• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Data Loss Prevention • Data Protection  /  The Data breach inferno burning big-ticket businesses
The Data breach inferno burning big-ticket businesses
05 February 2021

The Data breach inferno burning big-ticket businesses

Written by Seqrite
Seqrite
Cybersecurity, Data Loss Prevention, Data Protection

The recent surge of data breaches in different Indian companies has left security stakeholders worried. It is a clear indicator that enterprises will have to do much more to ensure they keep sensitive customer data safe.

Perhaps, the most newsworthy among these has been the data breach at BigBasket, one of India’s top online grocery stores. Reports suggested that sensitive details (full name, email IDs, password hashes, etc.) of over 20 million BigBasket users were put up for sale on the dark web for USD 40,000. BigBasket acknowledged the data breach and assured its customers that financial details had not been leaked as the company only stored data like phone numbers and addresses.

Government concerns about a large number of cyberattacks

This year, in particular, has seen a range of cyberattacks targeting sensitive data of various organizations with the attackers aiming to take advantage of the chaos and confusion created due to the ongoing COVID-19 pandemic. From reports of data leaked from the personal website of India’s PM Narendra Modi to security breaches at Dunzo and White Hat Jr to cyberattacks on pharma companies like Dr. Reddy’s and Lupin, even the Government of India has become concerned.

According to a report in the New Indian Express, a senior government official spoke of the government’s concern of these many data breaches and suggested that there would be regulatory follow-up actions to ensure that customer data was kept safely.

Data protection is one of the key highlights of India’s proposed Data Protection Bill which is currently being evaluated by a Joint Parliamentary Committee. However, enterprises cannot wait for a formal law to be passed – the protection of sensitive customer data is a critical parameter that can decide success or failure. Apart from just the financial pitfalls of customer data being leaked, these data breaches can lead to a storm of negative media coverage which can inordinately damage a company’s reputation.

Data protection has to be a key priority!

With many enterprises still operating with Work From Home (WFH) staff, the risks become even more apparent. At Seqrite, we had previously done an explainer on the many ways in which organizations are vulnerable to data breaches due to WFH employees. You can read the entire article here, but the summary is:

  • Deployment risks continue to be a major challenge and it is quite realistic to assume that there wasn’t a foolproof migration from a work environment to a home setup. It is also important to keep in mind that a consequent migration from home to work could also lead to gaps in an enterprise’s cybersecurity framework.
  • The Bring Your Own Devices (BYOD) policy is a major challenge as it means employees use company data on personal devices. The risk of data exfiltration is high.
  • Carelessness on the part of employees when it comes to cybersecurity is a big risk. In many cases, employees simply don’t care about cybersecurity and don’t follow precautions.

Keeping sensitive customer data safe has to be a top priority for enterprises. Seqrite Endpoint Security (EPS) offers a host of powerful features including Ransomware Protection, Data Loss Prevention and Phishing Protections, to ensure enterprises have the best protection when it comes to securing their data.

 Previous PostBEC and Ransomware attacks increase during the pandemic
Next Post  Pharma Sector needs to streamline its insides to avoid cyberattac...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Practical Steps to Comply with India’s DPDPA: A Guide for Businesses

    May 13, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies