On Trend: Business Data Protection Laws

A common mistake made by businesses when starting out is to dive right into the technology without a strategic plan. This approach ignores some of the most vital points of cybersecurity and is why governments and regulatory bodies around the world have recognised a need to invest in cybersecurity.

EU nations have created the GDPR – General Data Protection Regulations.

"The digital future of Europe can only be built on trust. With solid common standards for data protection, people can be sure they are in control of their personal information," said Andrus Ansip, EU vice-president for the Digital Single Market, speaking when the reforms were agreed in December 2015.   

Smaller organisations are now embracing digital transformation. This means smaller businesses can now leverage data in the same way that only very large businesses could as recently as ten years ago. However, this exposes them to the same risks, but without the relevant infrastructure in place. 

The GDPR introduced the obligation to report personal data breaches to regulators within 72 hours of discovery, unless it is unlikely that there will be a risk to data subjects. Unsurprisingly, this led to a significant rise in the number of data breaches and cybersecurity incidents reported to European regulators since the introduction of the GDPR.

The UK regulator, the Information Commissioner’s Office (ICO), reported a 490% increase in incidents notified to them in Q2 2018 compared to Q2 2017.

Data Protection Laws
As of September 2019, over 80 countries and independent territories have now adopted comprehensive data protection laws to prohibit disclosure or misuse of information. In Europe, the General Data Protection Regulations (GDPR) and rules from industry specific regulatory bodies layered onto this provide the regulatory framework. 

Organisations who fail to look after their data correctly, face huge fines and an erosion of customer confidence in their brand, losing them customers.

Unlike regulatory bodies, cyber attackers do not discriminate based on size. Smaller organisations now have to be as wary of protecting company data as those in the enterprise. In fact, lacking years of engagement with cybersecurity provisions, SOC (security operation centre) analytics teams and protection, smaller organisations could be seen as an easier target to some cyber threats. 

No longer just the domain of large enterprises and big channel providers, there is now a gap in the cybersecurity market for comprehensive cybersecurity solutions to cater for smaller players in every industry. 

Rather than seeing it as a challenge, businesses should be open to taking control of their cybersecurity and view it as an opportunity for growth, greater customer entanglement and a potential point of differentiation. For many C-level executives concerned with IT, cybersecurity is the topic at the top of their minds. Getting it right can even open up other areas of IT spend. Once decision makers feel confident in their security, your customers are more likely to start conversations about implementing IoT, Cloud Services, and other innovations.

Time to Act
Cyber criminals can be highly innovative. It often feels like new cybersecurity vendors pop up daily to address the next new threat. This makes it difficult to determine what solutions are the best fit for your organisation, which technologies to choose, and which vendors to get skilled up on. With so many different point products on the market, often with different degrees of overlap, the amount of choice can be bewildering. Effective cybersecurity relies on having the right knowledge and monitoring tools. 

This is where good distributors play an important role in the cybersecurity market. They will be researching the market all the time. They can identify the most effective solutions and decipher how to consolidate them into an efficient and effective cybersecurity portfolio. 

This is all work you don’t have to do. Channel partners should be able to deliver tailored cybersecurity solutions and services. For those who are building up cybersecurity expertise, fully formed cybersecurity solutions which have already been developed can be leveraged straight from the distributor.   Besides removing the initial costs of developing services, the service collateral and legal contracts curated by the distributor removes a large part of the risk involved. Not to mention, throwing in marketing support and enablement around the hardened solutions they’ve developed.

Compliance and Control Policies
We should not forget that for many organisations their focus is on running and improving their core business, rather than becoming experts on cybersecurity. As you build up expertise around cybersecurity, choosing to focus on the regulatory and compliance requirements around a vertical market could become a key area of differentiation from anyone else offering cybersecurity services.

IT Models
Channel partners have been learning in recent years that the growing technology market has changed the way businesses buy, and therefore the way technology vendors sell technology. The opportunity here is for the channel to be able to offer security as a service, either around the endpoint software and its users or the system and its applications. The service could be a dedicated service or it could be embedded into an existing offering.

What’s important here is looking at how you create a fully formed, productised service that allows you to continue to add new recurring value. For examplee, when customers subscribe to your service, there needs to be a way you can continue to add new value to the service and thus justify the on-going subscription. That way you can move away from a cost-plus pricing model, to one that is based on the value you deliver to the customer. The distributor should be able to help with this process. 

Now that cloud marketplaces automate the selling and management of cybersecurity technology and solutions choosing the right platform can also make it much easier and less costly to offer cybersecurity solutions at scale to your customers. Specialists need to stay current on new cyber threats as they emerge, and talent is in short supply across the industry. If you are starting out in cybersecurity, investing in technical skills is a big commitment and may seem like an irreversible change to your business model. 

The greatest costs associated with entering the cybersecurity market come into play with sourcing expertise with demonstrable experience, training and essential development of solutions, including production of brochures and product marketing.

The easiest way to get started is to look for cybersecurity services offered by distributors and consider the services you can resell. Fully developed and trusted solutions are available, training can be supplied and technical delivery of these services will be actioned by the distributor on your behalf. Once you have established a revenue stream, the distributor should be able to offer you certified technical training for your engineers to action the services, along with sales and marketing training for your commercially focused teams.

Structured Enablement Programmes
Leading distributors tend to offer structured enablement programmes to help channel organisations transform existing operating models around the latest new technologies and high growth markets, enabling shifts from traditional reseller to services-led, or managed services to managed security services. 

Although challenges to introducing cybersecurity do exist, they are not insurmountable with the support of the right distribution partner. 

Cyber Security Intelligence can Recommend the Correct GSPR Legal Advice and Cyber Security Training for you and your Organisation.  Please Contact Us for Free Advice.

TechRadar:           European Union:       Beazley Academy:          ZDNet

You Might Also Read:

The GDPR Wake-Up Call Is Being Ignored By Business:

 

« British Elections: The Parties Manifestos On Cyber
US & China Are Investing Big In Quantum Computing Simulation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.