Pages

Monday, 27 January 2025

Data privacy in 2025: more complex, with many aspects to consider for cybersecurity

Data Privacy Day, sometimes called Data Protection Day, is observed every January 28. The international effort focuses on raising awareness about data privacy, data protection and trust. For some it is now Data Privacy Week, running from January 27 to 31 this year. 

Source: BeyondTrust. Morey Haber.
Source: BeyondTrust. Haber.

Morey Haber, Chief Security Advisor, BeyondTrust, said that it is a time for reflection and action.

"Data Privacy Day serves as a crucial reminder of the importance of protecting personal information in an increasingly digital world. As organisations grapple with evolving regulations and the ever-growing volume of data, a strong commitment to data privacy is no longer just a compliance requirement, but a fundamental principle for building trust with customers and stakeholders," he said.

John Yang, VP APJ for Progress, also called the the day a reminder. "Data Privacy Day is a vital reminder of the importance of safeguarding personal and organisational data in our increasingly connected world. With data breaches and cyber threats becoming more sophisticated, organisations must prioritise robust data privacy measures, ensuring compliance with regulations like GDPR and CCPA while safeguarding sensitive information. By integrating privacy by design into technology and processes, companies can not only mitigate risks but also build long-term trust with their customers," he said.

Source: Progress. John Yang.
Source: Progress. Yang.

"As we celebrate this day, let’s recognise the shared responsibility of safeguarding data. Together, through collaboration, education, and innovation, we can create a more secure digital ecosystem that respects the privacy of every individual.” 

CCPA stands for the California Consumer Privacy Act.

Regulations

"Key regulatory frameworks like India’s upcoming Digital Personal Data Protection Bill, Singapore’s revised Personal Data Protection Act, and China’s Personal Information Protection Law are reshaping how APAC nations govern personal data. Alongside these, the APEC Privacy Framework and Cross-Border Privacy Rules (CBPR) systems are gaining traction, providing regional guidance on data governance and fostering consistency across borders," observed Clement Lee, Security Architect, APAC, Check Point Software Technologies.

"However, this evolving regulatory landscape presents multinational organisations with the challenge of navigating different definitions of sensitive data, varying breach notification timelines, and specific cross-border data transfer restrictions—all in the context of increasing cloud adoption and hybrid work models."

Source: CyberArk. Lim Teck Wee.
Source: CyberArk.
Lim Teck Wee.
"Several countries in the region, including Singapore and Indonesia, have strengthened data protection laws in the past year, reflecting a growing recognition of the importance of safeguarding personal information," said Lim Teck Wee, Area VP for ASEAN at CyberArk.

"It's essential that business and cyber leaders continue to prioritise proactive measures to safeguard data privacy amid the evolving technological and cybersecurity landscape. The ever-expanding volumes of data, rapid advancements in technologies like AI, and increasingly sophisticated threat actors demand unwavering focus and action."

Jasie Fon, Regional VP of Asia at Ping Identity, said that data privacy goes beyond compliance to being a matter of trust and transparency. "According to our survey last year, most Singapore consumers (86%) do not fully trust the organisations that manage their identity data. Doing online shopping (72%) made consumers feel most vulnerable to identity theft, followed by accessing or using online banking (69%) and using social media (68%)," she said.

Technology advances

Lee added that the rise of emerging technologies further complicates the safeguarding of personal information. "Artificial intelligence, while driving efficiency and innovation, also magnifies concerns about responsible data usage, algorithmic bias, and transparency in decision-making. The Internet of Things (IoT), from smart city infrastructure to consumer devices, creates new vulnerabilities, expanding the entry points for data breaches," he noted. 

"Blockchain’s decentralised and immutable nature conflicts with the 'right to be forgotten' under GDPR, which allows individuals to request the deletion of their personal data. While GDPR requires organisations to obtain explicit consent and grants individuals rights like data access, rectification, and erasure, Blockchain's design ensures that data cannot be easily altered or erased, creating friction between privacy rights and technology. In this landscape, privacy-by-design has evolved from a best practice to a fundamental necessity for earning trust and ensuring compliance." 

Jan Sysmans, Mobile App Security Evangelist, Appdome, touched on an evolving cybersecurity landscape in the mobile space. "On Data Privacy Day, we emphasise the growing importance of safeguarding mobile data in today’s interconnected world. Mobile apps are central to consumer and business interactions, making robust security a necessity for developers. Evolving threats like AI-driven attacks and account takeovers exploit app vulnerabilities, compromising user accounts, data, and brand trust," he said.

"To combat these risks, mobile businesses must adopt comprehensive, lifecycle-focused security measures."

Cybersecurity was a focus for several industry observers. Cybercriminals are increasingly sophisticated, leveraging advanced tactics to exploit weaknesses within organisations. "According to recent studies, 41% of businesses in the APAC region experienced a data breach in the past year, with nearly half reporting more than 10 incidents. This growing threat is exacerbated by poorly-secured privileged accounts, which, if compromised, can provide attackers with full access to critical systems, exfiltrate sensitive data and wreak havoc on business operations," said Keeper Security's CEO and Co-Founder Darren Guccione.

