Our Stance on Cyber Security at 6S Global

storing and transferring user data

What’s New in Cyber Security?

As most business processes become automated and digitized, personal client data is acquired and used everyday. Hence, regulations such as United Kingdom General Data Protection (UK GDPR), Privacy Electronic

Communication Regulation for CCTVs, and Data Protection Act (DPA) have been developed for businesses to employ best practices in handling, storing, and transferring of user data.

For example, DPA principles that govern good information handling stipulates that data should be processed for limited uses, lawfully and fairly processed, must be relevant, not excessive and adequate, should not be stored for long unnecessary periods, and should be processed within the rights of owners.

UK GDPR provides guidelines for protecting data and imposes hefty fines for non-compliance.

The Current State of Companies

Most companies currently use CCTV systems to secure their intellectual properties and operational interests.

As such, they require in-depth security solutions since cybercriminals may use CCTV systems as back door entry into their computer and network systems. Companies, therefore, should regularly review their IT systems with more focus on CTV systems.

6SGlobal has in the past six months made notable strides in identifying weaknesses and vulnerabilities in CCTV systems that give back doors to cybercriminals.

This is through intense penetration testing exercises, scanning system ports for vulnerabilities, assessing systems connected to major company networks, and identifying systems still using their default passwords.

6SGlobal ensures that companies are well protected, hence preventing fines due to data breaches or non-compliance.

6SGlobal ensures that companies are well protected, hence preventing fines due to data breaches or non-compliance.

Cyber Security Updates an Advice on Managing

Covering everything from: 

1. Updating You on Data Protection Regulations

2. Benefits of Reviewing Data Protection Policies

3. What Can Be Done

Get Your FREE download here

More Posts

Who Needs Security Consultancy?

Faced with the question – who needs security consultancy? – many companies may shrug and say, effectively, not us. That may not be very wise, especially if the work of the company has any sensitive aspects.

Read More »