Enterprise, GDPR, Internet Security

Is your company prioritising security?

In this age, having your company prioritising security is essential due to the way companies are connected to local networks…

In this age, having your company prioritising security is essential due to the way companies are connected to local networks and the internet almost by default, and this is due to how much the internet has been incorporated into the everyday routine. And as with any other aspect, information systems involve a series of security risks that have to be tackled by companies in order to ensure they offer the best service they can.

If you are in charge of a company, or of its security department, there are several tasks you have to perform at all levels in order to actually be protected from all kinds of digital threats.

Security diagnosis

Your company should have security diagnosis performed and evaluated constantly, in order to know whether it’s ready to stand against any malicious attack and to check if it was a victim of a cyber crime at any point, whether successfully or not. Have a team constantly analyze incoming and outgoing traffic, as well as any strange interaction within your internal information systems. You can also check how robust your current security measures are by trying to bypass or break them and see if you can get through them.

Preventive measures

Don’t wait until your security has been breached and you’re dealing with a real problem to improve your company’s security measures. The best mindset is to think you are always being targeted and plan in advance because you never know when you will actually be targeted. The objective of a robust and structured security plan is to be active and working before any attacks, in order to ensure that your company does its work without any unexpected interruption.

Human training

Most of the time, the human factor is the weakest link in a security chain. Take enough time to prepare every person that works for your company regarding good and bad security practices, what to do and what to prevent, and especially how to act in case of a security breach. Keep them updated every so often, and organize simulations to see how they would handle an attack and correct any mistakes. We offer some advice on preventing phishing attacks in our article – 5 ways to spot phishing attacks.

Emergency plans

Remember that, no matter how much you plan, a breach is always possible, and you’ve also got to be ready to handle it. Don’t just take preventive measures, but also prepare a series of emergency plans that can be easily and quickly deployed if a security breach is detected. Consider how to handle your clients or users information, any sensitive data, your databases, your websites and applications if any, and even how to handle the press and public information. Structure several plans depending on the gravity of the situation be prepared in case you need to deploy them.

Security tools

One final good practice is to always install and run updated security tools, such as an antivirus, a firewall, a backup tool and other programs, in every single device related to your company, to aid in your security measures and stand as yet another resort against malicious attacks.

Be the first to write a comment.

Leave a Reply

Internet Security

Massive Crypto Breach Unveiled: Latest Insights Emerge

In what appears to be the most significant crypto breach of the year, fresh revelations have emerged shedding light on the extensive infiltration into the digital realm. PeckShield, a reputable blockchain security firm, has disclosed a substantial breach impacting FixedFloat, a prominent platform facilitating cryptocurrency and fiat exchanges…

In what appears to be the most significant crypto breach of the year, fresh revelations have emerged shedding light on the extensive infiltration into the digital realm. PeckShield, a reputable blockchain security firm, has disclosed a substantial breach impacting FixedFloat, a prominent platform facilitating cryptocurrency and fiat exchanges…
Read More

Continue Reading
Internet Security

Protests in Delhi a security challenge

Sit-ins and protests in and around the national capital are emerging as a big security challenge for the establishment. According to Delhi Police’s 2022 report, cops handled 6,277 law and order situations relating to protests, demonstrations, meetings and processions, with latest curbs being enforced due to the ongoing farmers’ protest around Delhi-NCR.A former Delhi police

Sit-ins and protests in and around the national capital are emerging as a big security challenge for the establishment. According to Delhi Police’s 2022 report, cops handled 6,277 law and order situations relating to protests, demonstrations, meetings and processions, with latest curbs being enforced due to the ongoing farmers’ protest around Delhi-NCR.A former Delhi police commissioner told ET: “Crowd management has become complex these days mainly due to social media…
Read More

Continue Reading
GDPR

Next Wave: African data protection laws need more oomph to match GDPR

Cet article est aussi disponible en français First published 07 April, 2024 African nations’ data protection laws are, to some extent, weaker compared to Europe’s. This is because the European Union’s (EU’s) General Data Protection Regulation (GDPR) sets a high standard for digital data protection. We can think of the GDPR as a benchmark for

Cet article est aussi disponible en français

First published 07 April, 2024

African nations’ data protection laws are, to some extent, weaker compared to Europe’s. This is because the European Union’s (EU’s) General Data Protection Regulation (GDPR) sets a high standard for digital data protection. We can think of the GDPR as a benchmark for strong data protection laws. Moreover, African countries have varying levels of success in putting their data protection policies into practice. Digital governance policies in Africa can shape the continent’s progress as digital advancements grow alongside economic development.

This is why current data governance across African states must be assessed, particularly paying attention to their trends and differences. While South Africa, Kenya, and Botswana have seen rapid growth in data protection policies, they still need to catch up to the GDPR standards of the EU.


But why is this important?

Between 2020 and 2023, over 30 African countries implemented data protection laws. As expected, each new regulation brings fresh compliance obligations and penalties for non-compliance.

