India Ask Companies To Report Cybersecurity Incident Within Six Hours

May 3, 2022

The Indian government’s new policy requires organizations in the country to report cybersecurity incidents within six hours, including incidents involving vulnerability scans of computer systems.

The measure, along with other measures, was announced by the Indian Computer Emergency Response Team (CERT-In).

They were incorporated into Section 70B of the Information Technology (IT) Act, 2000 and are now part of the Indian law and will come into effect in 60 days.

The types of cybersecurity incidents that need to be reported to CERT-In include targeted scanning /probing of critical networks / systems, critical systems / information, unauthorized access to IT systems/data, defacement of website or intrusion into a website, malicious code attacks, attacks on servers, identity theft spoofing and phishing attacks, DoS and DDoS attacks, and attacks on critical infrastructure.

Others include attacks on applications, data breaches, data leaks, attacks on IoT devices and related devices, attacks or incidents involving digital payment systems, attacks through malicious mobile apps, counterfeit mobile apps, unauthorized access to social media accounts, and attacks or malicious/suspicious activities involving cloud computing systems and applications related to Big Data, Blockchain, virtual assets, and others.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

May 11, 2026 Instructure has restored access to its Canvas learning platform after a cyberattack disrupted service for universities and more...

May 6, 2026 The official White House mobile app for iOS and Android is facing scrutiny after a security researcher more...

May 4, 2026 Microsoft Defender mistakenly detected legitimate DigiCert root certificates as malware, triggering widespread false-positive alerts and, in some more...

April 27, 2026 Canada Life says it has contained a cybersecurity incident involving unauthorized access to internal applications through an more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn