sb-nz logo
Story image

Data Protection Day needs to be an everyday thing

29 Jan 2019

Article by Imperva EMEA regional vice president Spencer Young

Today marks the 13th annual Data Protection Day, a day aimed at raising awareness and promoting good data privacy practices around the world. 

The past year saw vast changes impacting the UK’s data protection landscape, not the least of which is due to the EU’s General Data Protection Regulation (GDPR) officially coming into play. The regulation means that regardless of the industry or location, any business that holds and processes personal data must prioritise data protection.

The fines associated with non-compliance are hefty, to say the least, and the potential damage to the brand’s reputation can be even costlier. Yet, we have seen big brands including the likes of Google tripping up on their data protection journey. Where are companies going wrong in getting data protection right?

1/ Finding the data is not easy

Data protection is complex and involves multiple teams, technologies and systems to work together.

One of the first hurdles IT teams face is in conducting a Data Assessment Report, which requires organisations to locate any personal data they are holding and document how the data is collected and processed. This detailed assessment must be kept current and ready for regulatory inspection or compliance audits.

However, many businesses find it challenging to locate that data. When you are a large enterprise, this can take more than just a call to your IT department and can take weeks – even months – of investment.

2/ Not having the right technologies in place

Perhaps most significantly, regulations require any company that experiences a data breach to publicly acknowledge the breach and notify the local Data Protection Authorities (DPA) in the member states where the people affected by that breach reside.

Businesses must notify the DPA’s within 72 hours of identification or confirmation of the breach. They must be able to tell them what data was breached, how many records were taken and provide a member-state specific report around the infringement. 

This requirement means all businesses need to be able to understand who accessed the data, what activity they performed and when they performed it. Any organisation without strong technology solutions in place will struggle to provide the requested information within the 72-hour window.

3/ Failure to govern data access

Limiting access to certain information and making sure that access is authorised and reflects any changes within the business is a critical step in data protection that many companies tend to neglect.

It's important to analyse policies on data collection, handling, test data usage, data retention, and data destruction. At each point, access must be on a need-to-know basis. Users should not be allowed to accumulate access rights as they are promoted or move laterally within an organization. Privileged accounts, including DBAs, Admins and Service accounts should be carefully monitored to ensure they are not used to bypass policies.

Not doing so will inevitably lead to disastrous consequences.

There may be many reasons why an organisation’s data protection strategy is not up to par, but they will reside somewhere within having inadequate or ineffective processes, people, and technology. It is critical to be aware of potential pitfalls and actively work towards more robust data protection practices.

GDPR or not, Data Protection Day should be every day in our data-driven business landscape.

Story image
Entrust launches cloud-based ID issuance solution
The Sigma instant ID solution uses encryption, trusted HSM technology and secure boot to issue highly secure physical and mobile identities.More
Story image
BayCom partners with NICE inContact to offer cloud contact centre platform in NZ
“With our extensive experience in the industry, BayCom has the ability to design, implement and support CXone nationwide, providing organisations with an industry-leading Contact Centre as a Service (CCaaS) solution to deliver on their customer experience strategies.”  More
Story image
How cyber-attackers use Microsoft 365 tools to steal data
Vectra security research has recently identified how cyber-attackers use Microsoft Office 365 tools against organisations to steal data and take over accounts.More
Story image
Cybersecurity market continues meteoric ascent
With the increase in cyberattacks, organisations are continuing to spend more money on security. However, without a focused cybersecurity strategy, they often spend it in the wrong areas.More
Story image
Video: 10 Minute IT Jams - Who is LogRhythm?
LogRhythm VP of sales for Asia Pacific Simon Howe, who discusses the company's primary offerings and services, what products the company is focused on for the future, and the infrastructure it has in the A/NZ market.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More