July 12, 2017 By Larry Loeb 2 min read

Recent research revealed a startling gap in security awareness among U.S. business leaders. According to an NTT Security report, “Business Security: Always a Journey, Never a Destination,” three-quarters of non-IT leaders at U.S. firms believe that the European Union’s (EU) upcoming General Data Protection Regulation (GDPR) does not apply to them.

But the problem is not confined to the U.S. The study found that business leaders in Hong Kong (29 percent), Australia (26 percent) and Singapore (33 percent) also lacked awareness of the law and its impact on any organization that houses data collected from EU subjects.

The study involved workers in the U.S., U.K., Germany, Austria, Switzerland, France, Sweden, Norway, Hong Kong, Australia and Singapore. Thirty-five percent of the respondents were C-level executives.

Lack of Awareness Stymies GDPR Preparedness

The GDPR will kick in on May 25, 2018. The regulation will govern how organizations handle data breaches and store personally identifiable information (PII). For example, data cannot be exported from the EU without special handling or transmitted to a third party without explicit user consent.

To comply with the GDPR, a company must know where its data is being stored and who can access it. Unfortunately, the NTT Security study found that one-third of employees had no idea where data resides, and pointed to the need for immediate training on the subject. Of the two-thirds of employees who knew where data was stored, less than half understood how the regulation would affect it.

“While the GDPR is a European data protection initiative, the impact will be felt right across the world for anyone who collects or retains personally identifiable data from any individual in Europe,” said Garry Sidaway, senior vice president at NTT Security, in a news release. “Our report clearly indicates that a significant number do not yet have it on their radar or are ignoring it.”

Incident Response Adjustments

Security leaders must also make adjustments to their incident response strategies to maintain compliance with the GDPR. In the event of a data breach, for example, the regulation requires security teams to report the incident to the appropriate EU regulator within 72 hours, SecurityWeek reported.

An incident response plan, which was fully understood by less than half of the survey’s respondents, extends far beyond the IT and security departments. Each part of the business must know its responsibilities and how to deal with them should a security event arise, or risk facing the consequences of the GDPR.

More from

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today