National Informatics Centre, MeitY Company Cyber Security Posture

www.nic.in

National Informatics Centre (NIC) was established in 1976, and has since emerged as a โ€œprime builderโ€ of e-Government / e-Governance applications up to the grassroots level as well as a promoter of digital opportunities for sustainable development. NIC, through its ICT Network, โ€œNICNETโ€, has institutional linkages with all the Ministries /Departments of the Central Government, 37 State Governments/ Union Territories, and about 736 District administrations of India. NIC has been instrumental in steering e-Government/e-Governance applications in government ministries/departments at the Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and management, resulting in better efficiency and accountability to the people of India. "Informatics-led-developmentโ€ programme of the government has been spearheaded by NIC to derive competitive advantage by implementing ICT applications in social & public administration.

NICM Company Details

Linkedin ID:

nicmeity

Employees number:

1643 employees

Number of followers:

30301

NAICS:

541

Industry Type:

IT Services and IT Consulting

Homepage:

www.nic.in

IP Addresses:

Scan still pending

Company ID:

NAT_3247122

Scan Status:

In-progress

AI scoreNICM Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

National Informatics Centre, MeitY Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

National Informatics Centre, MeitY Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
National Informatics Centre, MeitYBreach60309/2020NAT11919623Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: A malware attack on 100 machines belonging to the National Informatics Centre was reported as a breach of cyber security. This is the second cyberattack of this kind in the past month. Multiple servers and PCs were infected by the Maze ransomware during a similar cyber attack on NHAI last month, which caused the systems to be completely shut down for about 48 hours. Additionally, the attackers broke into the NHAI network's Windows Active Directory Server, which led to the compromise of internal computers, a mail server, and an antivirus server. The Special Cell of the Delhi Police has begun an investigation into the situation and has also filed a case in this regard under the Information Technology (IT) Act.

National Informatics Centre, MeitY Company Subsidiaries

SubsidiaryImage

National Informatics Centre (NIC) was established in 1976, and has since emerged as a โ€œprime builderโ€ of e-Government / e-Governance applications up to the grassroots level as well as a promoter of digital opportunities for sustainable development. NIC, through its ICT Network, โ€œNICNETโ€, has institutional linkages with all the Ministries /Departments of the Central Government, 37 State Governments/ Union Territories, and about 736 District administrations of India. NIC has been instrumental in steering e-Government/e-Governance applications in government ministries/departments at the Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and Centre, States, Districts and Blocks, facilitating improvement in government services, wider transparency, promoting decentralized planning and management, resulting in better efficiency and accountability to the people of India. "Informatics-led-developmentโ€ programme of the government has been spearheaded by NIC to derive competitive advantage by implementing ICT applications in social & public administration.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=nicmeity' -H 'apikey: YOUR_API_KEY_HERE'
newsone

NICM Cyber Security News

2025-03-08T08:00:00.000Z
MeitY leads nationwide awareness campaign on safer internet day to promote safe use of internet

MeitY leads nationwide awareness campaign on safer internet day to promote safe use of internet. This initiative was conducted under theย ...

2024-12-31T08:00:00.000Z
MeitY takes steps to strengthen cybersecurity, empower citizens through CSC welfare camps

The Cyber Surakshit Bharat initiative conducted the 43rd CISO Deep-Dive Training Programme and workshops in New Delhi and Kerala, training overย ...

2025-03-22T07:00:00.000Z
Cert-In short of staff to help curb ransomware: Meity to parliamentary panel | Latest News India

โ€œCERT-In faces challenges due to insufficient manpower while conducting onsite incident response activities to help affected entities inย ...

2025-04-08T07:00:00.000Z
MeitY, CERT-In, DST collaborate on quantum-safe network framework

India's computer emergency response team (CERT-In) is working with the ministry of electronics and IT (Meity), and the Department of Science andย ...

2025-02-01T08:00:00.000Z
Budgetary allocation for MeitY up by 48%; focus on electronics, semiconductors | Latest News India - Hindustan Times

The budget allocation for the ministry of electronics and technology (MeitY) increased by 48.16% from the revised estimate (RE) for FY25.

