TALKING
business
‘‘
want to mitigate, manage and defend data
protection issues.
Can IT departments better
secure devices?
The IT department in an organisation is
considered its neural network that keeps
the company up and running. Data needs
to be protected in transit, at rest and in use
– it is critical to have an all-encompassing
security, recovery and data erasure plan to
cover across all of these contexts.
There are various ways by which an
organisation can make sure that their data
isn’t getting compromised and can better
take care of their customers’ data privacy:
Two Factor Authentication
In the quest to keep your data secure; Two
Factor Authentication is the fundamental
step an organisation can adopt. This step
prompts the user to supply a password on
two different devices, say a laptop and
a cellphone and then let them pass to
the information.
It is a prudent way to keep yourself safe
from phishing emails. It is always advised
to use a complex unique password along
with Two Factor Authentication to better
safeguard your data.
VPNs, encrypted SSDs and USBs
VPNs are increasingly popular with SMEs.
A VPN works by creating a virtual network
tunnel between an employee’s device and
the company’s network.
The data goes through public Internet
but the data sent back and forth through
it is protected by encryption and security
protocols to help keep it private and secure.
They are particularly salient for staff who
are accessing business data over public
WI-FI networks.
With the advancement of technology;
encrypted USB flash drives have
spearheaded into the corporate sector and
they have been designed to protect data
that requires iron clad security.
Kingstons’s hardware based encrypted
USB flash drives like DT Locker+ G3, DT
Vault Privacy, DT 2000 and DT 4000 G2
are the ones that feature data protection
solutions for mobile data in and outside of
an organisation’s firewall giving them the
extra edge in security that is essential in
today’s uber fast world of data.
Deploying encrypted USBs and equipping
your notebooks with hardware encrypted
SSDs goes a long way in resolving the
challenges of remote working. If a device is
lost or stolen, you can be confident no one
will have access to the encrypted files. With
select encrypted USB drives, you can even
remotely destroy them.
Kingston’s Enterprise SATA 3.0 and NVMe
Data Centre (DC) SSDs like DC 1000B M.2,
DC1000M U.2, DC450R 2.5” and DC500
2.5” have been designed with a stringent
set of development requirements and a
thorough testing process.
This results in consistency for workloads
requiring a balance of high sustained
random read and write IOPS performance.
REMINDING
STAFF THAT
THERE’S ALWAYS
A PERSON
BEHIND THE
DATA CAN
GO A LONG
WAY TO
EMBED A
CULTURE OF DATA
PROTECTION
WITHIN YOUR
WORKFORCE.
The power failure features keep mission
critical environments up and running all
day. Along with this, UV500 provides end-
“
to-end data protection using 256-bit AES
hardware-based encryption and support
for TCG Opal 2.0 security management
solutions while KC600, KC2500, KC2000
and A2000 have quintessential features
like TCG Opal and eDrive that matches
the benchmark to possess industry
standard hardware encryption and drive
management support.
How can tech providers improve
processes and understanding?
Tech providers and organisations must
facilitate an environment of digital
cohesion and data cohesion within the
organisation as well as external suppliers
and partners.
A Data Protection Officer (DPO) can
be hired or delegated from within the
organisation. This is vital as they would act
as an independent advocate for the proper
care and use of customer information.
Tech providers must work closely with the
DPOs to provide them with full visibility
into a corporation’s security and data
privacy landscape which in turn would
help the DPO to understand the customer
data better.
Introduction of GDPR has regulated
businesses in terms of bringing data
privacy and network security to the
attention of the C-suite and consumers.
Complying to the norms of GDPR
requires proactive effort and attention
to data security.
An organisation’s formidability isn’t just
based on the amount of data it possesses
but also on how they tend to regulate it
and respect it as well. Reminding staff that
there’s always a person behind the data
can go a long way to embed a culture of
data protection within your workforce.
With the globalisation of data sharing,
regulations set out by GDPR have become
necessary to comply with all across the
globe and this phenomenon has been
hailed as a step in the right direction as
it inculcates digital ethics in the
employees holding on customers’ data
and in the awareness of customers with
respect to their data sharing conscience
as well. •
32 INTELLIGENTCIO www.intelligentcio.com