No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

What if WannaCry Happened in the GDPR Era?

by Jason Allaway
June 13, 2017
in Data Privacy, Featured
skull and key

Mitigating Risk to Enhance Data Security

In this article, Jason Allaway, RES Area VP for the U.K. and Ireland, reveals what the true cost of a ransomware attack like WannaCry will be in the GDPR era. As many organizations struggle to prepare for the upcoming regulation, Jason shares the three pillars of risk that must be integrated into organizations’ GDPR strategies to protect and secure sensitive data without hindering productivity.

Over the last few weeks, there have been numerous news stories around the WannaCry ransomware attack and the disruption that it has produced. WannaCry has caused major issues and compromised personal data around the world in a very short period of time.  It was reported that more than 200,000 computers were hijacked in more than 150 countries, with victims including hospitals, banks, telecommunications companies and warehouses.

Today, data is worth a lot of money, and cybercriminals know it. This is one of the key reasons why the EU has established requirements around doing more to protect data from breaches with the impending GDPR legislation. In fact, the GDPR compliance deadline of May 25, 2018 is less than one year away.

What if WannaCry Was Released on May 25, 2018?

Nobody can be sure what will happen after something like WannaCry strikes once the GDPR compliance deadline passes. It is assumed the governing bodies would jump into action, and it is inevitable that there will be a breach at some point after the compliance deadline. Based on the EU’s regulations, an investigation will begin to see if the organization met all the requirements and took the appropriate measures to secure the data.

For example, if an organization that experienced a data hijacking from malware was found to be out of compliance with GDPR, the consequences would be steep. There could be many reasons for noncompliance: maybe they didn’t have the right processes in place or they didn’t have a way to enforce their policies. Or maybe they didn’t report the breach within the 72-hour requirement. No matter where they fall short, it’s likely the organization will be made an example of – and it will be expensive.

GDPR has set forth some hefty fines between €10 million and 20 million, or up to 4 percent of a company’s total worldwide annual revenue. This is not to mention reputation damage and any disruption they already experienced from the breach itself. In the case of an attack like WannaCry, organizations would be hit hard on multiple fronts. The potential of getting struck with compliance fines on top of the breach means that organizations must take their approach to increasing data protection very seriously, and they must act quickly.

The 3 Pillars of Risk

There has been countless commentary and advice on how to protect and lock down systems and what should have been done by organizations to ensure they were protected from ransomware like WannaCry. However, one thing not being discussed is the amount of risk that something like WannaCry presents when it comes to compliance. Because a ransomware attack can cause this much disruption on such a large scale, it must be part of an organization’s GDPR strategy. To be effective, every organization should evaluate their level of risk across three key areas: technology, people and processes.

Technology

In an ideal world, organizations have the latest technology updated with the latest patches and security. The perimeter and the internal entry points would be secured without compromising user productivity. Also, technology would enforce policies so users do not open or read files or websites from unknown senders. In this secure world, risk is mitigated though technology. But many organizations are still utilizing legacy systems because they are “good enough” or haven’t implemented modern technology yet due to lack of resources (budget, time, etc.).

People

People will follow human nature, at times doing things that do not follow the rules. For example, how many times have people driven over the speed limit to get somewhere faster? With the uncertainty of being caught and the knowledge it is illegal, people still do it. It is human nature to do what is necessary to get where we are going. