Data Regulation and the Future

Every day more and more data breaches are occurring. Virtually every consumer in the United States already has had their information leaked to the dark web in one way or an other. As Europe enacts its GDPR (General Data Protection Regulation), this type of regulation could easily come to the United States within the next few years. Here’s a quick breakdown of what could be rules that our businesses will have to follow.

Data Breach Notification

Currently under the GDPR, businesses must notify customers within 72 hours of first having become aware of a data breach. Many companies here in the United States have taken much longer than that to inform their customers of an attack. Companies will most likely be scrambling to figure out what data was stolen, how it was stolen, and who stole the data. If this time-frame is not followed, companies can receive a hefty fine of 2-4% of their turnover or $23 Million USD, whichever is greater.  

Right to be Forgotten, Right to Access

This section under GDPR allows EU citizens to have companies erase any personal data they have on them. Unless they are a person of public interest, any person can withdraw their consent from your company keeping data related to them. If these requests are not taken seriously, it can result in a fine for your company. Many US based businesses may not have the processes currently in place to purge data as requested. Additionally, any person can request a copy of the data you have collected about them, free of charge. This type of data transparency in the US is mostly available for big enterprises such as Facebook, but for small businesses this type of system is unheard of.  

Privacy by Design (Data Minimization)

Privacy by Design is data protection fully integrated into your data systems. Only data absolutely necessary for your work processes are to be held by your company and the information should be only available to those employees who specifically need to see that data. This type of regulation is a good guide to follow in the event of a data breach, as it can limit the scope of what information hackers have access to.  

Data Breaches can happen to businesses of any size

Sign up to our newsletter and get a FREE Cyber Threat Report 

If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.

Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.

VISN-IT provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.

CALL 718-227-5500 NOW FOR A FREE NETWORK ASSESSMENT

 

Employee Safety Tips

Part Two of our Cyber Holiday Safety Series focuses on protecting your workplace. Gift card scams and money wiring scams increase this time of year …

Read More →

Online Shopping Safety Tips

Part One of our Cyber Holiday Safety Series focuses on protecting your information while online shopping. Phishing emails focused on fake deals and last minute …

Read More →

New York and New Jersey Data Regulation

If your company does any business in New York or New Jersey, it can be difficult to know what laws pertain to your business. We’ve …

Read More →

Security Alert: Lack of Trust Comes with a High Price Tag for U.S. Businesses

A new study finds that “Almost half (44%) of US consumers have suffered the negative consequences of a security breach or hack…”. The research done by …

Read More →

Preparing for an IT Disaster

IT disasters are devastating to the infrastructure of any business. In 2018, threats to your IT infrastructure are growing no matter what sector your business …

Read More →

Building an Incident Response Program

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order …

Read More →

NetConnect / VISN-IT Featured in StorageCraft Press Release

New StorageCraft Partner Success Program Boosts Profit Paths Across All Channel Partner Business Models DRAPER, Utah, Sept. 27, 2018 /PRNewswire/ — StorageCraft®, whose mission is to protect all …

Read More →

Small Business Cyber Security Concerns

The truth is that Small Businesses have a lot to fear when it comes to Cyber Security. Any disruption that causes downtime or loss of …

Read More →

Email Compromise – How Does it Work?

Email compromises are becoming more and more dangerous every year, and it’s important to know how they work. Email Compromises involve the hacking of a …

Read More →

Cloud Computing Pros and Cons

What is the cloud? Cloud Computing is “the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, …

Read More →

Phishing Threats

Phishing threats are getting more and more sophisticated as cyber security measures become smarter. The main reason why phishing must be handled differently than other …

Read More →

The Dark Web and You

Chances are that somewhere out on the Dark Web lies passwords, email address, and other compromising information that relates to your company. From clicking on …

Read More →

The New Extortion Scam you’ll want to look out for!

Email Threats constantly evolve and try to find new ways to steal your money or steal your information. A large part of Cyber Security is …

Read More →

Two Factor Authentication – Do I Really Need It?

Two Factor Authentication procedures or Multi Factor Authentication procedures are a part of many interactions in our daily life. Most credit and debit cards now …

Read More →

The True Cost of a Data Breach

One of the biggest headaches your company can endure is a data breach. Whether its caused by employee error or targeted cyber attacks, the long …

Read More →