Enough with The GDPR Warnings!


18 May 2018

Enough with The GDPR Warnings!

News pages have been awash with fresh warnings of the impending General Data Protection Regulation (GDPR) which (finally) comes into force this week. You are unlikely to have missed the recent widespread media warnings about GDPR, but another directive which may have slipped under the radar is the Security of Network Information Systems Directive (NISD), which quietly rolled out last week.

The NISD is designed to ensure the security of industries that comprise the critical infrastructure and although the potential penalties of up to £17 million are rather imposing, the government will not automatically administer a fine in the event of a breach. As with GDPR, any potential punishment will be judged on whether the organisation made adequate cyber security provisions. It is likely that the judgement will be based on how well the organisation has implemented the NIS Directive top-level objective guidelines recently published by the National Cyber Security Centre.

The implementation of GDPR is particularly timely given the recent stream of reporting about data breaches and the amount of personal data which appears to have been leaked into the public domain. Whilst some companies will perceive GDPR as burdensome, the new regulation actually presents an opportunity for companies to cleanse and consolidate the data they hold, thereby enhancing control over a key area where cyber attacks are currently increasing.

So How Do I Prepare?

For anyone concerned over the GDPR deadline, PGI has information security and data protection experts who can advise on how to become GDPR compliant, starting with a gap analysis to identify your level of compliance. However, notwithstanding the direct actions companies must take to address compliance, there are also a number of steps to help mitigate the threat of a data breach and prevent cyber attacks from occurring in the first place.

One of the simplest and most cost-effective measures in helping prevent attacks is to ensure your staff have improved cyber security awareness. As technical defences improve, the notion that ‘humans are the weakest link’ is increasingly pertinent as cyber attackers know that the most direct route into a company is by luring unsuspecting staff to click on malicious links and attachments. PGI’s one day GCHQ Certified Cyber Security Awareness course can provide employees with a thorough understanding of cyber security as well as the associated threats, vulnerabilities and different mitigation strategies for managing relevant issues.

In addition, PGI are running a series of GDPR courses to train your staff on how to continue to be compliant with the new GDPR regulations. Unfortunately, it isn’t a quick fix and will need a continued review of data, opt-ins, policies, images and the way employees interact with company databases.

Another way to address the risk of phishing attacks against an organisation is to conduct an internal phishing campaign to test, and subsequently advise staff on their susceptibility to this type of attack. To help assess the current cyber awareness of your workforce, PGI has developed a phishing capability assessment which can deliver targeted training to reduce the organisation’s vulnerability to phishing campaigns.

What About Technical Solutions?

Whilst an informed workforce adopting positive cyber hygiene is critical to protection, ensuring corporate technical infrastructure is secure is also crucial particularly in the event of a breach under GDPR, as any potential fines will be assessed against whether adequate cyber security provisions were used. Even basic practices, such as ensuring operating systems and devices are regularly patched to the latest security updates, is often overlooked by both companies and individuals. The scale and impact of the WannaCry ransomware attacks in 2017 were exacerbated by the many businesses and organisations who had not updated their systems to Microsoft’s latest software which would have been protected against the malware.

Evaluating the security of a business’ system or network can be done by one of PGI’s Penetration Testers who will seek to identify any vulnerabilities that could lead to a business impact. Penetration tests can vastly reduce your risk profile and contribute greatly to the protection of your income, clients and reputation. Furthermore, with the imminent introduction of GDPR, regular penetration tests also are a good way of evidencing security considerations for personal data processed on IT networks. 

What Happens if I Suffer a Breach?

A number of clients we have spoken to have been proactive and carried out the necessary preparation work. New policies have been written and stored data has been cleaned and consolidated. However, something that seems to have been overlooked in a lot of businesses’ preparation plans is the ‘what if’ scenario. What do you do if you suffer an information security breach and your customer and client data is compromised?

It is important to have an Incident Response plan included within the mountain of other privacy notices and legal policies that have to be rewritten. Who will be the spokesperson from your organisation? What will they say? Who do you report it to? What are the legalities around this? It is important to be structured and organised in the event of a breach as this can be the PR ‘make’ or ‘break’.

In addition, and more importantly, how are you going to recover the data, try to find out what has been done with it and patch up any weaknesses in your systems? That’s where we come in. PGI are Incident Response experts. Our team of cyber security specialists can deploy quickly and efficiently to begin the process of detecting and eliminating the threat. Our expertise means that we can limit any operational disruptions, financial losses and reputational damage that may result from incidents such as data breaches, network compromises, insider threats and malicious software (malware).

For advice or more information about any of this, please visit our website or contact us directly.

 

—————————————————————————————————————

Protection Group International believes that cyber security doesn’t need to be overly complicated, incomprehensible or vastly expensive. We specialise in delivering strategic vulnerability assessment services and offer a range of senior cyber awareness education to enable you to tackle cyber threats in-house. For more information click here.

Our partner company, Protection Vessels International, is focussed on the efficient delivery of high quality, cost effective security solutions for the maritime community. We invest in our well-maintained logistic infrastructure to enhance customers’ business continuity through the protection of their assets and people. For more information click here.

author

By PGI Expert

Senior Cyber Threat Analyst

Share this article

RISK PORTAL

Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP