Posts Tagged ‘security policies’

Challenges in the Cloud: Data Privacy & Sovereignty

IDG Roundtable in Cobramuseum, 17.11.2016. Foto: Yvonne Witte

Data privacy is one of the hottest topics in all industries globally. Understanding the critical due diligence from a data privacy and sovereignty perspective will help mitigate risk.

Privacy is not a security issue

Today, we face other and more complicated challenges than ever before regarding data privacy. Privacy is not a matter of security. Privacy concerns the contents of data -personal data- and its storage, transfer, access and processing methodologies. Under EU law, personal data can only be gathered legally under strict conditions, for a legitimate purpose.

Disrupted data

In this day and age tech-disruption causes new business models requiring even profounder use of data; leading to increased transfer of vast amounts of personal information across borders. GDPR and other data protections laws are being implemented to protect data from misuse, respecting the rights of the data owners. The rules are strict but data-privacy shows itself to be a wheel with many spokes.

The new currency

Data is currency, and the sense of urgency surrounding this is obvious; worldwide regulations develop fast and data leaks easily get in the eye of the (social) media storm causing heightened concern about privacy risk. The sanctions of the GDPR (4% of global annual revenue) will even hurt giants like Google, Apple and Microsoft. Times will change in benefit of privacy for the individual but conflict in data protection rules per country cause a bottleneck for business.

Challenges are plenty Read the rest of this entry »

We partner with Northwave to offer managed security services

leaseweb_northwave_partnershipWe are happy to announce that we have started a strategic partnership with Northwave to offer clients advanced managed security services. LeaseWeb clients are now able to put their IT environments under the permanent protection of the Northwave Computer Emergency Response Team (CERT).

The partnership is set up to guide and advise LeaseWeb customers on all security related topics.

The new security services are delivered as a tailor made extension to the Leaseweb Private Cloud, Dedicated Hosting and co-location services and available December 1st 2016. 

For more details, read our press release here.

The importance of data privacy and data sovereignty

Along with NetApp, we have hosted a round table discussion around “Data Privacy and Data Sovereignty: the challenges in the Cloud”.leaseweb_netapp_data-privacy-and-data-sovereignty

Special guest speaker for the evening was Sheila FitzPatrick – Global Data Governance Counsel and Chief Privacy Officer at NetApp.

Sheila is one of the world’s leading experts in data privacy laws and works closely with the US Government, Council of the European Union, country-specific data protection agencies in Europe, Asia/Pacific, and America, as well as, National Works Councils, European Works Councils and Law Enforcement Agencies. She provides expertise and hands-on experience in the areas of global data protection compliance, data sovereignty, cybersecurity regulations and obligations, legal issues associated with cloud computing and big data, data breach compliance and management, and records management. 

Data privacy is one of the hottest topics in all industries across the globe. Understanding the critical diligence from a data privacy and sovereignty perspective (as opposed to security) will help mitigate the risks as you embark on a cloud journey. 

We would like to thank to all the attendees for their valuable contribution to the discussion. Here is where you can read more about the outcome.

Security precaution: update your passwords

secureThe only way to stay safe on the internet is by helping each other minimize security risks. So as a precaution, I want to make you aware of a situation that could possibly affect you.

There are currently several databases available on the internet containing personal data such as e-mail addresses, user names and associated passwords. Lately, our security teams have noticed an increase in attacks attempted by unauthorized parties using this data.

In order to protect yourself, we recommend everyone to take the following actions if you haven’t done so already:

Read the rest of this entry »

Outsourcing your IT security: yes or no?

CloudSec_comp“Should we keep IT security in-house or is it better to outsource?” This has long been a thorny issue for organizations. Recently, it was one of the most important topics during a LeaseWeb Security Round Table with customers and I’d like to share some of the things I learned.

The discussion immediately took off following a statement from one of the participants, an end user: “In the Netherlands, the mantra is to focus on your core business. I dare to differ. I always learned that when operations are critical to your organization, you should keep them close. If security is critical to your company, why outsource it? If you outsource, you disconnect it from your company. What do you think about this?”

Read the rest of this entry »

Roundtable recap: security starts and ends in the boardroom

CloudSec_compThe IT industry is slowly becoming a technically solid sector, but until now, it continues to be vulnerable as well. Security incidents are still widely reported in the press. It’s an important topic, and one there are many ways of looking at it. This is I why lead a round table session with nine LeaseWeb customers, where questions were answered about the new Dutch Law on Data Breach Notifications (Meldplicht Datalekken) and participants discussed how to organize a secure online company.

The participants were executives of companies which have IT as a core business, or companies that use IT for their online services. They were joined by LeaseWeb founders Laurens Rosenthal and Con Zwinkels, and Jort Kollerie, Enterprise Security Specialist at Dell Security. In addition, IT journalist and security specialist Brenno de Winter shared his experiences about the topic.
Read the rest of this entry »

Strong Host Security Policies are Good Business

In the last few days an FBI raid on a data center in Virginia, targeting one malware server put offline many legitimate companies, with many servers down for days after the seizure.

Failure to enforce good security policies and operations can be expensive for hosts and their clients. Successful hosts must deal with a wide range of security issues as a regular part of doing business in an internet environment. Inevitably, the actions of some clients create serious security issues that need to be addressed by hosts quickly and cost effectively.

Read the rest of this entry »

LeaseWeb on Twitter

April 27th was King's Day in the Netherlands. It was a great opportunity to celebrate together with our customers

test Twitter Media - April 27th was King's Day in the Netherlands. It was a great opportunity to celebrate together with our customers https://t.co/WXZ73zehsB

Linux Engineer? Are you keen to work in a fast-moving environment with like-minded people? Let us know! We're hiring lnkd.in/gZ_7Ezd

test Twitter Media - Linux Engineer? Are you keen to work in a fast-moving environment with like-minded people? Let us know! We're hiring https://t.co/I4EHP3oSc2 https://t.co/pHuv5hxH1c

Read our CEO's reflections on the amazing growth that has made LeaseWeb the company it is today: blog.leaseweb.com/2017/04/26/loo… #LeaseWeb20

test Twitter Media - Read our CEO's reflections on the amazing growth that has made LeaseWeb the company it is today: https://t.co/vg5W5PUjRW #LeaseWeb20 https://t.co/jU0aayoqdk

"Mens sana in corpore sano" - Our team in training for last year's Viking Run #LeaseWeb20 #throwbackthursday

test Twitter Media - "Mens sana in corpore sano" - Our team in training for last year's Viking Run #LeaseWeb20 #throwbackthursday https://t.co/pCNEfXwmAa