Are we taking proper precaution against cybercrimes? | The Business Standard
Skip to main content
  • Latest
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
The Business Standard

Saturday
June 07, 2025

Sign In
Subscribe
  • Latest
  • Economy
    • Banking
    • Stocks
    • Industry
    • Analysis
    • Bazaar
    • RMG
    • Corporates
    • Aviation
  • Videos
    • TBS Today
    • TBS Stories
    • TBS World
    • News of the day
    • TBS Programs
    • Podcast
    • Editor's Pick
  • World+Biz
  • Features
    • Panorama
    • The Big Picture
    • Pursuit
    • Habitat
    • Thoughts
    • Splash
    • Mode
    • Tech
    • Explorer
    • Brands
    • In Focus
    • Book Review
    • Earth
    • Food
    • Luxury
    • Wheels
  • More
    • Sports
    • TBS Graduates
    • Bangladesh
    • Supplement
    • Infograph
    • Archive
    • Gallery
    • Long Read
    • Interviews
    • Offbeat
    • Magazine
    • Climate Change
    • Health
    • Cartoons
  • বাংলা
SATURDAY, JUNE 07, 2025
Are we taking proper precaution against cybercrimes?

Thoughts

Amzad Hossain
20 February, 2020, 09:15 am
Last modified: 20 February, 2020, 01:15 pm

Related News

  • Asian scam centre crime gangs expanding worldwide: UN
  • Ransomware group ‘Sarcoma’ attacks Popular Life Insurance
  • Singer Sunidhi Nayak reveals incident of life threat, extortion was true
  • Home minister bats for tech-based police force to tackle cybercrimes
  • Lockbit cybercrime gang disrupted by Britain, US and EU

Are we taking proper precaution against cybercrimes?

The threat of social engineering and insecure communication cannot be addressed by any software solutions. These are a result of human malice. In these cases, software companies cannot take liability

Amzad Hossain
20 February, 2020, 09:15 am
Last modified: 20 February, 2020, 01:15 pm
Photo:BSS
Photo:BSS

There has been a growing concern among stakeholders about the recent streak of cyber heist and hacks in different organisations, government websites and applications. As a result, security is currently the top priority for owners of every single website, e-commerce initiative and web application.

We, web developers, are now facing more questions related to cybersecurity than at any time in the past. Every time some remote application of a remote sector gets hacked, we have to answer to our client: "Are you sure hackers won't hack our web application like that?"

Information related to security is just a few keystrokes away, so everyone has their point of view. In a recent meeting with a prospective client, we were asked to build everything from the scratch. No third party libraries, no open source cms (Content Management System). A car buyer never asks the manufacturer to re-invent the wheel. Why do we web developers have to build everything from the scratch?

The Business Standard Google News Keep updated, follow The Business Standard's Google news channel

I am not against the client's curiosity regarding how things work. I always try to explain the mechanism to them in layman terms. Most of the clients often get perplexed with terms like cloud computing AWS, CDN, firewall, two-factor authentication, VPN, SSL etc. They pay hefty prices for tools that they do not need for their static HTML website.

The government's actions to digitise all sectors has boosted growth in the software industry. The number of medium and large projects has grown tenfold. There has been a shift in the demand of the clients too. Nowadays they no longer think that a software can be bought for Tk5,000 only. Many local clients are now willing to allocate a good budget to build a robust system.

The infrastructure of the web server and the architecture of the web application are important to take actions against a possible threat. But the organisations and their managers are overlooking two crucial threats - social engineering and insecure communication.

Social engineering is the art of manipulating people so they give up their secret information. This technic is popular among hackers. It can be used to hack your system without any tool or code. All it requires is smooth-talking skills. Social engineering relies on convincing someone to expose his or her confidential information over the phone or other media.

For example, imagine you have built your precious e-commerce website from company X. One day you get a call from an unknown number. The person says- "Good morning sir, I am developer Y from Company X. Our MD John Doe gave me your number. Sir, due to one of our security run, we need to change your password in the admin panel. I can send you our two-step process, where you will get an email to reset your password where you have to answer a few security questions. That should not take more than 20 minutes. Or it would be easier if you could give me your current password now. I will let you know the updated password right away."

If you are smart enough you might not fall for this trap. But do you think all the employees of your company are smart enough to avoid this trap? Did you train them or conduct small training to avoid leaking any confidential information over a phone call?

It's not that difficult to get your or your developer company's information, thanks to Facebook and LinkedIn.

Insecure communication: 

Sharing information via insecure channel can expose you to hackers. Let's look at some common mistakes:
  
1. Writing down the username and password in the paper. Later you throw this in the garbage without disposing them properly. That can go into the wrong hands.
 
2. We send confidential data over a non-encrypted email channel. If you are using Gmail or other email services, you should be more careful. Do you know, Gmail sometime considers john.doe@gmail.com and johndoe@gmail.com as the same account! So a mail sent to the first address can end up in the inbox of the second one.

