On this day, Security, as well as IT leaders and enterprise organizations, should remember today’s best privacy practices that will help them to navigate the complexities of today’s digital age.
On January 28 every year, Data Protection Day is remembered and celebrated across the technology world. The primary objective of this day is to remind users and organizations of the best privacy practices and principles in today’s digital age. Data Protection day has been around since 1981, first emerged in Europe and later in US and Canada as Data Privacy Day in 2008. Though the regulations have significantly changed and evolved over the years, the message is the same, “data privacy is a right.”
This day serves as a global reminder for one of the critical responsibilities of any organization: to keep sensitive as well as mission-critical data secure. However, many organizations failed to do so due to not following the best cybersecurity practices for their infrastructure and data security framework. Hence, ITSecurityWire spoke to security experts on organizations can strengthen their infrastructure and effectively deal with vulnerabilities in their security posture:
Peter Donnelly, Director of Products at ATTO Technology
January 28 is known as Data Protection Day and Data Privacy Day in different parts of the globe, which of course, makes sense as the two go hand in hand. Data privacy is a principle that data should be protected from unauthorized access in order to maintain confidentiality and prevent malicious or unapproved use. Data protection refers to the ongoing effort to prevent unauthorized access to data and to prevent data from being corrupted, illegitimately altered, or its integrity otherwise subverted. Achieving data privacy depends on a data protection effort, which itself depends on those who legitimately collect, access and process data to recognize and adhere to data privacy principles.
“Data immutability can play a pivotal role in bolstering an organization’s security posture by helping to ensure business-critical data remains safe in the event of an attack. Immutability means data is stored in such a way that it cannot be altered or deleted. Data is then referenced when needed and processing occurs as if the data were an object where changes are stored separately from the referenced data.”
Digital forensics is an important tool in data protection and privacy for law enforcement as well as corporate security. Digital forensic investigations are a highly specialized undertaking that, if executed successfully, provide insight as to how data was accessed, altered, deleted, or otherwise corrupted during an attack. The outcome of a digital forensics investigation can then be used to strengthen organizational data protection and privacy strategy and policy. Among the first steps in digital forensics is to lock down suspect data to preserve its state, which can only be accomplished via specialized hardware and software.
Organizations should pay close attention to the role that hardware and software tools play in their ability to protect data and privacy. The right solutions can elevate protection efforts with features like end-to-end encryption, data immutability, built-in forensics tools and even air-gap data protection like tape archives provide.”
Mike Wood, CMO at Versa Networks
“Following the explosive shift to the work-from-anywhere approach over the past couple of years, organizations’ people, technology, and data are spread across unlimited locations around the world. Coupled with that is our ever-increasing demand to be connected to everything and everyone all the time, which has resulted in a push for emerging technologies such as 5G and IoT.
Whilst convenience, connectivity and flexibility are key to our current working environment, so too should be the security of our devices and the privacy of our data. Despite the rapid adoption of 5G, IoT and other new technologies, their popularity far outweighs their security.
In the short time that 5G has been globally deployed, it has become a natural component of IoT devices and is also in the perfect position to help transform business networking and the interconnection of infrastructure environments, be those on-premises, hybrid-cloud, or multi-cloud. However, as a market, it has not undergone enough research for experts to be confident in its security. Zero-day attacks are a huge threat to IoT and 5G applications. What’s more, 5G is not a private network, so when IoT devices are connected to it, the attack surface expands, and they and the data they store become vulnerable.
With a work-from-anywhere model, employees can easily access their Voice over IP (VoIP), Unified Communications, collaboration, and video applications from any location and any device, but this has to be done securely. As a result, businesses should be looking to invest beyond traditional technologies such as VPNs to protect their data against users who can be connecting from anywhere, on any network, and any device – they need to implement a holistic approach to getting visibility and control over all identities, threats, and endpoints.
With a strategic approach to networking and security like SASE, organizations can achieve the flexibility in connectivity they are looking for, as well as ensuring their data is kept private and secure.”
For more such updates follow us on Google News ITsecuritywire News