
Government of Tamil Nadu Company Cyber Security Posture
tn.gov.inThe Government of Tamil Nadu is the governing authority for the Indian state of Tamil Nadu. It is seated at Fort St George (or historically, White Town), Chennai. The legislature of Tamil Nadu was bicameral until 1986, when it was replaced by a unicameral legislature, like most other states in India. The state of Tamil Nadu has a population of 7,21,38,958 as per the 2011 Census and covers an area of 1,30,058 kmยฒ. The major administrative units of the state constitute 32 districts, 76 revenue divisions, 220 taluks, 12 municipal corporations, 148 municipalities, 385 panchayat unions (blocks), 561 town panchayats and 12,524 village panchayats.
GTN Company Details
tngov
4313 employees
22779
922
Government Administration
tn.gov.in
Scan still pending
GOV_5113313
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Government of Tamil Nadu Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Government of Tamil Nadu Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Government of Tamil Nadu | Ransomware | 75 | 2 | 09/2021 | GOV103131222 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: A ransomware attack targeted Tamil Nadu Public Department and encrypted certain sensitive documents of the Department. Some of the files encrypted were related to VIP visits, their programmes and related arrangements made by State Protocol officials. The attackers demanded payment of 1,950 USD in cryptocurrency as a ransom for handing over the decryption code However, the cyber security experts from the Centre for Development of Advance Computing (C-DAC) and the Computer Emergency Response Team were trying to retrieve the encrypted documents. |
Government of Tamil Nadu Company Subsidiaries

The Government of Tamil Nadu is the governing authority for the Indian state of Tamil Nadu. It is seated at Fort St George (or historically, White Town), Chennai. The legislature of Tamil Nadu was bicameral until 1986, when it was replaced by a unicameral legislature, like most other states in India. The state of Tamil Nadu has a population of 7,21,38,958 as per the 2011 Census and covers an area of 1,30,058 kmยฒ. The major administrative units of the state constitute 32 districts, 76 revenue divisions, 220 taluks, 12 municipal corporations, 148 municipalities, 385 panchayat unions (blocks), 561 town panchayats and 12,524 village panchayats.
Access Data Using Our API

Get company history
.png)
GTN Cyber Security News
Tamil Nadu unveils its Cyber Security Policy 2.0
The Cyber Security Policy 2.0 released by the Tamil Nadu government recently lists out steps for ensuring the protection of assets of theย ...
Cyber security is pillar for national security, economic stability: TN IT Minister
The two day cyber security conference that has returned to India after a six year gap deliberates on the theme `The Battle for Cyber Supremacy'.
CERT-In SAMVAAD 2025: National cybersecurity conference opens in Tamil Nadu
The conference aims to strengthen India's cybersecurity audit ecosystem and enhance the capabilities of empanelled auditing bodies throughย ...
3-day National Annual Conference CERT-In SAMVAAD 2025
Union Minister of Fisheries, Animal Husbandry & Dairying, Shri Parshottam Rupala launched the realigned AHIDF Scheme and released the Radioย ...
Local Government Cybersecurity
The TN CyberHub's goal is to increase security awareness, establish a trusted communication platform, and elevate IT practices across all public and privateย ...
Karnataka govt launches new cyber security policy amid frequent scams
Karnataka govt launches new cyber security policy amid frequent scams ยท The Minister said that the state government has also tied up with Metaย ...
Tamil Nadu Unveils Cyber Security Policy 2.0
The Tamil Nadu Government introduced Cyber Security Policy 2.0 to replace the older version from 2020. This updated policy provides clearย ...
TN Cyber Security Dept Begins Probe In Rs 31 Lakh Online Fraud In Coimbatore
Chennai: The Tamil Nadu Cyber Security Department has launched a detailed investigation after two individuals in Coimbatore lost a combinedย ...
Call for awareness on cyber security
The speakers explained the importance of creating awareness on cybercrimes and cyber security. Members of 'We the People India,' 'Yes we canย ...

