Tag: GDPR

  • The latest cloud computing trends in 2019

    The latest cloud computing trends in 2019

    It’s 2019, and the Cloud is everywhere—from the apps we use every day to the infrastructure of global tech giants.

    According to researchers at Gartner, revenue generated from public cloud services is projected to grow 17.5 percent in 2019. This amounts to a total of $214.3 billion, up from $182.4 billion in 2018.

    More than a third of organizations surveyed by Gartner saw cloud investments as a top three investment priority. With this kind of growth, tech organizations are racing to get on board with cloud-only software and platforms.

    Here are some of the trends to look out for this year:

    Hybrid Cloud, Multi-Cloud and Mergers

    IBM announced its purchase of Red Hat last October, calling it the “most significant tech acquisition of 2018.” This combined Red Hat’s extensive network of open-source clouds with IBM’s Hybrid Cloud team.

    Mergers like these are likely to become a trend this year, as companies see the benefit of using multiple clouds across all sectors of their organization.

    Furthermore, this system will dominate in the future, as businesses find public clouds inadequate to meet every one of their requirements.

    As a more flexible and functional solution, many organizations will shift to a network of multiple private, public and hybrid clouds in the future.

    Serverless Cloud

    Serverless computing is a young market in technology, but it will continue growing in 2019. It isn’t actually “serverless.” Instead, it is a cloud-computing model in which the cloud provider itself runs the server on a dynamic, as-used basis (FaaS).

    Rather than buying server space, developers can use a back-end cloud service to code. They will only then pay for the server space they actually use.

    As this relatively new technology develops, we can expect to see more companies providing and expanding their “serverless” offerings.

    Artificial Intelligence

    Although cloud technologies are growing exponentially, artificial intelligence (AI) could prove an even greater economic driving force. According to Accenture, the impact of AI could double economic growth rates by 2035 in developed countries. 

    Around 80 percent of large companies have adopted some form of AI, according to the Harvard Business Review.

    Amazon, Twilio and Nvidia, to name a few, are thus, incorporating AI with cloud computing, next-gen GPUs and the Internet of Things (IoT). This has led to the developing of applications with “smart assistants,” and voice-to-text technologies.

    Such a combination of AI and the cloud provides an extremely powerful and unconstrained computing network.

    Security

    Digital transformation is already underway, with Gartner also projecting that 83 percent of all workloads will shift to the cloud by 2020. However, this movement presents issues of cybersecurity.

    Many businesses have not properly secured their cloud-stored data. For example, marketing and data aggregation firm Exactis left around 340 million records exposed on its cloud servers. This was uncovered in a data breach last year.

    Mitigating factors

    The implementation of the General Data Practice Regulations (GDPR) makes this even trickier. It affects cloud security, and IT companies will likely struggle to comply with these new laws while protecting sensitive information.

    Cloud computing services are progressing exponentially, as are their new developments. The year 2019 will surely be filled with businesses pouring investment into enterprise solutions. This while expanding, securing, and implementing cloud technologies to their fullest extent.

    Bridget is a freelance writer and editor, and the founder of Lost Bridge Blog, where she writes about traveling as a Millennial woman on a budget. When not writing, you can find her traveling, drinking inhuman amounts of caffeine and scrolling through the latest tech & political news.
    N26 Bank
  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.

    The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.

    Data breach incidents

    In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.

    These were followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).  

    Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked? 

    The digital intrusion gets even more sophisticated...

    This time affecting the very wealthy:  private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    Data security 

    On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.

    It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.

    Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.

    Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.

    A solution

    Zortrex400x400

    The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.

    Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex. 

    The law on data

    Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.

    “Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.

    Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.  

    The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.

    We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data. 

    “However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.

    Using Blockchain

    The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.

    A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.

    A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They,  in turn, will communicate with the legal sector or public health institutions (NHS).

    Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which could replace some lawyers) can spark off legal aid assistance to you.

    Your court cases will be heard quicker and be more efficient.  Protection registers can also be guarded using tokenization – rendering them more secure.

    Blockchain technology offers quality assurance making sure that no shortcuts are taken.

    This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.

    Zortrex wants to use its technology to put the hackers out of business! 

    Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.

    Scalability

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.

    The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.

    Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.

    The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.

