Zoho Introduces Team Pipelines In Bigin

Posted in Commentary with tags on January 31, 2023 by itnerd

Zoho Corporation, a leading global technology company, is today unveiling the latest version of Bigin, the company’s CRM solution for small businesses.  As the preferred CRM solution for small businesses, Bigin offers a simple yet powerful CRM  without the high barrier of entry and cost. Today’s product updates further support small and micro businesses by providing users the tools and insights they need to maintain and grow meaningful and high-value relationships with customers in a challenging economic environment. 

Since Bigin’s launch in 2020, it has stood out as a robust, easy-to-use, and welcoming CRM solution thanks to its 30-minute set up promise. Zoho has observed that around 65% of Bigin’s customers have never used a CRM previously, making it the ideal choice for business owners who are looking to move away from spreadsheets. When they outgrow Bigin, Zoho also offers them an easy migration to Zoho’s full-fledged CRM solution. Bigin now boasts 20K customers and continues to help small and micro businesses manage all of their customer-facing operations within a unified platform. 

Bigin’s latest version includes the introduction of Team Pipelines, which allow customer-facing teams to manage their distinctive operations using a distinct set of pipelines and sub-pipelines within a single Bigin account. Competitive offerings often cater only to a single function — like sales — whereas Bigin is an efficient solution for all customer-facing teams. New features compile customer operations into one place, and enable tighter alignment and collaboration between individuals and teams without compromising the simplicity that makes Bigin stand out. 

Key Product Updates

  • Team Pipelines: The most significant addition to Bigin, Team Pipelines brings together various customer operations into a single 360-degree view. Businesses can connect key customer processes such as deal management, onboarding, delivery, training, ticket management, refund requests, customer testimonials, etc. thereby ensuring small businesses manage their day-to-day processes in an easier way. Businesses can now enjoy a complete CRM that goes beyond sales management and offers them a single source of truth when it comes to analyzing customer data. 
  • Connected Pipelines: Alongside Team Pipelines, Bigin introduced a new way of connecting customer records across different processes. With Connected Pipelines, businesses can automate the movement of customer data across various pipelines, enabling them to deliver seamless end-to-end customer experiences. For example, once a deal is won, sales teams can automate the creation of a connected record in the customer onboarding pipeline. This way, businesses spend less time entering repetitive customer information and have more time to focus on actual customer conversations. 
  • ToppingsAdditional functionalities and third-party integrations can be added on-demand to address business needs that go beyond the standard offering. For example, the ‘Email-In’ topping ensures emails sent to different email aliases in an organization are automatically mapped to the relevant customer records in each pipeline. Similarly, the ‘File Cabinet’ topping automates the process of file collection where customers can manage all their documents through unique, secure links.
  • Mobile Capabilities: In response to the increased adoption of Bigin’s mobile app, Zoho is ensuring all new features are available across iOS, iPadOS, Android, and macOS. This makes for seamless employee experiences and is further enhanced with a new Dynamic Display which helps users customize the look, style, and visibility of records in their pipelines. Bigin also recently updated its apps for the Apple’s iOS16 and Samsung Galaxy Z Fold 4 launches, where it was an exclusive launch partner. 
  • Developer Center: Bigin now opens its developer platform to a network of global app developers and partners who are looking to create custom solutions for unique business needs. With various developer tools and components like custom fields, buttons, links, widgets, related lists, and REST APIs, developers can create new Toppings which can be monetized in the Bigin Marketplace. 

Pricing

Bigin by Zoho CRM starts at CAD $9/user/month (billed annually) for the Express edition and goes up to CAD $15/user/month (billed annually) for the Premier edition. There is also a free edition available.

Horizon3.ai Publishes POC & Deep Dive For VMware vRealize Log Insight RCE

Posted in Commentary with tags on January 31, 2023 by itnerd

Horizon3.ai has just published “VMware vRealize Log Insight VMSA-2023-0001 Technical Deep Dive” on the new CVEs affecting VMware vRealize Log Insight, which were reported by ZDI. 

Three of these CVEs can be combined to give an attacker remote code execution as root, and the vulnerability is exploitable in the default configuration for VMware vRealize Log Insight. The Horizon3.ai team has successfully reproduced the exploit and would like to provide the technical details about how this vulnerability works. The team’s POC can be found on GitHub.

