Table of Contents Table of Contents
Previous Page  15 / 18 Next Page
Information
Show Menu
Previous Page 15 / 18 Next Page
Page Background

COMPANY

BUZZ

July-September 2018

15

NEW JOINEES

Mr. Abhishek Singh

MT - Mechanical

Mr. Akhilesh Yadav

Sr. Engineer - Project

Mr. Ayush Kumar

GET - Mechanical

Mr. Bhavsinh B. Jadav

Engineer - Instrumentation

Mr. Kaushik V. Joshi

Assistant Manager - Logistics

Mr. Malde K. Kadegiya

Security Supervisor

Mr. Tushar Jangeer

Engineer – MIPS

Mr. Ramkumar Pandey

Supervisor Electrical

Mr. Ravindra Kumar Tripathi

Assistant Manager

Mr. Rajiv Kumar SIngh

General Manager-

Technical Services

Mr. Mahendra Zala

Assistant Manager -

Mines

Ms. Tinaz Engineer

Executive Assistant

to Executive Vice Chairman

Ms. Immaculate Gonsalves

Secretary

to Executive Vice Chairman

Corporate Office, Mumbai

GSCL, Sidheegram

SCL, Ranavav

Understanding

Information Security

What is Information Security?

Information Security is the practice of preventing unauthorized access, use,

disclosure, disruption, modification, inspection, recording or destruction of

information. Information Security's primary focus is the balanced protection of

confidentiality, integrity and availability of data, while maintaining focus on

efficient policy implementation without hampering organization productivity.

How is it achieved?

It is largely achieved through a multi-step risk management process that

identifies assets, threat sources, vulnerabilities, potential impacts, and possible

controls, followed by assessment of effectiveness of risk management plan.

Few Important Tips:

1. Always think twice before clicking on links or opening attachments.

Sometimes all it takes is that extra split second to realize that you might be

being tricked.

2. Verify requests for private information (yours or anyone's), even if the request

seems to come from someone you know. Con artists know how to fake their

identity.

3. Protect your passwords. Make them strong, never reveal them to anyone, and

use multi-factor authentication (MFA, also called two-step authentication)

wherever possible.

4. Protect your stuff! Lock it up or take it with you before you leave, even if

you'll only be away for a second. And always password-protect all your devices.

5. Keep a clean machine! Keep your devices, apps, browsers and anti-virus/anti-

malware software patched and up-to-date. Automate software updates and

restart your devices periodically to ensure updates are fully installed.

6. Backup critical files. Store backups in a physically separate location from the

original and test them periodically.

7. Delete sensitive information when you are done with it. Better yet, don't

store it in the first place if you don't need to.

8.If

it's suspicious, report it!

Overview

The global IT audience has seen far too many data breaches occur. A business

and its customers could suffer widespread irreparable financial loss as well as

damage to the company's reputation. Some security professionals know this

too well, the knowledge by itself is only half the battle won.

Contributed by

by

Priyanka Hanwate

,

M.Tech.-Information Security,

wife of Mr Sachin Hanwate,

Executive Assistant to Mr. M N Mehta