Just a moment...

Top
Help
×

By creating an account you can:

Logo TaxTMI
>
Call Us / Help / Feedback

Contact Us At :

E-mail: [email protected]

Call / WhatsApp at: +91 99117 96707

For more information, Check Contact Us

FAQs :

To know Frequently Asked Questions, Check FAQs

Most Asked Video Tutorials :

For more tutorials, Check Video Tutorials

Submit Feedback/Suggestion :

Email :
Please provide your email address so we can follow up on your feedback.
Category :
Description :
Min 15 characters0/2000
TMI Blog
Home / RSS

Need to firewall systems to counter cyber risks around GST

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....eed to firewall systems to counter cyber risks around GST <br>GST<br>Dated:- 19-6-2017<br><BR>New Delhi, Jun 18 (PTI) As the country is gearing up to usher in the Goods and Services Tax (GST) from next month, experts have cautioned that the government as well as firms should firewall their systems to deal with increasingly more complex cyber threats. Billed as the country&#39;s biggest taxation r....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....eform since independence, the Goods and Service Tax (GST) is expected to kick off from July 1. Experts opined there could be a rise in the number of security incidents, if the government and private players do not prepare themselves adequately to address the potential cyber risks around the GST. PwC India Partner and Leader (Cyber Security) Sivarama Krishnan said there are several threats that c....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....ompanies could get exposed to as a result of the new tax regime. Threats as a result of data leak, unauthorised changes to master data and involvement of third parties -- who will have access to a company&#39;s data -- are set to increase. &quot;Companies need to modify their IT architecture with a focus on the GST. Hardening and security configurations of the systems that will be used in the en....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....d-to-end technology landscape will be required,&quot; he said. Ansh Bhargava, Senior Consultant, Taxmann.com, was of the view that since the GST Network (GSTN) will be recording the data of 8 million taxpayers each month, &quot;it is imperative that this sensitive financial information be safeguarded against malicious attacks or security breaches in every possible way&quot;. &quot;It is of utmos....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....t importance that the cyber security unit is not only capable of detecting security threats but also conducting fraud investigations and forensics whenever needed,&quot; he said. On cyber threats, Rohan Khara of mobile wallet company MobiKwik said even small glitches can mean major disruptions, which is why his company has set up a robust technology infrastructure to handle billions of transactio....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....ns. &quot;We even use predictive analytics that can forewarn of cyber issues,&quot; he said. The expert from PwC further said that in order to de- risk themselves, companies must adopt new approaches to cyber security, governance and monitoring processes. &quot;The GST requires restructuring of the IT processes. If operationally security aligns with business objectives, it will enable a seamles....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....s GST process,&quot; Krishnan said. Rajeev Banduni, Co-founder and CEO GrowthEnabler advised that with the rushed timeline of implementation, suppliers and buyers should assess the information security practices of the Application Service Providers (ASP) and GST Suvidha Providers (GSP) while processing for GST implementation. &quot;These end-devices of ASPs and GSPs could be the next target of c....

X X   X X   Extracts   X X   X X

Full Text of the Document

X X   X X   Extracts   X X   X X

....yber terrorists,&quot; he cautioned.<BR> News - Press release - PIB....