
J&K Govt. offices ordered to stop using unofficial digital platforms
The J&K government on Wednesday (May 21, 2025) barred its departments from acquiring non-official domains and directed officials not to use non-official mailing services.
'In view of the growing risks associated with unauthorised digital platforms, outdated hardware/software infrastructure, and increasing incidents of data compromise and phishing, a comprehensive set of instructions is hereby issued for immediate implementation and strict compliance,' an order issued by J&K's General Administration Department (GAD) said.
The GAD mandated all the departments to adopt stringent cybersecurity practices, terminate unauthorised digital platforms, and ensure full compliance with official IT governance protocols. It has directed immediate 'deactivation of all departmental websites operating on non-official domains like .com, .org, or .net.'
'Government websites will be hosted exclusively on authenticated domains such as '.gov.in' or '.jk.gov.in,'' it said.
Personal email banned
The government also barred the use of personal email services such as Gmail, Yahoo, or Rediffmail for any official communication. 'All communications must be conducted using NIC-provided official email IDs. Emails from unofficial domains will be treated as invalid and may be ignored,' it said.
The order also underlined that any proposals for new websites must be routed through the National Informatics Centre (NIC) and approved by the Information Technology Department to ensure uniformity and compliance with cyber standards.
The administration has also ordered a comprehensive IT infrastructure audit across all departments. 'Chief Information Security Officers (CISOs) and Information Security Officers (ISOs) are tasked with compiling hardware and software inventories, verifying licensed systems, ensuring the presence of antivirus/firewall solutions, and assessing network security configurations. A standardised reporting format will be provided by the IT Department for uniformity,' it said..
Cyber hygiene
The NIC will conduct cyber hygiene and threat response training for IT staff. These sessions will cover topics such as email security configuration, CERT-In reporting protocols, and safe digital practices.
The order strictly prohibits the use of pirated or outdated software, stating that all IT procurements must adhere to the minimum technical standards set by the IT Department.
All the departments have been given a 15-day deadline to submit detailed compliance reports. 'Failure to comply will invite disciplinary action under the relevant administrative and IT conduct rules,' the order said.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
a day ago
- Time of India
State Launches Maha-AASTHA to Digitise Employee Records
Nagpur: The Maharashtra government has launched a time-bound drive to bring every service record of state employees online through its new e-HRMS platform, Maharashtra Advanced Administrative System for Transparent Human Resource Administration (Maha-AASTHA). The initiative aims to enhance transparency and efficiency in maintaining government staff data, from appointment formalities to retirement benefits. According to a Government Resolution (GR) issued on June 20, all departments at Mantralaya must establish dedicated Maha-AASTHA cells by June 27. Each department is required to appoint a nodal officer (SPOC) and submit their contact details to the general administration department (GAD) by June 30. These cells will function as control rooms to oversee the transition from paper-based service books to fully digitized records. Updating service records has been made mandatory. All details—such as appointments, transfers, promotions, training, leave history, pension nominations, and disciplinary actions—must be uploaded to the digital service books by July 15. Officials have also been instructed to physically sort and clean old records to facilitate scanning in the next phase. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Giao dịch vàng CFDs với mức chênh lệch giá thấp nhất IC Markets Đăng ký Undo Departments must prepare an organogram (staff structure) and ensure that all employees have active government email IDs. Weekly progress reports must be emailed to the GAD every Monday. Officials clarified that this is not just a digitization initiative, but part of chief minister Devendra Fadnavis' 150-day administrative agenda, building on the earlier success of the 100-day plan. The goal is to eliminate delays in employee service processes through streamlined digital workflows. While the initial phase targets the Mantralaya departments, the plan is to eventually expand it to every government office across Maharashtra. Departments have been warned that non-compliance or delays will be taken seriously. The state government expects the initiative to ultimately benefit over seven lakh employees, but for now, the pressure is on departments to clean up decades of paperwork and ensure no data is left behind before the July deadline.


