Should your organisation suffer a breach, “not knowing” that you have unseen data or inconsistencies in the treatment of data is not a permissible excuse in the eyes of regulatory bodies such as the Information Commissioner’s Office (ICO) in the UK. This means that not only do organisations have to set aside adequate time and money to undertake discovery, they need to be prepared to make time to assess, understand and decide what to do about unexpected data.
As an example, what would you do if you found that your marketing organisation had three databases which contained a mixture of duplicated and unique data? How would you consolidate and organise the data and how long would it take to go through that process?
In late 2019 the German regulator fined Deutsche Wohnen £12.5m for running a data archive that had no measure or systems for handling over-retained or out of policy data. With that precedent set so early on, it was a lesson to every business - that, put simply, they need to know their data or risk a huge fine from the regulator.
“People’s personal data is just that – personal. When an organisation fails to protect it from loss, damage or theft it is more than an inconvenience. That’s why the law is clear; when you are entrusted with personal data you must look after it. Those that don’t will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights.”
Elizabeth Denham, UK Information Commissioner.
The UK Information Commissioner makes it clear that prioritising critical customer systems is vital. The C-Suite in any business, particularly in those storing any kind of customer data, must be at the forefront of driving efforts to identify and secure those systems and that means starting with the perimeter fence – or your cyber security efforts.
Understand where vulnerabilities in the external, customer-facing systems are and take action to secure those.
So how can you protect personal data from an attack? Here are three practical steps:
Assess whether it is worth upgrading or retiring systems
Companies of all sizes are using huge numbers of software systems and applications, a subset with customer data stored within, and a smaller subset of critical systems handling and storing financial or sensitive data and transactions. The first step is identifying and risk-scoring each of these, to prioritise what happens next
Audit what you find based on risk
Run an audit of every system you have to understand where the weaknesses may be in your perimeter wall. Does the business still use all of them? Are there legacy systems that could be weaker than others?
Strengthen your cyber security processes and systems.
We won’t attempt to cover the huge area of cyber security in this article. If you need help in this area, speak to us, we have partnerships with some of the world’s leading cyber security companies. Having done these three things, it feels as though the probability of compromise of BA’s e-commerce platform may have been reduced dramatically.