The EU General Data Protection Regulation: Prepare for change

(c)iStock.com/xijian

The EU’s wide-ranging rules on General Data Protection Regulation (GDPR) are set to significantly impact all businesses, whether in the EU or further abroad. From 2018, any organisation that collects, uses or shares personal information about European citizens will have to demonstrate compliance with the hotly contested law. This includes using various techniques to ensure that the protection of data is built into the design and infrastructure of an organisation by default.

Securing the data...

By Iain Chidgey, 29 February 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Data Sovereignty, Security.

Enterprises given another warning over cloud app GDPR compliance

(c)iStock.com/DWalker44

More than 4% of enterprises have put their data at risk by sanctioning cloud apps laced with malware, according to research released by cloud security provider Netskope.

The study, which uses anonymised data from millions of users in the global Neskope Active Platform, found 88% of apps used were not enterprise-ready, while almost half (43%) of apps analysed keep data for more than a week after the service has ended, going against the upcoming EU General Data Protection Regulation...

By James Bourne, 26 February 2016, 0 comments. Categories: Applications, Data Management, Data Sovereignty, Security.

Challenges and opportunities securing data in a world without borders

(c)iStock.com/Matej Moderc

Data today is moving and multiplying at pace across boundaries, platforms and applications. With the growth in cloud adoption, social media and mobility, information very rarely stays within the secure parameters of the enterprise anymore. 

More and more businesses are looking to reap the benefits of the cloud. A recent study from the Economist Intelligence Unit found that the most mature enterprises are now looking to...

By Greg Hanson, 24 February 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

How to ensure enterprise cloud app use complies with the GDPR

(c)iStock.com/Creative-idea

After months of fine tuning and approvals from various bodies, the EU General Data Protection Regulation (GDPR) is almost upon us.

When the GDPR finally becomes law in spring of this year after passing a final stage of approval, organisations will have two years to comply with the regulation. Two years might seem plenty of time, but the complex picture of cloud use in modern enterprises means that GDPR compliance will be a challenge. A recent Netskope and YouGov survey found that...

Why data security in the cloud is your responsibility

(c)iStock.com/LeoWolfert

Concerns about data security have always been one of the key inhibitors for the take-up of cloud – yet its rapid growth in the last year suggests that such fears now are being overcome.

In many cases, they were overstated and were more about overall supplier risk management, which relies on the supplier’s financial security and terms of contract. With appropriate due diligence cloud can actually provide improved data...

By Richard Blanford, 17 February 2016, 0 comments. Categories: Data & Analytics, Data Management, Data Sovereignty, Security.

Access and identity governance in the cloud: Problems and solutions

(c)iStock.com/yipengge

There has been a consistent growth and increase in cloud application usage over the past five years as organisational IT leaders have realised the benefits of implementing them. This is also, in part, because of the fact that there is a major increase in remote employees, who need applications in the cloud to be able to work. Cloud applications have many obvious benefits to an organisation, such as improving efficiency, reducing costs and improving security.

Once these applications are...

By Dean Wiech, 22 January 2016, 0 comments. Categories: Applications, Security, Software.

The cloud is the limit: Disaster recovery, compliance, and other key 2015 trends

(c)iStock.com/roberthyrons

We are well into the first month of 2016, and many predictions from the cloud sector have started to reveal different trends that we may see over the next 12 months. In 2015 we saw IaaS (infrastructure as a service) and PaaS (platform as a service) growing 51%, with cloud firmly being pushed into the limelight. Looking to the future, there are many indications of what to expect in the year to come, including improvements to current-generation cloud environments as well as private...

By Monica Brink, 13 January 2016, 0 comments. Categories: Compliance, Disaster Recovery, Security.

Research shows increased proliferation of endpoints for IT service providers

(c)iStock.com/pederk

The extent of the proliferation of endpoints and how IT service providers (ITSPs) are reacting to it has been revealed in a new survey released by IT management provider Autotask.

More than half of the 1,100 global ITSPs polled (55%) said they have seen ‘significant’ or ‘steady’ endpoint growth, with four in five respondents saying they rely on cloud delivery to manage and secure endpoints.

90% say they offer cloud-based services while 55% say they expect between...

By James Bourne, 12 January 2016, 0 comments. Categories: Adoption, Data & Analytics, Security.

Enterprise IT in 2016: Why it is no longer enough to just be the best in your industry

(c)iStock.com/tomazl

Over the course of 2015, we’ve seen many of the trends we predicted last year come to fruition. As cloud adoption in the UK soared past 84% in May, it was evident that we had been right that the technology would become even more mainstream. With enterprises aiming to become more mobile, 2015 has also seen the normalisation of “anytime, anywhere working” and the increased dependency on...

By Sean McAvan, 07 January 2016, 0 comments. Categories: Adoption, Developers, Enterprise, Security.

Why it is vital to talk about security with your cloud provider

(c)iStock.com/creative-idea

Cyber security is currently centre stage – no matter where you turn, it is all over the news.

Just this last month we’ve certainly heard a plethora of stories about companies that have been affected by breaches and hacks. A UK telecoms provider experienced a detrimental cyber security attack where customers’ personal data was breached, and in a separate incident...

By Monica Brink, 02 December 2015, 0 comments. Categories: IaaS, Infrastructure, Security.

