Data Privacy Day: A Reminder to Implement a Data Protection Plan

January 28, 2019 0 By Hoofer

Data Privacy Day 

Cyberattacks, natural disasters and human error doesn’t discriminate, and they can all have catastrophic effects for any organization in any industry. Everyday there are 6,080,122 records stolen, according to Breach Level Index. Shockingly, this means that every second, there are 70 records stolen.

Ensuring data privacy should be a top priority for every organization. Data Privacy Day was established to remind organizations that sensitive personal data and company information is always at risk on the internet-and a data protection plan is no longer a luxury.

We spoke to several security experts to find out why having a data protection plan in place is more important than ever, and the steps that organizations can take to safeguard their data.

Setu Kulkarni, VP, corporate strategy, WhiteHat Security

"Trust and privacy are the cornerstones of security. Security does not necessarily imply obscurity and withholding – a society just won’t work in such a world. For society to work, physical entities need to trust each other and ensure privacy. You can’t go to a doctor and not tell the doctor about what is bothering you because you fear the doctor will not respect your privacy. You trust the doctor. Now phase shift to today, where a doctor is using a digital assistant to capture notes, and you are using web and mobile interfaces to interact with the doctor. Now there are digital representations of physical entities in play (digital assistants, web and mobile apps) that need to afford the same (if not higher) levels of trust and privacy to you and the doctor. Systems will need to change soon to accommodate this status change of digital entities. Digital entities will become at-par with physical entities, and as such, the social contracts as we know them will need to change to ensure the trust and privacy boundaries across humans, systems and data are upheld," said Setu Kulkarni, VP, corporate strategy at WhiteHat Security.

Neil Barton, CTO, WhereScape

"Data Privacy Day serves as a reminder to remain proactive in protecting and managing your data. The only way to ensure that your business and customers are protected, and remain compliant with any regulations is to know where each piece of data sits and who can access it, as well as tag it and track its lineage in order to understand its usage. In addition, to further data protection and comply with subject access requests, data must be stored in a location with fast and adaptable extract capabilities.

This is particularly challenging for organizations with a large number of data sets, where manually processing all of this information effectively can be time intensive, and error-prone. This is where automation comes in – data infrastructure automation can help companies ensure all data is adequately tagged, ensuring data is identifiable, auditable and quickly retrievable. This can help companies prove their level of data privacy compliance to regulators and customers," said Neil Barton, CTO, WhereScape.

Stephen Gailey, solutions architect, Exabeam

"Data privacy was a hot topic in 2018, and that trend is expected to continue in the coming months. Over the next year, I believe we will see the first sign of government control over large internet service companies. Organizations such as Google and Facebook still don’t seem to understand what privacy means. I think we will actually see some form of legislative control being put forward or even break-ups considered," said Stephen Gailey, solutions architect at Exabeam.

Steve Blow, tech evangelist, Zerto

"All businesses know by now that they need to prioritize data protection – there’s certainly enough headline scare stories of data leaks, outages and ransomware attacks that should have persuaded them over the past year. Adding to this is the modern consumer perspective of ‘there’s no excuse for downtime, or the loss of data’. Businesses need to be focusing on ensuring they are resilient against the many threats facing data today, to prove to their customers they are taking data protection seriously.

The adoption of the latest technology, with innovative new approaches, has led to this number of both planned and unplanned disruptions in a business rising. Combating this means companies need to start looking outside of traditional backup capabilities to keep the business online; they need to choose a modern, resilience approach that can utilize continuous data protection.

This, paired with the ability to orchestrate and automate the mobility of applications to the ideal infrastructure, will enable businesses to have more than just their customers’ data protected. Organizations will become completely IT resilient, protecting data, infrastructure and reputation – without the downtime," said Steve Blow, tech evangelist at Zerto.

Trevor Bidle, vice president, information security and compliance officer, US Signal

"Cyberattacks regularly made headline news in 2018, and no organization wants to be at the center of one. Data Privacy Day serves as an important reminder for every organization to perform an assessment of their own vulnerabilities. Organizations need to understand how much data they need to maintain, the sensitivity level of the data and where the sensitive data is stored. A backup from three years ago will do no good if an organization is targeted by cyberattackers, and that’s why a backup schedule that ensures data is available from a period far enough back to restore prior to the issue is necessary. No one can predict when a disaster – natural or man-made – will occur, so having a restoration plan that is documented, tested and understood by all employees involved will keep organizations safe no matter what happens," said Trevor Bidle, vice president, information security and compliance officer at US Signal.

Alex Fielding, interim CEO, Ripcord

"People mostly think of data privacy from a perspective of content that is already digitally accessible, but one of the risks that is not discussed enough is the amount of data that’s exposed and vulnerable because it’s stored on paper or exiled in data sources like backup tapes, optical media, hard drives and even microfilm," said Alex Fielding, interim CEO at Ripcord. "Data Privacy Day should be a reminder to legal, financial services and other global industries that they must take steps to digitize and extract PII in these less than accessible data sources and automate reporting for compliance with SOX, GDPR, the California Consumer Privacy Act and other regulations," said Alex Fielding, interim CEO, Ripcord.

Alan Conboy, CTO, Scale Computing

"Data Privacy Day serves as a significant reminder to the technology industry that securing your data is of utmost importance. As more organizations are moving their workloads to edge and hyperconverged environments, companies are looking to protect and recover these workloads. Backup and disaster recovery used to simply be good business practices. Now, for many industries, they are a big part of regulatory compliance. Data is more valuable than ever before and how data is managed and protected is increasingly being regulated by law. Platforms that include a variety of backup and disaster recovery features including snapshots, replication, failover, failback and cloud Disaster Recovery-as-a-Service are key," said Alan Conboy, CTO, Scale Computing.

Gary Watson, CTO of StorCentric and Founder of Nexsan

"The notion of data protection might be starting to sound repetitive, but it is still top of the business agenda. IT security threats come in all different shapes and sizes, and just as quickly as we put up barriers, cyber criminals find new ways to break through. Businesses need to have confidence in their recovery strategy; relying alone on the traditional ways of backing up data is not sufficient. Organizations need to ensure everything is protected including the data, finances and the organization’s reputation. Threat detection software is only half the battle, keep in mind ‘what if any attack succeeds?’ and ensure there is a second line of defense in place that can offer a comprehensive range of security features, from encryption through to backup, hardened archiving, and recovery. Alongside product investment, take the time to educate employees on the latest threats, which in turn will build confidence," said Gary Watson, CTO of StorCentric and founder of Nexsan.

Scott Parker, director of product marketing at Sinequa

"As enterprise data continues growing at exponential rates, artificial intelligence and machine learning capabilities have emerged as the primary means for enterprises to respond and become Information-Driven. While this evolution raises the efficiency and innovation of organizations and individual employees to unprecedented levels, it also introduces new data privacy risks and regulations. AI systems now exist that can analyze regulations across the world using multilingual natural language processing capabilities and determine whether a new regulation impacts specific organizations. Furthermore, these systems can identify who within an organization (R&D, legal, sales, marketing, etc.) should be informed and push the relevant information to these people. With this in mind, we should view data regulations like GDPR not as costly burdens but rather as opportunities to ensure compliance and data privacy while reaping the business benefits of accelerated innovation, increased productivity and optimized customer service," said Scott Parker, director of product marketing at Sinequa.

Todd Kelly, CSO at Cradlepoint

"Data Privacy Day shines the light on how data is fast becoming the new currency of our economy, which makes how well we manage and protect it a central consideration. The majority of corporate networks are still not fully equipped to manage this change. Most depend on perimeter based security architectures connected by wires. However, forward thinking CIOs are taking a more uniform approach to securing their data in transit by using a range of new technologies to transform their WANs, including 4G & 5G LTE, cloud-based management and orchestration, software-defined WAN (SD-WAN) and zero trust IoT network architectures.  These technologies enable companies to build self-optimizing and self-repairing WANs that can provide the connectivity, agility and availability they need – all while meeting the security standards that are essential for GDPR compliance." -Todd Kelly, CSO at Cradlepoint