    In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the type of work they engage in is considered groundbreaking – and one with the potential to have a massively, positive impact on our livelihoods, it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’ nor that it is cutting-edge/fascinating and therefore must be an excellent product – it actually has a value proposition for everyday people!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers and its fragility when used and abused by unscrupulous third-parties for their financial gain, the issue of data security is quite a serious issue – we must just pay attention to the news to become even more aware.

    In Europe, the where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked – with several hundreds of thousands of customers’ personal data compromised. This was followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked, leaving vulnerable passengers terrified and stuck high up in the air – probably to the amusement of the pranksters (hackers).  We all know about driverless buses and cars coming to the market soon.

    Can you imagine the chaos and commotion that would be caused if their control systems were to be hacked?  The hacks get even more sophisticated: this time, affecting the very wealthy –  private yachts are being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    On the issue of data security (with almost full anonymity); we have also heard about extra protection (and not just anti-virus and anti-phishing software) but the more secure and heavily encrypted Blockchain technology that is making waves in the digital sphere. Mainly for the escalation of its once shining star by-product designed for discreet transacting – the Bitcoin.

    It has also triggered several other technologies based on its digital cryptology technology to ensure that information is kept safe from prying eyes while stored, used or transferred online.

    Zortrex400x400The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization – and will be using it to initially ensure that highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details, instead the hackers ran off with the date of birth, passport numbers, financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    “Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.”

    The establishment of this start-up company was due to Brown’s background in data privacy systems as well as her devoted passion for the protection of PII and financial/healthcare data.  In her view, companies have disrespected their customer data for over 25 years, and if left unattended, there will be nothing left to protect.

    Thanks to new laws like the European GDPR law which is now imposing the data protection; data breaches and abuse of customer data is now met with hefty financial penalties. Companies now think twice about consent and how to use and share customer’s data digitally – but is it enough? The simple answer is a no.  The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches – yet.

    “We have ingeniously invented systems that automatically align with financial messaging, payments and securing information, all of which require data. However, we should and need to go a step further to secure all the PII details with tokenisation so that in the event of a hack, the cookies and trackers will only be following a useless token as there is no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenise all healthcare data so that vulnerable people living outside of major cities can also feel assured that their privacy is protected. In a previous blog, we wrote about the new Internet of things (IoT). For all those devices being built for it, their IP addresses and the serial numbers can be tokenised to avoid the terrifying thought of the whole Internet being compromised.

    N26_banner-160x600-EN

    The application of the all-powerful Blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with customer data – especially the most sensitive ones.

    An angel investor or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope!

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector and a tokenised supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would enable the police to “talk” to the prison service,  who in turn, will communicate with the legal sector and public health institutions such as the UK’s NHS.

    Forensic evidence would in such instances be tokenised and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which are touted to replace lawyers) can spark off legal aid assistance, so that court cases can be heard quicker, more efficient than currently pertains.  Protection registers can also be protected with tokenisation rendering it more secure.

    Blockchain technology offers quality assurance with every process being undertaken making sure that no shortcuts happen; as the smart contracts trigger any possible malfeasance. This will enable the monitoring/tracking of any data sharing to third parties once it is tokenised. The third party apps would only gain access to the data once the trigger has been activated.

    The company will be providing numerous business blockchain platforms; Asset Chain, Supply Chain, Accountancy Chain, Debt Chain, Life Cycle Management Chain, Outsourced Worker Chain; the list is endless, and all will be adequately secured.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenised, might seem farfetched – but may we remind you of the need for data protection taking into consideration the growth rate of massive data breaches.

    Zortrex is aiming high and wants to use their technology to put the hackers out of business!  Tokenisation cannot be mathematically reversed and thus it will least it will stop the hackers for a while.

    Brown explains further that as they move with their education; other information can be added on to the token, as with all their healthcare; any allergies tokenised; what injections they have had right through their life cycle until the day no more data can be tokenised.

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability – which in tech terms, is the ability of a network or software to grow and manage increased demand.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, has massive scalability issues. The growth in demand for DApps is crippling those systems and they are having to investigate the incorporation of alternative technologies, upgrade or split their platforms and accompanying cryptocurrencies to cope with such high demand.

    Someone must take the first step in securing this data forever. Citizens should be able to purchase what they want without being harassed by trackers and cookies. The need for tokenisation is endless and further, down the line, celebrities and government official’s PII can also be secured to protect them from damaging schemes, ‘bad press’ and scandals.

    In another previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Get more organised digitally!

    Get more organised digitally!

    We often hear the phrase “technology is your friend” To what extent this friendliness is, to help you to cope with your daily activities or business plans depends on how you embrace it.

    Life can be chaotic. Which so much to do it is easy to frequently miss important appointments. Delays often come from having to wait till you get to a PC to respond or not remembering contact details. The worst is having to ask someone repeatedly for their number or business cards.


    If you often experience that, you are getting it all wrong and definitely need this friend!

    The need for emails

    Emails are on a progressive, disruptive path to eliminate postal services. They even facilitate and encourage the acceptance of digitally signed documents.
    Most financial companies and legal institutions in many developed countries already accept digitally signed documents.

    Your digital signature confirms that the information originated from you and has not been altered through encryption. This makes it legally binding.

    Naturally, you need special software or Adobe Sign, to digitally sign and attach as a PDF to an email.

    N26_banner-160x600-EN

    Thanks to emails, we can now also easily store and get in touch with our contacts. It could be in the office, lounging around a park, watching your children play; even onboard/at the underground train station.

    Additional email tools

    Calendar and contacts syncing is a simple tool which is not offered entirely by all domain host providers. It works wonders along with your calendar and scheduler.


    If you need a simple CRM tool to just help with email contacts and plug into an existing sales app, you can do so with a useful add-on like Outlook Customer Manager.


    There are certainly advantages of decluttering your emails. This helps to alleviate the frustration of unimportant mails getting in the way of the ones you need to access frequently. For that, there is a clutter service offered by Office 365.


    Additionally, to avoid retaining important attachments, and clogging up space on your mailbox, you can with a click, save large file attachments directly to your cloud storage.


    With all that relevance of emails, it is critical that you source the best one – even if it costs a bit more than the (free) webmail services provided by Outlook (Hotmail), Gmail and Yahoo.


    Naturally, with a paid service, you will almost be freed from the scourge of spam and malicious items embedded in documents. In some cases, they are screened even before landing in your mailbox.

    More advanced features


    Other perks like a ‘catch-all service’, data loss prevention, in place-hold (compliance features), and advanced threat protection. You can add them as essential services to give you an even more peaceful emailing experience.


    You can, for instance, use In-Place Hold (Litigation Hold) to place user mailboxes ‘on hold’ and preserve mailbox items permanently.

    This feature is especially crucial for those in the financial and legal sectors – requiring emails and its contents to be preserved for a minimum of seven years typically. Security is the central factor that has kept the postal service in business – well at least for now.

    Your checklist when shopping for a good email solution:

    • A decent-sized mailbox – with archiving ability – 50GB is the new standard size (don’t get short-changed!).


    • Should allow you to sync emails, calendars, and contacts onto multiple devices – and it must always work!


    SMTP is now the standard and preferred Email protocol. If you are still on POP3 or even IMAP – run away!


    • Customizable domain (a .com or .net or any other you have bought), with the option to add more domains and email aliases. (info@ …sales@ etc).


    • Sync to an active directory – to keep your user-profile and allow for ease of single sign-on or extra security features like two-factor authentication. (Prevents unauthorized people from accessing your emails by pairing to your phone via an SMS code).


    • Your mailbox (since you are storing contact details or using it along with a CRM or ERP solution) must be GDPR-compatible.

    Final thoughts

    Finally, a good email hosting service should provide the ability to add innovative features in the future. These include extra archiving space, advanced threat protection, and enterprise voicemail. These are characteristics of a good email solution.

    Preparing to use an email solution can be effortless if you have the time. Most software suppliers like Microsoft (Office 365), have support sites with primary training material and “how-tos”.

    Check out Microsoft’s Support page to upskill your Office, email, and overall cloud-software aptitude.

  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

  • Already GDPR-ed Out?

    Already GDPR-ed Out?

    Well, it didn’t take long. Less than a full week in fact, for the first GDPR-related court cases to surface against social tech giants Facebook and Google.

    It was as if lawyers were just waiting to pounce on them for their apparent failure to protect our rights as online users. This pertains specifically to issues relating to data privacy and the sharing of private details mainly with third-party marketers.


