<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Security Nepal - PlutonicTech</title>
	<atom:link href="https://plutonictech.com/tag/data-security-nepal/feed/" rel="self" type="application/rss+xml" />
	<link>https://plutonictech.com</link>
	<description>Takes you forward</description>
	<lastBuildDate>Wed, 06 Aug 2025 05:04:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://i0.wp.com/plutonictech.com/wp-content/uploads/2021/10/cropped-black-and-white-1.png?fit=32%2C32&#038;ssl=1</url>
	<title>Data Security Nepal - PlutonicTech</title>
	<link>https://plutonictech.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">215847993</site>	<item>
		<title>Data Safety Still a Dream in Nepal?</title>
		<link>https://plutonictech.com/data-safety-still-a-dream-in-nepal/</link>
		
		<dc:creator><![CDATA[Plutonic Tech]]></dc:creator>
		<pubDate>Mon, 04 Aug 2025 08:36:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cybersecurity Nepal]]></category>
		<category><![CDATA[Data Security Nepal]]></category>
		<category><![CDATA[Nepali Organizations Cyber Risk]]></category>
		<guid isPermaLink="false">https://plutonictech.com/?p=734</guid>

					<description><![CDATA[<p>Kathmandu – With the rapid advancement of the digital age, the use of information technology in Nepal is growing at an unprecedented pace. However, private and government organizations’ lack of necessary caution in personal data protection poses a significant risk. Recent studies and evaluations by cybersecurity experts indicate that many organizations in Nepal are weak in their data [&#8230;]</p>
<p>The post <a href="https://plutonictech.com/data-safety-still-a-dream-in-nepal/">Data Safety Still a Dream in Nepal?</a> first appeared on <a href="https://plutonictech.com">PlutonicTech</a>.</p>]]></description>
										<content:encoded><![CDATA[<!--themify_builder_content-->
<div id="themify_builder_content-734" data-postid="734" class="themify_builder_content themify_builder_content-734 themify_builder tf_clear">
                    <div  data-lazy="1" class="module_row themify_builder_row tb_44dd24 tb_first tf_w">
                        <div class="row_inner col_align_top tb_col_count_1 tf_box tf_rel">
                        <div  data-lazy="1" class="module_column tb-column col-full tb_uczh25 first">
                    <!-- module image -->
<div  class="module module-image tb_xz28486 image-top   tf_mw" data-lazy="1">
        <div class="image-wrap tf_rel tf_mw">
            <img data-tf-not-load="1" fetchpriority="high" loading="auto" decoding="auto" data-recalc-dims="1" fetchpriority="high" decoding="async" width="1024" height="1024" src="https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/cyber.png?resize=1024%2C1024&#038;ssl=1" class="wp-post-image wp-image-735" title="cyber" alt="cyber" srcset="https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/cyber.png?w=1024&amp;ssl=1 1024w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/cyber.png?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/cyber.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/cyber.png?resize=768%2C768&amp;ssl=1 768w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/cyber.png?resize=50%2C50&amp;ssl=1 50w" sizes="(max-width: 1024px) 100vw, 1024px" />    
        </div>
    <!-- /image-wrap -->
    
        </div>
<!-- /module image --><!-- module text -->
<div  class="module module-text tb_4lvj955   " data-lazy="1">
        <div  class="tb_text_wrap">
        <p>Kathmandu – With the rapid advancement of the digital age, the use of information technology in Nepal is growing at an unprecedented pace. However, private and government organizations’ lack of necessary caution in <strong>personal data protection</strong> poses a significant risk. Recent studies and evaluations by cybersecurity experts indicate that many organizations in Nepal are weak in their <strong>data security practices</strong>.</p>
<p>The proposed <strong>Personal Data Protection Bill</strong> in Nepal is still in the implementation phase, but institutional preparation for it appears minimal. The increasing number of <strong>cyber attacks</strong> in Nepal in recent years has instilled fear among the general public and large companies alike.</p>
<p> </p>    </div>
</div>
<!-- /module text --><!-- module fancy heading -->
<div  class="module module-fancy-heading tb_vxez286  inline-fancy-heading" data-lazy="1">
        <h1 class="fancy-heading">
    <span class="main-head tf_inline_b">
                    Data Security Status of Nepali Organizations: 15 Major Weaknesses            </span>

