Lead Machine Pink 160x1200

Lead Machine Pink 160x1200

iTWire TV 705x108

Tuesday, 25 January 2022 10:46

Warning: Pay heed to Data Protection Day

By Anurag Kahol, CTO at Bitglass, a Forcepoint company

GUEST OPINION: Data Protection Day, impending in Europe, serves as a global reminder of one of the most important responsibilities for any organisation: keeping sensitive data secure.

My own company finds that countless organisations around the globe are open to cyber attacks as their data security measures are inadequate.

Consumers are constantly discovering the information that is collected about them, how that data is used, and how daily breaches put that information at risk. Consequently, to maintain consumer trust (and remain compliant with regulations), it is imperative that companies make security a top priority.

This past year marked a pivotal change in how companies conduct business, with most being forced to shift rapidly to a remote work style of operations due to the global COVID-19 pandemic.

Now we have begun to see high levels of vaccine distribution, some might think it’s only a matter of time before ‘normal’ in-office work resumes. That is not likely to be the case.

Instead, we are going to see a permanent blend of remote and in-office work, as well as mobile employees whose workspaces are changing constantly. Organisations must be prepared to continue to operate in this manner while ensuring that data is secure, no matter where or how it is accessed.

Unfortunately, many organisations lack the ability to achieve appropriate security levels, and are relying on outdated tools designed for predominately on-premises operations and lack the granularity needed today.

To address these challenges, a few steps must be taken. First, organisations must have an accurate inventory of data. This step is critical for adhering to data privacy regulations including GDPR and CCPA, because if companies don’t know the information they have or where it is going, they cannot protect it properly.

What is needed is a set of comprehensive activity logs that track all file, user, app, and web activity to reveal everything that is happening with consumers’ data. Next, companies need to protect access to consumer information as well as the various systems that store it.

This can become more challenging for improperly equipped organisations that adopt cloud technologies and other remote work capabilities, as consumer data can then potentially be accessed across numerous applications and on various devices.

To address this problem, organisations can require that employees attempting to access consumer data are authenticated via single sign-on (SSO), as well as multi-factor authentication (MFA). This will aid in ensuring that only legitimate, authorised users can handle consumer information.

Finally, organisations need to have a thorough understanding of data jurisdictions and any security challenges they may present after migrating to the cloud.

With respect to certain data privacy regulations like CCPA, data may be stored or transferred only where the state has jurisdiction or an agreement is in place. Similarly, under GDPR all personally identifiable information must be secured with policies and processes in place which allow for audit and compliance.

To ensure compliance, organisations should look for security solutions that allow them to encrypt cloud data (wherever it resides) while maintaining local control of encryption keys.

Additionally, solutions that dynamically allow or deny access based on contextual factors like a user's location, device type, or job function are highly helpful, along with data loss prevention (DLP) capabilities.

For ease of management and cost-effective, consistent security, organisations should look for a single security platform that integrates all these capabilities into one offering.

Read 1076 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News