Connect with us

Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website. .

Business

Tighter data privacy regimes demand action: four considerations for cybersecurity

Tighter data privacy regimes demand action: four considerations for cybersecurity

 By John Vladimir Slamecka, Region President, EMEA, AT&T

The end of May ushered in the General Data Protection Regulation (GDPR).

Companies now need to have stricter policies and processes related how they collect, use and store personal data.

There will be heavy penalties for GDPR violations. The new law sets stricter requirements on for example user consent, information to be provided to the user and stricter requirements on implementation of data protection measures. Data controllers have to disclose personal data breaches to regulators within 72 hours of becoming aware of a personal data breach.

International companies need to comply with the new regimeif they want to have access to the EU market of 500 million people.

What you can do: four recommendations to reassess security readiness

Now is the time to safeguard your business for the long term and reassess your security processes as part of data protection readiness. As part of your reassessment, try this four-point security checklist.

  1. Conduct a cyber security risk audit and assessment

Anaudit helps determine your current cybersecurity investments. A risk assessment will evaluate your security infrastructure and controls relative to the cybersecurity threat from emerging technologies and new hacking techniques. This could include the Internet of Things, mobility and cloud security. A gap analysis can also help you understand where you are versus where you want to be.

Two-thirds of organizations do not conduct regular cyber risk assessments[1].Regular reviews are crucial for the success of your business.

  1. Set up a threat alertplatform

Every end-point, such as an IoT device or mobile device is a potential entry point.And each has different security implications. The key is to build an integrated threat-analytics platform for all end-points. This platform needs to have a built-in, always-on security approach.

You can use threat analytics to study the ecosystem and ensure you are safe at all times.

An automated system that detects and responds to threats is important for audit and compliance procedures. A feed-back loop between your internal cybersecurity operations is ideal. Combined with a flexible risk management strategy, it can evolve based on daily threat activity and response.

  1. Get support from your service providers

To help protect sensitive data and apps that reside in your network, you need to work with your service providers. You should have full visibility of your network traffic and be able to authenticate legitimate users while blocking suspicious activity.

Today, an increasing number of companies are using artificial intelligence (AI) technologies to support their customers. AI tools can detect anomalous behavior and zero-day attacks. It helps to overcome the challenge of limited security resources.

  1. Organize ongoing staff training

People are still the weakest link in the cybersecurity chain. Cybersecurity attacks affected nearly 80% of organizations in the past year; but only 61% mandated security training for staff[2].

Every member of your organization needs to be aware of new types of security threats. Building a security culture takes time and effort and this sort of ongoing conversation with a top down approach is essential.

At the same time, threats are getting more sophisticated. From casual intruders to well-funded criminal organizations, hackers are increasingly using big data analytics to search for threat vectors. They are also using AI for social engineering attacks, such as phishing, to steal sensitive data and credentials. Daily cybersecurity events now number in the millions[3], and we should expect ransomware, malware and other attacks to continue to escalate. The focus has to be on changing user behavior and putting in place the right procedures to counter these attacks.

[1]2017 AT&T Global State of Cybersecurity

22017 AT&T Global State of Cybersecurity

3AT&T Cybersecurity Insights Report: Mind the Gap: Cybersecurity’s Big Disconnect

Global Banking & Finance Review

 

Why waste money on news and opinions when you can access them for free?

Take advantage of our newsletter subscription and stay informed on the go!


By submitting this form, you are consenting to receive marketing emails from: Global Banking & Finance Review │ Banking │ Finance │ Technology. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Recent Post