1 / 11

Information Security in a Modern Workplace

Today, information is a company’s biggest asset. Understanding the risks associated with storing and transmitting information digitally in the modern workplace is essential for safeguarding businesses.

Ricoh123
Download Presentation

Information Security in a Modern Workplace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INFORMATION SECURITY in a MODERN WORKPLACE

  2. Introduction Understanding Information Safety Today, information is a company’s biggest asset. Understanding the risks associated with storing and transmitting information digitally in the modern workplace is essential for safeguarding businesses. This slide deck will be looking at the key elements of information safety. We will also briefly discuss some high risk sectors and what they stand to lose by taking information security for granted. Finally, we will look at Ricoh’s role in managing information along with some of the security services offered by us.

  3. Key Areas of Concern

  4. 1 confidentiality A company’s data is at its most vulnerable when it is being processed or transmitted. There’s a great deal of technology involved in transmitting data, and often, we don’t understand those processes in their entirety. This lack of understanding makes us easy targets for hackers. Therefore,it’s essential that you take steps to ensure that there is no unauthorised disclosure of data during processing, transmission or storage. And to do that successfully, you need the help of professionals who not only understand these complexities, but also work efficiently to create a powerful cyber shield around your data.

  5. 2 It’s imperative to maintain the integrity of the data being handled. Sometimes, companies tend to get careless and employees take advantage of that to manipulate data. Or, in what can be only worse, the agency you outsourced your security to might tamper with the data themselves! It’s crucial, therefore, that you use a network security system that’s foolproof. Ricoh’s services, for example, guarantees no unauthorised alteration of data. integrity

  6. 3   A security system should be available round the clock. More importantly, it should be available with the same level of efficiency at all times, otherwise the entire system is practically useless. Also, we often find that the security system hasn’t been calibrated properly, which leads to denial of access/service even to authorised users. This is just as sub-optimal as allowing unauthorised users in. Therefore, a security system should be set up with utmost care. It should offer protection against unauthorised use of the system. At the same time, it is not hindering the work of those whom it’s meant to safeguard! availability

  7. 4 Every individual with the permission to use/access your company’s data must be registered separately and uniquely. There must be personal identifiers and a hierarchy of permissions among users. This ensures that sensitive data is kept out of the reach of non-essential personnel, and every action taken on any of the datasets can be traced back to a single individual. Ricoh lays a great deal of emphasis on “accountability of actions”, because it allows us to get to the root of the problem fast, and allows us to isolate individuals who are responsible. Moreover, it gives us an opportunity to streamline data access and ensure that confidential information stays that way. accountability

  8. 5 Non-repudiation is the assurance that the authenticity and integrity of network communications are maintained; that no one can deny their actions or escape the consequences of said actions. It follows a “if the bulb is glowing, then the switch is on” kind of philosophy. It helps ensure that there is proper justice mechanism in place for dealing with any unpleasant situations that might arise over the course of time. Such incidents might include, but are not limited to, a worker denying the authorisation of access/distribution of information, multiple parties using single access keys, and giving access to outsiders without proper authorisation. non-repudiation

  9. FOCUS SECTORS FINANCIAL INSTITUTIONS THE GOVERNMENT TECH–COMPANIES Prospective Mergers and Acquisitions, and other Stock Transactions National Security information, Military and Trade Secrets New Product Design, R&D, and Intellectual Property MEDICAL INSTITUTIONS LAW FIRMS GENERAL OFFICES Briefs, Depositions, Contracts, and other legal documents Clinical Trials, Patent Applications, Medical Records Customer Lists, Executive Compensation, Restructuring Plans

  10. Ricoh is a global technology company specialising in office imaging equipment, production print solutions, document management systems and IT services. We pride ourselves in helping our customers address unique and varied security challenges as they emerge. We strongly believe that security needs to be customised for individual needs, that’s a large theme in all our security solutions. Over the years, Ricoh has developed a comprehensive suite of security solutions. These security solutions help protect printed and electronic data content against opportunistic or targeted threats, be they internal or external. However, we still assess your vulnerabilities, consider your security objectives, and then frame and build a security system that’s a 100% custom-made for you. Ricoh’s Security Solutions

  11. www.ricoh.co.in

More Related