Impact of New EU Data Legislation Not Widely Understood

quick-guide-eu-general-data-protection-regulation-and-smart-metering-11-638.jpg?cb=1410159254

Almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation will mean to them or their organizations, according to iStorage.

The EU will soon have the power to fine companies €100 million or 5% of their annual turnover if they are found to be in breach of the new legislation, which compels anyone who holds data on EU citizens to implement adequate security measures to protect data from loss or theft.

With encryption largely recognized as the primary method of security by rendering data unintelligible to any unauthorized access, the forthcoming legislation exempts anyone from notifying the affected subjects if the data that was lost or stolen was encrypted.

"The EU’s position is very clear: all personal information must be protected by adequate security to prevent the loss or theft of data,” states John Michael, CEO of iStorage. “The majority of significant security breaches occur where confidential data has been stored on an unencrypted portable device. Organizations need to give serious consideration to minimizing the risks of loss by ensuring that all portable media devices containing personal information are robustly encrypted.”

90% of respondents to the survey at Counter Terror Expo in London confirmed that policies are in place within their organizations covering data protection matters, while a further 80% were specifically aware of who was directly responsible for data protection with these organizations.

Asked about the methods currently used to store business data, 22% confirmed the use of cloud technology, yet a sizeable number (65%) did not consider the cloud to be a secure method of storing confidential data.

Net-Security: http://bit.ly/1bZQSFN

« Germany’s BND Intelligence Agency Has Been Spying for the NSA.
Hacking Aviation Technology »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.