Categories: Business

Mandatory Data Breach legislation: Do you have a Data Breach Response Plan?

22 February 2018 is fast approaching, and with it the new Data Breach Laws.

If you run a business, you need to be aware of your obligations under this new law.  One part of this obligation could be to have a response plan. Failing to disclose a breach can leave individuals and business subject to significant fines for non-compliance. So what should a plan look like?

While every plan needs to be tailored to the individual business needs, some common things to consider in your plan might include:

  1. How to determine a suspected breach?
  2. What should the staff member who detected the breach do?
  3. What should the Company Directors do?
  4. How do you contain the breach?
  5. How do you determine the risks associated with the breach?
  6. Who needs to be notified?
  7. How do you prevent further breaches?

The legislation does vary across industries, so it is also worth checking with your relevant industry association as to what you may need to do.  If you are in the Financial or Medial industries, you may also have additional obligations.

From an IT perspective, we believe that prevention is also imperative to reduce your risk.

There are a number of strategies and technologies that Greenlight has put in place that can significantly reduce the likely hood of your systems being compromised. Some of the technologies we already deploy for our clients include:

  1. Penetration tests – when was the last time a ‘white hat’ hacker tried to breach your network?
  2. Phishing campaigns – We have software to send fake malicious emails and provide video training to anyone who gets tricked into downloading our fake malware.
  3. 2-factor authentication – to increase password security by requiring a second form of authentication, such as a mobile device.
  4. Mobile device management – So we can remotely wipe your phone or laptop if it gets lost or stolen.
  5. Single Sign on – a system to sign onto every cloud platform with a single login, meaning that your users never need to know more than one password.

There is no silver bullet, the threat landscape is constantly changing, and the rise of crypto-currencies and ransomware is only adding fuel to the fire.  However if you combine all of the five items above, the your systems will be harder to compromise and an It team may be able to mitigate any damage quickly, thus protecting your business.

If you would like help in formulating a Data Breach Response Plan, or improve the security of your systems in response to this new law, please talk to your Greenlight account manager or contact our sales team for further assistance.

Share
webdev

Published by
webdev

Recent Posts

Top 6 Tips for Effective Working from Home

With the outbreak of COVID-19, we are increasingly having conversations with our clients about working…

5 years ago

DHS Gives The Latest Mandatory Policy on Medical Data Management in Australia for 2020

The medical data management system in Australia is not where it should be. According to…

5 years ago

5 Surprisingly Simple Email Hacks to Save You Time

Not everyone has the luxury of 0 unread emails. Australia right now is on the…

5 years ago

4 Alarming Signs Your MSP/ IT Team Is Unprepared for CyberSecurity this 2020

One of the most pressing tech issues for businesses, especially in Australia, is cybersecurity. Therefore,…

5 years ago

6 Biggest Threats that Your MSP Should Prepare You for This 2020

The Hard Truth About Malware in Australia (The statistics in this section are findings from…

5 years ago

10 Crucial Apps That can 10x Your Windows 10 Performance

Many new apps will help increase your productivity and make getting the job done a…

5 years ago