Khwaja Saifuddin, the Senior Sales Director for the Middle East at Western Digital, speaks about the best-practice standards for data security
How has the need for data security and compliance changed over the past year?
With data security, such a big talking point of late, many of the discussions around protecting data have focused on securing the network. At a time of increased remote working and reliance on cloud technology, perhaps this is understandable. However, a key consideration should also be how best to secure the devices that hold this data.
What are the best-practice standards and frameworks that can help companies achieve and maintain data security and compliance?
To ensure data is protected, device systems, hardware, and software applications all have to be analyzed thoroughly in order to see where improvements can be made to existing infrastructures. Furthermore, new state-of-the-art security techniques need to feel virtually seamless for end-users to help ensure the best results. Infrastructures for storing data can be improved and there are many security concepts that have recently seen a significant improvement that can help companies achieve better security compliance.
Are there any regional data compliance regulations and frameworks, which companies that handle large amounts of public data need to follow?
Yes, while the UAE has a multi-layered legal system, it is important for companies to understand the data compliant regulations that apply in their economic zone. Companies are subject to various requirements to keep data secure and confidential and must employ appropriate technical and organizational measures to protect data. This goes across all business functions from digital payments to personal medical data.
What according to you are the five tips that companies need to follow to comply with data security regulations?
- Education – Implementing security regulation begins with educating all members of the workforce. Offering training can help companies employees feel ownership over their role in ensuring that company information is secure and remove doubt around these technologies and practices.
- Communication Protocols – Actively communicating within the company ensures better understandability and corrective action to keep files secure.
- Encryption – Encryption is important to both the confidentiality of data and the drive where that data resides. Strong hardware-based encryption can help to increase security without impacting speed.
- Collaborate – Ensure your company has the right partners in place to keep your company in line or ahead of regulations. Staying on top of evolving security protocols can help save your company from a wealth of issues down the road.
- Flexibility – Companies need the flexibility to manage their data according to their own requirements, whether their data is stored on-premises or in the cloud, or within a hybrid model that allows them to select the most effective option according to workloads and applications.
Many countries have passed their own version of data protection laws recently. How does your company help its clients with securing their data and staying compliant?
Western Digital is constantly invested in ensuring products are up to date with the needs of customers. Especially when it comes to data encryption and security, Western Digital does it like no one else can. When a customer chooses a Western Digital device, they are making an investment in their security.
Do you believe the line between data security and data privacy has started blurring?
The security needs of data storage are evolving. As the growth of data infrastructure continues there are clear advantages to using hardware for data security over solely relying on secure networks. Hardware products can push the boundaries of state-of-the-art security techniques while maintaining ease of use that feels virtually seamless. These products are designed by choosing existing, proven security concepts, improving them whenever possible, and creating innovative solutions where they are needed. Ultimately, by weaving concepts together, a next-generation architecture is created that helps provide security over many technology layers.