    
    <span class="sub-head tf_inline_b tf_rel">
                                </span>
    </h1>
</div>
<!-- /module fancy heading -->
<!-- module text -->
<div  class="module module-text tb_swxc427   " data-lazy="1">
        <div  class="tb_text_wrap">
        <p>Cybersecurity experts have identified the following 15 major weaknesses in Nepali organizations:</p><ol><li><strong>Lack of Data Protection Officer (DPO):</strong> Most organizations have not designated a responsible person for data protection.</li><li><strong>Lack of Legal Knowledge:</strong> Organizations lack information about national and international data protection laws.</li><li><strong>No Data Classification:</strong> There is no practice of separating sensitive data.</li><li><strong>Weak Consent Management:</strong> Data is used without explicit consent from customers or users.</li><li><strong>Lack of Investment in Cybersecurity:</strong> The use of essential security tools like <strong>firewalls</strong> and <strong>antiviruses</strong> is very low.</li><li><strong>Absence of Regular Audits:</strong> There is no practice of regularly auditing data security.</li><li><strong>No Incident Management Plan:</strong> There is no plan on how to respond if a data breach occurs.</li><li><strong>Use of Insecure Communication Channels:</strong> Sensitive information is sent through personal messaging apps or emails.</li><li><strong>Lack of Employee Training:</strong> Employees are not trained on information security.</li><li><strong>No Risk Assessment for Cloud Services:</strong> Security terms are not reviewed when signing agreements with service providers.</li><li><strong>Weak Password Policy:</strong> Weak passwords and the use of the same password across all systems are common.</li><li><strong>No Data Deletion Policy:</strong> There is no policy on when to remove unnecessary data.</li><li><strong>No Use of Security Technologies:</strong> Technologies like <strong>DLP (Data Loss Prevention)</strong> and <strong>SIEM (Security Information and Event Management)</strong> are not used.</li><li><strong>Banks and Telecom Sector are Slightly More Aware:</strong> Due to regulatory bodies, they are comparatively ahead in security.</li><li><strong>Digital Transformation is Increasing Awareness:</strong> Post-<strong>COVID-19</strong>, some organizations have started focusing on data security.</li></ol>    </div>
</div>
<!-- /module text --><!-- module fancy heading -->
<div  class="module module-fancy-heading tb_ie12423  inline-fancy-heading" data-lazy="1">
        <h1 class="fancy-heading">
    <span class="main-head tf_inline_b">
                    Rising Risk of Cyber Attacks: Nepali Organizations in Crisis            </span>

    
    <span class="sub-head tf_inline_b tf_rel">
                                </span>
    </h1>
</div>
<!-- /module fancy heading -->
<!-- module text -->
<div  class="module module-text tb_habz57   " data-lazy="1">
        <div  class="tb_text_wrap">
        <p>Recent <strong>cyber attacks</strong> in Nepal have affected businesses across all sectors. From financial institutions to healthcare providers, all are becoming targets of attacks. Cyber attacks, which cause billions of dollars in damage globally, have now become a regular challenge in Nepal.</p>    </div>
</div>
<!-- /module text --><!-- module fancy heading -->
<div  class="module module-fancy-heading tb_bmvi548 " data-lazy="1">
        <h3 class="fancy-heading">
    <span class="main-head tf_block">
                    Top 5 Cyber Attack Methods:            </span>

    
    <span class="sub-head tf_block tf_rel">
                                </span>
    </h3>
</div>
<!-- /module fancy heading -->
<!-- module text -->
<div  class="module module-text tb_8fwv354   " data-lazy="1">
        <div  class="tb_text_wrap">
        <ol><li><strong>Web Software Vulnerabilities:</strong> Data theft through attacks like <strong>SQL Injection, Remote File Inclusion, XSS</strong>.</li><li><strong>Network Layer Weaknesses:</strong> Password theft via <strong>Wi-Fi</strong> or <strong>LAN</strong> (<strong>Man-in-the-Middle</strong>).</li><li><strong>System Software or OS Vulnerabilities:Ransomware</strong> attacks on old or un-updated systems.</li><li><strong>Hardware-Level Weaknesses:</strong> Potential data leakage due to device flaws.</li><li><strong>Social Engineering:</strong> Attempts to trick users into installing malware.</li></ol>    </div>
</div>
<!-- /module text --><!-- module fancy heading -->
<div  class="module module-fancy-heading tb_7rqm969 " data-lazy="1">
        <h1 class="fancy-heading">
    <span class="main-head tf_block">
                    Whose Fault Are Cyber Attacks?            </span>

    
    <span class="sub-head tf_block tf_rel">
                                </span>
    </h1>
</div>
<!-- /module fancy heading -->
<!-- module text -->
<div  class="module module-text tb_dmpr526   " data-lazy="1">
        <div  class="tb_text_wrap">
        <p>Partial blame can be attributed to software manufacturers, service providers, company employees, or network providers.</p><p>However, the most significant reasons are the lack of Regular Cybersecurity Assessment, Information Security Audit and Lack of Awareness &amp; Education</p>    </div>
</div>
<!-- /module text --><!-- module fancy heading -->
<div  class="module module-fancy-heading tb_uwrx70 " data-lazy="1">
        <h1 class="fancy-heading">
    <span class="main-head tf_block">
                    Tips for Users to Avoid Cyber Attacks:            </span>

