Impact of New EU Data Legislation Not Widely Understood

quick-guide-eu-general-data-protection-regulation-and-smart-metering-11-638.jpg?cb=1410159254

Almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation will mean to them or their organizations, according to iStorage.

The EU will soon have the power to fine companies €100 million or 5% of their annual turnover if they are found to be in breach of the new legislation, which compels anyone who holds data on EU citizens to implement adequate security measures to protect data from loss or theft.

With encryption largely recognized as the primary method of security by rendering data unintelligible to any unauthorized access, the forthcoming legislation exempts anyone from notifying the affected subjects if the data that was lost or stolen was encrypted.

"The EU’s position is very clear: all personal information must be protected by adequate security to prevent the loss or theft of data,” states John Michael, CEO of iStorage. “The majority of significant security breaches occur where confidential data has been stored on an unencrypted portable device. Organizations need to give serious consideration to minimizing the risks of loss by ensuring that all portable media devices containing personal information are robustly encrypted.”

90% of respondents to the survey at Counter Terror Expo in London confirmed that policies are in place within their organizations covering data protection matters, while a further 80% were specifically aware of who was directly responsible for data protection with these organizations.

Asked about the methods currently used to store business data, 22% confirmed the use of cloud technology, yet a sizeable number (65%) did not consider the cloud to be a secure method of storing confidential data.

Net-Security: http://bit.ly/1bZQSFN

« Germany’s BND Intelligence Agency Has Been Spying for the NSA.
Hacking Aviation Technology »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.