Site icon ICT Frame

What Does It Take To Breach A Lock? Microsoft Digital Crimes Unit

What does it take to breach a lock

Share It On:

What does it take to breach a lock? The first thing that strikes our mind after reading the statement is breaking the lock. In this era of Digital transformation, everything is moving towards technology. As days are passing by Cyber crimes are increasing rapidly. Now, people are not interested in robbing your houses or jewelry shops they are transferring towards looking into your systems. Cybercrime, or computer oriented crime, is a crime that involves a computer and a network. The processor may have been used in the commission of a crime, or it may be the target. Cyber crimes: “Offences that are committed against individuals or groups of individuals with a criminal motive to nationally & internationally harm the reputation of the victim or cause physical or mental harm, to the victim indirectly or directly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notices and among the groups) and Cell phones (Bluetooth/SMS/MMS)”. Cybercrime may threaten an individual or nation’s Cybersecurity and Financial Institutions. Most of the Issues surrounding crimes have become high-profile, notably those surrounding hacking, copyright infringement, unwarranted mass-surveillance, extortion, child pornography, and child grooming. There are so many problems of privacy when confidential information is intercepted, lawfully or otherwise.

After realizing that this is a huge problem that’s rising ahead and can attack us even before we know about it, Microsoft organized an event today at Annapurna Hotel, Dubarmarg from 9:15 to 12:15 PM. In this event, we had some guests who arrived from Microsoft South East Asia New Markets to take over the session on Cybercrime and cybersecurity. They gave the brief knowledge about what it looks like to get breached and made us aware that none of us are untouched by this problem. Also, they talked about how does Microsoft helps to prevent Cybercrimes.

The session kicked off with the welcoming speech of Sonia Kabir, Managing Director Microsoft Bangladesh, Nepal, Bhutan, and Laos. She focused on what digital transformation looks like in the developing countries like ours and how can we go hand in hand with Microsoft to empower every individual and organization on the planet to achieve more.

Followed by her, we had Shalini Ratwatte, Head of Corporate, External and Legal Affairs speaking about what Cybercrime is, how can a small or significant organization get affected to it and why is Microsoft interested in Cybercrimes and Cybersecurity. She presented us with a whole new perspective of looking into how can we secure our systems and data from these crimes.

Then, we had Chinthaka Dunuwille, Microsoft Software Asset Management Team who sparked a light on cloud technology and how safer, more comfortable and convenient this technology today has become to make sure that our data and everything that we want not to be stolen is kept safe and untouched inside the cloud. With his session, we were able to realize that Cloud Technology is more reliable and is decidedly less likely to get hacked or get attacked by malware. Today every individual and organization are moving towards the cloud because we know this is where future is.

Now, we had Arafat Khan Chowdhury, Microsoft Premier Support Team who gave us the knowledge about Microsoft’s cybersecurity capabilities and how Microsoft is integrated with existing security architectures and capabilities. He also introduced us to the services, devices and many other areas of Microsoft security through which we can protect our systems and data. Finally, for ending the event, we had Deependra Bajracharya, Business Development Manager, Nepal, and Bhutan.

He gave a brief description of how Microsoft operates in Nepal with the conclusion he thanked all the guests who gave their time and shared their knowledge in today’s event. With this, the formal event came to an end followed by a Q&A session and lunch.

Author: Melish Ghimire


Share It On:
Exit mobile version