VMware vRealize Log Insight is used across enterprises to collect logs and provide analytics. This vulnerability poses moderate risk to organizations, allowing attackers initial access, if exposed to the internet, and the ability for lateral movement with any stored credentials. The Horizon3.ai Attack Team has published the data so users can determine if they have been compromised. 

Horizon3.ai Exploit Developer James Horseman noted when issuing indicators of compromise: “This vulnerability is easy to exploit, however, it requires the attacker to have some infrastructure setup to serve malicious payloads. Additionally, since this product is unlikely to be exposed to the internet, the attacker likely has already established a foothold somewhere else on the network. 

   “This vulnerability allows for remote code execution as root, essentially giving an attacker complete control over the system. If a user determines they have been compromised, additional investigation is required to determine any damage an attacker has done.”

VMware has released an advisory and patches and workarounds for these vulnerabilities and the team urges all VMware users to heed the VMWare advisory and patch or apply the workaround immediately.

New Survey from Intuit Shows How Gen Z Is Redefining Personal Finance

Posted in Commentary with tags on January 31, 2023 by itnerd

Generation Z, the first generation of digital natives who are more than twice as likely to compare themselves to others on social media, feel like they are falling behind their peers financially, according to a new survey by Intuit, the global financial technology platform that makes TurboTaxCredit KarmaQuickBooks and Mailchimp

Just as heavily doctored images of beauty on Instagram contribute to insecurities, ‘filtered finances’ are having a massive impact on 18 to 25-year-olds. Increasingly, honest conversations around formerly taboo subjects are the norm. But new data shows that Gen Z’ers would rather talk about politics, parenting struggles, sex and infertility than debt, their salaries and bad investments. In fact, despite their modern lives, they are part of the 55% of Canadians who would rather talk to their children about sex than speak to them about their own finances.

Survey data also identified a new trend: “soft saving” —the financial spinoff of the boundary-setting ‘soft life’ trend focused on comfort and minimizing stress. Currently taking over TikTok feeds, this philosophy extends to money. A stark departure from the F.I.R.E. (Financial Independence, Retire Early) movement, hustle culture and the Girlboss ethos dominating the past decade, Gen Z is embracing “soft saving.”  Three in four Gen Z’ers say they would rather have a better quality of life than extra money in the bank. In fact, experiences matter more than money to Gen Z, as  68% say they are only interested in finances as a means to support their current interests.

Gen Z has more access to financial information than any other generation, but this doesn’t always translate into decision-making. From financial tips on TikTok to Reddit forums on investing, the survey illustrates that Gen Z is frequently paralyzed by conflicting advice and could benefit from new ways to save:

  • Nearly three in four say they know how to make a budget and track their income, but haven’t done it (74%).
  • Nearly three in four know it’s important to invest, but they don’t know how (73%).
  • 65% say they have financial knowledge, but are unsure how to use it.
  • Nearly half bought cryptocurrency even though they don’t fully understand blockchain (49%).
  • Two-thirds say they’re not sure they’ll ever have enough money to retire (64%).

Additional Canadian survey findings include: 

  • Quality of life is being held hostage by poor finances, especially for Gen Z, the generation that values quality of life the most. 62% of Gen Z feel like they will never have the things they want in life because of their financial situation.
  • 59% of Canadians feel anxious going with friends to restaurants and bars they know they can’t afford (70% for Gen Z).
  • 53% of Canadians say giving a gift for a special occasion would put a strain on their monthly finances (67% for Gen Z).
  • Nearly half of Canadians (45%) say they have spent less time with friends or family due to financial constraints (56% for Gen Z).

*Statistics from 2022 Intuit survey of 1,500 Canadian consumers ages 18+. Gen Z is three times as likely to compare themselves to others on social media(30% vs. 10% Canadian general population).

Survey Methodology

The Intuit Prosperity Index Survey was conducted Dec. 2‑Dec. 9, 2022, via a 15‑minute online questionnaire. Intuit surveyed 1,500 Canadians ages 18+ plus an additional oversample of Gen Z (ages 18-25) in order to discover current attitudes around money and personal finance.

New Credential Phishing Attack Targeting 10,000 Inboxes Disguised As DocuSign To Exfiltrate Personal Credentials

Posted in Commentary with tags on January 31, 2023 by itnerd

Armorblox has released its latest research analyzing a credential phishing attack that impersonated the well-known brand, DocuSign, intending to exfiltrate sensitive login credentials.

These emails targeted more than 10,000 end users across multiple organizations and various industries counting on the trust and legitimacy people have in the company.

How it works: In this attack, victims receive an email from what appears to be from DocuSign. 

Attackers instilled a sense of urgency within the body of the email attack to encourage victims to open the new document for review and approval. When clicked, victims were navigated to a fake landing page designed to impersonate a Proofpoint Storage application login.

You can read the research here.

DH2i Awarded 2022 TMCnet Zero Trust Security Excellence Award

Posted in Commentary with tags on January 31, 2023 by itnerd

DH2i, the world’s leading provider of always-secure and always-on IT infrastructure solutions, today announced that TMC, a global, integrated media company, has named DxOdyssey as a 2022 TMCnet Zero Trust Security Excellence winner presented by TMCnet

The TMCnet Zero Trust Security Excellence Award recognizes the leaders and pioneers in the industry with the best and the brightest providers, offering the most innovative, effective solutions. DxOdyssey (DxO) software was honored for its ability to enable its users to create a direct connect Software-Defined Perimeter (SDP) with application-level Zero Trust Network Access (ZTNA) tunnels. With DxOdyssey users don’t need to trust an outside vendor with their data because DxOdyssey is never “in the middle” of the data stream. DxOdyssey gives servers, storage, applications, IoT devices and users direct access to the data endpoints they need — no more, no less. Deploying DxO:

  • Eliminates lateral network attacks
  • Improves data transfer rates up to 3x faster
  • Gives users total control over their data stream

Ready to push downtime and security holes to zero? Ready to eliminate VPN vulnerabilities? Try DxOdyssey for free here: https://dh2i.com/trial/ 

Aptum Earns Microsoft Azure Expert Managed Service Provider Recognition

Posted in Commentary with tags on January 30, 2023 by itnerd

Aptum, a hybrid multi-cloud managed service provider (MSP), today announced it has been recognized by Microsoft as an Azure Expert MSP. This designation identifies Aptum as a qualified global partner to deliver Azure solutions to customers.

Aptum is among a group of MSPs globally to earn this certification, having completed an extensive auditing process by an independent third party. The certification process consisted of a rigorous audit of 66 controls in areas such as:

  • Business Health and Managed Service Focus
  • Microsoft Services
  • Assessment and Design
  • Build and Migration
  • Cloud Operations and Service Management 
  • Security and Governance
  • Cloud SLAs, Customer Satisfaction, and Cost Optimization
  • Continual Improvement and Process Optimization

Aptum also provided multiple customer references for projects successfully delivered over the last 12 months. 

As an Azure Expert MSP, Aptum is strongly equipped to help organizations meet their evolving technology needs and achieve their business objectives. The company recently earned other Microsoft partner designations, highlighting its commitment to training and accreditation, as well as its expertise. 

  • The Microsoft Solutions Partner for Data & AI (Azure) designation demonstrates Aptum’s ability to assist customers with the management of their data across multiple systems to build analytics and AI solutions
  • The Microsoft Solutions Partner for Digital & App Innovation (Azure) certification establishes Aptum’s capability to help customers build, run, and manage applications across multiple clouds, on premises, and at the edge, with frameworks and tools customers choose
  • As a Microsoft Solutions Partner for Infrastructure (Azure), Aptum is identified as a partner that can help customers accelerate migration of key infrastructure workloads to Microsoft Azure.

Developers Are Fleeing Twitter For Mastodon

Posted in Commentary with tags on January 30, 2023 by itnerd

There’s been a fair amount of news about the fact that users are fleeing Twitter for Mastodon. But what’s now starting come to light is the fact that developers are doing the same thing. They’re being driven by the ban of third party clients on the platform, and as a result are looking for a new place to call home:

When Twitter quietly updated its developer policies to ban third-party clients from its platform, it abruptly closed an important chapter of Twitter’s history. Unlike most of its counterparts, which tightly control what developers are able to access, Twitter has a long history with independent app makers.

Now, the developers of some Twitter clients are turning their attention to another upstart platform: Mastodon. This week, Tapbots, the studio behind Tweebot, released Ivory, a Mastodon client based on its longtime Twitter app. Matteo Villa, the developer behind Twitter app Fenix, is testing a Mastodon client of his own called Wooly. Junyu Kuang, the indie developer behind Twitter client Spring is working on a Mastodon app called Mona. Shihab Mehboob, developer of Twitter app Aviary, is close to launching a Mastodon client called Mammoth.

The one-time Twitter developers join a growing group of independent app makers who have embraced Mastodon, the open-source social network that’s seen explosive growth since Elon Musk took over Twitter. The decentralized service now has more than 1.5 million users across nearly 10,000 servers. That, coupled with Mastodon’s open-source, “API-first” approach, has attracted dozens of developers eager to put their own spin on the service.

I question the number of users on Mastodon that is quoted in the article because an account on Mastodon which tracks the number of users on the platform says this:

But besides that, developers moving to Mastodon will help to grow the platform as it not only gives users more choice in terms of the Mastodon client that they use, but drives innovation of the platform. Those will help to make Mastodon a much better option than Twitter for those who want to be on some form of social media as there’s no innovation going on at Twitter at the moment. And you can only use their client or their web page to see Tweets. And to be frank, Twitter’s native client sucks and third party clients were always a much better option to access Twitter.

Bottom line: You can add this to the list of reasons why Twitter is a train wreck next to a dumpster fire.

Microsoft Posts Report On Last Week’s Outage

Posted in Commentary with tags on January 29, 2023 by itnerd

Last week, Microsoft had a major outage that affected a lot of their services including:

  • Teams
  • Xbox Live
  • Outlook
  • Microsoft 365 
  • Minecraft
  • Azure
  • GitHub
  • Microsoft Store

At the time, Microsoft said that a networking change caused this. And at the time, I said this:

My question for Microsoft, which I hope they answer is what specifically happened and what will they do to ensure that it doesn’t happen again. Microsoft does give some version of this information out, so I for one will be interested to see what they say.

And now Microsoft has a Preliminary Post Incident Review that goes into more detail that answers the questions that I had:

We determined that a change made to the Microsoft Wide Area Network (WAN) impacted connectivity between clients on the internet to Azure, connectivity across regions, as well as cross-premises connectivity via ExpressRoute. As part of a planned change to update the IP address on a WAN router, a command given to the router caused it to send messages to all other routers in the WAN, which resulted in all of them recomputing their adjacency and forwarding tables. During this re-computation process, the routers were unable to correctly forward packets traversing them. The command that caused the issue has different behaviors on different network devices, and the command had not been vetted using our full qualification process on the router on which it was executed.

And this is how they responded:

Our monitoring initially detected DNS and WAN related issues from 07:12 UTC. We began investigating by reviewing all recent changes. By 08:10 UTC, the network started to recover automatically. By 08:20 UTC, as the automatic recovery was happening, we identified the problematic command that triggered the issues. Networking telemetry shows that nearly all network devices had recovered by 09:00 UTC, by which point the vast majority of regions and services had recovered. Final networking equipment recovered by 09:35 UTC.

Due to the WAN impact, our automated systems for maintaining the health of the WAN were paused, including the systems for identifying and removing unhealthy devices, and the traffic engineering system for optimizing the flow of data across the network. Due to the pause in these systems, some paths in the network experienced increased packet loss from 09:35 UTC until those systems were manually restarted, restoring the WAN to optimal operating conditions. This recovery was completed at 12:43 UTC.

And this is how they will stop this from happening again:

  • We have blocked highly impactful commands from getting executed on the devices (Completed)
  • We will require all command execution on the devices to follow safe change guidelines (Estimated completion: February 2023)

This is all good and I really wish that other companies would do the same thing as you’re more likely to trust a company who is open and transparent. Kudos to you Microsoft.

Guest Post: 5 Essential Data Privacy Regulations for Businesses to Know in 2023

Posted in Commentary with tags on January 28, 2023 by itnerd

BY JAKUB LEWANDOWSKI – COMMVAULT

Happy 2023 Data Privacy Week!

Just as everyone started to get more or less cozy with the regulatory landscape in data privacy/protection and individuals and businesses learned to navigate the shallow waters of data subject requests, risk management, and impact assessments – BOOM   – another tidal wave of regulatory requirements and new challenges rushed in!