Next Wave continues after this ad.

The State of Tech in Africa

The first quarter of 2024 is just over and there was a lot of activity within Africa’s Tech Ecosystem in that period.
Due to varying reasons, some startups had to trim their workforce while there were others who even expanded into new territories. A couple of interesting M&A deals have also occurred.

Come and get an exclusive scoop into the details of these and more, like funding deals, at a specially curated edition of TechCabal Live on April 12 by 11am (WAT). You will also witness the State of Tech in Africa Q1 2024 report launching.

The report spotlights important trends in Q1 2024 while also delving deeper into the nitty gritty of various happenings in Africa’s Tech Space.

As a stakeholder in Africa’s Tech Ecosystem, these insights will help you position strategically and uniquely to harness the innovative progress within this sector. You don’t want to miss this.


Register here now to make sure!

This, therefore, means that organisations with operations or customers in Africa must understand the applicable laws fully. Many internet-based businesses operate or use cloud services in multiple African nations; this sometimes calls for transferring personal data across borders. This movement often occurs between African countries and regions such as the EU, UK, US, and Australia, which can pose various data protection challenges.

Understanding the importance of data privacy rules in each African country, especially limitations on data transfer, cannot be stressed enough. Organisations must also check if local laws limit using service providers within African nations and their related requirements. A grasp of the legal framework for transferring personal data from African countries is essential for compliance.


Circling back to GDPR and the EU…

Considering Europe’s stringent directive that international players adhere to its data protection standards, we must ask whether European companies maintain the same standards when handling personal data from Africans as they do with Europeans.

Next Wave continues after this ad.

DICE: The Tech Ecosystem Mixer

On April 26th, H.M Hannatu Musa Musawa, the Minister for Art, Culture & the Creative Economy, alongside distinguished experts, will speak at the DICE Ecosystem Mixer 2.0, with a focus on Africa’s creative economy.


Register here for a chance to attend.

This research revealed disparities in digital rights granted by subsidiaries of European telecom giants Orange and Vodafone in Senegal and Kenya compared to their European counterparts. The discrepancies included lack of transparency in publishing terms of use for prepaid services, minimal disclosure regarding data collection practices, third-party access, and security measures.

This highlights how, despite the principles underpinning the European data protection regime, companies may exploit regulatory gaps in countries to their advantage, compromising data privacy standards.

Many Western tech companies are notorious for disregarding user data privacy, offering convenience at the expense of the vast amounts of personal data they harvest. This trend is due to the absence of markets where individuals can understand the value of their data, leading them to exchange it for minimal gains. This issue is common in Africa and less so in Europe, where the GDPR exists.

Consider the case of Worldcoin, supported by OpenAI’s CEO, Sam Altman, which uses blockchain technology to store biometrically derived tokens. It retains personal data indefinitely without allowing users to delete their information.

When Worldcoin launched its services in Kenya, it incentivised people with around $50 to get them to scan their irises. Despite concerns about data protection, Kenya initially licensed Worldcoin’s operations. Before its suspension in August 2023, Worldcoin had become very popular, scanning the irises of up to 350,000 Kenyans, most attracted by the monetary incentive. While these funds may temporarily alleviate financial constraints for locals participating in the exercise, there is a compelling argument that Worldcoin’s model is exploitative.

The other day, Worldcoin was temporarily banned in Portugal, following similar restrictions in Spain, leaving Germany as its sole European market for biometric data collection. Portugal’s data protection office imposed the ban after complaints about scanning children’s irises.

This case underscores Europe’s stringent stance on digital data protection. EU data protection laws afford individuals rights over their data, including the ability to edit or delete it. This was an obvious legal conflict with Worldcoin’s approach, highlighting the split in digital privacy standards between Africa and Europe.



Bottom line

African nations must tailor data protection laws to their needs and enforce them consistently.

While directly copying the GDPR may not work, Africa can learn from the EU’s approach to demand global compliance. Despite initial uncertainties, harsh fines on non-comp

!–Subtitle>

!–Subtitle–>!–Text>

!–Text>!–Ad>!–Subtitle>!–Text>!–Text>!–Subtitle–>!–Ad>!–Subtitle>!–Subtitle–>!–Main>!–Date>!–Date–>!–TopBanner_END–>!–TopBanner
a>!–div>
Read More

Continue Reading
GDPR

Chrome’s latest feature blocks cookie-stealing hackers

Cookies aren’t just something sites have to annoy you about every single #$%&ing time you visit them because of the GDPR. They’re one of the most basic ways for sites to identify specific users, for better and worse. Stealing and spoofing those cookies is a popular vector for identity theft attacks…

Cookies aren’t just something sites have to annoy you about every single #$%&ing time you visit them because of the GDPR. They’re one of the most basic ways for sites to identify specific users, for better and worse. Stealing and spoofing those cookies is a popular vector for identity theft attacks…
Read More

Continue Reading