2023-03-14T07:00:00.000Z
Rashtriya Raksha University Conducts Cyber Security Incident Response Training for Officers from National Informatics Centre: 13 March 2023

Union Minister of Fisheries, Animal Husbandry & Dairying, Shri Parshottam Rupala launched the realigned AHIDF Scheme and released the Radioย ...

2022-05-18T07:00:00.000Z
Not all companies have to sync time with NIC, NPL servers: IT Ministry

Not all companies have to sync their clocks to National Informatics Centre (NIC) or the National Physical Laboratory (NPL) time servers.

2021-06-03T23:10:56.000Z
(PDF) INDIA'S NATIONAL CYBER SECURITY POLICY: GAPS AND THE WAY FORWARD

PDF | Ever since the events of document leaks by NSA's whistle blower Edward Snowden, countries around the world have become conscious about their cyber.

2020-09-19T07:00:00.000Z
Cyber security breach at National Informatics Centre, malware attack traced to Bengaluru

The origins of the bug have been traced to an IT company in Bengaluru. The computers at NIC's cyber hub contain crucial information and data onย ...

similarCompanies

NICM Similar Companies

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers โ€“โ€“ all on the Zoom AI-first work platform you know and love. ๐Ÿ’™ Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and se

GlobalLogic Latinoamโˆšยฉrica

GlobalLogic, una empresa del grupo Hitachi, es lโˆšโ‰ der en ingenierโˆšโ‰ a digital en Latinoamโˆšยฉrica. Ayudamos a diferentes marcas a diseโˆšยฑar y crear productos, plataformas y experiencias digitales innovadoras para el mundo moderno. Al integrar el diseโˆšยฑo de experiencia, la ingenierโˆšโ‰ a compleja y la exper

Mastercard

Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, weโ€™re building a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Ou

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

Accenture in the Philippines

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Combining unmatched experience and specialized skills across more than 40 industries and all business functionsโ€”underpinned by t

Softtek

Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

NICM CyberSecurity History Information

How many cyber incidents has NICM faced?

Total Incidents: According to Rankiteo, NICM has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at NICM?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does NICM detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with True.

Incident Details

Can you provide details on each incident?

Incident : Malware/Ransomware

Title: Malware Attack on National Informatics Centre

Description: A malware attack on 100 machines belonging to the National Informatics Centre was reported as a breach of cyber security. This is the second cyberattack of this kind in the past month. Multiple servers and PCs were infected by the Maze ransomware during a similar cyber attack on NHAI last month, which caused the systems to be completely shut down for about 48 hours. Additionally, the attackers broke into the NHAI network's Windows Active Directory Server, which led to the compromise of internal computers, a mail server, and an antivirus server.

Type: Malware/Ransomware

Attack Vector: Malware, Ransomware

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Malware/Ransomware NAT11919623

Systems Affected: 100 machines, Multiple servers and PCs, Windows Active Directory Server, Internal computers, Mail server, Antivirus server

Downtime: 48 hours

Which entities were affected by each incident?

Incident : Malware/Ransomware NAT11919623

Entity Type: Government

Industry: Information Technology

Location: India

Incident : Malware/Ransomware NAT11919623

Entity Type: Government

Industry: Infrastructure

Location: India

Response to the Incidents

What measures were taken in response to each incident?

Incident : Malware/Ransomware NAT11919623

Law Enforcement Notified: True

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Malware/Ransomware NAT11919623

Ransomware Strain: Maze

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident?

Incident : Malware/Ransomware NAT11919623

Legal Actions: Case filed under the Information Technology (IT) Act

How does the company ensure compliance with regulatory requirements?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Case filed under the Information Technology (IT) Act.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Malware/Ransomware NAT11919623

Investigation Status: Ongoing

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were 100 machines, Multiple servers and PCs, Windows Active Directory Server, Internal computers, Mail server, Antivirus server.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Case filed under the Information Technology (IT) Act.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge