SlideShare a Scribd company logo
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
Our Inspiration From
Jeff BezosCONTENTS
“I knew that if I failed I wouldn’t regret that, but I
knew the one thing I might regret is not trying.”
Tip: For latest posts relating to schools and education please
make a visit to Chalo Facebook page @
https://www.facebook.com/Chalo-School-1339162339445839/
NAC Jewellers Opens New Showroom @ Old
Washermanpet!
Recently our associates NAC Jewellers opened their new showroom at Old
Washermanpet. The event was marked with a grand gala ceremony and
attended by many celebrities.
A picture of NAC Jewellers New Showroom at Old Washermanpet.
We wish NAC Jewellers a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Style One winsRetail Icon Award 2016!
One of our associates Style One was awarded Winner of “Best Family Store
– Retail Icon Awards” for the consecutive year in Chennai. The grant event
was organised by Times Group of India was attended by many dignitaries.
In the above picture Vinod Sharma and Prakash Sharma –
Managing Directors of Style One are seen receiving the award.
We wish Style One to win many such awards in the future!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Theni Anantham @ Dindigul!
Recently our associates Theni Anantham opened their new showroom at
Dindigul with a grand inauguration ceremony.
Few pictures from inauguration function…
Our Mr. Balamurugan, Director – ITIS and Mr. KC. Sivakumar Sr. IT Consultant,
presenting the bouquet to Mr. Dharmaraj, Managing Director of Theni
Anantham Textiles at the occasion of their new showroom inauguration
We wish Theni Anantham a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Magalakshmi Group @ Namakkal!
Our associates Magalakshmi Group (of Villupuram fame) inaugurated their
new Hypermart at Namakkal. Below are few pictures taken during this
auspicious event…
Few pictures from inauguration function…
Magalakshmi Group Directors - Mr. K. Ramesh, Mr. Venkatesh and
Mr.Rajesh, honouring our Sr. IT Consultant Mr. KC. Sivakumar and Team
for giving their unconditional support.
We wish Magalakshmi Group a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Bridge i2i Inaugurates New Office
at Bangalore!
Bridgei2i Analytics, our associates shifted their operations to a new
location at Bangalore. Inspace Team were actively involved in the process.
Few snaps taken at the new office location...
Few pictures from inauguration function…
Our Business Head Mr. Rajavel at the new Bridge i2i Office during the occasion
We wish Bridgei2i a grand success in their endeavour!
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
MAKING NEWS...
Inspace Team celebrated its 13th Anniversary during on 11th October. To
mark this grand event, the staff members celebrated the coinciding
Ayudha Pooja with family and friends.
Few photos taken during the event…
In the above picture the winner of traditional dress competition
Mr. RG Kannan receiving the gift from our CFO Mr. Sumant Mehrish
CONTENTS
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
INBOX
WELCOME TO THE CLUB…
Recently Inspace secured few prestigious client and added them to their
esteemed list of clientele. Some of them are,
- Chennai
- Ambasamudram
- Chennai
- Chennai
- Chennai
- Chennai
- Chennai
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS
Welcome back to another edition of our BAIT Series, which aims primarily to
align business with technology. This month we would discuss on the
importance of IT Security…
IT Security also known as Computer security or cyber security, as the
Wikipedia defines it, is the protection of information systems from theft or
damage to the hardware, the software, and to the information on them, as
well as from disruption or misdirection of the services they are designed to
provide.
It includes protecting against harm that may come via network access, data
and code injection, and due to malpractice by operators, whether
intentional, accidental, or due to them being tricked into deviating from
secure procedures. As everyone may agree, this field is of growing
importance due to the increasing reliance on computer systems and the
Internet in most societies, wireless networks such as Bluetooth and Wi-Fi -
and recently due to the growth of "smart" devices, including smart phones,
televisions and tiny devices as part of the Internet of Things.
.
.
Business Aligned IT (BAIT Series 18)
By Samuel Raj Anbudaiyan (Technology Auditor)
IMPORTANCE OF IT SECURITY!
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 17)
By Samuel Raj Anbudaiyan (Technology Auditor)
To understand the importance of IT Security it is essential to gain
knowledge on how vulnerable is a system susceptibility or flaw. Many
vulnerabilities are documented in the Common Vulnerabilities and
Exposures database.A hacker can exploit a vulnerability and may cause
harm to the IT assets. Thus to secure a computer system, it is important
to understand the attacks that can be made against it, and these threats
can typically be classified into one of the categories below:
 Backdoors
 Denial-of-service attack
 Direct-access attacks
 Eavesdropping
 Spoofing
 Tampering
 Privilege escalation
 Phishing
 Click jacking
 Social engineering
Thus we find that Computer security is critical in almost any industry
which uses computers. Currently, most electronic devices such as
computers, laptops and cellphones come with built in firewall security
software, but despite this, computers are not 100 percent accurate and
dependable to protect data. There are many different ways of hacking
into computers. It can be done through a network system, clicking into
unknown links, connecting to unfamiliar Wi-Fi, downloading software
and files from unsafe sites, power consumption, electromagnetic
radiation waves, and many more. However, computers can be protected
through well-built software and hardware. By having strong internal
interactions of properties, software complexity can prevent software
crash and security failure.
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!
CONTENTS Business Aligned IT (BAIT Series 17)
By Samuel Raj Anbudaiyan (Technology Auditor)
In the recent times, IT Security is not the prerogative of IT Team alone,
but rather the all computer users become part of the security
environment and thus contribute towards an effective security. Thus it
is essential that all such critical users are trained in basic security
concerns by creating awareness of the security risks involved in their
operations. The user must be informed that he or she is responsible in
containing the security threat and thus help securing the environment.
In this regard Computer Security protection becomes essential. In
computer or IT security a countermeasure is an action, device,
procedure, or technique that reduces a threat, a vulnerability, or an
attack by eliminating or preventing it, by minimizing the harm it can
cause, or by discovering and reporting it so that corrective action can
be taken. One such measure is to conduct a thorough IT Security Audit.
Inspace Security team is actively involved in conducting in-depth IT
Security Audits. Please call us to know more and how Inspace’s Team
can identify such security threats and thus help mitigate them.
LOL!
Lets relax…
CONTENTS
Get in touch with us! All are encouraged to contribute towards the contents
of this newsletter. Please reach out to Editor’s Desk @
newsletter@inspacetech.com
(This newsletter is for private circulation only. The Editorial committee
reserves the right to publish contributed contents).
• Our Inspiration
• Making News
(Partners)
• Inbox
• Business Aligned
IT (BAIT) Series
• LOL!

