Protecting sensitive data is the end goal of almost all security measures. Data has moved outside of the traditional network perimeter with many organisations deploying their infrastructure to the cloud, and processing, storing and transmitting data via cloud applications. Data protection deals with the confidentiality, integrity and availability of data. This protection should be applied to both personal and corporate data to make sure that it is only accessible to those who have who have access privilege to it. The methods and extent of data protection varies depending on the type of data being protected, for instance unclassified data may require less protection than data types like highly confidential data.
The extent to which data privacy is regulated varies between countries. In Australia the Privacy Act 1988 (Privacy Act) regulates how personal information is handled, in addition The Notifiable Data Breaches (NDB) scheme is coming into effect on 22 February 2018, and requires breach disclosure. Other regulations such as the GDPR (General Data Protection Regulation) from the EU also has an effect on any organisations with business operations in the EU or processing, storing or transmitting the personal information of EU citizens.
Sensitive data is everywhere and organisations need people, processes and technologies to protect against the accidental or malicious loss of this data whether it is in use, at rest or in motion. Our Data protection capability looks at the following security controls: Transfer and Recovery, Encryption and Data Anonymization, Data Loss Prevention, and User and Data Analytics.
Encrypt sensitive data across on-premises, virtual, public cloud and hybrid environments.
The right tools will set you up for comprehensive logging and auditing capabilities to track access to encrypted data and keys.
Detect data access behaviors, stop data theft & loss and reduce risk with real-time user notifications and blocking.
Use file extension permissions, forwarding permissions and user & group based authentication to improve file sharing security.
Integrated incident workflow for faster incident resolution; active threat mitigation & data protection via integrations with DLP.
Be able to identify, isolate, remediate & report threats in line with new disclosure laws.
Opening in 2018 our new Security Operations Centre provides our analysts with access to the latest tech to keep your business safe.
Ensure all secured, sensitive data is rendered unreadable in the event destruction of data is required.
“Our first engagement with The Missing Link was for a full security review and penetration test throughout our entire environment. We used The Missing Link to identify what our risks and exposures were and what we needed to do to resolve those. The Missing Link came onsite to undertake that work. They were very consultative, dependable and accurate and they presented a roadmap for us going forward.”
Chief Information Officer, Gilbert + Tobin
We partner with over 100 leading-class vendors so you get the best solution for your business every time.
Alastair MacGibbon, Head of the Australian Cyber Security Ce...