SlideShare a Scribd company logo
1 of 7
IMPORTANCE OF
CYBERSECURITY
Take control of your digital safety
W HY IS SECURITY
IMPORTANT?
Security safeguards everything valuable in our
digital world, from personal information to business
systems. I
t stops disruptions, protects privacy, and
builds trust online. Strong security practices are
essential to keeping our digital lives safe.
TYPES OF
SECURITY THREATS
Cyberattacks (hacking,
phishing)
Data breaches
Physical threats
(unauthorized access)
Social engineering
SECURITY MEASURES
FOR INDIVIDUALS
Implement strong passwords and update them
regularly.
Enable two-factor authentication for added security.
Install antivirus and anti-malware software and keep
them up-to-date.
Be cautious of suspicious emails and links.
Back up your data regularly.
Secure your physical devices (laptops, phones).
SECURITY MEASURES
FOR ORGANIZATIONS
Implement security policies within
organizations.
Conduct cybersecurity awareness training
for employees.
Regularly update and patch software and
systems.
BENEFITS OF STRONG SECURITY
Protection: Shields sensitive data (financial, personal, intellectual
property) and keeps systems functioning smoothly.
Privacy: Safeguards personal information from unauthorized
access.
Trust: Builds confidence in online interactions for both individuals
and businesses.
Reduced Risk: Mitigates financial losses from cyberattacks and
data breaches.
Peace of Mind: Provides a sense of security in a digital world with
constant threats.
GET IN TOUCH
WEBSITE
www.lumiversesolutions.com
PHONE NUMBER
8888789684
LOCATION
Gangapur Road, Nasik

More Related Content

Similar to Why is Security Important | Importance of Cyber Security

Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfYuriKasan
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCR Group
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdfVograce
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdforage technologies
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfMverve1
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...
Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...
Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...Sarah Arrow
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Lock & Secure: Dubai Business Data Defender
Lock & Secure: Dubai Business Data Defender Lock & Secure: Dubai Business Data Defender
Lock & Secure: Dubai Business Data Defender Cybersecurity Dubai
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?VRS Technologies
 

Similar to Why is Security Important | Importance of Cyber Security (20)

CyberSecurity Study Jam
CyberSecurity Study JamCyberSecurity Study Jam
CyberSecurity Study Jam
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Cybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdfCybersecurity - Best Practices for Small Businesses.pdf
Cybersecurity - Best Practices for Small Businesses.pdf
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...
Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...
Implementing Cyber Essentials: Practical Steps for a Secure Digital Environme...
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Lock & Secure: Dubai Business Data Defender
Lock & Secure: Dubai Business Data Defender Lock & Secure: Dubai Business Data Defender
Lock & Secure: Dubai Business Data Defender
 
Network Security
Network SecurityNetwork Security
Network Security
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?How Can Our IT Solutions Enhance Security and Protect Your Data?
How Can Our IT Solutions Enhance Security and Protect Your Data?
 

More from Lumiverse Solutions Pvt Ltd

Cybersecurity Threats in Financial Services Protection.pptx
Cybersecurity Threats in  Financial Services Protection.pptxCybersecurity Threats in  Financial Services Protection.pptx
Cybersecurity Threats in Financial Services Protection.pptxLumiverse Solutions Pvt Ltd
 
Healthcare Cybersecurity | Cybersecurity in Healthcare
Healthcare Cybersecurity | Cybersecurity in HealthcareHealthcare Cybersecurity | Cybersecurity in Healthcare
Healthcare Cybersecurity | Cybersecurity in HealthcareLumiverse Solutions Pvt Ltd
 
Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0
Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0
Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0Lumiverse Solutions Pvt Ltd
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
Hacking Operating Systems | Best Operating System for Hacking
Hacking Operating Systems | Best Operating System for HackingHacking Operating Systems | Best Operating System for Hacking
Hacking Operating Systems | Best Operating System for HackingLumiverse Solutions Pvt Ltd
 
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeCybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeLumiverse Solutions Pvt Ltd
 
Cybersecurity Threats in the Finance Sector | Cyber Attacks
Cybersecurity Threats in the Finance Sector | Cyber AttacksCybersecurity Threats in the Finance Sector | Cyber Attacks
Cybersecurity Threats in the Finance Sector | Cyber AttacksLumiverse Solutions Pvt Ltd
 
Cyber Security | Information Security | Computer security
Cyber Security | Information Security | Computer securityCyber Security | Information Security | Computer security
Cyber Security | Information Security | Computer securityLumiverse Solutions Pvt Ltd
 

More from Lumiverse Solutions Pvt Ltd (9)

Cybersecurity Threats in Financial Services Protection.pptx
Cybersecurity Threats in  Financial Services Protection.pptxCybersecurity Threats in  Financial Services Protection.pptx
Cybersecurity Threats in Financial Services Protection.pptx
 
Healthcare Cybersecurity | Cybersecurity in Healthcare
Healthcare Cybersecurity | Cybersecurity in HealthcareHealthcare Cybersecurity | Cybersecurity in Healthcare
Healthcare Cybersecurity | Cybersecurity in Healthcare
 
Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0
Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0
Decoding Cybersecurity for Web 3.0 | Cybersecurity in Web 3.0
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
Healthcare Cybersecurity for Patient Confidence
Healthcare Cybersecurity for Patient ConfidenceHealthcare Cybersecurity for Patient Confidence
Healthcare Cybersecurity for Patient Confidence
 
Hacking Operating Systems | Best Operating System for Hacking
Hacking Operating Systems | Best Operating System for HackingHacking Operating Systems | Best Operating System for Hacking
Hacking Operating Systems | Best Operating System for Hacking
 
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeCybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of Cybercrime
 
Cybersecurity Threats in the Finance Sector | Cyber Attacks
Cybersecurity Threats in the Finance Sector | Cyber AttacksCybersecurity Threats in the Finance Sector | Cyber Attacks
Cybersecurity Threats in the Finance Sector | Cyber Attacks
 
Cyber Security | Information Security | Computer security
Cyber Security | Information Security | Computer securityCyber Security | Information Security | Computer security
Cyber Security | Information Security | Computer security
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Why is Security Important | Importance of Cyber Security

  • 2. W HY IS SECURITY IMPORTANT? Security safeguards everything valuable in our digital world, from personal information to business systems. I t stops disruptions, protects privacy, and builds trust online. Strong security practices are essential to keeping our digital lives safe.
  • 3. TYPES OF SECURITY THREATS Cyberattacks (hacking, phishing) Data breaches Physical threats (unauthorized access) Social engineering
  • 4. SECURITY MEASURES FOR INDIVIDUALS Implement strong passwords and update them regularly. Enable two-factor authentication for added security. Install antivirus and anti-malware software and keep them up-to-date. Be cautious of suspicious emails and links. Back up your data regularly. Secure your physical devices (laptops, phones).
  • 5. SECURITY MEASURES FOR ORGANIZATIONS Implement security policies within organizations. Conduct cybersecurity awareness training for employees. Regularly update and patch software and systems.
  • 6. BENEFITS OF STRONG SECURITY Protection: Shields sensitive data (financial, personal, intellectual property) and keeps systems functioning smoothly. Privacy: Safeguards personal information from unauthorized access. Trust: Builds confidence in online interactions for both individuals and businesses. Reduced Risk: Mitigates financial losses from cyberattacks and data breaches. Peace of Mind: Provides a sense of security in a digital world with constant threats.
  • 7. GET IN TOUCH WEBSITE www.lumiversesolutions.com PHONE NUMBER 8888789684 LOCATION Gangapur Road, Nasik