Story image

Data privacy regulations causing headaches for AU businesses

21 May 2018

Global and regulatory landscapes are tightening to ensure more data privacy in the face of increasing data sharing and cyber threats, and while many Australian businesses have prepared for the Notifiable Data Breaches scheme, fewer are prepared for GDPR.

Those are some of the findings from Webroot’s global report, Data Privacy and Regulation: The Worldwide Race to Comply. It surveyed 600 IT decision makers, of whom 200 were from Australia.

It found that 96% of Australian respondents feel confident that their fellow employees are equipped to comply with NDB and GDPR, however only 9% said they were actually ready to comply with GDPR.

“Organisations shouldn’t neglect training, and more importantly look to train ALL staff, not just IT. Many data breaches today come from insider threats – and often are caused by careless mistakes. IT and HR teams need to work together to make sure all employees are trained, and continue to be trained on compliance requirements as regulations evolve and as citizen’s demand for more privacy grows,” comments Webroot senior information security analyst Dan Slattery.

Twenty two percent of respondents also say they are not confident that their organisations could comply with rules requiring them to disclose all personal data collected on individuals within one month of request.

Interestingly, only 18% of UK respondents are confident they could provide information within one month of request – suggesting that they are even less sure about their abilities than those in Australia and the United States.

“Ongoing employee education is the best way to protect against many of the threats that companies are targeted with at the moment. If employees are able to correctly identify and report possible phishing or ransomware attacks and report them correctly, there will be less chance of a successful breach,” Slattery comments.

Advice for businesses:

  • Know your data. You must know what personal data your organisation has, where it’s stored, and in what systems. Regularly schedule audits and allocate resources for this work.
  • Delete. Make sure any data you do not need is deleted securely. There are legal requirements for maintaining certain types of data, but when data retention is not required, disposing of it helps reduce risk.
  • Communicate. With any process change, effective communication is essential. Proper internal communications with employees and external communications with suppliers will help make them aware of changes and give them time to amend their own processes.
  • Assess. When auditing personal data processes in relation GDPR and NDB, consider if a privacy impact assessment is required.
  • Comply. If there is a security breach within your organisation, follow the rules outlined by GDPR and NDB. Under these regulations, it’s essential to be transparent and inform affected individuals within the specified timeline.  
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.