Source: Cohesity. Lim Hsin Yin.
Source: Cohesity. Lim Hsin Yin.

 Lim Hsin Yin, VP, Sales - ASEAN, Cohesity, said that data protection must evolve. "As we mark World Data Privacy Day, the growing surge in cyberthreats underscores the urgency to re-evaluate our approach to data protection. It is crucial for organisations to incorporate proactive measures like AI-powered threat simulations and advanced encryption, moving beyond traditional security strategies to build up true cyber resilience. Conventional cybersecurity is no longer adequate to withstand external threat actors; organisations need to anticipate and mitigate emerging risks," she said.

"By aligning with the ASEAN Guide on AI Governance and Ethics and countries’ national cybersecurity regulations, businesses are able to innovate while maintaining a strong focus on robust security. In Singapore, the Model AI Governance Framework for Generative AI seeks to build a governance framework that aims to protect users while balancing the need to drive innovation.

"For businesses, critical systems are best protected when ethical AI and resilient data practices are given priority. Doing so fosters enhanced credibility, ensures business continuity, and drives long-term growth in today’s integrated digital ecosystem."

Darren Thomson, Field CTO EMEAI at Commvault, agreed that cybersecurity needs to be revisited. "As we embrace the new year and Data Protection Day rolls around once again, the core themes from cybersecurity companies remain the same: cyberattacks are not only increasing in volume but are also becoming alarmingly more sophisticated. It is no longer enough to focus solely on defending against these attacks - organisations must prioritise rapid recovery and minimising downtime to bolster their cyber resilience," he said.

“Data breaches can lead to mistrust and brand damage externally, while internally there is increased scrutiny from the board who are questioning the organisation’s security posture. If there’s not, there should be!" agreed Bernard Montel, Technical Director and Security Strategist at Tenable.

Arun Kumar, Regional Director for APAC, ManageEngine said: "Safeguarding data is essential, not only to prevent financial loss, reputational damage, and loss of intellectual property, but also to uphold customer trust. This requires a comprehensive approach that integrates people, processes, and technology frameworks.

"For instance, solutions like security information and event management (SIEM) leverage AI and automation to proactively identify, manage, and neutralise potential threats. These tools provide organisations with real-time alerts, enhancing their ability to respond swiftly to security incidents. However, technology alone is not enough. Data privacy also involves educating employees and fostering a culture of shared responsibility where everyone adheres to robust data protection policies and practices."

Kumar also pointed out that data privacy ultimately goes beyond compliance with regulations. "It empowers organisations to take control of their data and protect the rights of individuals, ensuring their information is handled transparently and responsibly. By doing so, businesses build long-lasting trust with their customers while securing their most valuable asset: data," he added.

The human factor 

"Human error also remains a major contributor to breaches, with 74% involving the human element, including stolen or weak passwords, credentials and secrets. It’s essential for organisations to invest in employee training on strong password practices and the risks associated with privileged accounts. Insider threats – whether accidental or malicious – also complicate matters, as privileged access can be exploited by trusted individuals," said Guccione.

Leadership

Strong leadership is fundamental in fostering a privacy-centric culture, Lee suggested. "Executives who advocate for privacy at the board level signal to regulators, customers, and partners that data protection is a priority. By investing in cross-functional data governance teams, embedding privacy impact assessments early in the project lifecycle, and providing ongoing employee training, leaders can protect their organisation's reputation while aligning with regional laws. In this way, a privacy-first approach becomes both a safeguard against fines and data breaches, and a competitive differentiator that enhances credibility," he said. 

A minimum viable company

"To achieve (cyber resilience), businesses must embrace the concept of a minimum viable company - the ability to maintain essential operations and services even in the aftermath of a cyberattack. Traditional reliance on backups is no longer enough, as cybercriminals have adapted, embedding malware into backups or using sleeper ransomware that activates after restoration. This makes clean recovery strategies essential," said Thomson. 

"Having a minimum viable company requires the ability to restore critical systems in a secure, malware-free environment, which is possible today thanks to virtual cleanrooms in the cloud. These environments can be adapted as needed, allowing for regular testing at a minimal cost and ensuring rapid, reliable recovery when it matters most."

Thomson said that there is more to the equation, however. "Rebuilding cloud applications is often the most time-consuming task, as organisations cannot function without their core systems. What was once a laborious, manual process can now be streamlined through modern automation technology. Critical cloud applications can be swiftly reconstructed in a secure cleanroom, reducing recovery times from days or weeks to mere hours or minutes. This is the essence of true cyber resilience - the ability to recover, adapt, and maintain operations even in the face of a crisis - and is something organisations can no longer afford to ignore."  

Identity management

"Digital identity is the front door to any digital experience. Organisations need to ensure that businesses are investing in the latest technologies such as customer identity and access management (CIAM) and decentralised identities (DCI) to secure consumers’ identities and prevent fraud," Fon said.

"Organisations are also responsible for ensuring customers understand how data is collected and are given a clear opt-in or opt-out option to feel secure and respected. This transparency goes a long way toward building brand loyalty and a positive customer experience."

