THE AGE OF IOT & DIGITAL BUSINESS YOU NEED PROTECTION?

BY 2020, MORE THAN SEVEN BILLION
PEOPLE AND BUSINESSES, AND AT
LEAST 30 BILLION DEVICES, WILL BE
CONNECTED TO THE INTERNET.

JORGE LOPEZ, VP & DISTINGUISHED ANALYST, GARTNER
www.betterfasterbigger.com

“Everything changes and nothing stands still.”
—Heraclitus

(business models, operational processes, customer experience)- Digital transformation

Why is it happening now?

IoT is an API for the real world.
A 5 -POINT DATA PROTECTION STRATEGYIf it was once acceptable for business to rely on primitive techniques to safeguard customer information, that day has surely past. Instead, companies today need a vigorous data protection strategy ― and one that meets the current need while responding to the growing customer expectations.Building such a strategy requires that:1. Storing unnecessary customer data should be viewed as a liability. That way, only the bare minimum of necessary data actually gets stored.2. Data breaches should be thought of as a sure thing rather than as an unlikely possibility. Breaches aren’t a matter of “if”, but of “when”. And when they do happen, just how will the organization respond?3. Business understand the implications of a data breach in terms of risk to be managed and risks incurred, such as regulatory penalties or loss of reputation, etc. As a result, they should be committed to protecting its Information assets as a normal part of corporate risk management.4. Processes and technology controls should be constantly adapted to changing risk paradigms.5. Organizations should enlist employees and partners to serve as a vital layer of defense.We’ve found that an information security and privacy strategy is more successful when it’s built from the ground up with input from a wide variety of stakeholders and updated on a periodic basis.Please feel free to share your experiences designing and implementing a realistic, workable data security and privacy plan.Photo by kevincole

- See more at: http://www.ciodashboard.com/information-strategy/the-era-of-security-breaches/#sthash.KyjZu0Uv.dpufThings with sensors, connectivity & logic that communicate with you, others & among themselves.


Comments