You've requested...

Navigating the General Data Protection Regulation mini guide

If a new window did not open, click here to view this asset.

Download this next:

Data privacy under the GDPR, machine learning, and more

In this week’s Computer Weekly, we take an in-depth look at GDPR – the new EU General Data Protection Regulation.

With a May 2018 deadline and severe fines for non-compliance, organisations need to prepare for what could be the most significant changes in data management in the past twenty years.

We also hear how one firm is using machine learning to revolutionise online fashion retail, examine how CIOs can apply lessons from buying software to improve digital transformation, and much more.

Read the issue now.

These are also closely related to: "Navigating the General Data Protection Regulation mini guide"

  • Top MITRE ATT&CK techniques from criminal/APT groups

    McAfee’s latest report incorporates not only the malware zoo, but new analysis for what’s being detected in the wild.

    It also covers:

    • Threats to sectors and vectors
    • Sunburst malware and the SolarWinds supply chain compromise
    • Top MITRE ATT&CK techniques in Q4 2020 from criminal/APT groups
    • And much more

    Download the full report to uncover it all.

  • Data protection: Not just about personal data and compliance

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Fortunately, the need to comply with the General Data Protection Regulation (GDPR) from 25 May 2018 and planned UK legislation designed to align perfectly with the GDPR is likely to drive most companies handling EU citizens’ data to reassess their data protection capabilities, particularly in relation to personal data.

    However, the need for every business to pay attention to data protection is underlined by the fact that data breaches have been shown to have a direct correlation to falls in share prices, sometimes wiping off tens of millions from the market value. 

    Data protection is not only important from a compliance and business value protection point of view, it is also key to fostering the digital economy and gaining a competitive edge, according to UK information commissioner Elizabeth Denham.

    Failure to protect and handle data correctly can also result in punitive actions for companies participating in the digital economy, as Google found out recently when a consumer protection organisation in Denmark asked the government to investigate allegations that Google is breaking privacy laws by not limiting how long it stores personal data.

    As companies move increasingly into the cloud, it is important that they adapt their data protection strategies accordingly, but at the same time, experts say enterprises should not forget tape storage when it comes to data protection, nor should they overlook cloud storage because of the agility it affords.

    However, before launching into cloud-based storage, there are several key questions organisations need to ask to ensure that a cloud-based data storage and protection strategy is right for them.  

Find more content like what you just read:

  • Understanding Zero Trust Security

    Inside this white paper, find the current state of workplace security, the basic principles of the Zero-Trust security model, and how you can begin your journey towards a Zero Trust-secure workplace environment.

    Download

  • Corporate Web Security - Market Quadrant 2021

    Radicati Market Quadrants are designed to identify top vendors within specific technology markets. Get this report to learn why Cisco Umbrella is ranked as a Top Player by Radicati and to compare strengths and weaknesses against other web security leaders.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • Computer Weekly – 7 November 2017: The ethics of software development

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

    Download

  • MITRE ATT&CK, a guide for businesses in 2022

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

    Download

  • PCI DSS AS A FOUNDATION FOR GDPR COMPLIANCE

    The latest iteration of EU legislation regarding personal data is the GDPR, applies to many more organizations than the DPD and the repercussions for non-compliance are significantly more severe. Download this white paper to access a roadmap on how organizations can effectively protect personal and cardholder data.

    Download

  • Top Mobile Data Protection Best Practices

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

    Download

  • Debunking APT myths: What it really means and what you can do about it

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

    Download

  • Mobile data protection best practices

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

    Download

  • An effective mobile device security policy

    Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.

    Download

  • 4 ways to scale to any size

    With both remote work and cloud becoming foundational for most workspaces, scalability has become one of the top priorities for IT organizations across industries and across the globe. In this report, explore 4 ways Atlassian Cloud helps you scale, from any size to enterprise.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Cross-regulatory compliance made simple-read more

    Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.

    Download

  • SASE: The driver of your SaaS security journey

    SaaS applications have become popular in recent years due to their widespread availability, ease of use, and low costs – but they’re not always secure. In this white paper, you will learn about how a SASE solution is designed to assist your cloud transformation and safely adopt SaaS applications. Download now to learn about solution benefits.

    Download

  • Protect, detect, and recover data from ransomware – quickly and fully

    Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.

    Download

  • Industry solution brief: Cyber insurance

    Organizations and the data they manage are major targets for cybercriminals, resulting in an increase in the demand for cyber insurance. This product overview explores how Symmetry Systems DataGuard can help organizations gain greater visibility into their data, facilitating more effective cyber insurance with lower premiums. Read on to learn more.

    Download

  • MicroScope January 2014: A special issue looking at software defined networking

    The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres

    Download

  • How tech companies can improve security with DataGuard

    Technology companies are defined by their ability to drive innovation. Because of frontier-like spaces that these organizations occupy, they are naturally predisposed to security risk. This solution brief investigates the potential security benefits technology companies can gain by utilizing Symmetry Systems DataGuard. Read on to learn more.

    Download

  • How DataGuard secures manufacturers

    Manufacturing organizations collect vast amounts of data from their customers, supply partners, research & development projects, and more. With so much data, manufacturers are high-priority targets for cybercriminals. Download this white paper to learn how Symmetry Systems DataGuard can help defend manufacturers from cyberthreats.

    Download

  • February Essentials Guide on Threat Management

    Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.

