Wednesday Dec 11, 2024
Thursday, 21 June 2018 00:00 - - {{hitsCtrl.values.hits}}
Cyber security is becoming so important to Sri Lanka. We hear of security breaches every day, these are either maliciously planned hacks or purely based on negligence of the employees which make the organisation vulnerable to lawsuits.
Most organisations don’t even know that they are vulnerable until something goes wrong. What if all your financial data are just leaked to some random person? What would you do in such a situation?
“We want to make sure that organisations are fully equipped to battle cybercrime as well as the actions of negligent workers who could tarnish the goodwill and reputation of the organisation,” said Exire Technologies CEO Nishan Wimalachandra.
“Most organisations believe that their current ICT security infrastructure is sufficient to battle modern-day cyber threats, whereas compared with the latest developments in technology they must keep themselves updated to face these challenges, as hackers possess superior technologies which can breach even the most sophisticated security systems.
“Therefore we could assist any organisation that their critical information, source codes, patent worthy ideas, and inherited intellectual assets such as recipes etc. are protected from criminals. We have the capability to even stop accidental information flows to third parties which could be devastating to the organisation holding such information and for the individuals who have trusted the organisation with their intimate data. For example people’s financial and medical data are so personal that if leaked to third parties, this could cause panic.”
Exire Technologies is a company which is against cyber theft, theft of intellectual capital, and wants to ensure that no one loses their hard-earned work due to security flaws.
Virus guards and firewalls are a necessity to any network, whereas with the sophistication of criminals, virus guards and firewalls alone cannot provide security.
“We cannot just wait until something really goes wrong to do something about it; so proactive defence is worth investing in than damage control,” said Wimalachandra.
With the availability of information on how to hack firewalls on the internet, a person with basic IT background can easily hack and take away the pride of the organisation.
“We have the expertise to secure any network and connected assets, whether it be a home network or a large enterprise level network. We are currently resolving some serious issues faced by few financial institutions about preventing future mishaps as our solutions could even prevent human error.
“Technology deployed by Exire Technologies not only protects existing systems, even ERP applications and software programs which are being developed could be secured while being developed. Our solutions support any technology.”
For instance many companies get applications designed by third parties and give it to their customers to use, a simple example would be how financial institutions and telco companies provide third party developed applications to their customers. “With our solutions, we could verify whether the applications developed for customer use are secure, if not we could suggest how to secure them.”
Wimalachandra added: “Our technology supports all Bring Your Own Device (BYOD) to work, and privilege access management systems to ensure that they are only allowed to work according to the whims and fancies of the employer. Our technology can use GEO fencing and biometric scanning to authenticate the users and grant them privilege access.
“Our technology can monitor even the systems administrators, and can give access to CEOs to monitor the activities of their most senior IT work force even with video recording of their screens to assess what the employees are doing. Up to now there has been no way to monitor the IT force which monitors everyone’s activities. This is one way to protect personal data from being sent out by people who have excess access to ICT resources.” Many companies have their in-house developed software and hardware solutions to handle data breaches and hacks and these organisations believe that homemade or collective remedies can handle these mishaps whereas we are professionally equipped with latest technologies to prevent data breaches, as the sophistication of threats also gets advanced every minute, organisations must hand over this job to the professionals to handle.
On 25 May European Union legislation implemented GDPR compliance, as a whole Sri Lankan business entities aren’t equipped to comply with GDPR.
General Data Protection Regulation (GDPR) is now in effect which affects every organization transacting, dealing and communicating with EU citizens or residents in whatsoever capacity relating to their personal data.
“Unfortunately as a country we are not prepared to address this compliance standard, therefore repercussions could be devastating as the fines for noncompliance are well defined and unimaginable and beyond our control in case of a non-compliance. We have the expertise and technology to assist any organisation in Sri Lanka to comply with GDPR on technological and process parameters,” said Wimalachandra.
“Most ICT security firms just sell products to enterprise level businesses, whereas homes are not protected due to the unavailability of such products. Today parents use virus guards to protect their children’s computers from viruses, but they are not able to protect them against child predators, pornography, cyber bullying, social network misuse, etc.”
Another security flaw is that most people including CEOs of large companies now use home network to access office resources, so if the home network is compromised, the login credentials and other access are compromised.
“We have the solutions to protect and secure home networks as well thereby protecting your family that matters most. We have the technology to monitor, secure and protect home networks, mobile phones, CCTV cameras, Smart TV cameras, from anywhere in the world using mobile applications to ensure that your loved ones are safe from intruders to your home network.”
More information could be obtained by contacting Exire Technologies via [email protected] or visit www.exiretechnologies.com.