    How Facebook stores and shares your data has been clarified by several intense inquiries in the US and recently in Europe. This is where the law is set to benefit users of the social media platform in that geospatial area of the world.


    The said lawsuit, however, focuses on the opt-out clause that forces you to make a choice to comply or leave. The claimant is a privacy campaigner. He has made the Billion-Euro complaint on behalf of several users; seemingly a challenge to Facebook.


    Additionally, he has launched a separate suit against Google, accusing them of “pressurizing” users into accepting their data collection policies.
    This ‘comply and accept or get thrown out’ clause could leave you without your routine dose of social media consumption. Such a clause is thus deemed unfair.


    It could cost Facebook a lot if they get their way based on the terms stipulated in the new law. The social media giant could be fined up to a few billion or a sizeable fraction of their earnings in punitive damages.

    The aim of the new law

    The passing of the new regulation on May 25th, 2018, better known as the General Data Protection Regulation {GDPR} has been a long time coming.


    Despite the warnings of the “kick-in” of the regulation, many are unprepared for it. Some of the reactions to the law include confusion, anxiety by both large and small firms alike, and plain comical hysteria!


    Non-compliance now carries heavy fines and penalties, up to 20 million euros for anyone operating within the EU borders.

    So, what then, is the big fuss about GDPR?


    Well, it boils down to a right that has since the launch of the Internet to the mainstream, been waivered and overlooked. Gaining CONSENT to use your data for anything other than the reason you went public on the Internet is very crucial.


    This has become a contentious issue as many companies have over the years, unscrupulously benefited from data acquired (mined) – without your consent. Facebook only brought this into the spotlight recently.

    You can read more about data mining here

    Ad: Web, Network & App Scanner

    Who needs compliance?

    If you hold a folder, database of clients whether online or on your internal server, you would have to comply with the rules which stipulate full disclosure. This includes who you share your details with, and how the information is tracked, shared, and kept secure.


    Furthermore, research in March this year showed that only 39% of the Fortune 500 companies in the UK and 47% had GDPR compliance taskforces.


    Another UK firm commissioned study found that our buying behaviours are heavily influenced by we perceive our data is being handled by companies.

    The consent given to use your basic information cannot be taken for granted – even in the medical environment.

    German doctors’ practices, in the wake of GDPR, are manually making you sign consent forms. Doctors are now required to fully disclose who they share your contact information with.

    How to be compliant

    There are simple ways you can stay GDPR compliant. One method is to adopt an attitude of embracing it rather than just complying with it. You can be transparent with your customers by doing the following:

    Add a cookie bar to your website. You can also add a clause/paragraph to that effect (website disclaimer) in your ‘About Us’ section.


    Similarly, you must state clearly on any opt-in forms. Newsletters and any forms where their data is collected, used, and passed onto other third-parties must be announced. State clearly who they are and which data they have access to.


    You then need to give your customer the option to select what they want to share. Even if such data may not be necessary for them to receive services from you.


    Constantly review your relationships with third-party affiliates and partners to ensure that they are also complying with the law.
    They could be jeopardizing your data compliance efforts – as Cambridge Analytica did with Facebook.

    The last and most challenging step requires the action of what is promised above. This means an upgrade of your internal software to include security/encryption.

    GDPR compliant software

    You can obtain full compliance by using a GDPR-compliant package like Office 365 Enterprise E3. This package has email software specially designed for those of you dealing with sensitive client’s data that need to be kept for long periods.  Litigation hold, heavy archiving features; as well as basic email encryption are all included.


    You can add supplementary encryption software such as Azure Information Protection as an extra layer of security. This helps you to safeguard emails and stored data from being lost, compromised, or accidentally shared.


    All said and done it is likely that if you are a bigger firm, you would either need to create the position of a data security officer internally. If your lawyers are not up to date with digital laws, however, you can simply outsource the service.

    This should help make you become fully compliant thereby having to avoid issues with the data compliance authority altogether.
  • Life hacks using tech

    Life hacks using tech

    We often do things out of routine without considering if there is an easier way to achieve the same result quicker and even more effectively. In a larger company or organization, this is the job of the business analyst.

    What if we applied this to other daily activities and tasks that shape the way we live?

