Story image

Data privacy regulations causing headaches for AU businesses

21 May 2018

Global and regulatory landscapes are tightening to ensure more data privacy in the face of increasing data sharing and cyber threats, and while many Australian businesses have prepared for the Notifiable Data Breaches scheme, fewer are prepared for GDPR.

Those are some of the findings from Webroot’s global report, Data Privacy and Regulation: The Worldwide Race to Comply. It surveyed 600 IT decision makers, of whom 200 were from Australia.

It found that 96% of Australian respondents feel confident that their fellow employees are equipped to comply with NDB and GDPR, however only 9% said they were actually ready to comply with GDPR.

“Organisations shouldn’t neglect training, and more importantly look to train ALL staff, not just IT. Many data breaches today come from insider threats – and often are caused by careless mistakes. IT and HR teams need to work together to make sure all employees are trained, and continue to be trained on compliance requirements as regulations evolve and as citizen’s demand for more privacy grows,” comments Webroot senior information security analyst Dan Slattery.

Twenty two percent of respondents also say they are not confident that their organisations could comply with rules requiring them to disclose all personal data collected on individuals within one month of request.

Interestingly, only 18% of UK respondents are confident they could provide information within one month of request – suggesting that they are even less sure about their abilities than those in Australia and the United States.

“Ongoing employee education is the best way to protect against many of the threats that companies are targeted with at the moment. If employees are able to correctly identify and report possible phishing or ransomware attacks and report them correctly, there will be less chance of a successful breach,” Slattery comments.

Advice for businesses:

  • Know your data. You must know what personal data your organisation has, where it’s stored, and in what systems. Regularly schedule audits and allocate resources for this work.
  • Delete. Make sure any data you do not need is deleted securely. There are legal requirements for maintaining certain types of data, but when data retention is not required, disposing of it helps reduce risk.
  • Communicate. With any process change, effective communication is essential. Proper internal communications with employees and external communications with suppliers will help make them aware of changes and give them time to amend their own processes.
  • Assess. When auditing personal data processes in relation GDPR and NDB, consider if a privacy impact assessment is required.
  • Comply. If there is a security breach within your organisation, follow the rules outlined by GDPR and NDB. Under these regulations, it’s essential to be transparent and inform affected individuals within the specified timeline.  
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.