The long-awaited General Data Protection Regulation (GDPR) of the EU was provisionally agreed in December 2015. The final details are still being ironed out, but publication of the final version of the regulation is expected around July 2016.2 There will then be a two-year waiting period until every organisation that does business in, or with, the EU must comply with the regulation. Since it is a regulation, not a directive, compliance is mandatory, without the need for each member state to ratify it into its own legislation.
Publication of the long awaiting General Data Protection Regulation (GDPR) of the EU regulation is expected around July 2016 so now is the time to take action according to Colin Tankard, Managing Director of data security company Comms Business Awards Finalist Digital Pathways.
Publication of the long awaited General Data Protection Regulation (GDPR) of the EU Regulation is expected around July 2016 so now is the time to take action according to Colin Tankard, Managing Director of data security company Digital Pathways.
Irish fund boards are putting plans in place to ensure they can deal with both internal and external cyber security breaches.
Following the publication of best industry practices last year, boards have taken several measures to make sure they can manage and mitigate the risk of cyber attacks.
In September 2015 the Central Bank of Ireland sent a letter to the fund industry, issuing guidance on cyber security policies and governance.
London: March 2016, data security specialist, Digital Pathways, has teamed up with ObserveIT, providers of insider threat management solutions.
The Insider Threat issue has become one of the major concerns surrounding data protection today. According to Verizon DBIR 69% of reported security incidents involved an insider with detection with such an attack taking some 32 months to unearth.
High-profile hacks have promoted cybersecurity from a backroom IT issue to a boardroom headache. But what opportunities does it represent for investors, asks Joy Dunbar.
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks.
The risk of malware infection from employees’ home networks is real and should not be overlooked.
“It is something we are coming across more and more,” says Colin Tankard, CEO of Digital Pathways. “Devices are being exploited and [companies] find that something unusual is going on. It is only when they do a little bit more investigation that they realise somebody or something is monitoring what they are doing.”
The Internet of Things (IoT) was first envisaged in the last century. It is a vision whereby potentially billions of “things” such as smart devices and sensors are interconnected using machine-to-machine technology enabled by Internet or other IP-based connectivity.