Skip to main content

Data Privacy Week with Sugar Security and OkieTech!

 


Data Privacy week is here!

You have probably heard of data privacy, but why is there a whole week of it? Data Privacy Week was created as an international effort to empower individuals and encourage businesses to respect privacy, safeguard data, and enable trust.

Here are the 7 Principles that are recognized most:

Principle 1: Lawfulness, Fairness, transparency
Principle 2: Purpose Limitation
Principle 3: Data Minimization
Principle 4: Accuracy
Principle 5: Storage Limit
Principle 6: Integrity & Confidentiality (Security)
Principle 7: Accountability

We highly recommend checking out: Here
It's a great reminder to check in on how you're handling customer data and maybe see ways to better it! Data privacy has been getting more traction as we go further into tech and is a necessary step to ensure customer data is in the right hands. Not only that, your customers trust you with their data, so how are you staying up to date with all these changes?

Stay Informed with your state

We recently met with Oklahoma Representatives behind the 2022 Computer Data Privacy Act that should be moving forward on February 7th, 2022.  It's refreshing to see Oklahoma taking step towards this, and we loved what they proposed. If you're in Oklahoma, I highly recommend you give this bill a read: 
Here

 Find local tech scenes in your area -

One of the best decisions we made was finding a tech group here in Oklahoma City called OkieTech. It's a great way to see what other tech leaders are doing in different industries and learn from them. Not only that, it's an awesome way to join a tech community with techy individuals. If you're in or ever visiting Oklahoma City, Check out our friends at OkieTech! They usually host a monthly talk with drinks and food. It's a great place to learn something and meet awesome people in the tech business.

Check them out here: Website & Linkedin

Staying informed is one thing, but how do you know if your Data Security is up to Scratch? 

It's simple, Test it. 

All those changes you implemented and the security team trained are never really ready until it's put in action. This is why we recommend hiring a Red Team, this puts your team in a scenario where it's a simulated attack and is the best way to see how your defenses hold up. Afterward, they report on the vulnerabilities and recommendations on fixing them before a real scenario. These can be pricey and may be hard to obtain. But we're helping businesses, small to large, with their security posture without that big price tag. We're experts in the field and want to make this service obtainable by any sized business. Feel free to contact us with questions or inquiries, we would be happy to help! 



Comments

Popular posts from this blog

Sugar Security – Using Red Teams To Ensure Data Security

The issue with data privacy is not just a matter of users’ privacy but also to the business itself - A compromised customer database may cost you customers and future revenue. It’s a giant pain point for  both your customers and business alike.  Data breaches and privacy violations have become routine news, a great example being the Facebook/Cambridge Analytica debacle. The latter incident has raised a number of questions about how the social network handled the personal information of 50 million users. Suffice to say, there is a growing need to keep sensitive data safe. After all, this is not just about protecting your company's brand. At stake is the trust that customers place in organizations they engage with and entrust their private information to. By failing to protect their data, businesses can face penalties as well as lose customers. Data breach insurance, once considered a distant possibility, has now become an urgent priority for many businesses. Some companies...

Adapting from Pentesting to Real-Time Vulnerability Scanning

Organizations should make the upgrade from disjointed penetration tests and MSSP services to a centralized and real-time solution. In the first half of 2020,  27 billion data records were exposed , including personal information, login credentials, financial data, PHI health records, and more. Covid-19 added to this, with  Trend Micro finding 9 million Covid-19-related threats  between January to June 2020. Many cyber-criminals specifically target smaller businesses, which are seen as ‘low hanging fruit’ with fewer resources available to prevent a cyber-attack. When we look at the cyber-threat situation, it feels as if cybersecurity is out of control. Just as one vulnerability or entry point is closed, another opens. The SMB is always on the run, playing catch-up as cybercriminals forge ahead, innovating around cybercrime. But help is here. Real-Time Vulnerability Detection is a technique that is managed on behalf of an SMB, giving them the tools to turn the tables on cyb...

Red Teaming 101: the benefits of employing red teaming as a cybersecurity tactic.

Red teaming is a powerful cybersecurity tactic If you were a bank robber, which kind of banks would you rob? Probably not the bank with a 24-hour police presence on its premises. And most certainly not the banks with an army of armed guards, bollards, and security cameras at every entrance. In cybersecurity, we call that vulnerability analysis. It's where we ask ourselves: "If I were a cybercriminal, what would I attack?" The answer to that question is called the attack surface: the sum of all potential vulnerabilities in a system. Red teaming is the practice of using a "fake" attacker to test the security of a business. The attacker will attempt to gain entry into the company's confidential files and databases, using whatever means necessary. The goal of this exercise is to find any weaknesses in their system, which can then be fixed. The Sugar Security Suite uses these methods to determine how easy it would be for someone without authorization to access yo...