Intelligent CIO Africa Issue 43 | Page 32

TALKING business ‘‘ want to mitigate, manage and defend data protection issues. Can IT departments better secure devices? The IT department in an organisation is considered its neural network that keeps the company up and running. Data needs to be protected in transit, at rest and in use – it is critical to have an all-encompassing security, recovery and data erasure plan to cover across all of these contexts. There are various ways by which an organisation can make sure that their data isn’t getting compromised and can better take care of their customers’ data privacy: Two Factor Authentication In the quest to keep your data secure; Two Factor Authentication is the fundamental step an organisation can adopt. This step prompts the user to supply a password on two different devices, say a laptop and a cellphone and then let them pass to the information. It is a prudent way to keep yourself safe from phishing emails. It is always advised to use a complex unique password along with Two Factor Authentication to better safeguard your data. VPNs, encrypted SSDs and USBs VPNs are increasingly popular with SMEs. A VPN works by creating a virtual network tunnel between an employee’s device and the company’s network. The data goes through public Internet but the data sent back and forth through it is protected by encryption and security protocols to help keep it private and secure. They are particularly salient for staff who are accessing business data over public WI-FI networks. With the advancement of technology; encrypted USB flash drives have spearheaded into the corporate sector and they have been designed to protect data that requires iron clad security. Kingstons’s hardware based encrypted USB flash drives like DT Locker+ G3, DT Vault Privacy, DT 2000 and DT 4000 G2 are the ones that feature data protection solutions for mobile data in and outside of an organisation’s firewall giving them the extra edge in security that is essential in today’s uber fast world of data. Deploying encrypted USBs and equipping your notebooks with hardware encrypted SSDs goes a long way in resolving the challenges of remote working. If a device is lost or stolen, you can be confident no one will have access to the encrypted files. With select encrypted USB drives, you can even remotely destroy them. Kingston’s Enterprise SATA 3.0 and NVMe Data Centre (DC) SSDs like DC 1000B M.2, DC1000M U.2, DC450R 2.5” and DC500 2.5” have been designed with a stringent set of development requirements and a thorough testing process. This results in consistency for workloads requiring a balance of high sustained random read and write IOPS performance. REMINDING STAFF THAT THERE’S ALWAYS A PERSON BEHIND THE DATA CAN GO A LONG WAY TO EMBED A CULTURE OF DATA PROTECTION WITHIN YOUR WORKFORCE. The power failure features keep mission critical environments up and running all day. Along with this, UV500 provides end- “ to-end data protection using 256-bit AES hardware-based encryption and support for TCG Opal 2.0 security management solutions while KC600, KC2500, KC2000 and A2000 have quintessential features like TCG Opal and eDrive that matches the benchmark to possess industry standard hardware encryption and drive management support. How can tech providers improve processes and understanding? Tech providers and organisations must facilitate an environment of digital cohesion and data cohesion within the organisation as well as external suppliers and partners. A Data Protection Officer (DPO) can be hired or delegated from within the organisation. This is vital as they would act as an independent advocate for the proper care and use of customer information. Tech providers must work closely with the DPOs to provide them with full visibility into a corporation’s security and data privacy landscape which in turn would help the DPO to understand the customer data better. Introduction of GDPR has regulated businesses in terms of bringing data privacy and network security to the attention of the C-suite and consumers. Complying to the norms of GDPR requires proactive effort and attention to data security. An organisation’s formidability isn’t just based on the amount of data it possesses but also on how they tend to regulate it and respect it as well. Reminding staff that there’s always a person behind the data can go a long way to embed a culture of data protection within your workforce. With the globalisation of data sharing, regulations set out by GDPR have become necessary to comply with all across the globe and this phenomenon has been hailed as a step in the right direction as it inculcates digital ethics in the employees holding on customers’ data and in the awareness of customers with respect to their data sharing conscience as well. • 32 INTELLIGENTCIO