sobota 10. února 2018

Ensuring that email data is compliant with GDPR regulations

By - Nathaniel Borenstein - 8. 2. 2018 - Information Management
Plné znění  najdete na adrese:
Cituji vybrané části textu:
- "More than 90 percent of cyberattacks start with email – whether it’s from customers, partners or colleagues, organizations collect hundreds, if not thousands, of emails that contain personal information every day.
- Considering the current cybersecurity landscape, none of that data is safe – even your deleted files. And all of it is vulnerable to attack, which ups the risk for getting hit with noncompliance penalties.
- So, how can your business ward off hefty fines and ensure compliance? For starters, make archiving an essential part of your compliance plans.
Make archiving an essential part of your compliance plans.
When GDPR goes into effect, organizations will need quick and easy access to their email – both current and historical files. This includes trashed and archived emails, which aren’t always simple to find....
Consider the chains of custody
Audit trails, referred to as “chains of custody” by some, are an essential piece of the puzzle when it comes to rounding out your archiving solution....
Determine who holds the keys to the castle
In a time crunch and can’t access the files you need to? Archiving solutions should make it simple for users to approve (and disapprove) who has the ability to directly access and recall specific files....
Leap to the cloud
Has your team moved to a cloud-based solution yet? If the answer’s no, you’re not alone, but you may soon be. Cloud adoption is up – and archiving is becoming a popular use case. Today, utilizing the cloud for archiving solutions saves the budget and your employees time....
Make teamwork a priority
Think the IT team is responsible for archiving? Think again. Everyone in the organization, from the C-level down, should be involved in the process. Teams must work together to define each of the different files that are being archived, and determine their sensitivity and retention period to develop the best protection plan. Without this collaboration, there’s a good chance files will go “missing.” And getting them back will require extensive resources – time and money – to recover....".