$user = $this->Session->read('Auth.User');
//find the group of logged user
$groupId = $user['Group']['id'];
$viewFile = '/var/www/html/newbusinessage.com/app/View/MagazineArticles/view.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$user = null
include - APP/View/MagazineArticles/view.ctp, line 54
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Notice (8): Trying to access array offset on value of type null [APP/View/MagazineArticles/view.ctp, line 54]
$user = $this->Session->read('Auth.User');
//find the group of logged user
$groupId = $user['Group']['id'];
$viewFile = '/var/www/html/newbusinessage.com/app/View/MagazineArticles/view.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$user = null
include - APP/View/MagazineArticles/view.ctp, line 54
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Notice (8): Trying to access array offset on value of type null [APP/View/MagazineArticles/view.ctp, line 55]
//find the group of logged user
$groupId = $user['Group']['id'];
$user_id=$user["id"];
$viewFile = '/var/www/html/newbusinessage.com/app/View/MagazineArticles/view.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$user = null
$groupId = null
include - APP/View/MagazineArticles/view.ctp, line 55
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Notice (8): Undefined index: summary [APP/View/MagazineArticles/view.ctp, line 62]
$viewFile = '/var/www/html/newbusinessage.com/app/View/MagazineArticles/view.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$user = null
$groupId = null
$user_id = null
include - APP/View/MagazineArticles/view.ctp, line 62
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Notice (8): Undefined index: summary [APP/View/MagazineArticles/view.ctp, line 68]
$viewFile = '/var/www/html/newbusinessage.com/app/View/MagazineArticles/view.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$user = null
$groupId = null
$user_id = null
include - APP/View/MagazineArticles/view.ctp, line 68
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.
Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.
Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment.
(Poudel is working as the Information Security Officer of Nabil Bank Ltd)
$viewFile = '/var/www/html/newbusinessage.com/app/View/Elements/side_bar.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
include - APP/View/Elements/side_bar.ctp, line 60
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::_renderElement() - CORE/Cake/View/View.php, line 1224
View::element() - CORE/Cake/View/View.php, line 418
include - APP/View/MagazineArticles/view.ctp, line 279
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Warning (2): simplexml_load_file() [<a href='http://php.net/function.simplexml-load-file'>function.simplexml-load-file</a>]: I/O warning : failed to load external entity "" [APP/View/Elements/side_bar.ctp, line 60]
$viewFile = '/var/www/html/newbusinessage.com/app/View/Elements/side_bar.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
simplexml_load_file - [internal], line ??
include - APP/View/Elements/side_bar.ctp, line 60
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::_renderElement() - CORE/Cake/View/View.php, line 1224
View::element() - CORE/Cake/View/View.php, line 418
include - APP/View/MagazineArticles/view.ctp, line 279
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
file not found!
Notice (8): Undefined variable: file [APP/View/Elements/side_bar.ctp, line 133]
$viewFile = '/var/www/html/newbusinessage.com/app/View/Elements/side_bar.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$xml = false
include - APP/View/Elements/side_bar.ctp, line 133
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::_renderElement() - CORE/Cake/View/View.php, line 1224
View::element() - CORE/Cake/View/View.php, line 418
include - APP/View/MagazineArticles/view.ctp, line 279
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117
Warning (2): simplexml_load_file() [<a href='http://php.net/function.simplexml-load-file'>function.simplexml-load-file</a>]: I/O warning : failed to load external entity "" [APP/View/Elements/side_bar.ctp, line 133]
$viewFile = '/var/www/html/newbusinessage.com/app/View/Elements/side_bar.ctp'
$dataForView = array(
'magazineArticle' => array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
[maximum depth reached]
)
)
),
'current_user' => null,
'logged_in' => false
)
$magazineArticle = array(
'MagazineArticle' => array(
'id' => '3967',
'magazine_issue_id' => '1271',
'magazine_category_id' => '56',
'title' => 'Security Transformation is the Need of the Hour',
'image' => '20230809060127_securitysdddddddddddd.jpg',
'short_content' => 'To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy.',
'content' => '<p><strong>By Prabesh Poudel</strong></p>
