{"id":1459,"date":"2019-02-18T00:41:28","date_gmt":"2019-02-18T00:41:28","guid":{"rendered":"http:\/\/kusuaks7\/?p=1064"},"modified":"2023-08-23T11:30:29","modified_gmt":"2023-08-23T11:30:29","slug":"actoring-data-protection-into-a-digital-transformation-strategy","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/actoring-data-protection-into-a-digital-transformation-strategy\/","title":{"rendered":"Factoring data protection into a digital transformation strategy"},"content":{"rendered":"<p>Digital transformation and data protection; to some that may feel like a contradiction in terms, but in fact, the two can be interdependent.<\/p>\n<p style=\"text-align: center;\">\n<p>With digital transformation, there is a temptation. It\u2019s the allure of just focusing on the deluge of information available and the potential for business advancement, if only one can successfully aggregate, interrogate and monetise it. Digital transformation and data protection, on the other hand, seem to be at odds. After-all, the principles of adding more control to data usage can feel like roadblocks on the path to becoming data driven.<\/p>\n<p>Further examination reveals a quite different relationship between digital transformation and data protection. In many ways, they are co-dependent. At a recent event in London, a\u00a0<a href=\"https:\/\/www.commvault.com\/blogs\/2019\/january\/stricter-regulatory-environment-welcomed-by-data-experts\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">poll<\/a>\u00a0conducted by\u00a0<a href=\"https:\/\/commvault.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Commvault<\/a>\u00a0found that 80% of respondents thought that, in fact, more data protection legislation could lead to better results for businesses.<\/p>\n<blockquote>\n<h4>Why privacy by design is like going to gym<\/h4>\n<p><a href=\"https:\/\/www.information-age.com\/privacy-by-design-2-123478156\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jason Cronk, expert on privacy by design, a crucial part of the GDPR, but which is being rolled out worldwide, talks to Information Age about AI, GDPR and privacy in the data age. He starts by comparing Privacy by Design with going to the gym.<\/a><\/p><\/blockquote>\n<p>This, despite some businesses experiencing hiccups along the way. Steve Blow, Technology Evangelist at\u00a0<a href=\"https:\/\/www.zerto.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zerto<\/a>\u00a0reckons that digital transformation has actually created many of the problems that data protection tries to solve. He noted that, \u201cthe adoption of the latest technology, with innovative new approaches, has led to this number of both planned and unplanned disruptions in a business rising.\u201d However, solutions implemented as part of a successful digital transformation strategy can also reduce the unplanned disruptions and improve data protection.<\/p>\n<p>\u201cCompanies need to start looking outside of traditional backup capabilities to keep the business online,\u201d Blow continued. \u201cThey need to choose a modern, resilience approach that can utilise continuous data protection. This, paired with the ability to orchestrate and automate the mobility of applications to the ideal infrastructure, will enable businesses to have more than just their customers\u2019 data protected. Organisations will become completely IT resilient, protecting data, infrastructure and reputation \u2013 without the downtime.\u201d<\/p>\n<p>Beyond preventing downtime, another aspect of digital transformation that aligns with data protection is the need to monitor, manage and track data usage within an organisation. Neil Barton, CTO at\u00a0<a href=\"https:\/\/www.wherescape.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WhereScape<\/a>, stresses the need to \u201cknow where each piece of data sits and who can access it, as well as tag it and track its lineage in order to understand its usage.\u201d This is vital for fulfilling data protection legislation requirements such as subject access requests, but also for being able to locate and move data in an agile way.<\/p>\n<blockquote>\n<h4>For tech\u2019s sake: Reconciling emerging tech and the GDPR<\/h4>\n<p><a href=\"https:\/\/www.information-age.com\/gdpr-tech-123477749\/\" target=\"_blank\" rel=\"noopener noreferrer\">In the lead-up to \u2018G-Day\u2019, critics warned GDPR would have a chilling effect on innovation and called on regulators to abandon core GDPR principles in favour of emerging tech. But by pitting privacy against innovation they missed the mark on both. Ironically, their pleas revealed a striking resistance to change and a vigorous defence of \u2018business-as-usual\u2019. There is no need for tech and GDPR to be at odds. Privacy lawyer, Abigail Dubiniecki, takes up the story.<\/a><\/p><\/blockquote>\n<p>However, Barton recognised that for some particularly digitally-forward companies, data can become the enemy. \u201cManually processing [the information from multiple different data sets] effectively can be time intensive, and error-prone. This is where automation comes in \u2013 data infrastructure automation can help companies ensure all data is adequately tagged, ensuring data is identifiable, auditable and quickly retrievable.\u201d<\/p>\n<p>This is against a landscape where businesses \u201cface a broader range of legal, financial and reputation risks\u201d associated with data, according to Steve Wainwright, Managing Director EMEA at\u00a0<a href=\"https:\/\/www.skillsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">Skillsoft<\/a>. Wainwright advocates for ongoing compliance training to improve employee awareness of new rules surrounding data, \u201cTraining helps employees stay mindful of potential compliance impacts when making decisions, particularly those involving the handling of data. A one off training session won\u2019t be enough.