Time of India
2 days ago
- Time of India
Your Google account could be next: What a hacker can do with just one login
We don't want to freak you out—but if someone gets access to your Google account, they basically own your digital life. One single login. That's all it takes. And if you're one of the billions using the same password across accounts, or if your credentials were part of that recently reported 16 billion password leak, you need to act—like, yesterday. Let's walk through exactly what a hacker can do with just your Gmail address and password. It's worse than you think. This isn't just about reading your emails. Your email is the master key to the internet Your Gmail is the recovery email for dozens (if not hundreds) of other accounts—Facebook, Instagram, Netflix, Amazon, bank logins, food delivery apps. Hackers know this. Once they're in, they can click 'Forgot Password' on your other accounts, have the reset links sent to your Gmail, and quietly take over everything. You won't even know it's happening until it's too late. And unlike a phishing scam, which might fail if you spot a dodgy link, this happens legitimately through the real password reset processes. They can access google pay and google wallet If you've linked any cards or bank accounts to Google Pay, hackers can make transactions, drain prepaid balances, or misuse saved billing information. Some people even store gift cards or event passes inside their Google Wallet. That's all fair game if they're inside. According to Google's own data, over 150 million people actively use Google Pay globally. That's a massive attack surface. They can see where you've been—and where you're going If you've ever used Google Maps for directions, or even had location services turned on, your location history is saved. Hackers can access your Timeline, find out where you live, where you work, which gyms or hospitals you've visited, and even where you parked last Tuesday. Creepy? Yes. Dangerous? Absolutely. This isn't just about stealing money anymore—it's about stalking, blackmail, and real-world threats. Your Google drive isn't as private as you think Documents, spreadsheets, old ID scans, medical reports, passwords saved in a notepad file (yes, people actually do that)—hackers can access everything in your Google Drive. And if you've given 'offline access' to your files, that makes downloading even easier. If you store resumes, family photos, or signed PDFs with your signature? It's all up for grabs. They can access your YouTube channel, photos, and search history Think of everything Google knows about you. Your YouTube likes, your watch history, your Google Photos library (which could include private family images), and even your Google search history going back years. Hackers can access and even delete your content—or impersonate you if you have a public YouTube presence. And yes, they'll also know what embarrassing questions you've Googled at 2 a.m. They can set up forwarding rules and watch silently One of the worst tricks? Hackers don't always change your password. Instead, they sneakily set up email forwarding rules that send copies of specific emails—like ones with banking info or OTPs—to their own accounts. You keep using Gmail like normal while they quietly spy. Some even add their backup email to your recovery options, so they can reset your account if you try to boot them out later. If you're logged in on Chrome, they can access everything If your Google login is synced with Chrome, hackers can see your bookmarks, browsing history, and even saved passwords—yes, the ones stored in Chrome's autofill. According to a research, over 30% of internet users use browser autofill to store passwords. If that sounds like you, your passwords aren't just at risk—they're already exposed. They can lock you out completely Hackers who gain access to your Google account often act fast. They change the password, recovery options, 2FA methods, and even delete your recovery codes. Some even set up Google Authenticator or new security keys—locking you out in under 10 minutes. If you've never gone through Google's painful account recovery process, trust us—you don't want to. How to protect yourself (starting now) Use Two-Factor Authentication (2FA) — Always. Preferably via an authenticator app, not SMS. Check 'Security Activity' in your Google Account regularly. Revoke access to unknown devices and apps. Use a password manager and never reuse passwords across accounts. Enable passkeys or security keys if you're serious about locking it down. Your Google account isn't just your email. It's your entire digital identity. From your bank logins and photos to your location and search history—it's all tied to that one login. So if there's ever a time to double-check your security settings, update your password, and stop brushing off 2FA, it's now. Because hackers aren't just after your money—they're after you. And with 16 billion passwords floating around out there, yours might already be in the wild.


Time of India
2 days ago
- Time of India
Maharashtra govt finds company to supply 50 Apple iPads for e-cabinet system
Mumbai: The state govt finally found a company to supply 50 Apple iPads for ministers and senior officials to run its e-cabinet system. After the previously shortlisted company refused to supply the iPads in a week's time, the govt was forced to scrap the tender. The state govt decided to place an order with a new company. The govt will spend over Rs 1 crore to buy the 50 Apple iPads. To implement the e-cabinet system immediately, a short-term e-tender was published. As Innovative Techhub was the only bidder eligible in the technical scrutiny, its commercial bid was opened. The total price quoted is lower than bids received previously. The Information Technology department also ensured the reasonableness of the prices mentioned in the supply order given to Innovative Techhub regarding the purchase of iPads, a Govt Resolution (GR) said. The state govt last week cancelled the work order to buy 50 Apple iPads for ministers and select officials after the supplier said that iPads were not immediately available and couldn't be supplied in a week. The state govt in April decided to provide iPads for all ministers and select senior officials for Rs 1.6 crore for the implementation of an e-cabinet system. However, activists criticised the govt over the decision to buy iPads for ministers. "A few days ago, the Maharashtra govt proposed purchasing iPads to distribute among ministers. Tenders were even invited. At that very moment, I raised a question — For ministers who don't even have official email IDs, what exactly is the use of an iPad? A toy? Who found a contractor who can't even supply 50–60 iPads? How was his tender approved? Is this just administrative incompetence, or something more? Who will answer these questions? 90% of ministers don't have official govt email IDs. Those who do use emails, use private ones. So, this e-Cabinet — was it going to run on WhatsApp? e-governance without email is like walking blindfolded," RTI activist Vijay Kumbhar said in a post on X.