More Related Content

Similar to Newsletter connect - Sep 2016

Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
Arish Roy
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
Arish Roy
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
IT Network marcus evans
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
Arish Roy
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
Arish Roy
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
Arish Roy
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
RES
 
Inspace Connect
Inspace ConnectInspace Connect
Inspace Connect
Arish Roy
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security Environments
Joe McCray
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015Robert Baldi
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
Arish Roy
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433Terry Gilsenan
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 

Similar to Newsletter connect - Sep 2016 (20)

Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Inspace Connect
Inspace ConnectInspace Connect
Inspace Connect
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Big Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security EnvironmentsBig Bang Theory: The Evolution of Pentesting High Security Environments
Big Bang Theory: The Evolution of Pentesting High Security Environments
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 

More from Arish Roy

Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
Arish Roy
 
Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
Arish Roy
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
Arish Roy
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
Arish Roy
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
Arish Roy
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
Arish Roy
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
Arish Roy
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
Arish Roy
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
Arish Roy
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
Arish Roy
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
Arish Roy
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentationArish Roy
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Technology Audit
Technology AuditTechnology Audit
Technology AuditArish Roy
 
Inspace Corporate Presentation
Inspace Corporate Presentation  Inspace Corporate Presentation
Inspace Corporate Presentation Arish Roy
 
Technology audit
Technology auditTechnology audit
Technology audit
Arish Roy
 
Inspace corporate presentation
Inspace corporate presentationInspace corporate presentation
Inspace corporate presentationArish Roy
 

More from Arish Roy (19)

Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
 
Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Inspace Corporate Presentation
Inspace Corporate Presentation  Inspace Corporate Presentation
Inspace Corporate Presentation
 
Technology audit
Technology auditTechnology audit
Technology audit
 
Inspace corporate presentation
Inspace corporate presentationInspace corporate presentation
Inspace corporate presentation
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Newsletter connect - Sep 2016

