"We prefer best security solutions are built-in not bolted on"
Ajay Yadav
Head-IT, Arshiya Northern FTWZ
Preparedness to face challenges of data security:
We are ensuring all stakeholders have a good basic understanding of security and privacy i.e. data classifications data protections techniques by developing and communicating clear policy about trusted devices and regularly sharing information about the changing threat environment will help establish and reinforce a strong security culture even in a changing environment. We have implemented strong access barriers one would encounter through a web, mobile interface these barriers could include passwords, biometrics and MFA.
The best practices Adopted for remote working:
We believe securing remote work is not solely the job of the IT Team, it also requires trust, the most effective way to build trust is to listen, learn and lead with empathy. We prefer best security solutions that are built-in, not bolted on. We have implemented DLP endpoint protection SOPHOS EDR, upgraded our firewalls to Fortinet 100F, SD WAN for remote sites, VPN connectivity, remote work force monitoring to all WFH Users.
role of CISOs:
A recent study shows that the number of data breaches in 2020 has almost doubled with 3,950 confirmed breaches against 2,103 recorded breaches in 2019, with the year far from the end. About 80 percent of the data breaches have occurred due to simple brute force attacks, which should raise serious concerns regarding data security Just one serious security incident or data breach could derail the growth and profitability of their companies because of impact to brand and the cost to remediate, fines and legal fees and customer loss. As a result, the role of the Chief Information Security Officer (CISO) is growing in importance.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.