The weakest link

The weakest link

posted in Product ● 27 Feb 2014

The ICO have updated their Privacy Impact Assessment (PIA) code of practice to help organisations respect peoples’ privacy when handling information. The PIA outlines varying privacy issues that could occur when processing personal information including identifying privacy risks and addressing these risks in the final project plan. The moves come after a large number of data breaches in 2014 and independent research conducted by The ICO showing that only 40% of the public believe organisations handle their data in a fair and proper way, The ICO hope the updated code will “help organisations of all sizes ensure the privacy risks of a project are identified and addressed at an early stage”.

Data security is like a proverbial chain, it is only as good as its weakest link, should the weak link be exposed it will result in heavy fines, damage to reputation and loss of business. For example, a Government department sold personal information relating to victims of a terrorist incident. The files were inside a locked cabinet, which was sold at auction, unbeknownst to the staff. The detailed files included the victims’ injuries, family details, the amount of compensation offered, as well as confidential ministerial advice. Upon finding the files, the ICO were alerted and fined the Government department £185,000 for “a very serious data breach”.

Redstor is a market leader in providing security, storage and disaster recovery services to the public and private sector. Our range of secure and encrypted cloud services are already protecting the data of over 10,000 organisations across the UK. Redstor’s secure data backup service ensures data is safely backed up offsite in an encrypted format. Our file sync and share service, Centrastor, enables organisations to store and share files securely online from any device with an Internet connection and our CentraStage service enables support providers to guarantee that devices they support are regularly audited, patched and safely up-to-date for effective management of endpoints. Our Virtual Disaster Recovery service guarantees to have your systems up and running within minutes following a disaster. To find out more about our services and how we can help you comply with data protection laws and prevent data leakage, please contact us either by giving us a ring on 01189 515 200 or emailing [email protected].

Benefits of Automated Data Management

7 Reasons to back up G Suite using a third party

With new critical data being generated across G Suite, IT teams need to consider how they back up G Suite data and ensure against data loss or corruption.

Continue reading
Benefits of Automated Data Management

7 pay-offs one-stop data management gives MSPs

The Covid-19 pandemic has forced many managed service providers to seek faster, easier and more scalable ways to manage their customers’ data.

Continue reading

POPIA makes SA CEOs more accountable

Following a three-month delay due to coronavirus – and more than seven years after its enactment – the Protection of Personal Information (POPI) Act has finally come into force. 

Continue reading