Cloudy with compliance

1 March 2018 Infrastructure, Security Services & Risk Management

Data breaches that result in confidential data being compromised, whether it is just released to the general public or used for more malicious purposes, have become almost a daily occurrence, making cybersecurity a non-negotiable for organisations. This includes both educational awareness and the necessary hardware or software tools.

Dragan Petkovic.
Dragan Petkovic.

According to a report from The Economist Intelligence Unit and Oracle, organisations have witnessed a 42% increase in hacking, a 39% growth in malware and a 23% rise in financial theft over the past two years. Globally, cyber-crime is expected to reach $2 trillion by 2019.

The increasing complexity of emerging technologies and advances in hacking practices mean that enterprises and their legacy networks – often built with kit bought from multiple vendors at the cheapest price at auction, by a procurement team over the years – may no longer be safe. Of top concern are infrastructure downtime, security threats and vulnerabilities, and data protection.

Companies are responding in several ways, including hiring CEOs who come from the cybersecurity space, as they know how to manage risk, and speeding up their migration to the cloud – with mature users understanding that cloud computing provides better security than poorly deployed or legacy licence (on premise) systems.

Ensuring regulatory compliance

Apart from protecting themselves from external threats, companies around the world are increasingly being required to comply with data privacy regulations, such as the Protection of Personal Information Act (PoPI) in South Africa.

The PoPI Act states that organisations must take appropriate measures to protect personal information against unlawful access or processing, as well as loss, damage, or unauthorised destruction. Companies must take further measures to identify risks, maintain safeguards against such risks, and ensure that these safeguards are continually updated in response to new risks.

In Europe, the General Data Protection Regulation (GDPR) becomes enforceable from 25 May this year, requiring data protection ‘by design and by default’, in addition to the right to access and the right to erasure amongst others. Non-compliance can result in significant fines – 4% of global revenue or €20 million, whichever is greater – as well as the possible accompanying reputational loss.

Migrating to the cloud

In addition to the right to access, right to erasure and data portability, one of the key legislative requirements of GDPR is to be able to provide any individual with every piece of data an organisation holds on them, including all data records and any activity logs that may be stored.

This places the focus firmly on good data management, with the benefits being increased security and operational efficiency, to improved customer service. By turning to cloud computing at the infrastructure, platform and software level, businesses gain the ability to extract, collate and analyse data at incredible volumes and speed – even from across previously disparate systems – to ensure compliance.

In a growing number of countries, data privacy regulation now stipulates where data must be stored, presenting organisations with additional challenges; however, the availability of innovative managed ‘cloud at customer’ solutions now gives customers transparency and the choice of having their workloads in a private cloud with all the benefits of stability and real-time updates yet keeping critical information and applications within their own building. Or the benefits of public cloud. In fact, in many cases it will be a hybrid model with a mix of public and private cloud solutions for different systems and applications.

Ensuring regulatory compliance is a long-term commitment, and investment in implementing a cost-effective supporting infrastructure might even represent one of the biggest opportunities for companies to accelerate digital transformation in recent years.

Education and automation

With security at the core of a modern organisation, good governance for managing systems and people effectively is critical; strong authentication and encryption becomes a necessity. Backup, archiving and storage helps to further protect against ransomware, and mobile device management becomes an instrumental means of controlling information at the edge.

It is also not just about the technology: industry estimates put nearly half of all security breaches down to human error, and educating employees on how to spot suspicious emails can help cut down on phishing, whaling and other attacks that rely on unsuspecting end-users to click on links to infected websites, or open attachments that install malware or ransomware.

However, the very advances in technologies that enable the threats are also providing companies with the tools that are required to combat them. Using machine learning and AI techniques, autonomous operations will anticipate outcomes, take remedial action, and be aware of real-time risks. Databases with autonomous auto-tuning and patching capabilities are already on the market, helping combat cyber threats resulting from human error – without it having to be shut down or taken offline.

By 2025, 80% of cloud operations risk will vanish entirely, and a higher degree of intelligent automation will permeate the cloud platform, becoming the catalyst that further accelerates enterprise cloud adoption.

For more information, contact Oracle, +27 (0)11 319 4753, www.oracle.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.