A close-up on an abstract design of a display, which is warning about a cyber attack. Multiple rows of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, etc...

During the press meet of CISCO Global Cyber Security Summit on Tuesday, Sunina Ghimire Pandey, Vice President of CAN Federation, informed around 800 cyber crimes occurred in Nepal last year but among them, only 11 cases were filed in the court. Pandey also apprised more numbers of deadly cyber attacks can be anticipated in future as all our data has been recorded in the computer system. With that, she also reported different kinds of cyber attacks that are mostly transpired in Nepal. List of those cyber attacks are as mentioned:

  • Attacks on social media
  • Piracy
  • Identity Threat
  • Unauthorized access
  • Website hacking

According to International global trend person under the age group of 12-67 has a high risk of experiencing cyber attacks.

Nepal is very new with terms like cyber attacks and cyber crimes. Still, no proper laws and policies haven’t made in Nepal regarding cybersecurity. Since the government is indifferent to prioritize the sector of ICT, the area of cybersecurity is moving towards a complicated situation.

But in recent days, for many of the Nepalese threat regarding cybersecurity has been one of the major issues. Almost all governmental and non-governmental organization is relying on digitals media to fulfill their regular task, but they are still unaware of cyber attacks and measure to be secured from it.

There are only a few organizations in Nepal that look after cybersecurity. Some of those organizations are NPCERT, LogPoint and Check Point.

NPCERT  

NPCERT is a society of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal. The attack on Information infrastructures are increasing in frequency and scale so, to address all these issues, not-for-profit NPCERT was established.

LogPoint

LogPoint enables organizations to convert data into actionable intelligence, improving their cybersecurity posture and creating immediate business value. It’s advanced next-gen SIEM, UEBA, and Automation and Incident Response solutions, simple licensing model, and market-leading support organization empower the customers to build, manage and effectively transform their businesses.

LogPoint provides cyber security automation and analytics that create contextual awareness to support security, compliance, operations, and business decisions.

Check Point

Check Point Software Technologies Ltd. is a multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security, and security management.

To discuss more and to enhance more knowledge on cybersecurity NPCERT is organizing CISCO Global Cyber Security Summit (GCSS) 2018 at the capital on 27th and 28th of July in an association with; Ncell, LogPoint, checkpoint, and Texas International College.

Previous articleCISCO Global Cyber Security Summit To kick off In Capital
Next articleHuawei Launches Nova 3 And Nova 3i In Nepal
Mina Aryal is a Nepali tech journalist and media expert. She is currently the chief editor of ICT Frame, a leading online tech media outlet in Nepal that covers topics such as technology, business, and entrepreneurship. Aryal has been involved in the field of tech journalism for over a decade and has covered various topics such as internet governance, cybersecurity, e-commerce, and startup ecosystems. She has also been involved in organizing and promoting tech events in Nepal to bring together tech enthusiasts, entrepreneurs, and investors to discuss and collaborate on various topics related to the tech industry. Aryal is considered one of the most influential tech journalists in Nepal and has been recognized for her contributions to the field.

LEAVE A REPLY

Please enter your comment!
Please enter your name here