The weakest link

The weakest link

posted in Product ● 24 May 2018

The ICO have updated their Privacy Impact Assessment (PIA) code of practice to help organisations respect peoples’ privacy when handling information. The PIA outlines varying privacy issues that could occur when processing personal information including identifying privacy risks and addressing these risks in the final project plan. The moves come after a large number of data breaches in 2014 and independent research conducted by The ICO showing that only 40% of the public believe organisations handle their data in a fair and proper way, The ICO hope the updated code will “help organisations of all sizes ensure the privacy risks of a project are identified and addressed at an early stage”.

Data security is like a proverbial chain, it is only as good as its weakest link, should the weak link be exposed it will result in heavy fines, damage to reputation and loss of business. For example, a Government department sold personal information relating to victims of a terrorist incident. The files were inside a locked cabinet, which was sold at auction, unbeknownst to the staff. The detailed files included the victims’ injuries, family details, the amount of compensation offered, as well as confidential ministerial advice. Upon finding the files, the ICO were alerted and fined the Government department £185,000 for “a very serious data breach”.

Redstor is a market leader in providing security, storage and disaster recovery services to the public and private sector. Our range of secure and encrypted cloud services are already protecting the data of over 10,000 organisations across the UK. Redstor’s secure data backup service ensures data is safely backed up offsite in an encrypted format. Our file sync and share service, Centrastor, enables organisations to store and share files securely online from any device with an Internet connection and our CentraStage service enables support providers to guarantee that devices they support are regularly audited, patched and safely up-to-date for effective management of endpoints. Our Virtual Disaster Recovery service guarantees to have your systems up and running within minutes following a disaster. To find out more about our services and how we can help you comply with data protection laws and prevent data leakage, please contact us either by giving us a ring on 01189 515 200 or emailing [email protected].

Rise in laptop sales leads to data protection worries

Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.

Continue reading

O365 cyber attacks stress need for isolated backup

Johannesburg, 17 December 2019 – Office 365 is a prime target for cyber criminals – and it’s not difficult to understand why when Microsoft announced this year that it has more than 180m active commercial users every month.

Continue reading

Game-changing pricing for O365 protection

Johannesburg, 24 October 2019 – Redstor, the company disrupting the world of data management, will demonstrate at the Gartner IT Symposium/Xpo™ in Barcelona how a pioneering technology developed in South Africa slashes the cost of Office 365 protection.

Continue reading