Category: Information Security

ISO 27001 family of standards

Introduction Welcome to Inzinc Consulting India Pvt. Ltd., where we specialize in providing comprehensive information security management services. Today, we will explore the ISO/IEC 27000-series, also known as the ‘ISMS Family of Standards’ or ISO 27001 Family of Standards. These standards are jointly published by the International Organization for Standardization (ISO) and the International Electrotechnical…
Read more

How to prevent social engineering attacks

We have heard a lot in the recent years about organizations and general public getting conned and enticed into giving out sensitive information. Unscrupulous persons posing as bankers or insurance agents have successfully extorted information and then money from naive people who just do not know what needs to be done in that situation and…
Read more

Data protection tips for Organizations to keep information secure

Data protection is the key aspect of information security in an Organization. The intention of data protection is to protect data from being available to unauthorized users. Data protection can be achieved successfully not only by technical controls but also by appropriate user awareness and responsible actions. This blog lists few data protection tips for…
Read more

Information Security Dos and Don’ts

The key for the success of the information security management system rests not just on the documented policies and procedures, but also on the acceptable behaviour of the employees while doing work. We have compiled the below Information Security Dos and Don’ts for employees that needs to be followed for acceptable behaviour and use of…
Read more

Information Security guidelines for employees working from Home

By Sudhir G K, Information Security and Management Consultant, Inzinc Consulting India With the COVID-19 Corona Virus pandemic spreading like wildfire across the globe, the World order has changed and the Businesses have started adapting to new strategies. More specifically, if we speak about Information security related Business strategies, one of the foremost is that…
Read more