Shane Fuller co-author of the official 'GDPR for Dummies' Guide, advises, ensure you don't misinterpret what is required to become GDPR compliant and don't over-complicate things.
One of the biggest ways to ensure you are complying not just with the Right to be Forgotten, but all regulation, is putting the data protection at the heart of your company.
In the first instance, organisations need to discover which repositories, assets and applications are holding data. The second step is to classify and understand all data in the context of all related business processes.
A risk-based approach to security is central to complying with GDPR. Article 32 requires that the measures taken by organisations must provide a level of security appropriate to the risk.
If you own or work at a small business and your firm is a data processor or data controller of private data belonging to European Union citizens, your company will be subject to the General Data Protection Regulation (GDPR).
Until governments catch up with IoT security standards and regulation the industry needs to establish a commercial IoT security testing standard and share best practices for IoT risk mitigation.
By analysing decentralised datasets it's possible for businesses to securely share data and generate insight from one or multiple data sources. Unlike Blockchain, access to the raw data is only given to the data controller.
In an effort to reduce its liability under Europe's General Data Protection Regulation (GDPR) set to take effect in May, Facebook has transferred responsibility for more than 1.5 billion users in Latin America, Asia, Africa and Australia.
Mobile devices are more vulnerable to data leaks, given that they can be lost or stolen and can often result in lost or deleted data; the legal ramifications for this are the same as with any other device under the GDPR
The first and most vital thing for SMEs is to reframe the way in which they view GDPR. In many ways, the regulations will help companies better their structure, security and awareness of data, which can only be a good thing.
Hashed email addresses do not provide any significant protection for consumers as many firms are now offering services that can reverse email hashing to correctly guess consumers' email addresses, security experts warn.
Only half of consumers in the UK have so far been contacted by brands asking for consent to keep sending marketing materials, even though fewer than 50 days are left before GDPR comes into force, says a recent study.
On 25 May the General Data Protection Regulation (GDPR) will come into effect, and could make the job of incident response a whole lot harder for security researchers.
It is vital to keep track of your data by continuously looking out for your data appearing "outside the perimeter," and quickly addressing any leaks - much like having CCTV or a security guard protecting your office and car park.
Effective 25 May, 2018, the European Union's General Data Protection Regulation, commonly called GDPR, will become not only the law of the land in Europe but across the globe.
Why GDPR may hold the key to ensuring the cyber-security of CCTV and access control technology.
There is a general lack of understanding amongst IT professionals regarding exactly what they needed to change in everyday processes to achieve regulatory compliance (under GDPR).
There are some difficult obstacles to overcome in the cyber-security tough-mudder challenge, from ransomware and phishing to insider threats and GDPR, but thorough preparation can boost your chances of success.
We are seeing a shift in people's perception of how their personal data is collected, stored and used. Large-scale data breaches have raised the level of awareness in the general public, and shone a light on the role of data aggregators.
It quickly becomes obvious that traditional methods of data security on their own aren't sufficient to provide complete data visibility, but an effective defence strategy must adequately cover all zones in which data can be accessed.
The Data Protection Officers required by the new European General Data Protection Regulation can be very difficult to find. But there is a rare breed of cloud providers whose data management skills make them ideal.
It's not enough to do the minimum necessary now with enforcement of new rules less than 100 days away.With GDPR coming into force less than 100 days, organisations need to make sure they are using best practices for security now.
SC Congress 2018: Register by 1.0 pm Wednesday 14th to get your FREE day pass on Thursday 15 February, at the ILEC Conference Centre, 47 Lillie Road, London, SW6 1UD.
Data controllers and processors are required to carefully think about the ways to effectively secure personal data and take all necessary steps in this respect to prevent possible infringements of the Regulation.
Jamie Bartlett, author of The Dark Net, advises monitoring the darknet markets, both to respond to your own data being sold, but also to protect your reputation if passwords are alleged to come from you following a hack elsewhere.
With just under four months to go before the General Data Protection Regulation (GDPR) takes effect, the European Commission (EC) published guidance last wee, meant to help organisations apply the new rules to their businesses.
Many organisations have been investing in resources and processes to meet GDPR standards ahead of the May deadline according to Cisco's first Privacy Maturity Benchmark Study.
More than 70 percent of British businesses are confident about their understanding of GDPR and their preparations for the upcoming data security legislation.
Ultimately, responsible handling of data is not about avoiding fines: it is about safeguarding reputation. You can put a price tag on non-compliance with the GDPR, but what price loss of shareholder and customer confidence?