On Trend: Business Data Protection Laws

A common mistake made by businesses when starting out is to dive right into the technology without a strategic plan. This approach ignores some of the most vital points of cybersecurity and is why governments and regulatory bodies around the world have recognised a need to invest in cybersecurity.

EU nations have created the GDPR – General Data Protection Regulations.

"The digital future of Europe can only be built on trust. With solid common standards for data protection, people can be sure they are in control of their personal information," said Andrus Ansip, EU vice-president for the Digital Single Market, speaking when the reforms were agreed in December 2015.   

Smaller organisations are now embracing digital transformation. This means smaller businesses can now leverage data in the same way that only very large businesses could as recently as ten years ago. However, this exposes them to the same risks, but without the relevant infrastructure in place. 

The GDPR introduced the obligation to report personal data breaches to regulators within 72 hours of discovery, unless it is unlikely that there will be a risk to data subjects. Unsurprisingly, this led to a significant rise in the number of data breaches and cybersecurity incidents reported to European regulators since the introduction of the GDPR.

The UK regulator, the Information Commissioner’s Office (ICO), reported a 490% increase in incidents notified to them in Q2 2018 compared to Q2 2017.

Data Protection Laws
As of September 2019, over 80 countries and independent territories have now adopted comprehensive data protection laws to prohibit disclosure or misuse of information. In Europe, the General Data Protection Regulations (GDPR) and rules from industry specific regulatory bodies layered onto this provide the regulatory framework. 

Organisations who fail to look after their data correctly, face huge fines and an erosion of customer confidence in their brand, losing them customers.

Unlike regulatory bodies, cyber attackers do not discriminate based on size. Smaller organisations now have to be as wary of protecting company data as those in the enterprise. In fact, lacking years of engagement with cybersecurity provisions, SOC (security operation centre) analytics teams and protection, smaller organisations could be seen as an easier target to some cyber threats. 

No longer just the domain of large enterprises and big channel providers, there is now a gap in the cybersecurity market for comprehensive cybersecurity solutions to cater for smaller players in every industry. 

Rather than seeing it as a challenge, businesses should be open to taking control of their cybersecurity and view it as an opportunity for growth, greater customer entanglement and a potential point of differentiation. For many C-level executives concerned with IT, cybersecurity is the topic at the top of their minds. Getting it right can even open up other areas of IT spend. Once decision makers feel confident in their security, your customers are more likely to start conversations about implementing IoT, Cloud Services, and other innovations.

Time to Act
Cyber criminals can be highly innovative. It often feels like new cybersecurity vendors pop up daily to address the next new threat. This makes it difficult to determine what solutions are the best fit for your organisation, which technologies to choose, and which vendors to get skilled up on. With so many different point products on the market, often with different degrees of overlap, the amount of choice can be bewildering. Effective cybersecurity relies on having the right knowledge and monitoring tools. 

This is where good distributors play an important role in the cybersecurity market. They will be researching the market all the time. They can identify the most effective solutions and decipher how to consolidate them into an efficient and effective cybersecurity portfolio. 

This is all work you don’t have to do. Channel partners should be able to deliver tailored cybersecurity solutions and services. For those who are building up cybersecurity expertise, fully formed cybersecurity solutions which have already been developed can be leveraged straight from the distributor.   Besides removing the initial costs of developing services, the service collateral and legal contracts curated by the distributor removes a large part of the risk involved. Not to mention, throwing in marketing support and enablement around the hardened solutions they’ve developed.

Compliance and Control Policies
We should not forget that for many organisations their focus is on running and improving their core business, rather than becoming experts on cybersecurity. As you build up expertise around cybersecurity, choosing to focus on the regulatory and compliance requirements around a vertical market could become a key area of differentiation from anyone else offering cybersecurity services.

IT Models
Channel partners have been learning in recent years that the growing technology market has changed the way businesses buy, and therefore the way technology vendors sell technology. The opportunity here is for the channel to be able to offer security as a service, either around the endpoint software and its users or the system and its applications. The service could be a dedicated service or it could be embedded into an existing offering.

What’s important here is looking at how you create a fully formed, productised service that allows you to continue to add new recurring value. For examplee, when customers subscribe to your service, there needs to be a way you can continue to add new value to the service and thus justify the on-going subscription. That way you can move away from a cost-plus pricing model, to one that is based on the value you deliver to the customer. The distributor should be able to help with this process. 

Now that cloud marketplaces automate the selling and management of cybersecurity technology and solutions choosing the right platform can also make it much easier and less costly to offer cybersecurity solutions at scale to your customers. Specialists need to stay current on new cyber threats as they emerge, and talent is in short supply across the industry. If you are starting out in cybersecurity, investing in technical skills is a big commitment and may seem like an irreversible change to your business model. 

The greatest costs associated with entering the cybersecurity market come into play with sourcing expertise with demonstrable experience, training and essential development of solutions, including production of brochures and product marketing.

The easiest way to get started is to look for cybersecurity services offered by distributors and consider the services you can resell. Fully developed and trusted solutions are available, training can be supplied and technical delivery of these services will be actioned by the distributor on your behalf. Once you have established a revenue stream, the distributor should be able to offer you certified technical training for your engineers to action the services, along with sales and marketing training for your commercially focused teams.

Structured Enablement Programmes
Leading distributors tend to offer structured enablement programmes to help channel organisations transform existing operating models around the latest new technologies and high growth markets, enabling shifts from traditional reseller to services-led, or managed services to managed security services. 

Although challenges to introducing cybersecurity do exist, they are not insurmountable with the support of the right distribution partner. 

Cyber Security Intelligence can Recommend the Correct GSPR Legal Advice and Cyber Security Training for you and your Organisation.  Please Contact Us for Free Advice.

TechRadar:           European Union:       Beazley Academy:          ZDNet

You Might Also Read:

The GDPR Wake-Up Call Is Being Ignored By Business:

 

« British Elections: The Parties Manifestos On Cyber
US & China Are Investing Big In Quantum Computing Simulation »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

CyberQP

CyberQP

CyberQP (formerly Quickpass Cybersecurity) provide Privileged Access Management built for MSPs. Our system is designed to reduce ransomware and social engineering attack risks.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.