India Ask Companies To Report Cybersecurity Incident Within Six Hours

Share post:

The Indian government’s new policy requires organizations in the country to report cybersecurity incidents within six hours, including incidents involving vulnerability scans of computer systems.

The measure, along with other measures, was announced by the Indian Computer Emergency Response Team (CERT-In).

They were incorporated into Section 70B of the Information Technology (IT) Act, 2000 and are now part of the Indian law and will come into effect in 60 days.

The types of cybersecurity incidents that need to be reported to CERT-In include targeted scanning /probing of critical networks / systems, critical systems / information, unauthorized access to IT systems/data, defacement of website or intrusion into a website, malicious code attacks, attacks on servers, identity theft spoofing and phishing attacks, DoS and DDoS attacks, and attacks on critical infrastructure.

Others include attacks on applications, data breaches, data leaks, attacks on IoT devices and related devices, attacks or incidents involving digital payment systems, attacks through malicious mobile apps, counterfeit mobile apps, unauthorized access to social media accounts, and attacks or malicious/suspicious activities involving cloud computing systems and applications related to Big Data, Blockchain, virtual assets, and others.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Microsoft’s AI success may spell defeat for it’s climate goals

Microsoft's ambitious strides in AI technology are now posing a significant challenge to its own climate goals, as...

OpenAI’s Chief Scientist Ilya Sutskever Departs Company

Ilya Sutskever, co-founder and chief scientist of OpenAI, has officially announced his departure from the company. This move...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways