
Security Intelligence
January 28, 2022
With contributions from Eric McDonald.
In 2016, the European Union introduced the General Data Privacy Regulation (GDPR). Websites everywhere suddenly had very visible banners outlining cookie policies and commitments to data privacy.
The regulation’s roll-out highlighted just how much personal data businesses work with every day. Ongoing digital transformation has helped organizations of every size and in every sector reach more customers and clients than ever before—but it also means that all these businesses now have access to large amounts of sensitive information.
If this data is exposed to the public following an accidental data breach or a deliberate cyber attack, it can lead to serious harm. Exposed personal data may put customers and clients at risk of identity theft, financial fraud, or further cyber attacks.
Businesses that interact with personal data have a responsibility to safeguard this information. Taking steps to protect this data starts with understanding the concepts behind data privacy and what it means for your business.
In this blog, you’ll learn:
In a nutshell, data privacy (sometimes called information privacy) is about how businesses and other organizations collect, store, manage, and share sensitive data. This data is often referred to as personally identifiable information (PII), and its use by third parties like your business is regulated and legislated, along with its misuse or unauthorized access.
Data privacy is closely related to consumer protection, giving individuals control over how organizations use and share PII. In fact, many of the laws and regulations governing data privacy emphasize the need for greater transparency and accountability; the GDPR, for example, explicitly outlines these principles.
There are several additional data privacy rights defined by the GDPR, which other regulations touch on:
Personally identifiable information, or PII, is at the heart of data privacy concerns. PII comprises a wide variety of documents and information that, when used alone or in conjunction with other data, identifies an individual.
Sensitive PII includes, but is not limited to:
On the other side of the coin, non-sensitive PII may include:
Accessed in isolation, non-sensitive PII is largely harmless, and in fact may be released publicly once it has been anonymized. The risk to an individual comes when it is paired with sensitive PII, which would allow a criminal to identify an individual and further target them.
Data privacy is an important aspect of any organization’s cyber security efforts and overall business strategy. Beyond the requirements imposed by laws and regulations, data privacy protections are simply a good business practice. Protecting customer and client PII is a major factor in building and maintaining trust.
Dive into the past, present, and future of cyber security with The State of Cyber Security eBook.
Your customers and clients expect that your business is already taking appropriate measures to safeguard the data they share with you. In 2020, Gartner recommended that businesses take proactive measures to build a comprehensive data privacy program to better build trust. As such, it’s much harder for an organization to rebuild trust and address reputation damage after a breach.
It’s not just about trust, though: failure to protect sensitive data means businesses face severe legal and regulatory penalties. Businesses that don’t meet GDPR requirements, for example, could face fines up to €10 million or as much as 2% of the annual worldwide turnover of the preceding financial year. That’s a lot of money for large enterprises—French authorities fined Google €150 million ($170 million USD) for issues with how the company manages cookies and for failing to provide users with a means of opting out.
That’s not the only legislation that governs data privacy. Other regulations and laws include:
Put simply, data privacy is a big topic with massive ramifications for any business.
Businesses need to collect data to operate effectively. Retail companies, for example, collect and store credit card information, which brings them in scope of PCI DSS compliance. Similarly, sales teams for large enterprises must collect data on prospects.
But if either of these data sets are exposed or collected without proper consent, businesses are at risk of financial penalties, lawsuits, or additional regulatory action—all of which can cause massive damage to a company. Navigating data privacy best practices can feel overwhelming, especially for smaller organizations.
Organizations must assess their tolerance for their risks to find the right balance between collecting enough data to operate and the potential consequences of a data privacy breach. If you’re already thinking about data privacy and cyber security, you’re on the right track.
For example, if you’re focused on alignment with accepted cyber security standards—like the Canadian Centre for Cyber Security Baseline Controls, the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and the International Organization for Standardization’s (ISO) ISO/IEC 270001 standard—chances are you’re already doing plenty of work that indirectly enhances your data privacy protections.
Not sure where to start when it comes to enhancing data privacy protections? Here are five steps your organization can take to build stronger data privacy policies and procedures:
You can’t defend something if you don’t know what you’re defending. Building a better understanding of your threat surface—all the attackable points in your IT infrastructure a cyber criminal may access—will help you identify vulnerabilities and assess your overall risk. From there, you can start to make informed decisions about what solutions, policies, and practices will reduce your threat surface while enhancing your defence. By securing your IT assets and infrastructure, you’re also reducing the likelihood of a data breach.
What do your employees think of security? Is it an afterthought, or a top-of-mind concern? Building security awareness into your company culture won’t happen overnight, and requires regular updates, ongoing security awareness training, and proactive diligence. By establishing that every employee and individual you work with has a responsibility to safeguard the data you handle, however, you can help foster that security-first mindset to make sure that staff will know what to do when they get a suspicious email or think they’ve been targeted by a hacker.
The zero-trust security model operates on the assumption that there is no perimeter in security. Put simply, even a user inside your network must prove that they are who they say they are—there are no trusted devices. Users and the network they interact with are constantly authenticating to ensure everything checks out.
Strong, complex passwords will always be a major line of defence against an attacker, and should ideally include a unique combination of letters, numbers, and symbols (or a hard-to-guess passphrase). The problem is that making and remembering these unique and complex passwords is challenging. Using password managers automates the entire process—users only need to remember a single unique master password, and can easily create, store, and use highly complex phrases and pins for all other logins. This eliminates reused passwords, making it much harder for attackers to compromise an account and access sensitive data.
On the topic of passwords and authentication, even a complex password can be guessed eventually, especially with the help of automated hacking tools. What’s more, social engineering techniques may still lead to a user accidentally sharing details with a malicious actor. That’s where multi-factor authentication (MFA) comes in. MFA requires users to provide some additional unique token alongside their password to access an account or service. Even with a compromised password, an attacker will still require these additional tokens to access confidential information.
Strengthening data privacy protections may seem overwhelming at first glance, but taking the time to put some of the practices outline above can help you build better defences that will help safeguard confidential information. The good news is that if you’re already working towards stronger cyber security, you’re on the right path with data privacy.
If you’re still not sure where to start, don’t worry—we’re here to help. Get a head start on data privacy practices with our Cyber Security Starter Kit.