On Trend: Business Data Protection Laws

A common mistake made by businesses when starting out is to dive right into the technology without a strategic plan. This approach ignores some of the most vital points of cybersecurity and is why governments and regulatory bodies around the world have recognised a need to invest in cybersecurity.

EU nations have created the GDPR – General Data Protection Regulations.

"The digital future of Europe can only be built on trust. With solid common standards for data protection, people can be sure they are in control of their personal information," said Andrus Ansip, EU vice-president for the Digital Single Market, speaking when the reforms were agreed in December 2015.   

Smaller organisations are now embracing digital transformation. This means smaller businesses can now leverage data in the same way that only very large businesses could as recently as ten years ago. However, this exposes them to the same risks, but without the relevant infrastructure in place. 

The GDPR introduced the obligation to report personal data breaches to regulators within 72 hours of discovery, unless it is unlikely that there will be a risk to data subjects. Unsurprisingly, this led to a significant rise in the number of data breaches and cybersecurity incidents reported to European regulators since the introduction of the GDPR.

The UK regulator, the Information Commissioner’s Office (ICO), reported a 490% increase in incidents notified to them in Q2 2018 compared to Q2 2017.

Data Protection Laws
As of September 2019, over 80 countries and independent territories have now adopted comprehensive data protection laws to prohibit disclosure or misuse of information. In Europe, the General Data Protection Regulations (GDPR) and rules from industry specific regulatory bodies layered onto this provide the regulatory framework. 

Organisations who fail to look after their data correctly, face huge fines and an erosion of customer confidence in their brand, losing them customers.

Unlike regulatory bodies, cyber attackers do not discriminate based on size. Smaller organisations now have to be as wary of protecting company data as those in the enterprise. In fact, lacking years of engagement with cybersecurity provisions, SOC (security operation centre) analytics teams and protection, smaller organisations could be seen as an easier target to some cyber threats. 

No longer just the domain of large enterprises and big channel providers, there is now a gap in the cybersecurity market for comprehensive cybersecurity solutions to cater for smaller players in every industry. 

Rather than seeing it as a challenge, businesses should be open to taking control of their cybersecurity and view it as an opportunity for growth, greater customer entanglement and a potential point of differentiation. For many C-level executives concerned with IT, cybersecurity is the topic at the top of their minds. Getting it right can even open up other areas of IT spend. Once decision makers feel confident in their security, your customers are more likely to start conversations about implementing IoT, Cloud Services, and other innovations.

Time to Act
Cyber criminals can be highly innovative. It often feels like new cybersecurity vendors pop up daily to address the next new threat. This makes it difficult to determine what solutions are the best fit for your organisation, which technologies to choose, and which vendors to get skilled up on. With so many different point products on the market, often with different degrees of overlap, the amount of choice can be bewildering. Effective cybersecurity relies on having the right knowledge and monitoring tools. 

This is where good distributors play an important role in the cybersecurity market. They will be researching the market all the time. They can identify the most effective solutions and decipher how to consolidate them into an efficient and effective cybersecurity portfolio. 

This is all work you don’t have to do. Channel partners should be able to deliver tailored cybersecurity solutions and services. For those who are building up cybersecurity expertise, fully formed cybersecurity solutions which have already been developed can be leveraged straight from the distributor.   Besides removing the initial costs of developing services, the service collateral and legal contracts curated by the distributor removes a large part of the risk involved. Not to mention, throwing in marketing support and enablement around the hardened solutions they’ve developed.

Compliance and Control Policies
We should not forget that for many organisations their focus is on running and improving their core business, rather than becoming experts on cybersecurity. As you build up expertise around cybersecurity, choosing to focus on the regulatory and compliance requirements around a vertical market could become a key area of differentiation from anyone else offering cybersecurity services.

IT Models
Channel partners have been learning in recent years that the growing technology market has changed the way businesses buy, and therefore the way technology vendors sell technology. The opportunity here is for the channel to be able to offer security as a service, either around the endpoint software and its users or the system and its applications. The service could be a dedicated service or it could be embedded into an existing offering.

What’s important here is looking at how you create a fully formed, productised service that allows you to continue to add new recurring value. For examplee, when customers subscribe to your service, there needs to be a way you can continue to add new value to the service and thus justify the on-going subscription. That way you can move away from a cost-plus pricing model, to one that is based on the value you deliver to the customer. The distributor should be able to help with this process. 

Now that cloud marketplaces automate the selling and management of cybersecurity technology and solutions choosing the right platform can also make it much easier and less costly to offer cybersecurity solutions at scale to your customers. Specialists need to stay current on new cyber threats as they emerge, and talent is in short supply across the industry. If you are starting out in cybersecurity, investing in technical skills is a big commitment and may seem like an irreversible change to your business model. 

The greatest costs associated with entering the cybersecurity market come into play with sourcing expertise with demonstrable experience, training and essential development of solutions, including production of brochures and product marketing.

The easiest way to get started is to look for cybersecurity services offered by distributors and consider the services you can resell. Fully developed and trusted solutions are available, training can be supplied and technical delivery of these services will be actioned by the distributor on your behalf. Once you have established a revenue stream, the distributor should be able to offer you certified technical training for your engineers to action the services, along with sales and marketing training for your commercially focused teams.

Structured Enablement Programmes
Leading distributors tend to offer structured enablement programmes to help channel organisations transform existing operating models around the latest new technologies and high growth markets, enabling shifts from traditional reseller to services-led, or managed services to managed security services. 

Although challenges to introducing cybersecurity do exist, they are not insurmountable with the support of the right distribution partner. 

Cyber Security Intelligence can Recommend the Correct GSPR Legal Advice and Cyber Security Training for you and your Organisation.  Please Contact Us for Free Advice.

TechRadar:           European Union:       Beazley Academy:          ZDNet

You Might Also Read:

The GDPR Wake-Up Call Is Being Ignored By Business:

 

« British Elections: The Parties Manifestos On Cyber
US & China Are Investing Big In Quantum Computing Simulation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Hornetsecurity

Hornetsecurity

Hornetsecurity offers managed cloud security solutions like Email archiving, Email encryption, Email spam filter, web filter and cloud storage.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.