Story image

Data privacy regulations causing headaches for AU businesses

21 May 18

Global and regulatory landscapes are tightening to ensure more data privacy in the face of increasing data sharing and cyber threats, and while many Australian businesses have prepared for the Notifiable Data Breaches scheme, fewer are prepared for GDPR.

Those are some of the findings from Webroot’s global report, Data Privacy and Regulation: The Worldwide Race to Comply. It surveyed 600 IT decision makers, of whom 200 were from Australia.

It found that 96% of Australian respondents feel confident that their fellow employees are equipped to comply with NDB and GDPR, however only 9% said they were actually ready to comply with GDPR.

“Organisations shouldn’t neglect training, and more importantly look to train ALL staff, not just IT. Many data breaches today come from insider threats – and often are caused by careless mistakes. IT and HR teams need to work together to make sure all employees are trained, and continue to be trained on compliance requirements as regulations evolve and as citizen’s demand for more privacy grows,” comments Webroot senior information security analyst Dan Slattery.

Twenty two percent of respondents also say they are not confident that their organisations could comply with rules requiring them to disclose all personal data collected on individuals within one month of request.

Interestingly, only 18% of UK respondents are confident they could provide information within one month of request – suggesting that they are even less sure about their abilities than those in Australia and the United States.

“Ongoing employee education is the best way to protect against many of the threats that companies are targeted with at the moment. If employees are able to correctly identify and report possible phishing or ransomware attacks and report them correctly, there will be less chance of a successful breach,” Slattery comments.

Advice for businesses:

  • Know your data. You must know what personal data your organisation has, where it’s stored, and in what systems. Regularly schedule audits and allocate resources for this work.
  • Delete. Make sure any data you do not need is deleted securely. There are legal requirements for maintaining certain types of data, but when data retention is not required, disposing of it helps reduce risk.
  • Communicate. With any process change, effective communication is essential. Proper internal communications with employees and external communications with suppliers will help make them aware of changes and give them time to amend their own processes.
  • Assess. When auditing personal data processes in relation GDPR and NDB, consider if a privacy impact assessment is required.
  • Comply. If there is a security breach within your organisation, follow the rules outlined by GDPR and NDB. Under these regulations, it’s essential to be transparent and inform affected individuals within the specified timeline.  
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.