• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News • Security  /  Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs
12 November 2018

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Written by Seqrite
Seqrite
News, Security
  • 27
    Shares
Estimated reading time: 4 minutes

The recent spate of cyber-attacks on banks in India has left everyone worried. For those who haven’t kept count, Pune-based Cosmos Bank recently saw a massive security breach where Rs 94 crore was siphoned off. In a similar incident, about $2 million was stolen from City Union Bank through a cyber-attack. The Union Bank of India also fell prey to a hacking attempt and lost around $171 million, though they managed to recover it.

Taking cognizance of the growing need for banks to secure themselves against this onslaught of cyber-attacks, the Reserve Bank of India (RBI) recently issued a circular calling for a robust cybersecurity/resilience framework for Urban Cooperative Banks (UCBs) to ensure proper security.

The circular also contains an annexure which has details on an indicative, but not exhaustive basic cybersecurity framework which is to be implemented by all UCBs. All the UCBS are advised to frame a policy on cybersecurity immediately. After framing of the policy, UCBs are advised to implement basic Cyber Security Controls as indicated in Annex I and report the same to respective Regional Offices of Department of Co-operative Bank Supervision on or before March 31, 2019.

Some of the controls mentioned in this annexure are:

  • Inventory Management of Business IT Assets

As per the annexure, this point emphasizes the maintenance of a business IT Asset inventory register with the minimum following fields: IT Assets, systems where customer data is storied, criticality of IT assets, classification of data based on sensitivity, management and protection of data within/outside the UCB network, etc.

How Seqrite can help:  Seqrite’s Endpoint Security solution offers Asset Management as an integral cybersecurity feature. This feature monitors the software and hardware configurations of the concerned endpoints; thereby assisting administrators and IT managers look closely at the organization’s underlining hierarchy. Asset management identifies the systems and software modules that need to be patched for updates while rendering selective application control, restricted accessibility, file activity monitor and other forms of protective measures. Additionally, Seqrite’s Endpoint Security offers Asset Management for analyzing the hardware and software modifications at the endpoints while implementing changes. In addition to this, Seqrite Encryption Manager (SEM) protects corporate data residing on endpoints with strong encryption algorithms such as AES, RC6, SERPENT and TWOFISH. It even encrypts the contents on removable devices such as Pen Drives, USB Drives and makes it accessible only to the authorized users.

  • Preventing access of unauthorized software

In brief, this point calls for a mechanism to be put in place whereby installation of software/applications on systems in the bank can be controlled and unauthorized software/applications can be blocked/prevented.

How Seqrite can help: Seqrite Endpoint Security (EPS) offers Application Control which allows enforcing control over the use of unauthorized applications within the network. Advanced Device Control allows enforcing policies regarding the use of storage devices, mobile and portable devices, wireless devices, network interfaces connected to endpoints. Asset Management gives total visibility of hardware and software running on endpoints and also helps to track software /hardware changes happening on endpoints.

  • Network Management and Security

This point calls for proper configuration and assessment of network devices with password management, control of wireless local area networks, access points.

How Seqrite can help: Seqrite’s Unified Threat Management (UTM) solution offers a one-stop solution for network visibility and can be considered by UCBs. UTM reduces security complexities by integrating key IT security features in one integrated network security product. The platform brings network security, management, backup and recovery of UTM data and many other critical network services together under a single unified umbrella, tailored to suit the complexity of emerging threat scenarios.

  • Anti-Virus, Patch Management and Firewall

The annexure also calls for systems and processes to be in place to identify, track, manage and monitor the status of patches to servers, operating system and application system. An updated anti-virus protection solution is also recommended along with firewall configurations set to their highest setting.

How Seqrite can help: Seqrite’s Unified Threat Management solution concentrates on offering a host of security solutions without the organizations having to rely on multiple service providers. Unified Threat Management is a holistic service that comes forth with the features like content filtering, VPN, firewall and anti-virus protection clubbed under a single dashboard. A UTM firewall boasts of a network intrusion prevention system or the IPS which in turn prevents hackers from attacking servers and unpatched PCs thus keeping severe threats like ransomware at bay. Apart from that, it offers secure and private remote access to the employees even when they are outside the company premises. Lastly, Unified Threat Management equips an organization to automatically update its security schema, anti-virus definitions, and other associated features. Seqrite EPS also offers a centralized patch management feature to patch vulnerabilities of applications. Other advanced features such as Anti Ransomware offers protection from ransomware attacks and automatically takes back-up of files. Seqrite Data Loss Prevention (DLP) prevents data loss by monitoring confidential and user defined data shared through removable drives, network or various applications.

Seqrite’s range of innovative, powerful solutions including Endpoint Security (EPS), Seqrite Encryption Manager, and Unified Threat Management (UTM) make it a good investment for Primary Urban Cooperative Banks (UCBs) to fortify their security investment and comply with the RBI’s circular, thus ensuring a safer, smoother experience for customers and employees alike.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostThe truth about the Twitter cryptocurrency giveaway
Next Post  Beware of these 5 scams this holiday season!
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • biometric-authentication

    Biometric authentication data at risk

    February 12, 2019
  • How to be a smart voter and not become a target of political campaigns on digital platforms

    February 11, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • This is how hackers can invade your system without installing malware This is how hackers can invade your system without installing malware February 1, 2019

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Ankita Ashesh
    Ankita Ashesh

    Ankita is a Communications Strategist at Quick Heal with a passion for covering...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • GandCrab Riding Emotet’s Bus!

    GandCrab Riding Emotet’s Bus!

    February 15, 2019
  • Increase in threats to mobile devices

    Increase in threats to mobile devices

    February 14, 2019
  • Biometric authentication data at risk

    Biometric authentication data at risk

    February 12, 2019
Tweets by @Seqrite

Join our Newsletter

Sign up for our Newsletter and get regular cybersecurity round-ups delivered to your inbox.

Follow Us On

Topics

Antivirus For Linux (9) Antivirus For Server (9) Bitcoin (6) Cryptocurrency (7) Cyber-attack (29) cyber-attacks (54) Cybersecurity (165) cyber security (24) Cyber threat (28) cyber threats (44) data breach (48) data breaches (27) data loss (28) data loss prevention (33) data protection (20) data security (13) DLP (49) Encryption (11) endpoint security (94) Enterprise security (12) Exploit (12) firewall (8) GDPR (7) hackers (7) incident response plan (9) malware (24) malware attack (20) malware attacks (12) MDM (18) mobile device management (9) Network security (16) Patch Management (12) phishing (15) Ransomware (43) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (15) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Unified Threat Management (7) UTM (30) Vulnerability (9) WannaCry (7)

Products

  • End Point Security (EPS)
  • Seqrite Encryption
  • Seqrite Endpoint Security Cloud
  • Mobile Device Management (MDM)
  • Cloud Security
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2018 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.