Friday 25 August 2017

Shifts in Legislative Compliance and Its Impact to Enterprise IT

Dell EMC Tutorials and Materials, Dell EMC

The motivational saying “Keep Calm and Carry On” does not apply to enterprise IT professionals. Not anymore, unless they have their data protection and data risk management strategies worked out.

Enterprise IT is facing persistent challenges to protect their data and secure their data center against cyberattacks and ransomware. On top of operational challenges to ensure data recoverability and availability, they now need to keep abreast of the shifts in legislative compliance requirements globally and in their territories, as these legislations would impact their businesses. Legislation and compliance requirements are becoming more stringent to ensure businesses handle data responsibly. We have read of many incidents of data theft and ransomware that impeded businesses and brought public services to a halt. Enterprise IT therefore, needs to have a holistic approach to data protection and data risk management.

Dell EMC has commissioned a research project with IDC focusing on data risk management, to provide enterprise IT professionals with the latest regulatory compliance requirements and best practices to help them mitigate these risks. This research took the form of an InfoBrief and the focus is on data privacy and protection, specifically in Asia Pacific markets. It captures the main legislation that comes with punitive damage and provides organizations better understanding of the region’s patchy legislative framework.

The IDC Data Risk Management Barometer shows a ranking of the markets based on the severity of financial penalties for non-compliance.

Dell EMC Tutorials and Materials, Dell EMC

IDC has also highlighted 6 key actions in limiting data risk exposure:

◉ Ensure integrity of data and access to data, which are critical components of a robust data management practice
◉ Put in-place, well-defined responsibilities of both the data owner and data processor
◉ Ensure data recoverability from backup, which is going to become more critical over time
◉ Protect your business from cyberattacks or ransomware, leveraging on air-gap solutions with faster restore capabilities for business-critical functions
◉ Require Recovery Point and Recovery Time Objectives to be as near to zero as possible to keep business running
◉ Gain visibility into what and where data is located, in order to be secure, compliant and to be able to monetize data more effectively

How is the IDC Data Risk Management Barometer InfoBrief beneficial to enterprise IT?

◉ Understanding the legislation helps build the IT infrastructure for compliance, thereby helping businesses avoid breach of any legislation, which can result in potential monetary and reputation damages.
◉ It helps enterprise IT leaders in setting IT priorities and budget for compliant costs more accurately.
◉ Enterprise IT can be a catalyst in helping business units better manage their data in order to more effectively monetize data.