You've requested...

Will data privacy make businesses more competitive?

If a new window did not open, click here to view this asset.

Download this next:

Data privacy under the GDPR, machine learning, and more

In this week’s Computer Weekly, we take an in-depth look at GDPR – the new EU General Data Protection Regulation.

With a May 2018 deadline and severe fines for non-compliance, organisations need to prepare for what could be the most significant changes in data management in the past twenty years.

We also hear how one firm is using machine learning to revolutionise online fashion retail, examine how CIOs can apply lessons from buying software to improve digital transformation, and much more.

Read the issue now.

These are also closely related to: "Will data privacy make businesses more competitive?"

  • Data protection: Not just about personal data and compliance

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Fortunately, the need to comply with the General Data Protection Regulation (GDPR) from 25 May 2018 and planned UK legislation designed to align perfectly with the GDPR is likely to drive most companies handling EU citizens’ data to reassess their data protection capabilities, particularly in relation to personal data.

    However, the need for every business to pay attention to data protection is underlined by the fact that data breaches have been shown to have a direct correlation to falls in share prices, sometimes wiping off tens of millions from the market value. 

    Data protection is not only important from a compliance and business value protection point of view, it is also key to fostering the digital economy and gaining a competitive edge, according to UK information commissioner Elizabeth Denham.

    Failure to protect and handle data correctly can also result in punitive actions for companies participating in the digital economy, as Google found out recently when a consumer protection organisation in Denmark asked the government to investigate allegations that Google is breaking privacy laws by not limiting how long it stores personal data.

    As companies move increasingly into the cloud, it is important that they adapt their data protection strategies accordingly, but at the same time, experts say enterprises should not forget tape storage when it comes to data protection, nor should they overlook cloud storage because of the agility it affords.

    However, before launching into cloud-based storage, there are several key questions organisations need to ask to ensure that a cloud-based data storage and protection strategy is right for them.  

  • Data Privacy Is Good for Business

    It bears repeating that protecting the privacy of customers, clients, employees, and all others who are connected to the data under your control is a sound, profitable business practice.

    Access this white paper to learn what data privacy means in the current day, how it breeds success, and why the increasing volume of data (and breaches) makes it more important than ever before.

Find more content like what you just read:

  • The core tenets of data stewardship

    For organizations that need to collect and process personal data, an erosion of consumer trust and an increasingly complex regulatory environment present new challenges. But through good data stewardship, organizations can collect personal information in a fair and transparent manner. Download this e-book to explore how.

    Download

  • Why visibility is key when responding to a data breach

    The impact of a data breach will be felt far beyond just the theft of or inability to access sensitive and private data. Read on to understand why data security should be a top business priority so that organizations can minimize the far-reaching ripple effects of a sensitive data breach.

    Download

  • The 6 board duties for promoting high cybersecurity standards

    Dive into this white paper for the 6 duties of modern boards for maintaining high cybersecurity standards, as well as a look at the role of integrated risk management systems in today's businesses.

    Download

  • Keep the (IT) faith: Data, storage, and the GDPR countdown

    An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.

    Download

  • MicroScope – May 2018: Bundles deliver surprise package for SMEs

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

    Download

  • MicroScope – May: Bundles deliver surprise package for SMEs

    An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

    Download

  • CIAM: How to secure trust in digital services

    Today, digital services are playing an amplified role in our lives, and consumers and citizens are being asked to share more personal data in variety of uses – such as financial and government services. Tap into this white paper to learn how you can secure trust with customer identity and access management (CIAM).

    Download

  • Identity: The Digital Trust Accelerator

    Today, digital services are playing an amplified role in our lives, and consumers and citizens are being asked to share more personal data in variety of uses – such as financial and government services. Tap into this white paper to learn how you can secure trust with customer identity and access management (CIAM).

    Download

  • SASE: The driver of your SaaS security journey

    SaaS applications have become popular in recent years due to their widespread availability, ease of use, and low costs – but they’re not always secure. In this white paper, you will learn about how a SASE solution is designed to assist your cloud transformation and safely adopt SaaS applications. Download now to learn about solution benefits.

    Download

  • Meeting compliance with integrated risk platforms

    In our age of digital innovation as threats and risks continue to advance, it can be difficult for legacy systems to keep up. Along with this, rapid shifts in regulations have forced companies to adapt faster than their systems allow them to. Read this white paper to learn more about the potential benefits of an integrated risk platform.