    
    <span class="sub-head tf_block tf_rel">
                                </span>
    </h1>
</div>
<!-- /module fancy heading -->
<!-- module text -->
<div  class="module module-text tb_2y7u689   " data-lazy="1">
        <div  class="tb_text_wrap">
        <ol><li><strong>Use Strong Passwords:</strong> Use passwords that include alphanumeric characters and special symbols.</li><li><strong>Use Two-Factor Authentication (2FA):</strong> Employ an additional layer of security beyond just a password.</li><li><strong>Avoid Open Wi-Fi:</strong> Do not perform sensitive activities on public <strong>Wi-Fi</strong> networks.</li><li><strong>Use Different Passwords:</strong> Do not use the same password for all accounts.</li><li><strong>Check for Password Compromise:</strong> Get information from <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com</a>.</li><li><strong>Use Firewall and Antivirus:</strong> Regularly update them for system security.</li><li><strong>Keep Software Updated:</strong> Regularly update your <strong>OS</strong> and all apps.</li><li><strong>Keep Passwords Confidential:</strong> Do not share your passwords with anyone.</li></ol>    </div>
</div>
<!-- /module text --><!-- module fancy heading -->
<div  class="module module-fancy-heading tb_n43f153 " data-lazy="1">
        <h1 class="fancy-heading">
    <span class="main-head tf_block">
                    Conclusion:            </span>

    
    <span class="sub-head tf_block tf_rel">
                                </span>
    </h1>
</div>
<!-- /module fancy heading -->
<!-- module text -->
<div  class="module module-text tb_gjzn566   " data-lazy="1">
        <div  class="tb_text_wrap">
        <p>As Nepal enters the digital age, <strong>data security</strong> and <strong>cybersecurity</strong> have become extremely important issues. A secure digital future is not possible without building a legally robust system, making institutional improvements, and raising public awareness.</p>    </div>
</div>
<!-- /module text -->        </div>
                        </div>
        </div>
                        <div  data-lazy="1" class="module_row themify_builder_row tb_hmn7767 tf_w">
                        <div class="row_inner col_align_top tb_col_count_1 tf_box tf_rel">
                        <div  data-lazy="1" class="module_column tb-column col-full tb_45jn767 first">
                            <div  data-lazy="1" class="module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_o7my306">
                <div  data-lazy="1" class="module_column sub_column col4-2 tb_2fpq306 first">
                    <!-- module image -->
<div  class="module module-image tb_ww4x267 image-top   tf_mw" data-lazy="1">
        <div class="image-wrap tf_rel tf_mw">
            <img data-tf-not-load="1" data-recalc-dims="1" decoding="async" src="https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/chirinjibi-sir.jpeg?resize=200%2C200&#038;ssl=1" width="200" height="200" class="wp-post-image wp-image-784" title="chirinjibi sir" alt="chirinjibi sir" srcset="https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/chirinjibi-sir.jpeg?resize=200%2C200&amp;ssl=1 200w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/chirinjibi-sir.jpeg?resize=300%2C300&amp;ssl=1 300w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/chirinjibi-sir.jpeg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/plutonictech.com/wp-content/uploads/2025/08/chirinjibi-sir.jpeg?w=450&amp;ssl=1 450w" sizes="(max-width: 200px) 100vw, 200px" />    
        </div>
    <!-- /image-wrap -->
    
        </div>
<!-- /module image -->        </div>
                    <div  data-lazy="1" class="module_column sub_column col4-2 tb_jvcb306 last">
                    <!-- module text -->
<div  class="module module-text tb_6htc24   " data-lazy="1">
        <div  class="tb_text_wrap">
        <p><strong>About Chiranjibi Adhikari</strong></p>
<p>Mr. Chiranjibi Adhikari is a Cybersecurity Policy Expert &amp; CEO of One Cover Private Limited, which is a Dedicated Cybersecurity Company in Nepal. He is also the Senior Vice President of the Federation of Computer Association Nepal (CAN Federation).</p>
<p>URL: <a href="https://www.linkedin.com/in/chiranjibiadhikari/" target="_blank" rel="noopener">https://www.linkedin.com/in/chiranjibiadhikari/</a></p>    </div>
</div>
<!-- /module text -->        </div>
                    </div>
                </div>
                        </div>
        </div>
        </div>
<!--/themify_builder_content--><p>The post <a href="https://plutonictech.com/data-safety-still-a-dream-in-nepal/">Data Safety Still a Dream in Nepal?</a> first appeared on <a href="https://plutonictech.com">PlutonicTech</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">734</post-id>	</item>
	</channel>
</rss>