<p>Most banks are currently undergoing digital transformations, adopting digital technologies to enhance their operations. However, as this transformation progresses, it is crucial for banks to prioritise security and compliance practices in order to minimise risks and promote digital well-being. Therefore, while we talk about digital transformation, it is imperative that security transformation keeps pace and goes hand in hand with the overall process. One of the biggest challenges faced by banks in this scenario is finding effective ways to deliver and maintain security measures at the same speed as digital transformation. It is essential to ensure that every new technology, digital process, customer interaction, and innovation is adequately protected.</p>
<p>Threat actors have shifted their focus to targeting end users, exploiting their behaviours and tricking them into opening malicious files, visiting malicious websites, or providing sensitive information. They often employ tactics that create a sense of urgency, such as lottery payment scams, or take advantage of ongoing crises and events. Therefore, relying solely on a secure system is not sufficient to strengthen information security. User awareness plays an equally important role. There have been instances in Nepal where mobile banking users unknowingly share their passwords or OTPs with fraudsters. To address the challenges related to information security effectively, it is crucial to set a comprehensive security strategy. Security should be approached from multiple angles, including a secure technology infrastructure, continuous security assessment, ongoing security monitoring, and the development of a security culture. All of these aspects should be guided by strong policies and procedures.</p>
<p>Before adopting any digital system, a thorough security assessment should be conducted to ensure its security before implementation. However, the process does not end there, as security is an ongoing effort due to the constant evolution of new threats. Therefore, continuous security assessments, security monitoring, and security awareness programs for users are necessary to establish a robust security culture. It is important to recognise that an effective security posture goes beyond individual components of a security framework. The focus should be on orchestrating these components in a cohesive manner to build a more resilient and effective security environment. </p>
<p>(Poudel is working as the Information Security Officer of Nabil Bank Ltd)</p>
',
'status' => true,
'publish_date' => null,
'created' => '2023-08-09 17:58:14',
'modified' => '2023-08-09 18:01:27',
'keywords' => '',
'description' => '',
'sortorder' => '3879',
'feature_article' => false,
'user_id' => '44',
'image1' => null,
'image2' => null,
'image3' => null,
'image4' => null
),
'MagazineIssue' => array(
'id' => '1271',
'image' => '20230806122052_NBA August Inside_2023_Cover.jpg',
'sortorder' => '1800',
'published' => true,
'created' => '2023-08-06 12:20:52',
'modified' => '2023-08-06 12:24:58',
'title' => 'August 2023',
'publish_date' => '2023-08-06',
'parent_id' => '0',
'homepage' => true,
'user_id' => '44'
),
'MagazineCategory' => array(
'id' => '56',
'title' => 'Sectoral',
'sortorder' => '526',
'status' => true,
'created' => '0000-00-00 00:00:00',
'homepage' => true,
'modified' => '2013-04-01 00:00:00'
),
'User' => array(
'password' => '*****',
'id' => '44',
'user_detail_id' => '1',
'group_id' => '1',
'username' => 'paru.ghimire118@gmail.com',
'name' => null,
'email' => 'paru.ghimire118@gmail.com',
'address' => null,
'gender' => null,
'access' => '1',
'phone' => null,
'access_type' => null,
'activated' => true,
'sortorder' => null,
'published' => null,
'created' => '2023-07-13 17:13:05',
'last_login' => '2024-08-11 22:05:39',
'ip' => '172.68.203.141'
),
'MagazineArticleComment' => array(),
'MagazineView' => array(
(int) 0 => array(
'magazine_article_id' => '3967',
'hit' => '925'
)
)
)
$current_user = null
$logged_in = false
$xml = false
simplexml_load_file - [internal], line ??
include - APP/View/Elements/side_bar.ctp, line 133
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::_renderElement() - CORE/Cake/View/View.php, line 1224
View::element() - CORE/Cake/View/View.php, line 418
include - APP/View/MagazineArticles/view.ctp, line 279
View::_evaluate() - CORE/Cake/View/View.php, line 971
View::_render() - CORE/Cake/View/View.php, line 933
View::render() - CORE/Cake/View/View.php, line 473
Controller::render() - CORE/Cake/Controller/Controller.php, line 968
Dispatcher::_invoke() - CORE/Cake/Routing/Dispatcher.php, line 200
Dispatcher::dispatch() - CORE/Cake/Routing/Dispatcher.php, line 167
[main] - APP/webroot/index.php, line 117