
National Informatics Centre, MeitY Company Cyber Security Posture
www.nic.inNational Informatics Centre (NIC) was established in 1976, and has since emerged as a โprime builderโ of e-Government / e-Governance applications up to the grassroots level as well as a promoter of digital opportunities for sustainable development. NIC, through its ICT Network, โNICNETโ, has institutional linkages with all the Ministries /Departments of the Central Government, 37 State Governments/ Union Territories, and about 736 District administrations of India. NIC has been instrumental in steering e-Government/e-Governance applications in government ministries/departments at the Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and management, resulting in better efficiency and accountability to the people of India. "Informatics-led-developmentโ programme of the government has been spearheaded by NIC to derive competitive advantage by implementing ICT applications in social & public administration.
NICM Company Details
nicmeity
1643 employees
30301
541
IT Services and IT Consulting
www.nic.in
Scan still pending
NAT_3247122
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

National Informatics Centre, MeitY Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
National Informatics Centre, MeitY Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
National Informatics Centre, MeitY | Breach | 60 | 3 | 09/2020 | NAT11919623 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: A malware attack on 100 machines belonging to the National Informatics Centre was reported as a breach of cyber security. This is the second cyberattack of this kind in the past month. Multiple servers and PCs were infected by the Maze ransomware during a similar cyber attack on NHAI last month, which caused the systems to be completely shut down for about 48 hours. Additionally, the attackers broke into the NHAI network's Windows Active Directory Server, which led to the compromise of internal computers, a mail server, and an antivirus server. The Special Cell of the Delhi Police has begun an investigation into the situation and has also filed a case in this regard under the Information Technology (IT) Act. |
National Informatics Centre, MeitY Company Subsidiaries

National Informatics Centre (NIC) was established in 1976, and has since emerged as a โprime builderโ of e-Government / e-Governance applications up to the grassroots level as well as a promoter of digital opportunities for sustainable development. NIC, through its ICT Network, โNICNETโ, has institutional linkages with all the Ministries /Departments of the Central Government, 37 State Governments/ Union Territories, and about 736 District administrations of India. NIC has been instrumental in steering e-Government/e-Governance applications in government ministries/departments at the Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and management, resulting in better efficiency and accountability to the people of India. "Informatics-led-developmentโ programme of the government has been spearheaded by NIC to derive competitive advantage by implementing ICT applications in social & public administration.
Access Data Using Our API

Get company history
.png)
NICM Cyber Security News
MeitY leads nationwide awareness campaign on safer internet day to promote safe use of internet
MeitY leads nationwide awareness campaign on safer internet day to promote safe use of internet. This initiative was conducted under theย ...
MeitY takes steps to strengthen cybersecurity, empower citizens through CSC welfare camps
The Cyber Surakshit Bharat initiative conducted the 43rd CISO Deep-Dive Training Programme and workshops in New Delhi and Kerala, training overย ...
Cert-In short of staff to help curb ransomware: Meity to parliamentary panel | Latest News India
โCERT-In faces challenges due to insufficient manpower while conducting onsite incident response activities to help affected entities inย ...
MeitY, CERT-In, DST collaborate on quantum-safe network framework
India's computer emergency response team (CERT-In) is working with the ministry of electronics and IT (Meity), and the Department of Science andย ...
Budgetary allocation for MeitY up by 48%; focus on electronics, semiconductors | Latest News India - Hindustan Times
The budget allocation for the ministry of electronics and technology (MeitY) increased by 48.16% from the revised estimate (RE) for FY25.
Rashtriya Raksha University Conducts Cyber Security Incident Response Training for Officers from National Informatics Centre: 13 March 2023
Union Minister of Fisheries, Animal Husbandry & Dairying, Shri Parshottam Rupala launched the realigned AHIDF Scheme and released the Radioย ...
Not all companies have to sync time with NIC, NPL servers: IT Ministry
Not all companies have to sync their clocks to National Informatics Centre (NIC) or the National Physical Laboratory (NPL) time servers.
(PDF) INDIA'S NATIONAL CYBER SECURITY POLICY: GAPS AND THE WAY FORWARD
PDF | Ever since the events of document leaks by NSA's whistle blower Edward Snowden, countries around the world have become conscious about their cyber.
Cyber security breach at National Informatics Centre, malware attack traced to Bengaluru
The origins of the bug have been traced to an IT company in Bengaluru. The computers at NIC's cyber hub contain crucial information and data onย ...

NICM Similar Companies

Zoom
Bring teams together, reimagine workspaces, engage new audiences, and delight your customers โโ all on the Zoom AI-first work platform you know and love. ๐ Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and se

GlobalLogic Latinoamโยฉrica
GlobalLogic, una empresa del grupo Hitachi, es lโโ der en ingenierโโ a digital en Latinoamโยฉrica. Ayudamos a diferentes marcas a diseโยฑar y crear productos, plataformas y experiencias digitales innovadoras para el mundo moderno. Al integrar el diseโยฑo de experiencia, la ingenierโโ a compleja y la exper

Mastercard
Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, weโre building a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Ou

Dimension Data
Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

Accenture in the Philippines
Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functionsโunderpinned by t

Softtek
Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
NICM CyberSecurity History Information
How many cyber incidents has NICM faced?
Total Incidents: According to Rankiteo, NICM has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at NICM?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does NICM detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with True.
Incident Details
Can you provide details on each incident?

Incident : Malware/Ransomware
Title: Malware Attack on National Informatics Centre
Description: A malware attack on 100 machines belonging to the National Informatics Centre was reported as a breach of cyber security. This is the second cyberattack of this kind in the past month. Multiple servers and PCs were infected by the Maze ransomware during a similar cyber attack on NHAI last month, which caused the systems to be completely shut down for about 48 hours. Additionally, the attackers broke into the NHAI network's Windows Active Directory Server, which led to the compromise of internal computers, a mail server, and an antivirus server.
Type: Malware/Ransomware
Attack Vector: Malware, Ransomware
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Malware/Ransomware NAT11919623
Systems Affected: 100 machines, Multiple servers and PCs, Windows Active Directory Server, Internal computers, Mail server, Antivirus server
Downtime: 48 hours
Which entities were affected by each incident?

Incident : Malware/Ransomware NAT11919623
Entity Type: Government
Industry: Information Technology
Location: India

Incident : Malware/Ransomware NAT11919623
Entity Type: Government
Industry: Infrastructure
Location: India
Response to the Incidents
What measures were taken in response to each incident?

Incident : Malware/Ransomware NAT11919623
Law Enforcement Notified: True
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Malware/Ransomware NAT11919623
Ransomware Strain: Maze
Regulatory Compliance
Were there any regulatory violations and fines imposed for each incident?

Incident : Malware/Ransomware NAT11919623
Legal Actions: Case filed under the Information Technology (IT) Act
How does the company ensure compliance with regulatory requirements?
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Case filed under the Information Technology (IT) Act.
Investigation Status
What is the current status of the investigation for each incident?

Incident : Malware/Ransomware NAT11919623
Investigation Status: Ongoing
Additional Questions
Impact of the Incidents
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident were 100 machines, Multiple servers and PCs, Windows Active Directory Server, Internal computers, Mail server, Antivirus server.
Regulatory Compliance
What was the most significant legal action taken for a regulatory violation?
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Case filed under the Information Technology (IT) Act.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