2023 is the perfect moment to start internalizing new acronyms (get ready for #NIS2, #DORA, #DPDPB, #CPRA, #CCPA, #CPA, #CDPA, #UCPA, #VCDPA, #ADPPA, #PrivacyPenaltyBill) and legislative acts they stand for.

The underlying motive of the upcoming changes is to boost and enhance the cybersecurity postures of various organizations and manage evolving cyber risks more effectively.

Here is a helicopter view of selected legal developments around the world:

  • EU – Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union (NIS2)
  • EU – Regulation on digital operational resilience for the financial sector (DORA)
  • US – State & Federal privacy laws
  • India – Digital Personal Data Protection Bill (DPDPB)
  • Australia – Privacy Penalty Bill & overhaul of the Privacy Act 1988

NIS2

According to ENISA, the general spending on cybersecurity is 41 per cent lower by organizations in the EU than by their US counterparts. With the arrival of NIS2, this ratio is expected to shift to cover this enormous gap at least partially. Conservative estimates are that NIS2 entry in force will translate into a ~22 per cent increase in ICT spending over a 3–4-year period.

NIS2 was published just before year-end, and EU Member States now have 21 months to transpose requirements and mechanisms described into national laws. The 2016 NIS Directive – despite shortcomings – served as a cornerstone for increasing Member States’ cybersecurity capabilities. Now, NIS2 will expand the scope and the list of impacted organizations. It is expected that as many as 160 000 organizations will be subject to this new legislation, including digital services providers (platforms and data centre services), electronic communications networks and services providers, manufacturing, food, and the public sector.

NIS2 aims to strengthen cybersecurity postures by, amongst other: improving cybersecurity governance, addressing the security of supply chains, streamlining reporting obligations (early warnings/shortened notification periods), and introducing more stringent supervisory measures and stricter enforcement requirements.

What can you do right now?

  • First, try to understand which obligations will apply to your organization and in which compliance bucket your organization will fall into: “Essential Entity,” “Important Entity,” or maybe “other.”
  • Next, see if you can create synergies and leverage existing technical and organizational measures implemented during preceding compliance efforts (e.g., GDPR, NIS1, etc.)
  • Start looking for the right partners that can adequately support your compliance efforts. Engage your vendors in discussing the approach that best fits your organization.
  • Last but not least, initiate planning for increased spending to address any remaining gaps. In compliance could result in administrative fines of up to 10 million euros or up to 2 per cent of the total annual worldwide turnover of the organization.


DORA

DORA aims to achieve “a high common level of digital operational resilience,” mitigating cyber threats and ensuring resilient operations across the EU financial sector. It will become directly applicable from January 17th, 2025. It will impact the financial sector (banks, insurance companies, investment firms) and its ICT providers (i.e., cloud platforms) – roughly around 22,000 organizations.

New requirements imposed by DORA will effectively boil down to reviewing and updating risk management practices. Financial sector customers will need to transfer as many regulatory risks as possible to ICT providers or apply different risk-mitigating strategies. In any case, ICT providers will need to be able to assure adherence to DORA’s requirements. The whole industry will also need to reassess contractual relations with vendors. DORA will incorporate requirements for contracts between financial companies and their critical ICT providers, including the location where data is processed, service level agreement descriptions, reporting requirements, rights of access, and circumstances that would lead to terminating the contract.

In a separate post – Commvault’s Product Team will perform a more technical deep-dive into DORA’s requirements related to detection (art. 10), response and recovery (art. 11), and backup (art. 12).


US data privacy laws – CPRA/CCPA, CPA, CDPA, UCPA, VCDPA, ADPPA

As of January 1st, 2023, California Privacy Rights Act (CPRA) amendments to the California Consumer Privacy Act 2018 went into effect. Many temporary exemptions in place expire, imposing additional obligations on companies dealing with California residents’ personal information, e.g., regarding employment-related personal data, opt-out from selling personal information.

2023 is also the year when the Colorado Privacy Act (CPA), The Connecticut Data Privacy Act (CDPA), The Utah Consumer Privacy Act (UCPA), and The Virginia Consumer Data Privacy Act (VCDPA) will become effective. Legislative fragmentation risk is imminent and substantial, and this is the kind of risk that caused the European Union to harmonize the regulatory approach. Let us see whether the same will be true in 2023 in the case of the American Data Privacy and Protection Act (‘ADPPA’) – a proposal for a federal and general data privacy law.

India – DPDPB

Indian legislators plan to introduce a very ambitious Digital Personal Data Protection Bill (DPDPB) this year. When enacted, long-awaited legislation will undoubtedly impact all kinds of organizations due to India’s role as a tech powerhouse and a global outsourcing hub.

Australia – Privacy Penalty Bill & overhaul of the Privacy Act

Australian authorities announced yet another complete overhaul of the Privacy Act dated 1988. The current legislation was summarized as “out of date and not fit for purpose in the digital age.”

In the meantime, still in 2022, Australia passed the Privacy Penalty Bill that increased privacy-related sanctions to levels comparable with trends introduced by GDPR (up to 50m AUD) and expanded regulatory powers of the Office of the Australian Information Commissioner (OAIC) and the Australian Communications and Media Authority (ACMA).

Summary

The relentless compliance clock just started ticking again. Cross-functional teams consisting of IT, compliance, privacy, legal professionals, and business analysts will spend considerable amounts of time analyzing the impact of the cloudburst of legislative developments that emerged at the end of last year and will materialize throughout 2023.

Be aware that the legislative developments presented here could be more comprehensive. You can be sure, however, that they will become standard talking points not only in 2023 but also for the years to come.

Today Is Data Privacy Day

Posted in Commentary with tags on January 28, 2023 by itnerd

Data Privacy Day, also known in Europe as Data Protection Day, is globally recognized each year on January 28th. Some have now even extended this to a weeklong celebration. The event’s purpose is to raise awareness and promote privacy and data protection best practices. 

Executives from Datadobi, DH2i, Folio Photonics, Nexsan, Nyriad, Hammerspace, Fortra and Retrospect had this to say about this very timely and important topic: 

Carl D’Halluin, CTO, Datadobi: 

“A staggering amount of unstructured data has been and continues to be created. In response, a variety of innovative new tools and techniques have been developed so that IT professionals can better get their arms around it. Savvy IT professionals know that effective and efficient management of unstructured data is critical in order to maximize revenue potential, control costs, and minimize risk across today’s heterogeneous, hybrid-cloud environments. However, savvy IT professionals also know this can be easier said than done, without the right unstructured data management solution(s) in place. And, on Data Privacy Day we are reminded that data privacy is among the many business-critical objectives being faced by those trying to rein-in their unstructured data. 

The ideal unstructured data management platform is one that enables companies to assess, organize, and act on their data, regardless of the platform or cloud environment in which it is being stored. From the second it is installed, users should be able to garner insights into their unstructured data. From there, users should be able to quickly and easily organize the data in a way that makes sense and to enable them to achieve their highest priorities, whether it is controlling costs, CO2, or risk – or ensuring end-to-end data privacy.”

​​Don Boxley, CEO and Co-Founder, DH2i:

“The perpetual concern around data privacy and protection has led to an abundance of new and increasingly stringent regulations around the world. According to the United Nations Conference on Trade and Development (UNCTAD), 71% of countries now have data protection and privacy legislation, with another 9% having draft legislation. 

This increased scrutiny makes perfect sense. Data is being created and flowing not just from our business endeavors, but countless personal interactions we make every day – whether we are hosting an online conference, making an online purchase, or using a third party for ride-hailing, food delivery, or package transport. 

Today, as organizations endeavor to protect data – their own as well as their customers’ – many still face the hurdle of trying to do so with outdated technology that was simply not designed for the way we work and live today. Most notably, many organizations are relying on virtual private networks (VPNs) for network access and security. Unfortunately, both external and internal bad actors are now exploiting VPN’s inherent vulnerabilities. However, there is light at the end of the tunnel. Forward looking IT organizations have discovered the answer to the VPN dilemma. It is an innovative and highly reliable approach to networking connectivity – the Software Defined Perimeter (SDP). This approach enables organizations to build a secure software-defined perimeter and use Zero Trust Network Access (ZTNA) tunnels to seamlessly connect all applications, servers, IoT devices, and users behind any symmetric network address translation (NAT) to any full cone NAT: without having to reconfigure networks or set up complicated and problematic VPNs. With SDP, organizations can ensure safe, fast and easy network and data access; while ensuring they adhere to internal governance and external regulations compliance mandates.”