    Download

  • International politics is leading to the downfall of global IT services

    In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.

    Download

  • MicroScope – May 2020: Staying connected

    In this issue, read about how the channel is helping customers stay connected during the pandemic, with Covid-19 raising hardware as businesses aim to provide technology for home workers. Also discover the benefits of SD-WAN and learn about the top compliance concerns for the coming year

    Download

  • Identity security in healthcare: Benefits & challenges

    According to research by SailPoint, 95% of healthcare IT decision-makers classify identity security as an important investment priority. But what does identity security in healthcare even look like? To answer this question, this report explores insights from 150 interviewed healthcare IT professionals. Review now to learn more.

    Download

  • Computer Weekly – 7 November 2017: The ethics of software development

    Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.

    Download

  • Data Protection Ascends the Business Agenda

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download

  • Automate Data Security

    Studies have shown that the cost of data breaches will reach over $5 trillion by next year. With that kind of projected growth, if you are running a multicloud environment, then your exposure compounds even more. Even with that kind of outlook, all is not lost. Read more to learn about a compliance automation strategy that mitigates those risks.

    Download

  • PCI DSS AS A FOUNDATION FOR GDPR COMPLIANCE

    The latest iteration of EU legislation regarding personal data is the GDPR, applies to many more organizations than the DPD and the repercussions for non-compliance are significantly more severe. Download this white paper to access a roadmap on how organizations can effectively protect personal and cardholder data.

    Download

  • 4 ways to scale to any size

    With both remote work and cloud becoming foundational for most workspaces, scalability has become one of the top priorities for IT organizations across industries and across the globe. In this report, explore 4 ways Atlassian Cloud helps you scale, from any size to enterprise.

    Download

  • Simplifying GDPR Compliance

    Since its inception in 2018, the General Data Protection Regulation (GDPR) has cost organizations in the EU more than $330 million USD in collective fines as a result of non-compliance. Read this e-book to learn more about the costs of non-compliance and discover insights for simplifying GDPR efforts.

    Download

  • How healthcare is fighting ransomware by tokenizing PHI and sensitive data

    Dive into this data sheet to learn about tokenization, explore why tokenizing protected health information (PHI) is a crucial compliance checkmark, and discover how Protegrity can help.

    Download

  • comforte & Global Payment Service: Case Study

    A global payment service provider recognized a challenge: protecting the private data associated with more than 1 billion cards. The company partnered with comforte to tackle this issue. Dig into this case study to explore the 5 project goals and to understand the benefits of the company’s partnership with comforte.

    Download

  • Building a Safer Future in Finance

    Tap into this paper to examine 8 key trends in the Financial Services landscape in 2021 and how cyber risks connected with these new trends can potentially damage customer trust.

    Download

  • Managing risk in the age of data privacy regulation

    If your business is a victim of a data breach, you’ll possibly face not only financial and reputational damage but also legal repercussions. And as more data privacy regulations emerge, it becomes even more challenging for your organization to ensure across-the-board compliance. Inside this white paper, discover tips for managing regulatory risk.

    Download

  • Cross-regulatory compliance made simple-read more

    Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.

    Download

  • How Atlassian Cloud Achieves Enterprise-Grade Security and Compliance

    In today’s digital landscape, cloud has unlocked unlimited scale and the ability to collaborate across remote, distributed teams. However, the risk of data breaches has increased. In this white paper, find Atlassian’s 5-pronged approach to achieving enterprise-grade security and compliance for Atlassian cloud products. Read on to learn more.

    Download

  • Breakdown of location & industry compliance requirements

    To stay on top of your company’s compliance obligations, access this 26-page cybersecurity compliance e-book, which includes an overview of compliance requirements for a myriad of industries and locations (local and international).

    Download

  • CW Europe – June 2017

    This quarter in CW Europe we look at how momentum in the artificial intelligence industry in France might be slowed due to ethical questions.

    Download

  • How SubRosa Assisted a Global Marketing Agency in Managing and Assessing Vendor Risk

    In this case study, a global PR and marketing company partnered with Subrosa to address concerns of GDPR data management requirements. Open your copy to learn how Subrosa’s in-depth risk assessment provided 3 key direct impacts on vendor risk management.