GTN Similar Companies

TAHRI Mohamed Bechar University
L'Universitรฉ de Bรฉchar Est un รฉtablissement universitaire Algรฉrien crรฉe pour la premiรจre fois en 1986. INES puis CUB pour Centre Universitaire de Bรฉchar et le 07/01/2009 dรฉclarรฉ comme universitรฉ. Depuis peu, le monde est entrรฉ dans le 3รจme millรฉnaire. Un millรฉnaire qui nous impose des dรฉfis au

City of Los Angeles
The City of Los Angeles employs more than 45,000 people in a wide range of careers. Visit our website for information on current openings, including regular civil service positions, exempt and emergency appointment opportunities, in addition to internships! The City of Los Angeles is a Mayor-Counci

South Lanarkshire Council
South Lanarkshire is a fantastic place to live and work. Situated at the heart of Scotlandโรรดs economic powerhouse, South Lanarkshire has so much to offer as a region to live, learn, raise a family, enjoy recreational activities and as a place for work and business. From the commercial and indust

Cebu City Government
Cebu City is located on the central eastern part of Cebu Province, an island at the center of the Visayas in Southern Philippines. As defined by the Bureau of Land Location Monument (BLLM) No. 1, Cebu Cadastral Survey, it is 10 degrees 17 minutes North Latitude and 123 degrees 54 minutes East Longit

CONICET
El Consejo Nacional de Investigaciones Cientโโ ficas y Tโยฉcnicas (CONICET) es el principal organismo dedicado a la promociโโฅn de la ciencia y la tecnologโโ a en la Argentina. Su actividad se desarrolla en cuatro grandes โยฐreas: โรยข Ciencias agrarias, ingenierโโ a y de materiales โรยข Ciencias biolโโฅgica

General Directorate of Land Registry and Cadastre
The General Directorate of Land Registry and Cadastre (Tapu ve Kadastro Genel Mรผdรผrlรผgรผ) refers to the legislation regarding land registry and Cadastre in Turkey. Duties of General Directorate of Land Registry and Cadastre TO KEEP AND UPDATE LAND REGISTRY AND CADASTRE DATA OF THE COUNTRY UNDER

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
GTN CyberSecurity History Information
How many cyber incidents has GTN faced?
Total Incidents: According to Rankiteo, GTN has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at GTN?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
How does GTN detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Centre for Development of Advance Computing (C-DAC), Computer Emergency Response Team and recovery measures with Attempting to retrieve the encrypted documents.
Incident Details
Can you provide details on each incident?

Incident : Ransomware Attack
Title: Ransomware Attack on Tamil Nadu Public Department
Description: A ransomware attack targeted Tamil Nadu Public Department and encrypted certain sensitive documents of the Department. Some of the files encrypted were related to VIP visits, their programs, and related arrangements made by State Protocol officials. The attackers demanded payment of 1,950 USD in cryptocurrency as a ransom for handing over the decryption code. However, the cyber security experts from the Centre for Development of Advance Computing (C-DAC) and the Computer Emergency Response Team were trying to retrieve the encrypted documents.
Type: Ransomware Attack
Motivation: Financial Gain
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware Attack GOV103131222
Data Compromised: VIP visits, programs, arrangements made by State Protocol officials
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive Documents.
Which entities were affected by each incident?

Incident : Ransomware Attack GOV103131222
Entity Type: Government Department
Industry: Public Administration
Location: Tamil Nadu, India
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware Attack GOV103131222
Third Party Assistance: Centre for Development of Advance Computing (C-DAC), Computer Emergency Response Team
Recovery Measures: Attempting to retrieve the encrypted documents
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Centre for Development of Advance Computing (C-DAC), Computer Emergency Response Team.
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware Attack GOV103131222
Type of Data Compromised: Sensitive Documents
Sensitivity of Data: High
Data Encryption: Yes
Ransomware Information
Was ransomware involved in any of the incidents?
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Attempting to retrieve the encrypted documents.
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Centre for Development of Advance Computing (C-DAC), Computer Emergency Response Team.
Additional Questions
General Information
What was the amount of the last ransom demanded?
Last Ransom Demanded: The amount of the last ransom demanded was 1,950 USD.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were VIP visits, programs and arrangements made by State Protocol officials.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Centre for Development of Advance Computing (C-DAC), Computer Emergency Response Team.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were VIP visits, programs and arrangements made by State Protocol officials.
Ransomware Information
What was the highest ransom demanded in a ransomware incident?
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 1,950 USD.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