Steve Santamaria, CEO, Folio Photonics: 

“It is no secret that data is at the center of everything you do. Whether you are a business, a nonprofit, an educational institution, a government agency, or the military, it is vital to your everyday operations. It is therefore critical that the appropriate person(s) in your organization have access to the data they need anytime, anywhere, and under any conditions. However, it is of the equal importance that you keep it from falling in the wrong hands. 

Therefore, when managing current and archival data, a top concern must be data security and durability, not just today but for decades upon decades into the future. The ideal data storage solution must offer encryption and WORM (write-once, read-many) capabilities. It must require little power and minimal climate control. It should be impervious to EMPs, salt water, high temps, and altitudes. And, all archive solutions must have 100+ years of media life and be infinitely backward compatible, while still delivering a competitive TCO. But most importantly, the data storage must have the ability to be air-gapped as this is truly the only way to prevent unauthorized digital access.”

Surya Varanasi, CTO, Nexsan: 

“Digital technology has revolutionized virtually every aspect of our lives. Work, education, shopping, entertainment, and travel are just a handful of the areas that have been transformed. Consequently, today, our data is like gravity – it’s everywhere. 

On Data Privacy Day, we are reminded of this fact, and the need to ensure our data’s safety and security. Fortunately, there are laws and regulations that help to take some of the burden off of our shoulders; such as the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and Health Insurance Portability and Accountability Act (HIPAA).

However, some of the responsibility remains on our shoulders as well as those of the data management professionals we rely upon. Today, it would be extremely challenging to find an organization (or an individual for that matter) that isn’t backing up their data. Unfortunately however, today that just isn’t enough. Cyber criminals have become increasingly aggressive and sophisticated, along with their ransomware and other malware. And now, the threat isn’t just that they will hold your data until payment, cyber criminals are now threatening to make personal and confidential data public, if not paid. It is therefore critical that cyber hygiene must include protecting backed up data by making it immutable and by eliminating any way that data can be deleted or corrupted. 

This can be accomplished with an advanced Unbreakable Backup solution, which creates an immutable, object-locked format, and then takes it a step further by storing the admin keys in another location entirely for added protection. With an Unbreakable Backup solution that encompasses these capabilities, users can ease their worry about the protection and privacy of their data, and instead focus their expertise on activities that more directly impact the organization’s bottom-line objectives.”

Andrew Russell, Chief Revenue Officer, Nyriad: 

“Data Privacy Day serves as a great reminder of the value and power of data. In addition to your people, data is without question the most strategic asset of virtually any organization. Data and the ability to fully leverage, manage, store, share, and protect it, enables organizations to be successful across virtually every facet – from competitive advantage, to innovation, the employee experience, and customer satisfaction, to legal and regulations compliance competency. 

Consequently, savvy data management professionals recognize that while a storage solution that is able to deliver unprecedented performance, resiliency, and efficiency with a low total cost of ownership is priority number one to fully optimize data and intelligence for business success; they likewise need to ensure they have the ability to protect against, detect, and restore data and operations in the event of a successful cyber-attack in order to protect their data, for business survival.” 

Brian Dunagan, Vice President of Engineering, Retrospect: 

“Every organization, regardless of size, faces the real possibility that they could be the next victim of a cyberattack. That is because today’s ransomware, which is easier than ever for even the novice cybercriminal to obtain via ransomware as a service (RaaS), strikes repeatedly and randomly without even knowing whose system it is attacking. Ransomware now simply searches for that one crack, that one vulnerability, that will allow it entry to your network. Once inside it can lock-down, delete, and/or abscond with your data and demand payment should you wish to keep your data private and/or have it returned. 

As an IT professional, it is therefore critical that beyond protection, steps be taken to detect ransomware as early as possible to stop the threat and ensure their ability to remediate and recover. A backup solution that includes anomaly detection to identify changes in an environment that warrants the attention of IT is a must. In order to ensure its benefit,, users must be able to tailor the backup solution’s anomaly detection to their business’s specific systems and workflows; with capabilities such as customizable filtering and thresholds for each of their backup policies. And, those anomalies must be immediately reported to management, as well as aggregated for future ML/analyzing purposes.”