    Download

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

    Download

  • ISM Essentials Guide – Threat Management

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

    Download

  • How DataGuard can defend retail customer data

    Retail and e-commerce businesses have been all over the news, being the victims of a plethora of cyberattacks. With customer data at stake, a cyberattack places retail and e-commerce at significant risk. This solution brief looks at how Symmetry Systems DataGuard can help secure e-commerce organizations and their data. Read on to learn more.

    Download

  • Increasing Compliance with Regulations in Digital Banking

    While digital banking has taken the financial services sector like wildfire it has come with new risks, and new compliances. This white paper presents an analysis of compliance and regulation for digital financial services, focusing on specific compliance laws, breaking them down, and guiding you through them. Read on to learn more.

    Download

  • DataGuard for communications & media companies

    As communications and media companies rely heavily on customer data, they are a prime target for hackers trying to steal that data. DataGuard is a data security posture management (DSPM) solution that communication & media organizations can use to better understand their data, so that they can better secure it. Read on to learn more.

    Download

  • MicroScope – June 2019: Sourcing IT among the clouds

    Outsourcing is changing as the anything-as-a-service model takes off.

    Download

  • Securing energy, oil & natural gas companies’ data

    Energy, oil, & natural gas companies are integral to the way the modern world runs. When malicious threat actors attack these organizations, they are attacking infrastructure that is critical to homes, cities, and entire industries. Read on to see

    Download

  • The Complete Pocket E-Guide to Cloud Security

    As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.

    Download

  • Essential Guide to Threat Management

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

    Download

  • Data Protection Ascends the Business Agenda

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download

  • Meeting compliance with integrated risk platforms

    In our age of digital innovation as threats and risks continue to advance, it can be difficult for legacy systems to keep up. Along with this, rapid shifts in regulations have forced companies to adapt faster than their systems allow them to. Read this white paper to learn more about the potential benefits of an integrated risk platform.

    Download

  • The 6 board duties for promoting high cybersecurity standards

    Dive into this white paper for the 6 duties of modern boards for maintaining high cybersecurity standards, as well as a look at the role of integrated risk management systems in today's businesses.

    Download

  • Financial services & insurance security: Protecting customer & financial data

    Legacy cybersecurity technologies and processes are designed to defend the perimeter and endpoints, not the sensitive data the threat actors want to attain. This product overview addresses the challenges financial services and insurance companies face when securing data and looks at how DataGuard can help solve them. Read on to learn more.

    Download

  • How to approach ASM step-by-step

    In the absence of attack surface management, many traditional approaches to minimizing external risk fail to secure every asset within a business. Download this e-book to access a guided approach to attack surface management, complete with a 7-step plan to testing and monitoring the security of your attack surface.

    Download

  • 3 phases of privacy program automation

    As privacy legislation has expanded in recent years, so has the scope of the privacy programs that support it. This e-book looks at how automation allows organizations to simplify and navigate the increasingly complex privacy compliance landscape. Download now to learn more.

    Download

  • Why visibility is key when responding to a data breach

    The impact of a data breach will be felt far beyond just the theft of or inability to access sensitive and private data. Read on to understand why data security should be a top business priority so that organizations can minimize the far-reaching ripple effects of a sensitive data breach.

    Download

  • The core tenets of data stewardship

    For organizations that need to collect and process personal data, an erosion of consumer trust and an increasingly complex regulatory environment present new challenges. But through good data stewardship, organizations can collect personal information in a fair and transparent manner. Download this e-book to explore how.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download

  • Implementing a Governance, Risk and Compliance (GRC) Strategy – North America Edition

    Governance, risk and compliance (GRC) facilitates the collaboration needed to achieve strategic goals. This white paper serves as a guide to GRC implementation, giving an introduction to GRC strategy and its benefits, followed by an in-depth analysis of several compliance regulations. Read on to learn more.

    Download

  • 5 important cybersecurity & privacy regulations to review

    Examine this 23-page e-book to gain insight into the top 5 most important cybersecurity & privacy regulations to keep top of mind, alongside detailed frameworks for constructing log monitoring and breach response processes.

    Download

  • Building a Safer Future in Finance

    Tap into this paper to examine 8 key trends in the Financial Services landscape in 2021 and how cyber risks connected with these new trends can potentially damage customer trust.

    Download

  • Addressing security compliance with privileged access management (PAM)

    Complying with data privacy and information security regulations is a challenge for most organizations. This e-book reviews privileged access management (PAM) requirements imposed by various data privacy and information security regulations, and looks to formulate strategies that you can use to maintain compliance with PAM. Read on to learn more.

    Download

  • Tips to Achieve Compliance with GDPR in Cloud Storage

    Organizations that must retain GDPR compliance should have an operational policy and protocols related to their business’ storage and processing of personal data—this imperative extends to cloud storage, as well. Read the following e-guide to achieve cloud storage GDPR compliance with expert tips.

    Download

  • Breakdown of location & industry compliance requirements

    To stay on top of your company’s compliance obligations, access this 26-page cybersecurity compliance e-book, which includes an overview of compliance requirements for a myriad of industries and locations (local and international).

    Download

  • Simplifying GDPR Compliance

    Since its inception in 2018, the General Data Protection Regulation (GDPR) has cost organizations in the EU more than $330 million USD in collective fines as a result of non-compliance. Read this e-book to learn more about the costs of non-compliance and discover insights for simplifying GDPR efforts.

    Download

  • IT Decision Checklist: Messaging Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

    Download

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

    Download