"Identity security is a critical pillar of data privacy. Deploying robust workforce identity management solutions and protecting user credentials are key steps in preventing breaches. Prioritising identity security will not only ensure compliance with local data protection laws; it will also ensure that organisations are mitigating risks and protecting customer trust," agreed Lim from CyberArk. 

Privileged access management

Guccione noted that privileged accounts are often the most valuable to attackers."Protecting privileged accounts is becoming increasingly difficult due to the expanded attack surface created by cloud adoption, remote work and hybrid environments. As businesses embrace digital transformation, new vulnerabilities arise – particularly concerning privileged accounts. Employees accessing systems from multiple devices and locations make consistent security measures harder to maintain," he elaborated.

Privileged access management (PAM), the strategies and tools that help organisations control and monitor accounts with access to privileged information, could provide greater visibility into IT infrastructure, Guccione said, "enabling organisations to manage third-party access, monitor user activity, ensure compliance and mitigate the risk of cyberattacks".

"By reducing the number of users with elevated privileges, PAM minimises the attack surface, making it harder for cybercriminals to exploit vulnerabilities. It also helps prevent insider threats by controlling who has access to sensitive systems, offering strict access controls and real-time activity monitoring. This proactive approach helps organisations identify and stop malicious behaviour before a breach occurs," Guccione said.

"Many regulatory frameworks require organisations to implement access controls and auditing for privileged accounts. PAM solutions support compliance by providing the necessary reporting and oversight to meet these standards."

Zero-knowledge encryption

Guccione also noted the pivotal role of zero-knowledge encryption in protecting businesses against cyberthreats. "Zero-knowledge encryption is as secure as it gets. It ensures that only the user has access to their data – period. With true zero-knowledge encryption, your information is encrypted and decrypted directly on your device, meaning the service provider doesn’t hold the keys, even for recovery or troubleshooting," he explained. 

"This level of control goes beyond what traditional security tools, or even 'almost' zero-knowledge solutions, can offer. 'Almost' solutions still leave potential vulnerabilities, with access points or backdoors that undermine your security. With zero-knowledge, there are no loopholes – just absolute confidentiality."

"As businesses, we hold a responsibility to protect client data, intellectual property and everything in between. Zero-knowledge encryption plays a pivotal role in fulfilling that duty. When your data is protected at every stage – whether in storage, transit or in use – you’re reducing the risk of exposure from every angle. True zero-knowledge encryption is a crucial step for businesses in building a comprehensive security strategy," he said.

New strategies

Lee advised businesses to consider regulations, technologies, and processes to ensure trusted relationships with stakeholders. "Looking ahead, enforcement in APAC is poised to intensify, with higher penalties and evolving guidelines—particularly around AI and cross-border data flows. Privacy-enhancing technologies, post-quantum encryption, and Zero-Trust security models will be integral to an organisation’s data protection strategy. To stay ahead, businesses must map data flows comprehensively, harmonise compliance across jurisdictions, and maintain proactive communication with regulators. In an age where personal data is an invaluable asset, robust privacy practices will not only meet legal requirements but also strengthen the trust that underpins enduring relationships with customers and partners," he said.

Thales' five steps for better privacy include:

1. Create a culture of privacy. This can be done by educating employees on their obligations to protect personal information and ensuring that staff know how data security is applied in their daily work.

2. Conduct a privacy impact assessment. This will determine how and where data is stored, backed up, and disposed of, what data security measures are currently implemented, and where systems may be susceptible to a data privacy breach.

3. Transition from a reactive cyberdefence stance to a proactive one. Security programme transformation is characterised by proactive defences that enable operators, developers and other users to adopt new technologies safely, Thales said. According to Thales’ 2024 Data Threat Report, organisations have identified the emerging areas of generative AI, cloud, IoT/5G and quantum computing for proactive security measures.

4. Keep up to date with security technologies. Staying abreast of technological developments in the industry is essential. With the increase in phishing attacks and identity infrastructure attacks, organisations should consider how workforce identity and access management, along with customer identity and access management, can enhance their existing security measures.

5. Foster stakeholder buy-in to enhance overall organisational security. Security leaders should focus on empowering stakeholders to play an active role in safeguarding the organisation. For instance, developers could adopt user-friendly methods for customer onboarding and authentication, while security champion programmes can inspire more developers to embrace secure development practices. These initiatives help embed robust security measures across the organisation, creating a culture of security that extends beyond its boundaries.

“Ultimately, these steps will enable businesses to deepen customer trust, strengthen organisational resilience through better threat management, and improve ROI from generative AI and cloud investments through better data control,” said Andy Zollo, Senior VP, Application and Data Security for Thales in Asia Pacific & Japan. ROI stands for return on investment.

Explore

The data privacy focus continues with a discussion on AI at https://www.techtradeasia.com/2025/01/data-privacy-in-2025-ai-adoption.html

Read about data privacy research on consumers from Acronis at https://www.techtradeasia.com/2025/01/acronis-privacy-survey-data-breaches.html

Hashtag: #DataPrivacy2025

No comments:

Post a Comment