Molly Presley, SVP of Marketing at Hammerspace:  

“With global rules governing how data should be stored, used, and shared, combined with escalating data losses, explosive personal data growth, and customer expectations, addressing data privacy is now an obligatory business requirement. However, as organizations expand and navigate compliance and legal requirements in the rapidly evolving age of big data, AI/ML, and government regulations, the existing processes surrounding data privacy need to evolve to 1) automate processes and 2) scale to meet increasingly complex new challenges.   

Privacy and security concerns increasingly impact multiple vertical markets, including finance, government, healthcare and life sciences, telecommunications, IT, online retail, and others, as they quickly outgrow legacy data storage architectures. As a result, there is increasing pressure to develop and implement a data strategy and architecture for decentralized data that is more cohesive, making access to critical information simplified and secure.

To protect the organizations’ and individual users’ sensitive data, organizations must take the steps necessary to control how data is shared and eliminate the proliferation of data copies outside the controls of IT security systems. Accelerating IT modernization efforts while managing the ever-increasing volumes of data requires a data solution that simplifies, automates, and secures access to global data. Most importantly, to ensure data privacy and secure data collaboration, a data solution must be able to put data to use across multiple locations and to multiple users while simplifying IT Operations by automating data protection and data management to meet policies set by administrators.”

Jason Lohrey, CEO of Arcitecta:   

“In this information age, data is the critical element of transformation, serving as a foundation for strategic decision-making. Data Privacy Day reminds us that data influences everything we do, from building services, products, customer experiences, and employee relationships. With the acceleration of technology, we are more connected than ever before and using data to facilitate high-value achievements for businesses and consumers.  

But with new threats, it is now more imperative than ever to protect data from those who seek to gain an advantage by exploiting others. It is becoming increasingly easier to infiltrate systems around the world. Organizations need to increase the resilience of their data so that it remains continuously available, and IT leaders must shift their focus from successful backups to successful recoveries to ensure that valuable data doesn’t become compromised by landing in the wrong hands.”  

Nick Hogg, Director of Technical Training at Fortra:

“With the rise of remote working, sharing sensitive files is now taken for granted. Therefore, awareness days and weeks, like Data Privacy Week, are a great way to remind organizations and their stakeholders of the importance of storing and handling data properly.

It’s essential for organizations to re-evaluate their security awareness and compliance training programs to move away from the traditional once-a-year, ‘box-ticking’ exercises that have proven to be less effective. The goal is to deliver ongoing training that keeps data security and compliance concerns front and center in employees’ minds, allowing them to better identify phishing and ransomware risks, as well as reducing user error when handling sensitive data.

They will also need to use digital transformation and ongoing cloud migration initiatives to re-evaluate their existing data loss prevention and compliance policies. The goal is to ensure stronger protection of their sensitive data and meet compliance requirements, while replacing complex infrastructure and policies to reduce the management overhead and interruptions to legitimate business processes.”

Wade Barisoff, Director of Product, Data Protection at Fortra (on the recent introduction of new privacy laws in the states of California and Virginia):

“As new states contemplate their own flavors of data privacy legislation, the only consistency will be the fact that each new law is different. We are already seeing this now; for example, in California, residents can sue companies for data violations, whereas in others it’s their attorney general’s offices that can impose the fines. In Utah, standards apply to fewer businesses compared to other states. As each state seeks to highlight how much they value their citizens’ rights over the next, we’ll see an element of (for example), ‘What’s good for California isn’t good enough for Kansas’ creep in, and this developing complexity will have a significant impact on organizations operating across the country.

Before GDPR there were (and still are) many different country laws for data privacy. GDPR was significant, not because it was a unifying act that enshrined the rights of people and their digital identities to govern how their data could be handled, but it was the first legislation with real teeth. Fines for non-compliance were enough to force companies into action.

So far, five states have (or will have) individual laws, but there are 45 more yet to come. The amount of money and time companies will spend enacting the proper controls for these individual privacy laws fuels the argument for a more unified national approach to data privacy standards, as the penalties for non-compliance are significant. Also, as states begin to increase the demands on business, usually without fully understanding the technology landscape and how businesses work with shared and cloud-based technologies, there’s a potential that companies will be forced to make the decision not to conduct business in certain areas. A national approach would allow businesses to tackle data privacy once, but as it stands, with the federated states model, doing business within the U.S. is likely to get more complicated and expensive.”