search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
NEWS ROUND-UP


Information and Communication businesses are risking GDPR penalties by not wiping the memory from old IT equipment


• In the two months following the introduction of GDPR, 39% of information and communication businesses have failed to wipe the memory off redundant IT equipment before disposal


Despite GDPR legislation having come into effect over five months ago, the majority of UK information and communication businesses are now risking penalties by failing to adhere to some of the rules. According to a survey of 1,002 UK workers in full or part-time employment, carried out by Probrand.co.uk, a large proportion (39%) of businesses in the information and communication industry failed to wipe the data from IT equipment they disposed of in the two months following GDPR. This news is perhaps less surprising given the research


also found that 58% of all UK information and communication businesses do not have an official process or protocol for disposing of obsolete IT equipment. What’s more, 66% of information and communication sector workers admit they wouldn’t even know who to approach within their company in order to correctly dispose of old or unusable equipment. The top 5 industries most guilty of not clearing the memory of IT equipment before disposal in the months following GDPR were transportation (72%), sales and marketing (62%), manufacturing (59%), utilities (58%) and retail (57%). Matt Royle, marketing director at Probrand.co.uk commented: “Given the amount of publicity around GDPR it is arguably


impossible to be unaware or misunderstand the basics of what is required for compliance. So, it is startling to discover just how many businesses are failing to both implement and follow some of the simplest data protection practices. “This is especially startling to see from businesses within


the information and communication sector, where sensitive customer information is handled all the time. “The fines involved in a GDPR breach can potentially run into


the millions – and what appear to be less tangible impactors, like reputational damage, customer trust and loyalty, will ultimately become financially significant. “Given these findings, it is clear that more needs to be done to


ensure that all businesses have a disposal procedure in place to avoid inadvertently leaking sensitive data.”


The top 10 industries which are most guilty of not clearing the memory of IT equipment before it is disposed of:


1. Transportation


2. Sales and marketing 3. Manufacturing 4. Utilities 5. Retail


6. Education 7. Leisure and travel


8. Healthcare and hospitality 9. Trades / administration


10. Information and communication


72% 62% 59% 58% 57% 54% 49% 45% 44% 39%


Launch of Cyber Security Standards for Enterprise-Grade Mobile Apps


Not-for profit membership organisation Secure Chorus has announced the completion of its first set of interoperability standards for regulatory-compliant encrypted voice calls. The move will lead the way to the commercial rollout of an ecosystem of different brand mobile apps for enterprise. Phone call hacking is a risk frequently overlooked by business.


With the threat of faked caller ID and unauthorised network access, enterprise users can’t guarantee the identity of incoming calls, or be sure outgoing calls reach their intended recipients. Neither can they be certain that third parties accessing the enterprise networks are who they say they are. This risk is set to escalate as digital transformation trends


call for security to be pushed beyond the walls of a business’ IT premises. The requirement for secure communication is no longer simply about communication between employees. It now extends beyond the enterprise security perimeter to clients, suppliers and other third parties. Despite enterprise grade secure voice apps already existing


in the marketplace, these have failed to realise widespread adoption in enterprise. This is mainly due to the way secure voice apps have been built to date, which often makes them incompatible with other similar products. This gives rise to a scenario in which, unless the entire enterprise market adopts the same brand of voice application, users will resort to compromise solutions in order to bridge the gap created by the current mainstream ‘vendor lock-in’ approach. The completion of this first set of interoperability standards


for secure voice apps specifically aimed at enterprise users has created a much-needed breakthrough in the market. These standards will make single-vendor lock-in applications obsolete,


by ensuring that call security can be established between different product brands. Secure Chorus has achieved this milestone through a strategy


of government-industry collaboration. Secure Chorus’ industry members have developed a number of secure voice apps that use the same enterprise-grade cryptographic open standard: MIKEY-SAKKE. MIKEY- SAKKE was developed by the CESG, now part of


the National Cyber Security Centre (NCSC), the UK’s authority in cyber security. MIKEY-SAKKE has received endorsement at global level, standardised by the Internet Engineering Task Force (IEFT) and approved by the 3rd Generation Partnership Project (3GPP), the body responsible for standardising mobile communications for use in mission-critical applications. With interoperability standards based on MIKEY-SAKKE


now available, organisations will be able to adopt secure voice apps with a number of common benefits. These include strong end-to-end encryption of voice calls together with centralised management, giving a domain manager full control of the security of the system. These technologies are also highly scalable, requiring no prior setup between users or distribution of user certificates. This new generation of voice applications achieves four key requirements in enterprise use: security, auditability, scale and simplicity of deployment. The Secure Chorus multi-year strategic plan includes instant messaging, group calls, video calls, document sharing and many others. Secure Chorus continues to work with its members through its government-industry collaboration approach, to promote the growth of an ecosystem of interoperable products while developing further features focused on the enterprise user.


www.isopps.com 05


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19