dcn-as logo
Story image

Data Protection Day needs to be an everyday thing

29 Jan 2019

Article by Imperva EMEA regional vice president Spencer Young

Today marks the 13th annual Data Protection Day, a day aimed at raising awareness and promoting good data privacy practices around the world. 

The past year saw vast changes impacting the UK’s data protection landscape, not the least of which is due to the EU’s General Data Protection Regulation (GDPR) officially coming into play. The regulation means that regardless of the industry or location, any business that holds and processes personal data must prioritise data protection.

The fines associated with non-compliance are hefty, to say the least, and the potential damage to the brand’s reputation can be even costlier. Yet, we have seen big brands including the likes of Google tripping up on their data protection journey. Where are companies going wrong in getting data protection right?

1/ Finding the data is not easy

Data protection is complex and involves multiple teams, technologies and systems to work together.

One of the first hurdles IT teams face is in conducting a Data Assessment Report, which requires organisations to locate any personal data they are holding and document how the data is collected and processed. This detailed assessment must be kept current and ready for regulatory inspection or compliance audits.

However, many businesses find it challenging to locate that data. When you are a large enterprise, this can take more than just a call to your IT department and can take weeks – even months – of investment.

2/ Not having the right technologies in place

Perhaps most significantly, regulations require any company that experiences a data breach to publicly acknowledge the breach and notify the local Data Protection Authorities (DPA) in the member states where the people affected by that breach reside.

Businesses must notify the DPA’s within 72 hours of identification or confirmation of the breach. They must be able to tell them what data was breached, how many records were taken and provide a member-state specific report around the infringement. 

This requirement means all businesses need to be able to understand who accessed the data, what activity they performed and when they performed it. Any organisation without strong technology solutions in place will struggle to provide the requested information within the 72-hour window.

3/ Failure to govern data access

Limiting access to certain information and making sure that access is authorised and reflects any changes within the business is a critical step in data protection that many companies tend to neglect.

It's important to analyse policies on data collection, handling, test data usage, data retention, and data destruction. At each point, access must be on a need-to-know basis. Users should not be allowed to accumulate access rights as they are promoted or move laterally within an organization. Privileged accounts, including DBAs, Admins and Service accounts should be carefully monitored to ensure they are not used to bypass policies.

Not doing so will inevitably lead to disastrous consequences.

There may be many reasons why an organisation’s data protection strategy is not up to par, but they will reside somewhere within having inadequate or ineffective processes, people, and technology. It is critical to be aware of potential pitfalls and actively work towards more robust data protection practices.

GDPR or not, Data Protection Day should be every day in our data-driven business landscape.

Story image
Google & Parallels to bring Windows apps to Chrome Enterprise
Google Chrome Enterprise users will soon be able to use fully-featured Windows applications such as Microsoft Office on their Chromebooks – a change expected to take effect later this year.More
Story image
Cloud-edge and 5G solutions propose significant value to vendors and enterprises
"Clearly, there is an opportunity to be addressed by somebody, but the jury is still out on who captures what parts of the emerging cloud-edge and 5G ecosystem.”More
Story image
Digital Realty announces Hong Kong data center build
The HKG11 data center will span 21,000 square metres and deliver 24 megawatts of IT capacity, to be in Kwai Chung, a developing data center cluster. More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Link image
Transform your authentication from a burden to a boon
Modern authentication tools can be operational burdens, introducing more problems than they solve. Here's how one solution can flip the script.More
Story image
Gartner: Strong revenue growth forecast for container management software and services
This is the first time Gartner has published a forecast for container management, in response to the increasing importance of the underlying technology.More