DH Latest NewsDH NEWSLatest NewscyberIndiaNEWSTechnologyInternationalMobile AppsCrime

Warning: Do not use Google Drive, Dropbox, or VPN apps, Read more…

To protect its systems from potential cyber-attacks, the Indian government has warned its staff not to utilize services such as Google Drive, Dropbox, and third-party virtual private networks (VPN). These procedures are said to be included in a 10-page guideline issued this week by the National Informatics Centre (NIC). Its 24-point scale essentially specifies the cyber security do’s and don’ts for the country’s federal personnel.

According to many sources, the recommendation recommends that any usage of third-party programs be avoided for security reasons. We also independently validated the document, which is available on the Ministry of Highways’ website, as Business Standard reported in its story.

The government also prohibits its workers from downloading sensitive information from any non-government cloud service. It also prohibits the installation of third-party toolbars in web browsers. The Centre appears to want its staff to practice basic cyber hygiene, which includes steps such as not exchanging passwords with unauthorized individuals and not utilizing external storage devices (such as a USB drive) on government networks.

‘The rising acceptance and usage of ICT have increased the attack surface and danger perception to the government, due to a lack of adequate cyber security measures implemented on the ground,’ NIC notes in its guidelines. All of these efforts are reasonable, but banning the use of services like Google Drive and VPN programs shows that the government is preparing the way for its own authorised services. We still don’t know what they are, and the government hasn’t said what alternatives to these huge digital platforms are available to its employees.

Security analysts have observed an increase in cyber attacks on government entities, and the new NIC guidelines should be followed by government employees. The measures detailed here are genuine, and while they may appear simple, they are equally effective in thwarting possible attacks from third-party actors looking to steal confidential government data.

shortlink

Post Your Comments


Back to top button