Why security will make small businesses move to the cloud in 2016

(c)iStock.com/eric1513

It has long been said that security concerns are what drives small businesses away from putting their data in the cloud. Yet according to Oscar Arean, technical operations manager at disaster recovery provider Databarracks, 2016 will see more small to medium firms move towards cloud services as managing security in-house becomes an increasing headache.

In particular, Arean argues the need for small businesses to move to Office 365 – almost by default – because of its...

By James Bourne, 01 December 2015, 3 comments. Categories: Adoption, Security.

Identity management in the cloud: What does it actually mean?

(c)iStock.com/mihau

Identity management in the cloud? What does this actually mean to us? We don’t yet have an established definition of cloud identity management - and there is not even a Wikipedia page yet, although identity management is well founded. That says it all. I’m going to attempt to draw up a definition.

Using cloud applications has now become commonplace for many organisations. Certainly in education, cloud applications have been used for years, such as Office 365 and various...

By Robert Doswell, 17 November 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.

Bringing DRaaS to the C-suite: The key job roles analysed

(c)iStock.com/samxmeg

A series of large scale cyberattacks have been in the headlines this year and, according to McAfee, the situation will only worsen as hackers use more advanced techniques to infiltrate networks.

Despite this, there are still a large portion of companies that remain vulnerable, mainly due to the lack of executive interest in preparing for worst-case scenarios. The same report states that 79 percent of C-level US and...

By Monica Brink, 13 November 2015, 1 comment. Categories: Data & Analytics, Data Loss, Data Management, Disaster Recovery, Security.

It's time to take your big data strategy beyond the data lake

(c)iStock.com/Bastar

A well-established – and unsettling – metric we anecdotally hear from organisations is that analysts spend 70% or more of their time hunting and gathering data and less than 30% of its time deriving insights.

The promise of big data is to reverse this 70/30 ratio. Organisations striving to build a data lake and use data for competitive advantage are seduced by the opportunity to discover new insights to better target customers, improve operations, lower costs, and discover new...

By Dr. Paul Terry, 12 November 2015, 0 comments. Categories: Big Data, Data & Analytics, Privacy, Security.

Data centre security: Do you understand your risk?

(c)iStock.com/baranozdemir

Let’s assume for a moment that you still manage all or some of your data in-house.

By implication that means that somewhere in the building you have a room full of servers that need to be maintained and protected. And as a manager you’ll be aware of the physical risks that threaten the integrity of your data. These include not only flood, fire and incursions by malicious third parties but also the havoc that can be created by unauthorised members of staff entering the...

By John Hall, 22 October 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Management, Security.

Addressing the hurdles of cloud security: Why you may be setting yourself up for failure

(c)iStock.com/kmlmtz66

Security is trumpeted as a top concern for organisations, especially with increased investment in new technologies like mobile, cloud, and the Internet of Things. As new technologies are introduced and adversaries become more sophisticated, the threat landscape and the attack surface within organisations continues to grow. This means that not only do organisations need protection from threats, they need to protect their data and they also need to protect their reputation and brand....

By Monica Brink, 21 October 2015, 0 comments. Categories: Big Data, Data & Analytics, Security.

Who should look after cloud data – the CSP or the end user? Execs undecided

(c)iStock.com/BlackJack3D

The debate over whether the end user or the cloud service provider (CSP) should be responsible for data security has been reopened after new research from Armor and Ponemon Institute proved inconclusive.

The survey, which quizzed 990 US and UK-based CIOs, CISOs and directors of IT operations, found almost a third (31%) expect their cloud provider to keep SaaS applications secure, while 20% believe the customers are more responsible and only 16% argue it is a shared...

By James Bourne, 16 October 2015, 1 comment. Categories: Security, Vendors.

Managing the risks of cloud collaboration in business today

(c)iStock.com/Alija

Gartner predicts that cloud office systems will account for 33% of the overall office market by 2017. This is a big step considering a few years ago collaboration in businesses typically involved emails, phone calls, and perhaps a few instant messages exchanged within the company.

However, nowadays the arrival of cloud computing and all the remunerations that come with it have shaped the path for collaborative cloud-based services, which is reforming how...

By Nigel Moulton, 16 October 2015, 1 comment. Categories: Collaboration, Security.

Securing your data centre from human error with a multi-step security approach

(c)iStock.com/gogo_b

10 years ago, few could have predicted that the world would generate data on today’s colossal scale, that a new social media environment would emerge, or that the Internet of Things (IoT) would integrate devices with intelligent IT. These changes have impacted the way we access data, and the way that businesses manage and store data.

Recently we have seen an evolution in infrastructure and storage to support these new trends, both for the business community and for consumers, which...

By Sean McAvan, 22 September 2015, 0 comments. Categories: Data & Analytics, Data Centres, Data Loss, Data Management, Infrastructure, Security.

Is your data privacy and security bulletproof?

(c)iStock.com/Nomadsoul1

To ensure a completely bulletproof data service, there are certain components you must own and control. At all times, you need to ensure that you’re in the driver’s seat, and that you didn’t hand over your car keys, along with your corporate data security and privacy, to someone else.

As your company's security expert, you are the one chosen to protect your organisation's data so you should invest in a system that allows you to apply your corporate policies,...

By Saimon Michelson, 11 September 2015, 1 comment. Categories: Data & Analytics, Data Management, Privacy, Security.