Cybersecurity and Protection of Personal Data

With the increase in electronic sharing of personal information on different computer platforms, cybersecurity threats will be more frequent and their consequences will be more serious. Since confidentiality incidents are no longer isolated events, it is important to be ready to deal with them and limit their risks and impact.
Marie-Noelle Morin
20 September 2022
Security and conformity
6 min
bimi impact

It is no longer uncommon to see the names of large companies in the media dealing with privacy incidents. With the increase in electronic sharing of personal information on different computer platforms, cybersecurity threats will become more frequent. Their consequences will be more serious. Privacy incidents are no longer isolated events. It is important to be ready to deal with them and limit their risks and impact.

Privacy incidents

These incidents occur when there is a breach of privacy. Whether through unauthorized access, use or disclosure. This also includes the loss of confidential data that can identify a natural person. The intrusion of hackers into a database containing personal information is one of the most serious incidents. This is called a data leak. The purpose of this operation is to use this information or sell it on the Dark Web to usurp the identity of these people.

The Calm Before the Storm: Be prepare

Although cyberattacks are often associated with large enterprises, small and medium-sized businesses must also be on the lookout for these threats. In fact, these companies are targeted by 43% of cyberattacks. Thus, it is important that every organization holding sensitive information is well prepared. Some initiatives can already be taken internally as a preventive measure.

1. Raising awareness among stakeholders

It is important to educate your employees as well as your customers on the subject of cybersecurity. They must be informed about the precautions to be taken to avoid such incidents. They must be equipped to protect their data against unauthorized access or theft.

Privacy incidents put the privacy of your customers, employees and/or business partners at risk. This indirectly harms your business. Indeed, these incidents have a financial impact on your organization and they risk to impact your sustainability.

One of the most worrying cybersecurity threats today is Ransomware. With this strategy, hackers gain access to company computer files and they can block access to data until a ransom is paid. The annual share of ransomware attacks experienced by organizations worldwide has been on the rise since 2018, peaking at 68.5% in 2021 (Statista). This threat is largely the result of phishing attacks.

2. Implement good cybersecurity management practices

Some recognized cybersecurity management practices include, but are not limited to:

  • Install anti-virus and anti-malware software
  • Enable data encryption
  • Carry out security audits
  • Comply with current legislation
  • Take out data leak insurance
  • Establish a cybersecurity policy (password management, access management, etc.)

3. Surround yourself with trusted business partners

It is important to have sufficient cybersecurity resources and to have trusted business partners. Especially for data hosting. At Dialog Insight, the security of your data is a priority. As a result, we implement the best practices in the industry. Moreover, we comply with the requirements of legislation in Quebec (Law 25), Canada and Europe (GDPR). In addition, we hold ISO 27001 and SOC2 certifications.

Victim of a cyberattack: What to do?

In the event that the worst happens and your business is the victim of a cyberattack, certain actions are required by the various levels of government.

In Quebec, Law 25 (Bill 64) aims to improve the protection of personal information by public bodies and private companies. It sets out the various obligations that must be respected in the management of confidential data. Its main objective is to better control confidentiality incidents and limit their impact.

Law 25 requires that a person who operates a business must take reasonable measures to reduce the risk of harm being caused and to prevent new incidents of the same nature from occurring. When there is reason to believe that there has been a confidentiality incident involving personal information that it holds.

Here are the steps to follow in the event of a theft of personal information:

  1. Preliminary assessment of the situation: Define the context, designate a person responsible for managing the situation, inform the internal stakeholders concerned
  2. Limit the invasion of privacy: Recover data, modify access codes, control gaps
  3. Assess the risks: consider the sensitivity of the personal information in question, determine the potential harm, determine the actions to be taken as a priority
  4. Notifying data subjects: determining who needs to be notified and how
  5. In-depth assessment of the situation and prevention: analyze the circumstances of the event, make recommendations on the internal directives to be put in place
  6. Follow-up

New obligations related to Law 25

When a privacy incident poses a risk of serious harm being caused, Law 25 requires companies to take the following actions, starting September 22, 2022:

  1. Notify the Commission d’accès à l’information
  2. Notify any person whose personal information is affected by the incident
  3. Notify any person or organization likely to reduce this risk
  4. Consult with Privacy Officer to assess risk of harm
  5. Maintain a register of confidentiality incidents, to be communicated to the Commission on request

For more information on Law 25 and the various obligations arising from it, see our latest article Preparing for the implementation of Law 25

 

This article does not represent legal advice. You should consult your legal advisors for an opinion with respect to Law 25 or its implication.

Find out how your company can benefit from Dialog Insight.

Read also

Security and conformity

Tracking Pixels in Emails: An Ethical Solution Exists

The CNIL seeks to regulate the use of tracking pixels in emails. Between legal obligations, marketing lobbying, and technical solutions like Dialog Insight, find out how to reconcile compliance, performance, and privacy.

Data Management

Explicit Data vs. Implicit Data in Digital Marketing: How to Use Both to Boost Customer Experience

Customer data falls into two main categories: explicit data, voluntarily provided by the user, and implicit data, inferred from their behaviors. Understanding their complementary roles and knowing how to leverage them together makes it possible to personalize the experience, optimize marketing campaigns, and strengthen customer loyalty.

Omni-Channel Marketing Campaign

Email Marketing vs. SMS Marketing: Which One to Choose?

Email marketing or SMS marketing: Which is more effective to reach your customers? Discover the advantages, limitations, and uses of each channel, along with best practices to combine them and maximize your conversions.

Law 25

The Impact of Law 25 on Consents

In Quebec, Law 25 (formerly Bill 64) modernizes regulations regarding the protection of personal information. In order to provide citizens with better control over their personal information, this law supports companies in the collection and use of this data. Several clarifications are introduced into the Private Sector Act to regulate consent. It is important to fully understand these and to be well prepared to avoid any sanction.

Omni-Channel Marketing Campaign

All about a winning web contest

The contest is an outstanding acquisition tool, it can be simple or complex but must be aligned with your business objective.

Omni-Channel Marketing Campaign

How Gamification Can Transform Your Email Marketing Strategy?

Discover the benefits of using gamification in your email marketing campaigns and get inspired by some successful examples.

New at Dialog Insight

Every message, on the right channel, at the right time — automatically.

What if your campaigns could find on their own the ideal channel and the perfect moment to generate more impact?With Smart Channel and Omnichannel STO, your campaigns become more engaging and more effective: