Tag Archive dados privados

7 tips for rapid adaptation to GDPR

The process of adapting the General Regulation on Data Protection (GDPR) to the Portuguese reality has not been easy. Although the European diploma has been in force since May 25, 2018, there are still many companies that fail to meet all the standards associated with the new legislation. The National Comission of Data Protection has passed fines to defaulters and it is urgent that companies work to comply with all the obligations that exist in the law. In today’s article, we present 7 tips for rapid adaptation to GDPR!

Read More

The impact of GDPR in the various sectors of a company

GDPR came into force in May last year and brought many changes to the companies. Almost a year after its arrival, there are still many doubts about the impact that this regulation will have on the various sectors of a company. For this reason, we have prepared an article that talks about the main changes that happen in each sector of the company due to the GDPR!

Read More

Key features to increase the security of your business

Businesses live in a digital age and all the information we need to work on a daily basis is stored in a virtual environment. Thus, it is very important to ensure that the most important data in an organization remains protected from potential threats. A security breach can compromise the survival of a business, so it is imperative that companies leverage the most important tools to protect data. In today’s article, we’ve covered key features to increase the security of your business!

Information Security Policy

The security policy is a document developed by the company that records the principles of security that the company adopts and that must be followed by the employees. The security policy should be applied to all information systems, both desktop and mobile. For the policy to be respected, it is essential that top managers participate in its implementation and that there are clarification sessions on each point in this document. Sanctions should also be created for non-compliant employees, as this will make it easier to ensure that employees comply with all standards.

Data masking

Data masking aims at creating a structurally identical version of the data, but not the same as the original version. This technique creates a database with fictitious but realistic information that can be used for testing and training purposes. Data masking solutions offer a variety of sophisticated scrambling techniques to protect sensitive data, irreversibly replacing them with data that is not real, while maintaining the referential integrity of the database. It is increasingly important that companies adopt this technique as computer attacks are becoming more sophisticated, which makes them more unpredictable and more lethal. Datapeers offers a variety of sophisticated scrambling techniques to protect sensitive data, replacing them irreversibly with fictitious but realistic data.

Disaster Recovery Plan

A disaster recovery solution is a very complete process that guarantees data protection and recovery in the event of a failure. Backup is part of disaster recovery, but it is only one of its components. Disaster recovery is a very complete solution since in addition to copying the data it also ensures its restoration efficiently in case of natural disasters or infrastructure failures. This type of solution has as its main objective to eliminate (or at least to minimize on a large scale) the downtime of a company due to failures. RAAS is a disaster recovery service totally managed by specialized equipment and gives you the possibility to recover a virtual server in seconds.

Use updated antivirus on all devices

Incredibly, there are still companies that don’t look at antivirus as an important tool and completely underestimate its use. It is essential to use a good antivirus and ensure that it is always up to date, because only this way you can avoid the entry of viruses. The free antivirus we find on the Web is not able to protect the organization in all its layers, so you should always opt for a full premium version.

Have a good backup policy

It is essential that the most important information of your company has several copies, so that there is no risk of losing data forever. If you saved the data on external disks or pen drives a few years ago, it is now completely advisable to use the Cloud because it is one of the most reliable and reliable solutions on the market. In addition to having your data stored in a secure location, you can access it from anywhere and from any device, as long as you have access to the Internet.

How can fake news be harmful to your business?

In recent times, the term “fake news” has become part of our day-to-day life. Fake news is created to attract audiences by getting people to click on the links. The goal is to increase revenue through ads. Fake news is also used for its own benefit and to deconstruct ideas rooted in the population. The term “fake news” gained fame during the United States presidential election, but its performance goes far beyond politics. Companies like PepsiCo have seen their reputation threatened due to the spread of fake news. In an age when information travels so quickly, it is very important that companies also protect themselves from this threat. In today’s article, we leave you some tips for not being a victim of fake news and for not taking the risk of seeing your company name “damaged” by this new threat! Read More

The definitive guide of the General Data Protection Regulation

The new general data protection regulation came into effect in May this year and despite all the information that has been generated around this new law, the truth is that many companies still feel lost and have not yet begun to protect their information. For this reason, we have prepared a definitive guide with all the information you need to know to protect your business under the new data protection law!

Read More

Find how to safeguard private data on mobile devices

The trend is global: people are increasingly using mobile devices for everything. Nowadays, Internet access is mostly done through these devices and its evolution makes it possible to access the world wide web from anywhere in the World. People no longer go to the Internet; they live permanently online. On a personal level, there are no doubts about the changes and advantages that the mobile devices have brought, and at the corporate level the advantages are already evident: ability to work from any location, possibility to send e-mails by mobile phone, possibility to attend meetings, among many others. But not everything is good in the mobile world. Storing data on devices of this type raises security issues that if not thought out and handled in a timely manner can jeopardize the overall security of the enterprise. In today’s article, we leave you some tips for safeguarding private data on mobile devices!

Read More

What does my data masking solution need to have?

Data are the most important assets of companies today because it is through them that managers extract information about customers and the market in order to make the best decisions. Never before has there been an awareness that it is necessary and fundamental to protect information. Data masking is a technique that many companies are already using because it allows unauthorized data to remain secure and confidential. This tool is a growing need especially in the companies that generate a great volume of data (Big Data). Nowadays it is very important that companies protect their data in all stages of work, since the data is generated until the moment it is released. Data masking solutions allow data to be protected as long as they are being worked on in test environments until they are stored. Data masking creates a structurally identical version of the database, but it is exchanged for realistic but fictitious data. This makes the data protected and kept confidential. In today’s article, we’ll cover all the features that a data masking solution needs to have!

Read More

GDPR: questions and answers about the new data protection law

GDPR came into effect on May 25, but there are still some doubts as to the scope of its action. Companies need to be prepared not to run the risk of suffering from the heavy fines that this law provides. We’ve prepared some questions and answers about the new data protection law and hope this article is useful for you!

Read More

Safety precautions that all companies must have

Data security is an ever-increasing concern in business life, as data is the most important asset of a business. Today, businesses are working every day to increase the protection of their business and take increasingly effective measures to counter the threats that may arise in the digital world. A security flaw and the consequent exposure of sensitive data can seriously compromise a company’s survival, so companies should not (and especially can not) overlook data protection. In today’s article we leave you some safety precautions that every business should have!

Read More

DPO: get to know the new profession created by the GDPR

The General Regulation on Data Protection entered into force with mandatory character in the European Union on May 25 and there are still some doubts regarding its scope of action. One of the most debated issues has been related to the DPO – Data Protection Officer – a figure that comes with the creation of this new legislation. In today’s article, we will address all issues related to the DPO, the new profession created by the GDPR!

Read More