Page 17 - Risk Management Bulletin Jan- Mar 2022
P. 17

RMAI BULLETIN JANUARY - MARCH 2022


                 design, committee oversight, detailed roles and  activities says a lot about their business. Having a good
                 responsibilities, resource requirements.     hold on outsourcing is necessary to mitigate associated
                                                              threats  and  vulnerabilities  ranging  from  the
              b) Strategy & Objectives: ORM goals, design ORM
                                                              operational  impact of  third-party  failures  to the
                 framework, capabilities and skills, development
                                                              reputational impact  of poor work practices of third
              c)  Policies: ORM policy design, integration with other
                                                              parties.
                 policies and standards
              d) ORM tools and Processes: Data loss governance,  But it also sets the standard by which third parties will
                 alignment with strategic planning and accounting  perceive the organization and managed effectively,
                                                              could  open  the  door  to  strategic  opportunities
              e) Supporting  Systems:  Business requirements,
                                                              emanating  from  positive  cost-reduction  and
                 Vendor selection, Change management
                                                              innovation. Organizations  that lose control of their
              f)  Measures and  Reporting:  KRI, Internal  ORM
                                                              management  of  outsourcing  face  heightened
                 reporting  flows,  External  ORM  disclosure
                                                              regulatory  scrutiny,  reputational  damage  and,
                 requirements
                                                              ultimately, consumer backlash.
              Conclusion:                                     Reference:
              To Conclude, the way a firm manages its outsourcing  Various Sources.


                   Biggest target of cyber threats is Indian education

                                             sector, says report

               According to a report titled 'Cyber Threats Targeting the Global Education Sector', India is the biggest target
               of cyber threats to educational institutions and online platforms followed by the USA, the UK, Indonesia and
               Brazil. The key triggers that enlarged the attack surface includes the adoption of remote learning during the
               Covid-19 pandemic, digitisation of education, and prevalence of online learning platforms.

               The report also claimed that data shows a 20% increase in cyber threats to the global education sector in
               the first three months of 2022 when compared to the corresponding period of 2021.
               "Of the threats detected in Asia and Pacific last year, 58% of them were targeted at Indian or India based
               educational institutions and online platform. Indonesia was distant second being the target of 10% cyber
               threats. This included attacks on BYJU's, IIM Kojhikode and Tamil Nadu's Directorate of Technical Education,"
               the report said. The report findings indicate that several cybercriminals are actively leaking databases,
               accesses,  vulnerabilities and exploits, and other information belonging to educational institutions,  on
               cybercrime forums.
               "Databases and accesses are the most commonly sought after data types. The databases leaked from
               educational institutions primarily contain information Personally Identifiable Information (PII) of students
               and their families, including name, date of birth, email address, phone number, and physical address; website
               user records and credentials and examination results and scores," it said.
               "Overall, the USA was the second most affected country across the globe with a total of 19 recorded incidents,
               accounting for 86%of the threats  in North  America. These include ransomware attacks on prestigious
               institutions such as Howard University and University of California. In addition, high-risk API vulnaribilities
               were uncovered in Coursera, the massive open online course provider," the report added.
               The report has been compiled by the Threat Research and Information Anayltics Division of CloudSEK, a
               Singapore-based AI-driven Digital Risk Management Enterprise.

               The experts have asserted in the report that given the size and impact of the education sector, it is critical
               for institutions, students, parents, teachers, and the government to ensure that the information gathered
               and stored is not leaked and exploited by cybercriminals.



                                                           15
   12   13   14   15   16   17   18   19   20   21   22