If you don’t protect your data – Who will?


The one thing that 2017 has proved is that cyber threats are consistently, and persistently, evolving. In the name of Data Protection Day which falls on January 28 this year, four IT experts give their take on why it is important to educate organisations, both large and small, and make them aware of the significance of ensuring that their most important asset – data – is secure.

Rowan Troy, security solutions director at Six Degrees discusses the importance of MSPs in the lead up to GDPR.

“As data across all business sectors continues its growth trajectory, so do the security challenges for CTOs, which are further amplified by the introduction of the General Data Protection Regulation (GDPR) on May 25,” he says. “Data Protection Day presents an ideal opportunity for businesses and CTOs to take a close look at their data and determine the best approach for ensuring security and compliance.”

“In the face of an evolving regulatory climate, many businesses are choosing to outsource these needs to a multi service provider (MSP) with the facilities and expertise to provide the appropriate data security and management in accordance with current and future legislation. This can be done very cost effectively, with additional benefits including peace of mind and the freedom to focus on core business goals.”

Gary Watson, CTO and founder at Nexsan, believes that secure phone payment solutions can be a huge step forwards in removing the associated risks.

“With fraudsters increasingly looking for ways to exploit telephone contact centre agents, and regulations like GDPR coming into play, organisations must use events such as Data Protection Day to give voice security the attention it deserves,” Gary states. “Secure phone payment solutions can completely eliminate the need for sensitive payment information to enter the contact centre environment in the first place, making them a far less appealing target for criminals and removing the associated risks to the organisation.”

He continues, “Whether for analytics, training purposes, compliance adherence or other business processes, the volume of call recordings being generated today is growing at an exponential rate. Organisations that fail to take securing this data seriously are not only risking the safety of their customers’ most sensitive information, but also gambling with their own reputation.”

Mat Clothier, CEO, CTO and founder of Cloudhouse, explains how containers may be the answer to approaching data protection.

“An element to data protection that is often overlooked is the need to run up-to-date operating system,” he begins. “Security best practice will always advise organisations to move away from legacy, unpatched versions that are vulnerable to data theft or loss – users of Windows XP, Server 2003 and, soon enough, Windows 7, all face this challenge. However, it’s easier said than done; organisations of all industries often find themselves having to rewrite legacy apps not built for modern platforms, which can be both time-consuming and costly. Thankfully, compatibility containers can now help any business looking to take a comprehensive approach to data protection in 2018, enabling the mobility of mission-critical, legacy apps to the safety of a support OS.”

Chris Colotti, field CTO at Tintri, believes that the key to good data protection is being proactive.

“From the threats of malware attacks to the rise in popularity of IoT and smart devices, data is now more vulnerable than ever before,” Chris says. “As technology continues to advance, both companies and individuals need to remember the importance of keeping their data and information protected, both in the long and short term. Data Protection Day is a great reminder of this.”

“In this risky landscape, the key is to establish recovery point and recovery time objectives, which are a vast improvement over traditional backup tapes,” he continues. “For example, if your proactive security measures fail and your organisation experiences a cyber attack, you can speed up the recovery of data with online and nearline snapshots. Being in a position to review snapshots quickly and enhance protection with multi-site replication is no longer a nice to have, but a must have.”