Expert Identity Management Commentary on Data Privacy Day

Expert Identity Management Commentary on Data Privacy Day

Today, the editors of Solutions Review proudly participate in Data Privacy Day. This international event focuses on raising awareness of protecting consumer privacy and personally identifiable information (PII). In fact, businesses of all sizes could stand to gain from the commentary and stories of National Data Privacy Day. 

Recently, identity and access management solution provider Ping Identity outlined why. First, 81 percent of consumers would stop engaging with a brand online after a data breach. Meanwhile, about 49 percent of respondents feel more concerned about data privacy than last year. 63 percent of consumers believe companies have the responsibility for protecting their data. More than half of consumers—55 percent—feel more negatively about businesses sharing their data without permission.

In other words, your enterprise needs to adapt to the new demands for data privacy or suffer. Therefore, we present the top commentary of the day from identity and access management experts and providers.

Expert Identity Management Commentary on Data Privacy Day 

Cindy Provin

Cindy Provin is Senior Vice President of Entrust Datacard and General Manager of nCipher Security.

“We as an industry need to do more than just live up to the mere letter of the law. Based on our research, 79 percent of Americans care how a company uses their private information. That means consumers want reassurances that their private data is not at risk.”

“It is the industry’s responsibility to build that trust by putting a comprehensive security strategy in place that leverages encryption and key management best practices. Then it’s up to the industry to educate consumers about how and why a company should earn their trust.”

Rui Lopes 

Rui Lopes is the Engineering and Technical Support Director at Panda Security

“Whether it’s for legitimate business purposes or for the next global cyber threat, data has never been more widely collected—or valuable, sparking the need for a seismic shift in how businesses and individuals protect their information. As Data Privacy Day 2020 approaches, it’s important for companies large and small to review their data-privacy policies to ensure that these valuable assets are secure.” 

“Businesses should use this day to ensure that they have visibility and control over how users and applications access data across each device on their network. Additionally, they should also review their own data-collecting policies for clients as well as employees to confirm proper security protocols are in place, and that they are in compliance with any applicable regulatory guidelines.”

Steve Durbin

Steve Durbin is the Managing Director of the Information Security Forum

“The requirement for maintaining data privacy has increased as privacy regulations have been adopted by many more jurisdictions since they were first introduced. Fines for breaching data privacy regulations have multiplied, and penalties can be more severe than fines. Increased public awareness and media interest have led to potential commercial and reputational consequences for non-compliance. The risk of private data being compromised has increased as systems are increasingly accessible via connected devices and vulnerable to cyber-attacks.”

“With all of the focus on breaches and the loss of personal data, it is understandable that the main attention for organizations today seems to have shifted to data privacy—after all, we are seeing a growth in legislative requirements to protect personal information along with the associated fines and sanctions for non-compliance.”

Joseph Carson

Joseph Carson is Chief Security Scientist at Thycotic

“Privacy, security, and trust must come as a package; they are all related and needed in order to build a cyber-resilient society. If you sacrifice privacy you are also sacrificing security and ultimately ends in a lack of trust.”

Heather Paunet

Heather Paunet is Vice President of Product Management at Untangle

“Data privacy has become a hot topic over the last few years, especially with the abundance of large-scale data breaches. It is important that organizations of all sizes take data privacy seriously and proactively ensure personally identifiable information (PII) is protected. Protecting data in the event of a breach is crucial to maintain the trust and respect of the public.” 

“Businesses can take some simple steps to protect the data they are collecting. Storing the private data on a network or server that is separate from the public, or even separate from the main corporate network, can provide an extra layer of protection. Encrypting the data, especially PII, is another standard practice to comply with a variety of regulations like PCI and HIPAA in the United States and GDPR in Europe. With GDPR and CCPA in full effect, data privacy and transparency are now more relevant than ever.” 

“Businesses must realize that the GDPR rules are not a hindrance, but a chance to show consumers that they can trust them and that they are taking a proactive approach to data privacy.”

Shahrokh Shahidzadeh 

Shahrokh Shahidzadeh is CEO at Acceptto

“Today, everyone must assume that each and every one of their credentials have already been stolen. This includes those credentials that haven’t even been created yet.”

“Due to the frequency of data breaches, we all must operate under the assumption that it’s only a matter of time that we become aware of the fact that our credentials and personal information are compromised.”

Auth0

Auth0 provides a platform for multifactor authentication, single sign-on, and password control. It shares this checklist for privacy protection.     

  • Be ready to meet compliance standards

Whether CCPA, GDPR or the next big thing, keeping your data safe and your enterprise compliant will not be an option. Make sure compliance is worked into your overall protection strategy.

  • Integrate social logins

Be ready to integrate social logins to make signing into apps safer and users happy.

  • Centralize identity

Streamline your identity program and allow each department to customize its look and feel – eliminating the challenges that come with out-of-the-box solutions.

  • Two-factor authentication is a must

A password is the first layer of protection, but it shouldn’t be the last. 2Fa can be added to include an extra layer of security for consumers.

  • Stay on top of the latest security lapses

Going back to basics – knowledge is power. Make sure you are always aware of the latest security issues and what needs to be done to patch them.

How to Learn More About Data Privacy

Thanks to the Identity Management Experts for their thoughts on data privacy. Also, to learn more, be sure to check out our Identity Management Buyer’s Guide.   

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner