Vulnerability, Threat and Risk : Key difference with Examples

Vulnerability, threat and risk are most common used terms in the information security domain. They form the building blocks of advanced concepts of designing and securing security posture of any organization. However, these terms are often confused and hence a clear understanding becomes utmost important. We have tried to make the concepts easy to remember with a learning key and relevant examples.

Read More

Steps of Physical Security Assessment

Physical Security is an important area of Information Security Risk Assessment Process. If other technical controls are well placed coupled with weak physical security, the breach is prone to occur. Physical access controls fall first in the line of defense to deter/detect the malicious activities and must be the strongest. The steps of physical security assessment comprises of the following steps

Read More

Encashing Energy Efficiency from Automated Teller Machines (ATMs)

There are over two lakh Automated Teller Machines (ATMs) owned by various banks in India. Increasing digitization and financial inclusion, demand setting up of ATMs in each nook and corner of the country. To banks ATMs are cost centres, involving high upfront investment and recurring costs. 24*7 ATM cooling & lighting energy bills are a major operating cost. The use of energy efficient appliances can bring down electricity bills and ATM operating costs.

Read More