Data security

Has #censusfail got you thinking about the privacy of your own data?

What about the privacy of your company’s most vital information?

On Tuesday 9th August, Australians were urged to ‘get online’ to complete the country’s first-ever large-scale digital census. But in another first, the Australian Bureau of Statistics (ABS) has announced that it would reserve the names and addresses of every person in Australia until 2020 – for four years as opposed to the previous standard of 18 months.

Subsequent, personal privacy concerns on the minds of many, including those who argued that the Census would remove anonymity in the process. Politicians Including Nick Xenophon spoke out in opposition and a social media campaign to boycott the Census started to gain traction 1 .

Just about personal data privacy and retention; cybersecurity threats facing the general public. What level of protection is there for the data? What would happen if the personal information were to be breached?

Ever since the Census website crashed on the very night the survey started, it has been impossible to avoid the media storm and the hashtag #censusfail. What a cyberattack? What about poor planning? Inadequate security? What exactly went wrong?

Hitting so close to home, the topic undoubtedly worked to get people thinking about data security.

And what does this mean for work? Inadvertently mislays important documents. In June of this year, almost the entire population of Denmark’s unencrypted medical records contained two CDs arrived at the Chinese embassy due to a postal error!

It’s clear that security has never been more important. Paper does not cut it, human error happens all too easily, and even email and shared data servers can be infiltrated.

Privacy is on the minds of Australians. Privacy and security matters, and awareness is growing.

Security spending

The process of increasing data security and cybersecurity is growing.

According to Gartner, 2016’s worldwide security spend will be dominated by IT outsourcing and security consulting services to generate year-on-year growth of 7.9% and a spend of $ 81.6 billion.

And as recently reported in CSO.com , “… shortages of cyber security talent will ensure that spending on security remains focused on services.” Organizations that are more prone to nation-backed hackers and insider threats are finding it difficult to manage the right mix of people and technology to detect and remediate attacks.

In light of this, what should a CISO do to effectively communicate the importance of security?

In an interview carried out at the recent Black Hat Conference in Las Vegas, Nuix CISO Chris Pogue offered the following advice to security managers :

  • Learn how to communicate Effectively with various executives – learn the language a CFO needs to hear, and how it Differs from what the chairman or CEO needs to hear. Make sure your marketing team understands the reputational risks of inactivity, too. Show perspective by highlighting real-life examples of the business effect.
  • Hire experienced CSOs or CISOs – make sure the board understands that they need experienced people in the role.
  • Hire a great team – “. Hire the crazy, Because You need them . Those are the ones who do not think outside the box, They burn the box and stomp on the ashes . That’s what you want”

Every day we are seeing new threats appear in the landscape, which are compounded by the risk of plain old human error. Both factors contribute to a growing need for stringent business security, something which poses both a challenge and an exciting opportunity for the enterprise software industry to tackle.

Diligent understands the importance of safeguarding confidential company data, and has designed a solution to protect against the risks of data breach. It is a secure platform designed to streamline board meeting management and to facilitate better board communications.

Board Portal Buyer’s Guide

With the right Board Portal software, a board can improve corporate governance and efficiency while collaborating in a secure environment. With lots of board portal vendors to choose from, the whitepaper contains the most important questions to ask during your search, divided into five essential categories.

Featured Blog