Three steps to help your colleagues prevent data leaks

Human errors are by far the most important cause for data leaks. According to information security
specialist Daan Koot these errors are caused by both employees and employers. How can
organisation limit the amount of human error with sensitive information?


There is most likely no CISO in Europe that is not thinking daily about the results of the GDPR
(General Data Protection Regulation). Recently, I had a talk with Daan Koot of SafeHarbour, who in
his function of adviser privacy and information security (CIPM Certified CISO) encounters the impact
of this new legislation on a daily basis. One of his tasks is to audit the measures organisations take to
prevent data leaks.


In the meantime many organisations understand that their own employees play a crucial part in
causing and preventing data leaks. Most of the times ignorance about the sensitivity of the
information and the vulnerability of the channels through which the information is being shared
causes errors. According to Koot, employers themselves can also do more to prevent data leaks. In
this article we will discuss three things employers can do according to Koot that will prevent data
leaks.


1. Encourage data awareness


Organisations are performing insufficiently in creating data awareness amongst their employees.
Koot advises clients often to classify all available information within the organisation. For this he uses
three criteria: availability, integrity and confidentiality. How sensitive is the information? How
important is the information? And what are the consequences for the user and organisation if the
information is not available on time? Following this process, organisations and their employees get a
clear insight in the different data streams within their organisation and the necessity to properly
secure these.


2. Avoid fake solutions


Organisations tend to introduce ‘paper solutions’ on a regular basis, however these solutions often
have no practical use in preventing data leaks. As an example Koot mentions the obligation of
companies to come up with a new password every month or user agreements that have to prevent
employees in using their BYOD phones and tablets in an unsafe way. These new passwords are often
almost similar to the previous password leaving no struggle for hackers trying to bypass this layer of
security. User agreements are often very large pieces of judicial text that most employees barely
read, let alone understand. These kind of fake solutions result in a misplaced sense of security.


3. Look for the balance between safety and user friendliness


Organisation that are strengthening their data security can go too far. If increased safety measures
have too much impact on the work of your colleagues, they will start looking for ways to avoid them.
The challenge is to strike a balance between safety and user friendliness. The ideal solution will not
only allow employees to work safer, but will also add to their awareness. One of the ways to do this
is to warn them when they are taking a possible safety risk. This way you will prevent data leaks and
are making sure that the approach is carried throughout your company.


Checklist GDPR


We have described all the necessary steps you have to take in order to meet the GDPR legislation in
our checklist. This document elaborates on things like creating a processors agreement, getting
permission for processing personal information and security measures that have to be taken.

GO TO THE GDPR CHECKLIST

RELATED
Comfort Safe Communications

Zivver Listed as a Representative Vendor in Gartner's 2020 Market Guide for Email Security

LONDON and AMSTERDAM – Zivver, a leading secure digital communication provider, announced today that it has been identified as a Representative Vendor for Email Data Protection Specialists in Gartner's 2020 Market Guide for Email Security. […]

Read more
Rick Goud

My promotion from CEO to CIO

I am proud to announce that I have handed over the CEO reins of Zivver to Wouter Klinkhamer. In my new position as CIO I will focus more on where my passion and strength lies: innovation and translating problems into solutions with technology. The new Zivver Meet service for safe video calling is a good example of how quickly we can innovate and is therefore a nice […]

Read more
London bridge lights moving quickly

How to safeguard data and comply with the GDPR and similar legislation

With the GDPR in effect for some time now, organizations must ensure that their products, services and processes are GDPR compliant as well. The optimal way to do this with current and future business initiatives is by establishing a culture of privacy by design and default in your organization, as well as perform a privacy impact assessment (PIA) as needed. We like to […]

Read more
London bridge lights moving quickly

How to safeguard data and comply with the GDPR and similar legislation

With the GDPR in effect for some time now, organizations must ensure that their products, services and processes are GDPR compliant as well. The optimal way to do this with current and future business initiatives is by establishing a culture of privacy by design and default in your organization, as well as perform a privacy impact assessment (PIA) as needed. We like to […]

Read more
Hand_dominos_traffic-light

5 top GDPR compliance challenges, and what you can do about them

If your organization is struggling to comply with data protection regulations such as the GDPR, you can take some comfort in knowing you’re definitely not alone. Some studies have shown close to half of companies in many countries are not fully compliant with their national data protection requirements. But what are the compliance challenges these companies are […]

Read more
EU_California_flag

General Data Protection Regulation (GDPR) vs California Consumer Privacy Act (CCPA)

In a recent blog post we explained how the California Consumer Privacy Act (CCPA) went into effect on the 1st of January, 2020, after it was signed into law in 2018. This consumer protection legislation, the most robust yet in the United States, was essentially modelled after the General Data Protection Regulation (GDPR) in the European Union, which went into effect in […]

Read more