If you cannot view this email please click here
Advertisement

BYOD

Passwords

Hacking Cloud Compliance Reviews


COMPUTING SECURITY AWARDS


Vote Now!

The finalists have been determined for the 2017 Computing Security Awards. Voting is now open to decide the ultimate winners.. Which individual, which products and which companies are most deserving? Play your part by voting now www.computingsecurityawards.co.uk


Editor's Focus


Massive surge in zero-day exploits

Thirty per cent of malware can be classified as new or zero-day because it cannot be caught by legacy antivirus solutions, it is claimed

main headline

Time for a unified front

Cyber security is rarely out of the news these days, with businesses and organisation everywhere under attack

main headline


banner advert

Features


Space invaders

All too often, victims of identity fraud do not even realise that they have been targeted. By then, it is way to late - the damage has been done


main headline

No soft touch

How exactly can you best manage software verification, and what are the first step towards safe and resilient systems? Dr João Ferreira, a computer scientist working in the School of Computing at Teesside University, offers his insights

main headline

Unclouded thinking

With the financial penalties and loss of reputation facing companies that fall victim to a data breach, moving your private data to an external provider is more daunting than ever



main headline

Aftershock of a data breach

Stock prices drop by an average of 5% when a data breach is disclosed. The impact on reputation can be even more damaging

main headline


Show Review


Runaway success!

Come sunshine, rain or Polling Day, nothing could prevent visitors from flocking to Infosecurity Europe 2017 in London. Read our post-show verdict

main headline


Masterclass


Keys to Effective Threat Intelligence

A threat intelligence feed gives insights into possible identities of hackers, the methods they use, and the networks they are targeting, says Charlotte Gurney, group marketing manager at Brookcourt Solutions

main headline

Encryption Insights


Encrypted USB-drives - an important piece of the EU-GDPR puzzle

Christoph Bader, Strategic Marketing Manager B2B EMEA for Kingston Technology, offers key insights as the EU-GDPR regulations deadline gets ever closer

main headline

Welcome to the August 2017 issue of the Computing Security Newsletter.

The new Data Protection Bill, which plans to overhaul the UK’s data protection regulations, has, unsurprisingly, provoked mixed reactions. Keeping in line with the European Union’s (EU) GDPR, the new bill aims to increase trust and confidence in the economy and offers enhanced benefits in terms of data protection. However, there are some potential changes that will bring other financial repercussions for companies that fail to demonstrate compliance.

For example, the bill states that the Government will “create a new offence of altering records with intent to prevent disclosure following a subject access request”. The scope of the offence would apply not only to public authorities, but to all data controllers and processors. The maximum penalty would be an unlimited fine in England and Wales or a Level 5 fine in Scotland and Northern Ireland.

For Paul Wilford, cyber security architect at EACS, although this suggests that there may be greater financial repercussions, there will be long-term benefits to the UK’s digital economy. “This is a welcome piece of legislation and one that will make the UK a much more attractive place to do business with,” he states. “However, organisations need to be savvy to certain elements that differ from GDPR,” he warns. “By way of example, an organisation could potentially be fined for a breach or they could be fined for lack of compliance, even if it hasn’t actually been breached.”

Meanwhile Simon Migliano, head of research at Top10VPN.com, has mixed feelings about what the government has unveiled. “The proposed new protections of personal data are certainly a step in the right direction,” he says. “Our personal information is becoming increasingly valuable and needs better safeguards. However, it feels hypocritical for the Government to be trumpeting these new data protection measures while at the same time being responsible for the Investigatory Powers Act, or Snoopers' Charter, that runs completely contrary to these proposals.”

No doubt all the pros and cons of the new bill will emerge over time, but a real positive is that it will be far easier for people to find out how companies are using their personal details, including their browsing history and even their DNA. It will also greatly increase the ‘right to be forgotten’, allowing people to make those companies delete that most personal of information – something we should all celebrate.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622