Cybersecurity and Protection of Personal Data

With the increase in electronic sharing of personal information on different computer platforms, cybersecurity threats will be more frequent and their consequences will be more serious. Since confidentiality incidents are no longer isolated events, it is important to be ready to deal with them and limit their risks and impact.
Marie-Noelle Morin
20 September 2022
Security and conformity
6 min
bimi impact

It is no longer uncommon to see the names of large companies in the media dealing with privacy incidents. With the increase in electronic sharing of personal information on different computer platforms, cybersecurity threats will become more frequent. Their consequences will be more serious. Privacy incidents are no longer isolated events. It is important to be ready to deal with them and limit their risks and impact.

Privacy incidents

These incidents occur when there is a breach of privacy. Whether through unauthorized access, use or disclosure. This also includes the loss of confidential data that can identify a natural person. The intrusion of hackers into a database containing personal information is one of the most serious incidents. This is called a data leak. The purpose of this operation is to use this information or sell it on the Dark Web to usurp the identity of these people.

The Calm Before the Storm: Be prepare

Although cyberattacks are often associated with large enterprises, small and medium-sized businesses must also be on the lookout for these threats. In fact, these companies are targeted by 43% of cyberattacks. Thus, it is important that every organization holding sensitive information is well prepared. Some initiatives can already be taken internally as a preventive measure.

1. Raising awareness among stakeholders

It is important to educate your employees as well as your customers on the subject of cybersecurity. They must be informed about the precautions to be taken to avoid such incidents. They must be equipped to protect their data against unauthorized access or theft.

Privacy incidents put the privacy of your customers, employees and/or business partners at risk. This indirectly harms your business. Indeed, these incidents have a financial impact on your organization and they risk to impact your sustainability.

One of the most worrying cybersecurity threats today is Ransomware. With this strategy, hackers gain access to company computer files and they can block access to data until a ransom is paid. The annual share of ransomware attacks experienced by organizations worldwide has been on the rise since 2018, peaking at 68.5% in 2021 (Statista). This threat is largely the result of phishing attacks.

2. Implement good cybersecurity management practices

Some recognized cybersecurity management practices include, but are not limited to:

  • Install anti-virus and anti-malware software
  • Enable data encryption
  • Carry out security audits
  • Comply with current legislation
  • Take out data leak insurance
  • Establish a cybersecurity policy (password management, access management, etc.)

3. Surround yourself with trusted business partners

It is important to have sufficient cybersecurity resources and to have trusted business partners. Especially for data hosting. At Dialog Insight, the security of your data is a priority. As a result, we implement the best practices in the industry. Moreover, we comply with the requirements of legislation in Quebec (Law 25), Canada and Europe (GDPR). In addition, we hold ISO 27001 and SOC2 certifications.

Victim of a cyberattack: What to do?

In the event that the worst happens and your business is the victim of a cyberattack, certain actions are required by the various levels of government.

In Quebec, Law 25 (Bill 64) aims to improve the protection of personal information by public bodies and private companies. It sets out the various obligations that must be respected in the management of confidential data. Its main objective is to better control confidentiality incidents and limit their impact.

Law 25 requires that a person who operates a business must take reasonable measures to reduce the risk of harm being caused and to prevent new incidents of the same nature from occurring. When there is reason to believe that there has been a confidentiality incident involving personal information that it holds.

Here are the steps to follow in the event of a theft of personal information:

  1. Preliminary assessment of the situation: Define the context, designate a person responsible for managing the situation, inform the internal stakeholders concerned
  2. Limit the invasion of privacy: Recover data, modify access codes, control gaps
  3. Assess the risks: consider the sensitivity of the personal information in question, determine the potential harm, determine the actions to be taken as a priority
  4. Notifying data subjects: determining who needs to be notified and how
  5. In-depth assessment of the situation and prevention: analyze the circumstances of the event, make recommendations on the internal directives to be put in place
  6. Follow-up

New obligations related to Law 25

When a privacy incident poses a risk of serious harm being caused, Law 25 requires companies to take the following actions, starting September 22, 2022:

  1. Notify the Commission d’accès à l’information
  2. Notify any person whose personal information is affected by the incident
  3. Notify any person or organization likely to reduce this risk
  4. Consult with Privacy Officer to assess risk of harm
  5. Maintain a register of confidentiality incidents, to be communicated to the Commission on request

For more information on Law 25 and the various obligations arising from it, see our latest article Preparing for the implementation of Law 25

 

This article does not represent legal advice. You should consult your legal advisors for an opinion with respect to Law 25 or its implication.

Find out how your company can benefit from Dialog Insight.

Read also

Omni-Channel Marketing Campaign

7 common segmentation mistakes… and how to avoid them

Customer segmentation is essential for targeting your audiences effectively. However, some mistakes are often repeated and reduce the impact of campaigns. Discover the 7 most common pitfalls and concrete solutions for successful marketing personalization.

Omni-Channel Marketing Campaign

Black Friday: from frenzy to marketing strategy

Black Friday is not just a race for discounts. For marketing professionals, it’s an opportunity to rethink strategy, create value, and build lasting relationships. Discover how to turn this commercial event into a growth engine — without sacrificing your brand’s coherence or credibility.

Security and conformity

Tracking Pixels in Emails: An Ethical Solution Exists

The CNIL seeks to regulate the use of tracking pixels in emails. Between legal obligations, marketing lobbying, and technical solutions like Dialog Insight, find out how to reconcile compliance, performance, and privacy.

Data Management

A Comprehensive Guide to 0, 1st, 2nd and 3rd Party Data: What Marketers Need to Know

As a marketer in today’s digital age, it’s essential to understand how to leverage the power of data. Data can be used to help inform decisions regarding marketing campaigns, target audiences, and more. To do this effectively, you need to understand the different types of data available, such as zero, first, second, and third-party.

Omni-Channel Marketing Campaign

5 ways you can benefit from using Mobile Push Notifications

Mobile push notifications have been created in order to intervene in the daily life of an individual. There are several opportune moments when the latter will be inclined to use one or more applications.

Omni-Channel Marketing Campaign

How to Create Effective Mobile Push Notifications To Engage Your Audience

Mobile push notifications have become a powerful tool for businesses to engage with their target audience. They are an effective way to reach out to customers and keep them informed about the latest news, updates, and promotions. With an open rate ranging between 30 and 60%, this is the most effective method of communication. 

New at Dialog Insight

Every message, on the right channel, at the right time — automatically.

What if your campaigns could find on their own the ideal channel and the perfect moment to generate more impact?With Smart Channel and Omnichannel STO, your campaigns become more engaging and more effective: