Connect with us

Infosecurity

GDPR Compliance Preparation: Why 2017 Was the Last Full Year to Get Ready

Published

on

The clock was ticking. With the General Data Protection Regulation (GDPR) set to take effect on 25 May 2018, 2017 represented the final full calendar year for businesses to achieve GDPR compliance preparation. Failure to act meant risking penalties as high as €20 million or 4% of global annual turnover—whichever proved greater. For companies that neglected data security, the message was clear: enjoy your cash while you still have it.

Why 2017 Was the Make-or-Break Year for GDPR Compliance Preparation

According to experts quoted by Infosecurity Magazine, with only 526 days remaining until enforcement, 2017 demanded urgent operational changes. Quentyn Taylor, director of information security at Canon Europe, emphasized that the biggest shift would be in the relationship between suppliers and businesses. As data processors now share similar liability with data controllers under GDPR, entire business models and pricing structures needed adaptation.

“Boards will start to take data protection seriously—something that too many have failed to do thus far,” Taylor warned. This sentiment echoed across the industry, as organizations scrambled to understand the scale of the transformation required.

The Governance Gap: Why Many Organizations Were Unprepared

Steve Holt, partner in Financial Services Advisory at EY, observed that many organizations had not established proper governance or clearly defined programs. Gap assessments were underway, but few had a handle on the full scope of change needed. “In many cases, the program is being led by legal teams,” Holt noted. “Our view is that it needs board sponsorship and a cross-functional approach.”

Holt argued that the COO was often better positioned to drive this transformation, given the importance of data, systems, and business processes. He also flagged a dangerous trend: some organizations were avoiding decisions, waiting for further regulatory clarification that was unlikely to arrive soon. “It’s important that organizations make a few assumptions and decisions, so that the program can move forward,” he said.

The Risk of Delayed Action

Holt recommended that boards openly discuss whether full compliance by May 2018 was realistic. His view: many global organizations would not be fully compliant, so prioritizing focus was essential. This meant that GDPR compliance preparation in 2017 was not just about ticking boxes but about strategic risk management.

Low Readiness Scores and the Existing Law Problem

Jonathan Armstrong, partner at Cordery, revealed that their GDPR readiness test showed alarmingly low scores. “People not having done things the existing law requires,” he said. “My gut feel is many people are leaving themselves exposed—there are only 526 days left and for most businesses there’s still a lot to do.”

Armstrong stressed that gap analysis alone was insufficient, as many organizations were not even compliant with current data protection laws. He predicted that 2017 would either be a year of hard work or a prelude to failure under the new regime.

Building Blocks for Compliance: What Experts Recommended

To move forward, Armstrong advised that businesses should have basic building blocks in place by early 2017: a process for handling a data breach and a fit-for-purpose privacy policy. Holt added that a clear governance structure was essential, covering all aspects of the business—including HR, compliance, legal, IT, marketing, operations, and procurement. He also recommended performing a thorough assessment and gap analysis to establish a future vision and strategy.

For more insights on building a robust data protection framework, check out our guide on creating a data breach response plan. Additionally, understanding board responsibilities under GDPR can help leadership take ownership of the process.

The Bottom Line: Time Was Not on Their Side

GDPR may have been 17 months away at the start of 2017, but time has a way of slipping away. The predictions from industry experts were clear: 2017 would be the year of GDPR compliance preparation—or the year organizations set themselves up for failure. Those who heeded the warnings and acted decisively stood the best chance of avoiding the steep penalties that awaited the unprepared.

As the deadline approached, the message remained the same: now or never. For businesses still on the fence, the cost of inaction was simply too high to ignore.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Infosecurity

Deck the Halls With Security Awareness: A Holiday Guide to Data Protection

Published

on

Deck the Halls With Security Awareness: A Holiday Guide to Data Protection

The holiday season is a time of joy, generosity, and unfortunately, heightened cyber risk. As consumers rush to buy gifts and share personal data online, cybercriminals see a golden opportunity. This is where security awareness becomes your strongest defense. Whether you run a small business or manage a large enterprise, protecting customer data should top your Christmas list.

Why is this so critical? Because the stakes have never been higher. A single data breach can shatter trust, incur massive fines, and turn a festive season into a nightmare. But with the right mindset and practices, you can keep the grinches at bay.

Why Security Awareness Matters More During the Holidays

The holiday shopping frenzy creates a perfect storm for cyber attacks. Phishing emails spike, fake websites multiply, and social engineering attempts become more convincing. Without robust security awareness, employees and customers alike can fall for these traps.

Consider this: a well-trained team is your first line of defense. They can spot suspicious activity, avoid risky clicks, and report incidents quickly. In contrast, a lack of awareness leaves your organization vulnerable to devastating losses.

Common Holiday Cyber Threats to Watch For

  • Phishing scams: Emails that mimic trusted brands like Amazon or PayPal, asking for login details.
  • Fake charities: Fraudulent donation requests that steal credit card information.
  • E-commerce fraud: Stolen payment data used for unauthorized purchases.
  • Ransomware attacks: Malware that locks systems until a ransom is paid, often targeting retailers.

Each of these threats exploits human error. Therefore, investing in security awareness training is not optional—it is essential.

Practical Steps to Boost Security Awareness This Christmas

Building a culture of vigilance starts with clear policies and ongoing education. Here are actionable steps you can take today.

Update Your Policies and Processes

Review your data protection policies to ensure they reflect current risks. For example, enforce multi-factor authentication for all accounts. Additionally, limit access to sensitive data only to those who need it. A simple audit can reveal gaps that cybercriminals might exploit.

Train Your Team on Suspicious Activity

Conduct short, engaging training sessions that focus on real-world scenarios. Teach employees how to identify phishing emails, verify requests for data, and report incidents without fear. Explore our cyber awareness training resources for practical tips.

Monitor for Insider Threats

Not all risks come from outside. Disgruntled employees or careless insiders can cause significant damage. Implement monitoring tools that flag unusual behavior, such as mass data downloads or access after hours.

How to Respond If a Breach Occurs

Despite your best efforts, incidents can happen. The key is to act swiftly and transparently. Have an incident response plan in place that includes steps to contain the breach, notify affected customers, and work with law enforcement.

Moreover, communicate openly with stakeholders. Apologize, explain what happened, and outline the measures you are taking to prevent a recurrence. This builds trust even in difficult times.

Final Thoughts: Make Security a Holiday Tradition

This Christmas, let security awareness be part of your celebrations. By protecting customer data, you are not just avoiding disaster—you are building lasting loyalty. Remember, a little vigilance today can prevent a major crisis tomorrow.

For more guidance on fraud prevention and risk management, check out our fraud prevention strategies or read about cyber security best practices. Stay safe, and enjoy a happy, secure holiday season!

Continue Reading

Infosecurity

Cybercrime Monetization: How Attackers Will Make Money in 2017 and Why It’s Getting Easier

Published

on

Cybercrime Monetization: How Attackers Will Make Money in 2017 and Why It’s Getting Easier

In many Asian cultures, the number eight symbolizes wealth and prosperity. For cybercriminals, 2017 promises to be a lucky year indeed. As the digital underground evolves, attackers are finding new ways to turn breaches into profit. This article explores the key trends in cybercrime monetization for 2017, from ransomware to cloud compromises, and why the barrier to entry is dropping.

The Rise of Ransomware and Social Media as Revenue Streams

Ransomware remains a dominant force in cybercrime monetization. According to RiskIQ VP EMEA Ben Harknett, modern threat actors move fast, and seconds will count more than ever. Attack campaigns now go live within hours of account creation, lasting only a short time to evade detection.

Social media platforms are also being weaponized. Phishing and malware campaigns spread rapidly through fake profiles and malicious links. This low-cost, high-reach method allows criminals to target millions without sophisticated tools.

State-Sponsored Cybercrime: A New Level of Organization

Symantec’s Chief Strategist for EMEA, Sian John, warns that rogue nation states may align with organized crime for financial gain. The SWIFT attacks serve as a stark example, where state-backed actors stole millions by exploiting financial systems. This collaboration could lead to downtime for political, military, or financial infrastructures.

Therefore, cybercrime monetization is no longer just the domain of lone hackers. State funding brings resources and sophistication, making attacks harder to stop.

Cloud Infrastructure: The Next Big Target

Anomali senior threat researcher Aaron Shelmire predicts that cloud services will be a primary target in 2017. Security conferences have highlighted cloud-based persistence and compromise methods. Shelmire expects leading security organizations to detect malicious actors breaching cloud management infrastructure.

Malware designed to capture cloud credentials is on the rise. Once inside, attackers establish persistence through cloud management profiles, complicating intrusion timelines. This shift means cybercrime monetization will increasingly rely on cloud vulnerabilities.

Low-Sophistication Attacks Still Pay Off

Not all attacks require advanced skills. Mike Scutt, analytic response manager at Rapid7, predicts a surge in script-based malware and the use of native OS tools for execution, persistence, and reconnaissance. The dark web provides ready-made tools, lowering the entry barrier.

As a result, even less skilled criminals can profit. The websites hosting malware and phishing lures may last only hours, but the malware persists. Improved detection and response will help, but attackers adapt quickly.

How Businesses Can Defend Against Cybercrime Monetization

To counter these threats, organizations should invest in real-time monitoring and employee training. Phishing simulations and cloud security audits are essential. Additionally, adopting a zero-trust architecture can limit the damage from credential theft.

Building on this, companies must prioritize patch management and endpoint detection. As cybercrime monetization evolves, proactive defense is the best offense.

For more insights, read about ransomware prevention strategies and cloud security best practices. Also, check our guide on social engineering awareness.

In conclusion, 2017 marks a turning point in cybercrime monetization. Attackers are more organized, better funded, and leveraging low-sophistication methods with high success. Staying informed and vigilant is key to protecting assets.

Continue Reading

Infosecurity

AI and Machine Learning: Why These Trends Will Dominate 2017

Published

on

AI and Machine Learning: Why These Trends Will Dominate 2017

As 2016 draws to a close, the cybersecurity industry is buzzing with predictions about what the new year will bring. Among the most prominent forecasts is the continued rise of AI and machine learning trends, which have captured significant attention over the past two years. Experts agree that these technologies will not only persist but evolve, demanding sophisticated Big Data capabilities and reshaping how organizations defend against cyber threats.

The Growing Role of AI and Machine Learning in Cybersecurity

According to Sian John, Chief Strategist of EMEA at Symantec, the expansion of AI and machine learning will unlock powerful insights for businesses. She emphasizes that this growth will foster increased collaboration between humans and machines. From a security standpoint, this means impacts on endpoints and cloud mechanisms. Enterprises will need to invest in solutions capable of collecting and analyzing data from countless endpoints and attack sensors across diverse organizations and geographies.

Similarly, Staffan Truve, CTO of Recorded Future, argues that the scale and complexity of cyber threats are pushing human analysts to their limits. He predicts that the next generation of cyber threats will require a combined effort from AI-equipped machines and human experts. Truve draws a parallel to weather forecasting, where improved sensors and advanced algorithms have enhanced prediction accuracy. In cybersecurity, web intelligence offers new sensing capabilities that, combined with novel algorithms, can predict future threats.

Machine Learning: Hype vs. Reality

However, not everyone is convinced that the buzz around AI and machine learning trends translates into genuine innovation. Adrian Sanabria, senior analyst at 451 Research, warns that these terms have become buzzwords, pressuring companies to claim they are leveraging them—whether they need to or not. He points out that many security and IT vendors have used machine learning algorithms for years, with Amazon employing the technology for book recommendations in the late 1990s.

Sanabria highlights both positive and negative aspects. On the upside, machine learning helps defenders gain an edge in preventing malware infections. On the downside, it may not be as effective in addressing the information overload that plagues defenders. The quality of input data is crucial, and much of the data fed into security analytics engines—such as threat intelligence, vulnerability scans, and logs—is often low quality, raw, or unfiltered. As the old adage goes, “garbage in, garbage out.”

How AI and Machine Learning Trends Will Shape the Battlefield

On the defensive side, the McAfee Labs 2017 Threats Predictions Report from Intel Security suggests that AI and machine learning will be instrumental in teaching machines to operate on the front lines of a global battle. Eric Peterson, director of threat research at Intel Security, notes that when expertly applied, machine learning can solve complex business problems. Regression algorithms predict values, clustering algorithms reveal data structures, and anomaly detection identifies abnormal data points.

Peterson describes machine learning tools as “force multipliers” for security professionals. He warns against assuming that cybercriminals are not also adopting these powerful tools. This arms race means that organizations must stay ahead by embracing AI and machine learning trends proactively.

The Human Element: Collaboration Over Replacement

Despite the emphasis on automation, experts stress that AI and machine learning are not about replacing humans. Instead, they augment human capabilities. For instance, at Microsoft’s Future Decoded conference, the Cortana digital agent demonstrated how AI can assist in online helpdesk tasks—a far cry from the high-stakes environment of a security operations center. Nevertheless, the trend toward human-machine collaboration is undeniable.

As we move into 2017, the conversation around AI and machine learning will intensify. However, the actual impact on businesses and legacy IT systems may be slower to materialize. Organizations must navigate the hype, invest wisely, and focus on quality data to truly benefit from these transformative technologies.

For more insights on cybersecurity trends, check out our guide to cybersecurity predictions for 2017 and learn about ransomware protection tips to stay safe.

Continue Reading

Trending