Predictions for Cyber Security Threats in 2017

July 18th, 2017 / Sudipta Biswas / 0 comments

The top 10 biggest cyber security threats for 2017 As the internet continues to evolve, so too does cyber-crime. It’s an  unfortunate  reality that we’re all forced to live with. We exist in an  era  when  the  Internet  has given us access to vast amount  of information. Online  tasks like shopping, banking and paying bills… View Article

How to Secure Smart Cities?

July 15th, 2017 / Prime Research Team / 0 comments

India is moving towards Smart Cities and has developed a design and budget to build them. No doubt, a network of smart cities in any country can boost the national economy and improve the lives of citizens. A key point to be considered at the stage of designing IoT blueprint is the security of the IoT… View Article

How to Protect Yourself from the New Generation of Ransomware?

July 8th, 2017 / Prime Research Team / 0 comments

What is Petya Malware? Petya is a malicious software or malware that spreads through emails or websites. Once it is installed on the computer, it blocks access to important files through encryption. If victims do not have a backup, they face losing all the data or have to pay to the hackers for decryption. The… View Article

Way forward on “Wannacry”ransomware

May 15th, 2017 / Prime Research Team / 0 comments

It has been reported that a new ransomware named as “Wannacry” is spreading widely. Wannacry encrypts the files on infected Windows systems. This ransomware spreads by exploiting vulnerable Windows Systems. As you must be aware that there is huge Ransomware attack across globe which affected more than 90 countries. Following are few details about the… View Article

ISO 27001 Audit Checklist

September 7th, 2016 / Sushobhan Mukherjee / 0 comments

If you are planning your ISO 27001 internal audit, you may be looking for some kind of an ISO 27001 audit checklist. Every company is different. And if an ISO management system for that company has been specifically written around it’s needs (which it should be!), each ISO system will be different, and the internal… View Article

What is DROWN?

May 12th, 2016 / Prime Research Team / 0 comments

DROWN is Identified as a low cost attack and it allows hackers to decrypt browser-server communication in hours to attack servers or/and users. Shockingly, this newly found vulnerability works even on TLS servers, and affected flickr.com,yahoo.com, alibaba.com, buzzfeed.com,  and cnbc.com to name a few. DROWN vulnerability and affected website list was publicly disclosed on March 1,… View Article

Infocon Bangladesh 2016

April 24th, 2016 / Prime Research Team / 0 comments

Introduction The civilization has always been interested on protection, let it be primitive or sophisticated present ages.  Human Life or property or business, our thoughts revolves on safeguarding the same. With the advancement with technology, we are getting more engaged with internet and in effect data security is becoming more critical worldwide. Information security is… View Article

Issues with Jobs

November 6th, 2014 / Sushobhan Mukherjee / Comments Off on Issues with Jobs

Jobs , Job Seeker and Employers are never friends. They always have repelling  effect between them. Below are perennial problems of the society and those are increasing day by day: People do not get jobs, Employers do not  get right candidate, High level of attrition in the organizations People are not ready to join even… View Article

Vijaya Greetings

October 9th, 2014 / Sushobhan Mukherjee / 0 comments

Dear Well Wisher, Subha Bijaya from Prime! Trust you have spent good times with your family, friends and relatives. Durga Puja, being the one of the largest festivals in Bengal, gives all of us the desired break in our busy schedule to refresh / energize ourselves. Even though Duargapuja, Dussera, EID and Lakshmi Puja got… View Article

Lady Coordinator Opening at Prime

February 17th, 2014 / Sushobhan Mukherjee / Comments Off on Lady Coordinator Opening at Prime

JOB OPENING AT PRIME Company: Prime Infoserv LLP Role: Lady Coordinator for Back Office Operations: Location: Kolkata. West Bengal, India Scope Co-ordination with customers for orders, proposal, payment collection etc Co-ordination with vendors/contractors/OEMS for pricing, material delivery Creation of Proposal Raising Invoice Co-ordination with Accounts/Finance for VAT, CST, TDS calculation, return submission Mail Communications with… View Article