18.02.2016 | Ray Dzikiti | IT
The protection of information systems from theft or damage. Not just about data loss, it involves protection against loss of access to files, website defacement and loss of control of customer’s data.
Cyber crime is has increased as technology has advanced over the years. In order to tackle this danger the government is urging all companies to instil the proper procedures to protect themselves. As cybercrime has grown, the law has needed to develop in order to properly tackle cyber criminals. The Data Protection Act 1998 is quickly evolving in order to match this.
As businesses cannot always protect themselves against the more advanced cyber crimes, the government urges them to have a response plan in place in order to properly manage the data breach.
The stages involved in managing a data breach:
Please note that a response plan can minimise the chances of potential claims that can occur when data breaches occur within a company.
If after an audit by the Information Commissioner’s Office(ICO) it is found that a business did not have a method of securing themselves again cyber attacks or if their method was minimal this would open the business up to Civil Monetary penalties from the ICO, at the moment the penalties are up to £500,000 and is likely to increase in the future.