognizing this need for NBFCs to have a secure framework, India’s Reserve Bank of India (RBI) came out with a Master Direction for an Information Technology Framework in the NBFC sector in June, 2017. While the direction of the proposed IT framework was on various divisions, Information & Security Policy also played an important part.

The RBI directed that all NBFCs were required to have a board-approved information security policy with the following basic tenets:

  1. Confidentiality – Ensuring access to sensitive data to authorized users only
  2. Integrity – Ensuring accuracy and reliability of information by ensuring that there is no modification without authorization.
  3. Availability – Ensuring that uninterrupted data is available to users when it is needed.
  4. Authenticity – For IS it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine.

To ensure that NBFCs are compliant with these rules regarding information security, they can consider Seqrite Encryption Manager which protects corporate data that resides on endpoints with strong encryption algorithms such as AES, RC6, SERPENT and TWOFISH. Supported on all laptops and desktops running Microsoft Windows, data loss is prevented to occur from loss/theft of endpoint. It provides a powerful solution to issues like unauthorized access or protecting private data by maximizing data protection options. Two of the most important advantages of endpoint encryption include exceptional policy administration and key management followed by highly functional remote device management.

Some of the key benefits of SEM that make it a good option for NBFCs are:

  • Centralized management and control
  • Full disk encryption with assured data protection and compliance
  • Encryption of removal media devices providing security across multiple removal media devices
  • Ease of deployment and rescue methods

On the topic of cybersecurity, the RBI outlined the need for a board-approved cybersecurity policy, vulnerability management, cybersecurity preparedness indicators, the need for a cyber crisis management plan, sharing of information on cybersecurity incidents with RBI along with various tenets. Recognizing the importance of the mobile in today’s day and age and the role it plays, the RBI also outlined directions for it:

Mobile Financial Services

NBFCs that are already using or intending to use Mobile Financial Services should develop a mechanism for safeguarding information assets that are used by mobile applications to provide services to customers. The technology used for mobile services should ensure confidentiality, integrity, authenticity and must provide for end-to end encryption.

If NBFCs want to take heed of this and opt for a Mobile Device Management solution that can secure mobile devices, they can consider Seqrite Mobile Device Management, a comprehensive, state-of-the-art solution which offers all basic and advanced features enabling NBFCs to defend themselves from malicious attacks whilst not impacting their resource utilization. The solution can be deployed and modulated over cloud within a very short span of time. Its easy enrollment makes the user registration, setup and policy syncing a seamless efficient experience irrespective of the location of the end user. A unified management console enables the organization to view, manage and synchronize all the subscribed devices through a central GUI.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostGandCrab says, “We will become back very soon! ;)”
Next Post  Beware! Your website might be delivering Emotet malware
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

    June 8, 2023
  • patch_management

    What happens when you don’t patch your software?

    March 6, 2019
  • Seqrite mSuite – everything you need to know

    March 4, 2019
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies