Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Technology is only half of the battle for GDPR compliance

by The Gurus
September 21, 2016
in Editor's News
Share on FacebookShare on Twitter

Technology, such as encryption and firewalls, can only go so far to protect an organisation’s data; culture is just as important, if not more so. This is according to Phil Bindley, CTO of The Bunker, who warns that organisations are fighting a losing battle if they fail to get company culture right. Data streams throughout organisations and is often used by everyone in some way. This means that without a cultural appreciation of how data should be treated, the risk to GDPR compliance remains high.

The GDPR is designed to better protect citizens’ data and harmonise legislation across Europe. The regulation brings a number of new guidelines for organisations in relation to Personally Identifiable Information (PII). In order to ensure a best practice approach to securing data is achieved, business leaders need to create a culture of information security by embedding sound processes within their organisations.

Phil Bindley, CTO of The Bunker, explains: “With the GDPR coming into force a culture of information security has a major part to play in ensuring firms are able to demonstrate and maintain compliance. Although technology is an important factor, what it fundamentally comes down to is people and processes. It’s not about building a bigger firewall, it’s about changing the way organisations and their employees behave and treat the data that they hold on behalf of their customers. 

“Information security professionals have a huge part to play in creating this culture. They need to speak the language of the board so they can explain the commercial benefits of behaving in a secure way. Businesses need to instil sound practices and ensure all staff look through a lens of data security. It’s vital to have a complete picture of everything that has the possibility to impact security. Everyone within a business needs to think about what they do on a day-to-day basis to make sure they behave in a way that is beneficial to the company as a whole, this extends all the way to the boardroom. Only then can organisations achieve a best practice approach to IT security.

“The GDPR provides a framework that encourages organisation to evaluate whether or not they are behaving in a secure way. It’s a real opportunity to change the way that information security is approached and it should be welcomed by businesses. By embracing a culture of information security, organisations will be more competitive, can manage risk, protect their brand, and innovate in a controlled way. This in turn will allow organisations to compete at a European level; in order to trade with other European nations, organisations need to be compliant with the GDPR standard as and when it comes into existence. If business fail to embrace the changes they won’t be able be able to understand the associated risks. Businesses need to understand risks in order to make decisions about where to invest and grow. 

“There’s a competitive advantage of working with a cloud service provider (CSP) that values security, especially when an organisation’s customers reside in sectors that constantly evaluate this, such as financial services and government. With the introduction of the Data Protection Officer, supply chains are going to be tested to make sure data is being handled in the correct way. Fundamentally, without a secure framework in place, people are going to be less likely to want to do business with you,” concludes Bindley.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Achieving business success by balancing business goals with security requirements

Next Post

Study finds smart home tech gaining in popularity, yet still woefully insecure

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information