\u201d Without such training around regulations like GDPR, businesses will find themselves derailed from their digital transformation endeavours by a lack of data protection awareness.<\/p>\n<p>The role of staff in data protection, and in ensuring security through a digital transformation project more generally, is one also emphasised by John Williams, Product Manager at\u00a0<a href=\"https:\/\/www.node4.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">Node4<\/a>. \u201cTreat your staff as your human firewall, educate them in the threats they may be exposed to and get them active and aware of those threats \u2013 they are your intelligent line of defence,\u201d he began. \u201cAdded to this, regular vulnerability scanning and penetration testing provides vital intelligence that your security is matched to the threats. Do it again and again as the threat landscape is a moving feast. And, should serious problems occur, disaster recovery and backups are vital as a solution to threats like ransomware, but as these systems also become the targets of cybercriminals they need to be protected \u2013 not just seen as a siloed last line of defence.\u201d<\/p>\n<blockquote>\n<h4>We risk a digital crisis in 2019 akin to the 2008 banking crisis, warns data privacy lawyer<\/h4>\n<p><a href=\"https:\/\/www.information-age.com\/data-privacy-123477354\/\" rel=\"noopener\">The 2019 digital crisis, data privacy charlatans and the good guys with an ethical approach: data privacy will diverge in 2019 says privacy lawyer.<\/a><\/p><\/blockquote>\n<p>Improved security overall is an important consideration in both a digital transformation and data protection strategy. Jon Lucas, Director,\u00a0<a href=\"https:\/\/www.hyve.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">Hyve Managed Hosting<\/a>, commented, \u201cBeing confident in your data security is more crucial now than ever before. Hosting and cloud providers in particular need to prioritise security measures that can help prevent cybercriminals from taking advantage, thereby ensuring that their customers\u2019 data is kept safe.\u201d However, in the event that breaches do happen, a fact of modern business, Lucas said, \u201cBusinesses need to be able to trust that their provider has suitable security and recovery measures in place, giving them peace of mind that no harm will come to the data placed in their hands.\u201d<\/p>\n<p>Finally, it is important businesses do not underestimate the impact of consumer advocacy on both the shape of digital transformation and the implementation of data protection. Nigel Tozer, Solutions Marketing Director EMEA at Commvault, commented, \u201cWhile businesses are still finalising their GDPR compliance, [consumer] pressure is actually required to make the effects of the regulator more tangible.\u201d<\/p>\n<p>Tozer concluded, \u201cI\u2019ve been saying it for years now, but businesses should focus on profiling the data they have, where it\u2019s stored and what it\u2019s being used for \u2013 if they haven\u2019t already done so. Not only will it help businesses get compliant and reduce their risk exposure, it could also reduce their costs, too.\u201d<\/p>\n<p>The race to digital transformation is a vital one \u2014 it brings agility, cost effectiveness and longevity to both traditional and disruptive businesses. However it is not one that can happen independently of a revised focus on data protection. This attention to data protection will provide businesses with the time needed to revisit established data practices, and ensure data access, security and compliance \u2014 all with a view of providing a better service to customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital transformation and data protection; to some that may feel like a contradiction in terms, but in fact, the two can be interdependent. With digital transformation, there is a temptation. It\u2019s the allure of just focusing on the deluge of information available and the potential for business advancement, if only one can successfully aggregate, interrogate<\/p>\n","protected":false},"author":442,"featured_media":3564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[2975],"class_list":["post-1459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":2975,"user_id":442,"is_guest":0,"slug":"michael-baxter","display_name":"Michael Baxter","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Baxter","first_name":"Michael","job_title":"","description":"Michael Baxter&nbsp;is Editor of <a href=\"https:\/\/www.information-age.com\/\">Information Age<\/a>, Author, and economics and technology writer. He is also an accomplished public speaker, has spoken on disruptive technology, the economy, and Brexit at various locations in the UK and the US and facilitated conferences on GDPR and digital marketing."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/442"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1459"}],"version-history":[{"count":2,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1459\/revisions"}],"predecessor-version":[{"id":29036,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1459\/revisions\/29036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3564"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1459"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}