  • 1. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! Our Inspiration From Jeff BezosCONTENTS “I knew that if I failed I wouldn’t regret that, but I knew the one thing I might regret is not trying.” Tip: For latest posts relating to schools and education please make a visit to Chalo Facebook page @ https://www.facebook.com/Chalo-School-1339162339445839/
  • 2. NAC Jewellers Opens New Showroom @ Old Washermanpet! Recently our associates NAC Jewellers opened their new showroom at Old Washermanpet. The event was marked with a grand gala ceremony and attended by many celebrities. A picture of NAC Jewellers New Showroom at Old Washermanpet. We wish NAC Jewellers a grand success in their endeavour! CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS...
  • 3. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Style One winsRetail Icon Award 2016! One of our associates Style One was awarded Winner of “Best Family Store – Retail Icon Awards” for the consecutive year in Chennai. The grant event was organised by Times Group of India was attended by many dignitaries. In the above picture Vinod Sharma and Prakash Sharma – Managing Directors of Style One are seen receiving the award. We wish Style One to win many such awards in the future!
  • 4. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Theni Anantham @ Dindigul! Recently our associates Theni Anantham opened their new showroom at Dindigul with a grand inauguration ceremony. Few pictures from inauguration function… Our Mr. Balamurugan, Director – ITIS and Mr. KC. Sivakumar Sr. IT Consultant, presenting the bouquet to Mr. Dharmaraj, Managing Director of Theni Anantham Textiles at the occasion of their new showroom inauguration We wish Theni Anantham a grand success in their endeavour!
  • 5. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Magalakshmi Group @ Namakkal! Our associates Magalakshmi Group (of Villupuram fame) inaugurated their new Hypermart at Namakkal. Below are few pictures taken during this auspicious event… Few pictures from inauguration function… Magalakshmi Group Directors - Mr. K. Ramesh, Mr. Venkatesh and Mr.Rajesh, honouring our Sr. IT Consultant Mr. KC. Sivakumar and Team for giving their unconditional support. We wish Magalakshmi Group a grand success in their endeavour!
  • 6. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Bridge i2i Inaugurates New Office at Bangalore! Bridgei2i Analytics, our associates shifted their operations to a new location at Bangalore. Inspace Team were actively involved in the process. Few snaps taken at the new office location... Few pictures from inauguration function… Our Business Head Mr. Rajavel at the new Bridge i2i Office during the occasion We wish Bridgei2i a grand success in their endeavour!
  • 7. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! MAKING NEWS... Inspace Team celebrated its 13th Anniversary during on 11th October. To mark this grand event, the staff members celebrated the coinciding Ayudha Pooja with family and friends. Few photos taken during the event… In the above picture the winner of traditional dress competition Mr. RG Kannan receiving the gift from our CFO Mr. Sumant Mehrish
  • 8. CONTENTS • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! INBOX WELCOME TO THE CLUB… Recently Inspace secured few prestigious client and added them to their esteemed list of clientele. Some of them are, - Chennai - Ambasamudram - Chennai - Chennai - Chennai - Chennai - Chennai
  • 9. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Welcome back to another edition of our BAIT Series, which aims primarily to align business with technology. This month we would discuss on the importance of IT Security… IT Security also known as Computer security or cyber security, as the Wikipedia defines it, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they are designed to provide. It includes protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. As everyone may agree, this field is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi - and recently due to the growth of "smart" devices, including smart phones, televisions and tiny devices as part of the Internet of Things. . . Business Aligned IT (BAIT Series 18) By Samuel Raj Anbudaiyan (Technology Auditor) IMPORTANCE OF IT SECURITY!
  • 10. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 17) By Samuel Raj Anbudaiyan (Technology Auditor) To understand the importance of IT Security it is essential to gain knowledge on how vulnerable is a system susceptibility or flaw. Many vulnerabilities are documented in the Common Vulnerabilities and Exposures database.A hacker can exploit a vulnerability and may cause harm to the IT assets. Thus to secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below:  Backdoors  Denial-of-service attack  Direct-access attacks  Eavesdropping  Spoofing  Tampering  Privilege escalation  Phishing  Click jacking  Social engineering Thus we find that Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent accurate and dependable to protect data. There are many different ways of hacking into computers. It can be done through a network system, clicking into unknown links, connecting to unfamiliar Wi-Fi, downloading software and files from unsafe sites, power consumption, electromagnetic radiation waves, and many more. However, computers can be protected through well-built software and hardware. By having strong internal interactions of properties, software complexity can prevent software crash and security failure.
  • 11. • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL! CONTENTS Business Aligned IT (BAIT Series 17) By Samuel Raj Anbudaiyan (Technology Auditor) In the recent times, IT Security is not the prerogative of IT Team alone, but rather the all computer users become part of the security environment and thus contribute towards an effective security. Thus it is essential that all such critical users are trained in basic security concerns by creating awareness of the security risks involved in their operations. The user must be informed that he or she is responsible in containing the security threat and thus help securing the environment. In this regard Computer Security protection becomes essential. In computer or IT security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. One such measure is to conduct a thorough IT Security Audit. Inspace Security team is actively involved in conducting in-depth IT Security Audits. Please call us to know more and how Inspace’s Team can identify such security threats and thus help mitigate them.
  • 12. LOL! Lets relax… CONTENTS Get in touch with us! All are encouraged to contribute towards the contents of this newsletter. Please reach out to Editor’s Desk @ newsletter@inspacetech.com (This newsletter is for private circulation only. The Editorial committee reserves the right to publish contributed contents). • Our Inspiration • Making News (Partners) • Inbox • Business Aligned IT (BAIT) Series • LOL!