{"id":917656,"date":"2018-12-03T05:32:27","date_gmt":"2018-12-03T13:32:27","guid":{"rendered":"http:\/\/customerthink.com\/?p=917656"},"modified":"2018-12-03T05:32:27","modified_gmt":"2018-12-03T13:32:27","slug":"gdpr-extortion-protect-your-business-and-customers","status":"publish","type":"post","link":"https:\/\/customerthink.com\/gdpr-extortion-protect-your-business-and-customers\/","title":{"rendered":"GDPR Extortion: Protect Your Business and Customers"},"content":{"rendered":"

Remember what your email inbox looked like some months back, precisely the month of May? \u00a0For some time, some of my peers expected every email subject line in their inbox to begin with a \u201cupdates to (insert company name) privacy policy.\u201d<\/em> Maybe you felt that way too.<\/p>\n

While the Facebook\/Analytica scandal<\/a> caused widespread contention about data privacy, GDPR has caused its fair share of debates and issues as well.<\/p>\n

For example, a recent report by Europol<\/a> shows that the new data protection laws may worsen cyber extortion. But more on this later.<\/p>\n

Still, no matter the drawbacks or potential drawbacks, GDPR hopes to give customers more control of their data and help businesses control and collect customer data<\/a> effectively in a way that benefits both parties.<\/p>\n

GDPR extortion <\/strong><\/h2>\n

Even with the avalanche of emails you may think you received from businesses a week or two to the GDPR compliance deadline, you may be surprised to discover that not all companies today, at the time you\u2019re reading this are GDPR compliant. This is a great opportunity for cyber criminals.<\/p>\n

If they notice you\u2019re not compliant, they may hack into and steal your customers\u2019 data. Now GDPR compliance means businesses are supposed to notify customers and the general public of data breaches. Non-compliant companies may, for the fear of a fine from data protection authorities, negotiate with these cyber criminals to keep the breach and the company\u2019s non-compliance to GDPR a secret.<\/p>\n

The problem here is that such negotiations and subsequent payment of a ransom to cyber criminals will lead to further criminal activity. That is, you may be forced to keep paying a ransom for as long as the cyber criminal deems fit. Certainly not an appealing thought.<\/p>\n

Then again, data breaches can still occur on GDPR-compliant companies\u2019 data. That could attract a penalty from the Data Protection Authority too. So cyber criminals may try to make companies pay a ransom or hush fee in exchange for their silence and cover up.<\/p>\n

In both cases there are no guarantees the criminal will not ask for more money in future. And you can\u2019t be certain they\u2019ll stay true to their end of the deal and keep the data breach a secret.<\/p>\n

This is definitely a tight spot to be in. Fortunately, you don\u2019t have to find yourself in it.<\/p>\n

How to protect your business\/customers <\/strong><\/h2>\n

First, if it\u2019s any consolation, you may be exempt from an attack if you are GDPR compliant. So if you\u2019re not, you can take steps now to ensure you\u2019re compliant before you\u2019re discovered. But there are no guarantees you won\u2019t be attacked anyway.<\/p>\n

In case you\u2019re breached, always try to determine the scope of the breach, how it happened, and what you need to do to secure your software and hardware. Additionally, you may need to change passwords or lock credentials while investigating the breach. Sometimes these cyber attacks occur because of compromised passwords or credentials.<\/p>\n

Work hard to secure your data and all digital systems your business uses. If you have nobody on your team with the necessary skills, you may need to hire a cyber security expert in-house or as a contractor to help you out.<\/p>\n

Alternatively, and this is probably your best bet: You can adopt an IT management software that would help you oversee your entire cyber security mission from one organized platform. Tools like Cloud Management Suite can help you keep your software and hardware safe from harm.<\/p>\n

Their real-time security solution<\/a> enables you to secure your IT inventory and notifies you of any malicious activity in real time. This notification is accompanied by a \u201ckill process\u201d button that terminates said activity in a single click, thus ensuring maximum security for your IT assets with ease and preventing any malicious activity from making rounds online right under your nose.<\/p>\n

Remember, if you\u2019re thinking of negotiating with criminals just to avoid the GDPR fine, keep in mind that in the long run, the money you\u2019ll pay as ransom may eclipse the one-time amount you would have paid for GDPR fines. And if you\u2019re unable to meet with the demands of the cyber criminals, it can still bring unwanted exposure. In the end, you may find yourself paying money to a criminal or group of criminals, and then eventually paying the GDPR fine anyway.<\/p>\n

Customer security is essential for good customer experience<\/a>. Can you begin to imagine what your customers would do when they find out? In this age of social media, be sure that your infamy would spread like wildfire, causing a considerable number of your customers to lose their trust in you and boycott your business. So much for taking shortcuts!<\/p>\n

Future outlook <\/strong><\/h2>\n

It\u2019s fair to say that some businesses were already applying GDPR requirements long before it became mandatory to do so. Constant threat of data breaches and cyber attacks, dealings with savvy customers, and immense competition from other businesses makes it a prudent move.<\/p>\n

Hopefully more businesses will become GDPR compliant and not fall prey to cyber criminals. Regardless, whether you\u2019re compliant or not, secure your software and hardware. In the end, getting your customer data hacked into will have a tremendously negative impact on your business, whether you are GDPR compliant, or not.<\/p>\n

Handling your customers\u2019 private information is a trust. They\u2019re counting on you. Don\u2019t disappoint them.<\/p>\n","protected":false},"excerpt":{"rendered":"

Remember what your email inbox looked like some months back, precisely the month of May? \u00a0For some time, some of my peers expected every email subject line in their inbox to begin with a \u201cupdates to (insert company name) privacy policy.\u201d Maybe you felt that way too. While the Facebook\/Analytica scandal caused widespread contention about […]<\/p>\n","protected":false},"author":11119,"featured_media":898121,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[128,36],"tags":[],"_links":{"self":[{"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/posts\/917656"}],"collection":[{"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/users\/11119"}],"replies":[{"embeddable":true,"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/comments?post=917656"}],"version-history":[{"count":0,"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/posts\/917656\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/media\/898121"}],"wp:attachment":[{"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/media?parent=917656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/categories?post=917656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/customerthink.com\/wp-json\/wp\/v2\/tags?post=917656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}