GDPR compliance isn’t all about encryption: what other types of software can help you achieve compliance?
Encryption always comes up very quickly when you start to discuss or read about GDPR and there is no denying that it is a crucial piece of puzzle.
• Device control could also be used to limit files entering or leaving your internal networks. Device control is often a feature of endpoint software and can stop unauthorised USB drives and other removable media from being used to steal data.
• Two-factor or multi-factor authentication (2FA or MFA) can be used to authenticate the user when logging into your systems, this protects login credentials from being used by someone else if lost or stolen. Generally speaking, 2FA and MFA provide an additional level of security for a login: alongside your traditional username and passwords you’ll need to provide a code which is usually generated by an app or SMS.
It’s important to emphasise than there is no panacea, no silver bullet, when it comes to GDPR compliance. The only way to ensure full compliance and be covered for virtually any eventuality is layering strong data policies and practices with trusted software solutions.
Request a copy of ESET’s GDPR Whitepaper here