    Download

  • Tips to Achieve Compliance with GDPR in Cloud Storage

    Organizations that must retain GDPR compliance should have an operational policy and protocols related to their business’ storage and processing of personal data—this imperative extends to cloud storage, as well. Read the following e-guide to achieve cloud storage GDPR compliance with expert tips.

    Download

  • CIAM buyer’s guide: Essential criteria for the perfect match

    According to Forrester, CIAM has a direct impact on the bottom line: if your online user management and security functions do not work, customers flee to your competitors. Download now to unlock a comprehensive CIAM buyer’s guide.

    Download

  • CIAM buyer’s guide: Essential criteria for the perfect match

    According to Forrester, CIAM has a direct impact on the bottom line: if your online user management and security functions do not work, customers flee to your competitors. Download now to unlock a comprehensive CIAM buyer’s guide.

    Download

  • The state of data privacy in 2022

    In 2022, amidst global uncertainty and advancing technology, the need for stricter data privacy regulations and laws is clearly, and increasingly, evident.In this e-book, explore a detailed overview of data privacy trends to watch for, new

    Download

  • Why hyper-converged infrastructure could improve overall IT performance

    In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.

    Download

  • 10 tactics for fending off advanced cyber threats

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

    Download

  • The cybersecurity sector’s trial by fire

    According to a recent study 77% of Australian companies were affected by ransomware attacks over the last year. This e-book looks at the state of cybersecurity in Australia, analyzing how current cybercrime trends are affecting organizations, and what strategies organizations can use to overcome them. Read on to learn more.

    Download

  • You think compliance costs a lot? Try non-compliance

    If just keeping your own network safe and secure wasn’t enough, regulators are now taking a more proactive role in establishing and revising guidelines for best practices regarding third-party risk management (TPRM). This was expected considering the growth of third-party relationships in modern business. Read on to learn more and get ready.

    Download

  • 5 important cybersecurity & privacy regulations to review

    Examine this 23-page e-book to gain insight into the top 5 most important cybersecurity & privacy regulations to keep top of mind, alongside detailed frameworks for constructing log monitoring and breach response processes.

    Download

  • The Value of Understanding the Financial Impact of Cyber Risk

    New Gartner research shows that 88% of board of directors’ regard cybersecurity as a business risk. This has led many to ask, “how do you translate business cyber risk into financial terms that stakeholders understand?” This white paper presents 4 ways to operationalize cyber risk quantification. Download now to learn more.

    Download

  • Building scalable compliance management

    Do you need to add more security frameworks to your existing compliance program, but don’t know where to start? Vanta’s ultimate guide to growing your compliance program shares strategies and best practices for adding compliance standards without adding to your workload. Learn how to scale, manage, and optimize alongside your business goals.

    Download

  • MITRE ATT&CK, a guide for businesses in 2022

    Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.

    Download

  • Computer Weekly – 9 January 2018: Countdown to GDPR

    In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.

    Download

  • How DataGuard can defend retail customer data

    Retail and e-commerce businesses have been all over the news, being the victims of a plethora of cyberattacks. With customer data at stake, a cyberattack places retail and e-commerce at significant risk. This solution brief looks at how Symmetry Systems DataGuard can help secure e-commerce organizations and their data. Read on to learn more.

    Download

  • 3 phases of privacy program automation

    As privacy legislation has expanded in recent years, so has the scope of the privacy programs that support it. This e-book looks at how automation allows organizations to simplify and navigate the increasingly complex privacy compliance landscape. Download now to learn more.

    Download

  • 3 pillars for transforming IT risk management

    Digital transformation has led organizations to many benefits, but with these advantages come greater risks, with data breaches and security incidents more detrimental than ever. Dig into this white paper to uncover the 3 pillars for transforming IT management to meet the risks of the digital transformation.

    Download

  • MicroScope – June 2019: Sourcing IT among the clouds

    Outsourcing is changing as the anything-as-a-service model takes off.

    Download

  • 10 ways voice will disrupt the workplace in the next 5 years

    According to a recent report, more than 50% of workers say voice calls are faster and make it easier to get their thoughts across. This white paper provides 10 ways that voice is transforming workplace communication. Continue reading to learn more.

    Download

  • November ezine: Peer-to-peer lending

    Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for

    Download