Page 13 - NOVEMBER MAGAZINE 2022
P. 13

Why is Data Protection               Addressing the Gaps
                                             Important for Enterprises?           As a business and IT leader, one

                                             Digitalization  is  becoming  an     has  to  draw  data  protection
                                                                                  policy to ensure that they:
                                             increasingly  important  part  of
                                                                                    Complies with data protection
                                             operations  in  enterprises.  With
                                                                                    law and follows good practice.
                                             digitalization,  the  importance  of
                                                                                    Protects  the  rights  of  staff,
                                             data  has  also  increased.  Hence,    customers, and partners.

     Backup, Backup, and                     we  need  data  protection  to         Is open about how it stores and

       Backup is the only                    s a f e g u a r d   e n t e r p r i s e s   &   processes individuals' data.
       mantra to recover                     individuals  from  reputational        Protects itself from the risks of a
                                                                                    data breach.
         from an attack.                     damage and regulatory fines.          Data Protection Bill-What to
                                             Protection Gaps & More
    There should be a BCP                    There are primarily three reasons    Expect?

      ready in your policy                   behind  the  growth  in  protection   After  withdrawing  the  previous

     implementation and                      gaps,  reputational  damage  and     d a t a   p r o t e c t i o n   b i l l ,   t h e
                                                                                  government introduced a new bill
      strategic planning.                    regulatory fines.                     expected  to  be  more  about
                                             Lack  of  monitoring:  Anomalous
                                                                                  dealing  with  personal  data  and
                                             behavior  on  the  network  and
                                                                                  leaving out non-personal data.
                                             endpoints must be flagged at the
       A   L e a d i n g   I T   S u s t a i n a b l e                            Future Trends in Data Protection
                                             o n s e t   t o   m i n i m i z e   t h e
       Business Transformation expert                                               T h e   i n t e g r a t i o n   o f   d a t a
                                             organization's  vulnerability  to
       and  certified  Data  Protection                                              protection into the “ecosystem”
                                             attacks or fraud.                      c o n t i n u e s   t o   p r e s e n t
       Professional  from  FDPPI  with
                                             People risk: A malicious staff may     challenges,  especially  around
       over 20 years of multi-industry       sell  confidential  information  or     c l o u d - b a s e d   w o r k l o a d s ,

       experience, Arindam Singha is a       even  allow  attackers  entry  into    migration to cloud storage, and

       versatile leader who has helped       the organization's network.            databases.
       several  firms  realize  their         Incident  handling:  Mishandling       I   e x p e c t   d a t a   p r o t e c t i o n
                                             of  incidents  results  in  much       modernization  projects,  which
       business goals.
                                             higher  costs  and  reputational       are top IT priorities, to alleviate
       Below,  he  outlines  the  key        damage,  from  which  it  may  be
                                                                                    key data protection challenges
       reasons  behind  the  growth  in      challenging to recover.
                                                                                    identified.
       protection gaps.                      Recovery Post the Attack               AI and Blockchain technologies
                                             Backup,  Backup,  and  Backup  is
                                             the only mantra to recover from        could  help  immensely  in  years
                                             an attack. There should be a BCP       to come.
                                             r e a d y   i n   y o u r   p o l i c y
                                             implementation  and  strategic
                                             planning.
                                                                                                               Nov. 2022
   8   9   10   11   12   13   14   15   16   17   18