3. Your in-house FTP server is not that secure. Stop using that.

The threat of social engineering and insecure communication cannot be addressed by any software solutions. These are human errors. In these cases, software companies will not take liability. You are responsible for securing your confidential information.

To avoid future disaster conduct one or two yearly training sessions regarding security for your organisation and force all the employees to make sure they do not share their information with anyone. Please do not sell old notebooks to hawkers and try to adopt a paperless model.

Top News

cyber crime

Comments

While most comments will be posted if they are on-topic and not abusive, moderation decisions are subjective. Published comments are readers’ own views and The Business Standard does not endorse any of the readers’ comments.

Top Stories

  • Rawhide collected from various parts of the city. Photo taken on 7 June in Old Dhaka. Rajib Dhar/ TBS
    Rawhide prices see slight increase, but below fair value
  • According to tannery officials, most of the hides delivered so far came from madrasas and orphanages in Dhaka. Photo: Noman Mahmud/TBS
    Rawhide collection in full swing at Savar tanneries; 6 lakh hides expected in 2 days
  • Elon Musk listens to US President Donald Trump speak in the Oval Office of the White House in Washington, DC, US, February 11, 2025. File Photo: REUTERS
    Trump asks aides whether they believe Musk's behaviour could be linked to alleged drug use, source says

MOST VIEWED

  • Long lines of vehicles were seen at the Mawa toll plaza, although movement remained smooth on 5 June 2025. Photos: TBS
    Padma Bridge sets new records for daily toll collection, vehicle crossings
  • The government vehicle into which a sacrificial cow was transported by a UNO. Photo: TBS
    Photo of Natore UNO putting cattle in govt vehicle takes social media by storm
  • Army Chief General Waker-Uz-Zaman and his wife exchange Eid greetings with Chief Adviser Muhammad Yunus at the State Guest House Jamuna in Dhaka today (7 June). Photo: CA Press Wing
    Army chief exchanges Eid greetings with CA Yunus
  • Fire service personnel carry out rescue operations after Dhaka-bound Parjatak Express train hit a CNG auto-rickshaw last night (5 June). Several other vehicles also got trapped under the train. Photo: Mohammad Minhaj Uddin
    3 killed, several injured after Dhaka-bound Parjatak Express train hits CNG auto-rickshaw on Kalurghat bridge
  • CA’s televised address to the nation on the eve of the Eid-ul-Adha on 6 June. Photo: Focus Bangla
    National election to be held any day in first half of April 2026: CA
  • Representational image: WHO
    Health ministry urges public to wear masks amid rising Covid-19 infections

Related News

  • Asian scam centre crime gangs expanding worldwide: UN
  • Ransomware group ‘Sarcoma’ attacks Popular Life Insurance
  • Singer Sunidhi Nayak reveals incident of life threat, extortion was true
  • Home minister bats for tech-based police force to tackle cybercrimes
  • Lockbit cybercrime gang disrupted by Britain, US and EU

Features

Photo collage shows political posters in Bagerhat. Photos: Jannatul Naym Pieal

From Sheikh Dynasty to sibling rivalry: Bagerhat signals a turning tide in local politics

8h | Bangladesh
Illustration: TBS

Unbearable weight of the white coat: The mental health crisis in our medical colleges

3d | Panorama
(From left) Sadia Haque, Sylvana Quader Sinha and Tasfia Tasbin. Sketch: TBS

Meet the women driving Bangladesh’s startup revolution

3d | Panorama
Illustration: TBS

The GOAT of all goats!

4d | Magazine

More Videos from TBS

Power shift in Chinese politics, Is Li Qiang emerging in Xi Jinping's shadow?

Power shift in Chinese politics, Is Li Qiang emerging in Xi Jinping's shadow?

2h | TBS World
Eid joy fills the capital, with residents busy performing animal sacrifices

Eid joy fills the capital, with residents busy performing animal sacrifices

8h | TBS Today
Chief Advisor offers Eid prayers at National Eidgah

Chief Advisor offers Eid prayers at National Eidgah

9h | TBS Today
Hamas warns of tougher resistance if fighting doesn't stop

Hamas warns of tougher resistance if fighting doesn't stop

9h | TBS World
EMAIL US
contact@tbsnews.net
FOLLOW US
WHATSAPP
+880 1847416158
The Business Standard
  • About Us
  • Contact us
  • Sitemap
  • Advertisement
  • Privacy Policy
  • Comment Policy
Copyright © 2025
The Business Standard All rights reserved
Technical Partner: RSI Lab

Contact Us

The Business Standard

Main Office -4/A, Eskaton Garden, Dhaka- 1000

Phone: +8801847 416158 - 59

Send Opinion articles to - oped.tbs@gmail.com

For advertisement- sales@tbsnews.net