    This would give us more time to partake in the things we love.
    It’s hard enough for most working-class adults to spend most of their days in the week behind a PC. This is usually followed by hours behind the wheel in traffic or commuting via public transportation.
    This makes the task of going shopping or even attending a doctor’s check-up after an 8-hour work stint more of a burden or chore. Worse over if you must queue further to get the service.


    This very example came to mind when a relative complained about having to go from one doctor to another. When referred to a specialist they had to then book another appointment by calling that specialist’s practice.


    Now granted, this is basically a ´first world problem’. Because having a specialist attend to a back problem after your doctor recommends it during an initial check-up is a luxury. One that third world citizens could only dream of having in the first place!

    Problem-solving scenario

    So, in the case of the referral to a specialist, a simple unified medical system can resolve this. A CRM database linking all the medical practitioners including their schedules can save you the time taken to arrange the new appointment.
    This system would also have a secure high-tech scanning and attachment add-on so that X-rays, scans, diagnoses and the attending doctor’s notes can be attached. All for the attention of the specialist.
    The times for the new appointment can be chosen quickly while the patient is at the doctor’s practice.  When convenient, you could then go to the specialist directly.

    The concept explained

    This is one very basic and rudimentary example of how an automated, centralized software solution can help schedule appointments.
    To achieve maximum optimization the system would clearly require several tests before implementation.

    Too often systems analysts and developers do not consider the end users. The user experience (UX) is the most crucial aspect of software development and should be the first step in building an automated system or it will never achieve its purpose.

    It doesn’t have to be used as a national health solution. This is because centrally planned systems, as mentioned in a previous blog, can lead to inefficiencies.
    It would need to be localized in order to make the system easier to maintain and be updated with contact details.  This especially when information can change on a weekly or monthly basis.


    Naturally, and for decades, health insurance companies have utilized card systems to document patient visits to practitioners. This also helps you and practice to easily claim back medical costs.


    But this only serves a singular function and is laborious to run. What is being proposed in this blog post is something to resolve this in a more secure and decentralized manner.

    Application and security

    Cloud security has become a huge requirement and will be a necessity for all businesses and services in the very near future. Europe, for instance, is implementing compliance laws for storage of data under its new GDPR regulation.


    Countries like Sweden also have similar compliance laws to handle financial (with a lot of banking going mobile) and medical data stored in the cloud.


    So, security would become less of a concern for businesses when it comes to data storage and automated CRM systems in the future.

    Shopping and housing convenience

    smart-home-3096219_640

    The burden of shopping can also be alleviated with initiatives such as cashless processes. We first saw this introduced in Asia (China) and now adopted in the West through Amazon’s new cashless´ and cashier-less grocery stores.


    While shoplifters might not see the innovation in this ‘new method’ of shopping; it saves you time spent queueing to pay and will invariably help resolve the scourge of shoplifting.


    It will, however, require more reliance on technology for surveillance, to monitor and track the scanning of the goods and keep a database of records on a server.


    This helps you with the inventory management and other back-office processes and is managed by an automated ERP solution (and not a person).
    We are still waiting for massive roll-outs of the so-called smart houses equipped with smart chips that help regulate temperature, turn off energy-consuming devices when not in use.


    Some are even equipped with fridges that remind you when food is expiring or simply needs to be replaced.


    Designing such systems would naturally require careful observation into the various steps needed to reach the desired result. Details in every step from how you go from point A (selecting a product); to point Z.


    Point Z being you walking out of the shop with a fully paid item. All without using cash or the need for a cashier.

    Tweaking the solution

    The system analyst’s job would be to engage or even simulate the processes using different test subjects and not just the best practice.
    There is the possibility that you might forget to pay for the milk after checking out of a security area. That could result in an embarrassing scenario for all.


    These are just two examples of countless scenarios that can help us benefit from the use of automation and AI.
    There are many other subtle examples such as in the motor industry. This includes the use of computers to diagnose a ‘sick car’.


    There can be a solution for every bottlenecking problem. Addressing this is now has become a new field of study. Computerization and the use of robotics to handle manual labour and repetitive blue-collar jobs will be new highly lucrative career paths.

    Many new start-ups already exist purely to develop system automation.

    Welcome to the future!

     

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.