{"id":13729,"date":"2018-05-25T12:45:08","date_gmt":"2018-05-25T11:45:08","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=13729"},"modified":"2019-11-22T10:03:36","modified_gmt":"2019-11-22T10:03:36","slug":"gdpr-video","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/gdpr-video\/13729\/","title":{"rendered":"GDPR: What it is, and what businesses should do"},"content":{"rendered":"<p>Ongoing digital transformation has carried us right into the data-centric age: personal data is everywhere. Data subjects do not always realize how their data is handled, or who has access to it. What is even worse, organizations are sometimes careless about how they handle this data \u2014 and how they bring it online. That creates a surge of opportunities for data hunters of all kinds. The EU General Data Protection Regulation is an attempt to address those problems.<\/p>\n<h2>What GDPR is, and how it will help<\/h2>\n<p>GDPR suggests an ongoing process focused on ensuring that data subjects have real control over their personally identifiable information \u2014 and ensuring companies use it lawfully and handle it securely. It helps give both data controllers and data processors a clearer understanding of their responsibilities.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/Y2kn_ebwr6M?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>This regulation is about ensuring that the processes and technologies used for personal data safekeeping follow the Regulation and are effectively implemented. Therefore, compliance is not a one-time task, something that is simply <em>accomplished<\/em>; you will need to assess and adjust regularly. Compliance lies not just in following the letter of the law but also in taking a practical approach to ensuring data security \u2014 which you can accomplish by continuously tuning your processes and countermeasures.<\/p>\n<h3>What you can do<\/h3>\n<p>Of course, implementing effective cybersecurity technologies does not equal GDPR compliance. However, cybersecurity is among the cornerstones on which this compliance is built. We have some practical advice on how to strengthen it.<\/p>\n<ul>\n<li>Start your protection with endpoints (including keeping track of mobile ones); they are likely points of entry for cybercriminals, which can pose a risk even if the endpoints are not directly involved in personal data processing.<\/li>\n<li>Use <a href=\"https:\/\/securelist.com\/threats\/encryption-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">encryption<\/a> to protect data at rest \u2014 and in motion! Ensure the security of your regulated data storage.<\/li>\n<li>Add layers of protection to your gateway and e-mail server to counter the \u201chuman factor\u201d to reduce risk.<\/li>\n<li>Regularly check your infrastructure for weaknesses before someone else has a chance to find them. Perform penetration tests and security assessments.<\/li>\n<li>Know what is happening in your infrastructure. In the event of a breach, your ability to establish the cause may help mitigate other, future risks and demonstrate that you made reasonable efforts to protect data.<\/li>\n<\/ul>\n<p>We have a broad arsenal of measures that will help reduce the risks of a data breach, prevent security incidents, and deliver enhanced visibility of monitored infrastructure. They can be quite helpful in the quest for protection of personal data. Want to learn more? Please visit the <a href=\"https:\/\/www.kaspersky.com\/gdpr?redef=1&amp;reseller=gl_gdpr_acq_ona_smm__onl_b2b_kasperskydaily_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">GDPR section of our website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.<\/p>\n","protected":false},"author":610,"featured_media":13730,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1836,2361],"tags":[2261,260,1802],"class_list":{"0":"post-13729","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-compliance","10":"tag-data-protection","11":"tag-gdpr"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gdpr-video\/13729\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/gdpr-video\/13408\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/gdpr-video\/11184\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/gdpr-video\/15463\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gdpr-video\/22476\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/gdpr-video\/9230\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/gdpr-video\/20469\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gdpr-video\/20344\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gdpr-video\/20340\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/gdpr\/","name":"GDPR"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=13729"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13729\/revisions"}],"predecessor-version":[{"id":17354,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/13729\/revisions\/17354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/13730"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=13729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=13729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=13729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}