Information Security

As one of India’s leading providers of building materials, we are constantly evaluating our data security and IT systems to ensure that we are adequately equipped to alleviate the increasing threats of cyber-attacks on a real-time basis. We are conscious of the fact that modern methods of construction and infrastructure are leading to the evolving nature of building practices. Therefore, driven by connectivity and virtual collaboration, our digital assets, right from planning and design to client, contractor, employee and vendor details are securely encrypted.

To ensure that our organisation is safe from potential gaps in its security posture, our highly competent security team prioritises people skills and technological infrastructure to ensure that the rest of our business is on board with security as early as possible in the projects we handle.

Along with a keen focus on vulnerability management, we have also created a foundation of good cyber hygiene. We are continuously improvising our Information and Cybersecurity posture by defining and implementing the right set of policies, procedures and controls to manage these 'advanced' risks by adopting Global Standards and leading practices.

We have implemented a series of cybersecurity controls within our organisation to encompass the People, Process and Technology layers.

Some of the key aspects of our IT and Information Security Policies are:

We believe that our proactive roadmap and robust processes to deal with Information & Cyber Security risks align with our business goals. With the backing of our strong vision and leadership, and a specialised team to lead our information security strategy, we will continue to focus on building a robust and sustainable Cyber Secure environment in keeping with our ‘People First’ approach in mind.

Be Aware

We organize continuous training and awareness programs on Information and Cybersecurity for our talent pool. Our focus remains on sharing best practices that not only empowers our people at the workplace but also protects them from cyber fraud in their personal lives.

Defence in Depth

We design policies and controls to protect our technology layers that includes but are not limited to, Infrastructure, Business Applications, Communication and Accessibility. We are committed to adopting leading cybersecurity controls that are ‘fit-for-purpose’ and scalable to meet the requirements of our business ambitions.

Early Detection and Interception

We perform 24x7 Cybersecurity Monitoring on our mission-critical technology infrastructure. We take relevant and timely actions based on findings to mitigate risks. We also integrate threat intelligence to prevent potential cyber-attacks.

Data Protection

We have put in place various checks and controls to protect enterprise data from external and internal data leakage attacks, and we continuously improvise our data protection program.

Test of Effectiveness

Our technology environment undergoes periodic systems' testing, both internal and external. In addition, we perform ethical hacking and other threat simulation exercises to devise a focused action plan so as to ensure that our Cybersecurity posture keeps pace with the evolving threat landscape.

Secured Ecosystem

We constantly follow a method of ‘Design, build and acquire’ safe and secure IT systems, including infrastructure and business applications. Our endeavour is to build a robust cybersecurity partner ecosystem as well as continuously improve our supplier security posture.

Subscribe for Newsletter

What Is RCF?

RCF stands for Roof, Column, and Foundation and is the core structural system of any building, responsible for overall stability and load-bearing capacity. Therefore, RCF Strong. Toh Ghar Strong.