01722 411999

twitter

GDPR

GDPR tools and services

GDPR

GDPR - How ABC Networking can help you be compliant

GDPR is coming, we all know that, what a lot of organisations are struggling with is how to demonstrate compliance. Different organisations have different compliance obligations which is why ABC Networking Ltd is offering our clients a choice of services dependent on compliance needs.

ABC Networking has a comprehensive suite of tools that we are offering either as stand-alone options or as combinations depending on your business needs: 

GDPR Audit and Virtual DPO which is the best way to demonstrate an audited compliance. GDPR Audit and Virtual DPO also acts as a virtual Data Protection Officer (DPO) but for a fraction of the cost of employing someone to do the role. GDPR Audit and Virtual DPO will perform regular assessments within your organisation, generating risk profiles and also generating monthly to do lists to ensure compliance. GDPR Audit and Virtual DPO will assess the IT infrastructure and will generate compliance reports as well as generate internal policy documents and processes. 

Network threat assessment is a managed service tool that can regularly scan your internal and external network for threats and vulnerabilities and generate remediation reports, detailing what issues have been detected and recommendations on how to minimise the threats. Even if you do not feel that you need to demonstrate GDPR compliance, this tool will help minimise threats to your business and help ensure your data and systems are secure. 

Application assessment is a service that can identify applications that are running inside your business and determine if they are a risk to your business data. Do you know all of the applications that have been installed and are running? A lot of businesses do not truly know what applications their employees have installed or are running which means that data may be leaking from the organisation to locations outside of the business's control. Applications such as Dropbox, Box or WeTransfer can often seamlessly allow users to leak data, without the business knowing about it. 

User access controls are used to determine who has access to your data. This can be electronic or physical data such as paper files. Do the right people have access to the business data or is it a free for all? Remember that securing data also means filing cabinets, archive storage and access to certain parts of the building, as well as controlling who has access to data stored on the network. We can identify your electronic user access controls and also help with recommendations for physical access control measures. 

System health monitoring is a real time managed service tool that monitors the health and wellbeing of your business computer systems, ensuring they have up to date security solutions to protect against viruses, malware and ransomware, ensure your systems are running the latest security patches and are healthy in terms of operation.  

Security suite is a bundle of security products that protect your environment from threats such as viruses, malware and ransomware. Organisations are under increasing threats from various sources, such as email, web browsing or even external media such as CDs or USB sticks, so it is imperative to have protection. Ransomware in particular is very difficult to intercept and stop which is why we use our security suite to monitor each computer's behaviour and if a change, such as rapid reading and writing to the disk is detected, it is halted, and the computer rolls back to a known healthy state, preventing ransomware attacks. 

Encryption allows an organisation to protect data. One of the six principles of GDPR requires businesses to secure data. If you have data that is portable (for example on a laptop, USB stick or embedded in email) then it must be secured if includes personal or sensitive information and encryption is the best way to achieve this. We have all heard horror stories of laptops left in taxis, even if it is password protected, the data can be accessed in minutes if the device is not encrypted.  

Secure deletion allows an organisation to delete data so that it is no longer recoverable. One of the six principles of GDPR requires businesses to secure data and just deleting data doesn't secure it. Simple tools can be used to undelete data on a disk which is why a secure deletion tool is required to ensure that once data has been deleted, it stays deleted. There have been many cases where hard disks purchased from eBay have had data recovered from them, even after being formatted, this is why secure deletion tools should be used to ensure GDPR compliance. 

Call us on 01722 411999 to arrange a demonstration of each of the products & services we can offer to ensure your business is GDPR compliant