Kolkata: Two persons, identified as Sravan Soni and Ravi Verma, have been arrested by Posta police station for allegedly blackmailing a businessman. It was alleged that the accused persons were using some pictures where the businessman could be seen being intimate with a woman.Sources informed that the complainant is a resident of Guwahati, who owns a business in Hanspukuria Street. For his business, he used to travel between Guwahati and Kolkata frequently. A few months ago, he met with a woman and developed a close relationship with her. Recently, he went to a hotel with the woman and took some pictures while they were sharing personal moments. Also Read – Rain batters Kolkata, cripples normal lifeAfter a few days, the businessman received a message containing a picture which he had clicked with the woman. The sender then called him and asked for Rs 50 thousand. The accused also threatened of circulating the pictures among his close ones if he did not pay the money. After a few calls with the same demand, the businessman lodged a complaint with the Posta police station. After commencing investigation, sleuths traced the accused in and around Posta and Burrabazar, after getting the tower location of the number which was used to call the businessman. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedImmediately, police requested the complainant to call the accused and ask him to receive the money. On Saturday night, when Soni came to take the money, he was surrounded by police. Later, Soni stated that he was doing this as per order from his friend Verma. Police then arrested Verma as well. Later, it came to light that the complainant had showed the pictures to Verma, who is a friend of him. After seeing the pictures, Verma came up with the idea to blackmail and extort money from his friend.
Growing a business sometimes requires thinking outside the box. 5 min read May 31, 2016 When it comes to hackers and cyberattacks, the name of the game is staying ahead of these people and programs that can sabotage a company, especially if you are a small-business owner. While larger companies can bounce back from data breaches (even if it will cost them a fortune), small to midsize business don’t always have the resources.To make sure small-business owners are equipped with the tools and resources needed to stay protected, we asked a number of experts what security threats SMBs face and how to remain safe.Here is what they had to say:It is an industry-wide issueSMBs should stay on the lookout for what is happening in their industry. If, for example, a software manufacturer has a large part of your industry’s market share, you have to assume that application is a target, because when hackers find a way in, they can find it broadly. If a hundred hospitals are running the same version of the same patient information system, they all have the same risk.Related: The Major Security Risks Small Businesses Face and How to Defend Against ThemEveryone remembers the Target and Home Depot hacks, but not everyone may know that it was the same virus, a virus designed to swipe card data specifically from point-of-sale terminals, running Microsoft Windows. This same scenario can play out in nearly any vertical that has valuable data — healthcare, education, government, retail, ecommerce.– Cortney Thompson, Chief Technology Officer of Green House Data, an environmentally conscious data center serviceRisks will move across all your networkSMBs should focus on the many ways the business is networked and connected to outside organizations and people — from third-party providers to clients, employees and customers. We have never been more networked and that means we have never been more vulnerable. Small and mid-size businesses need to carefully watch trends around data sharing and access because this is what cyber criminals are after: data. It’s critical to always know exactly who has access to company data and how it is being protected whether it’s on in house servers or somewhere in the cloud. Keeping up with the trends and best practices for managing and monitoring data access is critical to the success of any business today.– Anna Frazzetto, Chief Digital Technology Officer and SVP at Harvey Nash, an IT recruiting firmRansomware and spear-phishing scams are getting more advancedWe are seeing more carefully crafted, well researched spear-phishing and ransomware attacks.For instance, businesses have been targeted lately by scams attempting to get employee tax documents and company financial data. In these cases, someone might pose as the company CEO (or CFO) and then gets a copy of everyone’s W2 or order the execution of a wire transfer.On the other hand, ransomware is when a virus gets installed and the users get completely locked out. There is no way to access the data, as it all becomes encrypted by the attacker. In exchange for money, the attacker will unlock the computer and give users access again. Depending on how important the affected computer is to the business, this could cripple a company. There are services that can help fix some types of ransomware.– Arne Josefsberg, Chief Information Officer of GoDaddy, an Internet domain registrar and web hosting companyRelated: Here’s How to Build a Strong Security Team to Keep Your Company Safe and SoundSecurity vulnerabilities are going to spreadBig data, data analytics and business intelligence have transformed marketing, sales and the bottom line. These same trends are going to take off very soon in security.We are collecting all this data. Now we have to be able to sift through it and make it valuable. Unless we learn from it and use it to make our organizations safer, why collect it in the first place?Connected to this is the idea of machine learning. There is so much data that a single employee can’t possible track all network events. A single person can look at about 100 events per day. Most small/midsized businesses have 100,000 – 500,000 events per day. We need machines to be able to analyze the network and alert us when they register an abnormality that we can investigate.– Greg Kushto, Director of Security Practices at Force 3, a network security company.Related: 7 Cybersecurity Layers Every Entrepreneur Needs to UnderstandBYOD devices will continue to be vulnerableAll businesses should be focusing, in part, on their porous networks. BYOD and wireless connectivity dominate the end-user requirements. As such, these pose an enormous risk that needs to be managed. SMBs should be focused on implementing security programs consistent with how users work. If not, users will circumvent controls.– Rick Orloff, Chief Security Officer of Code42, a data-protection company Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Register Now »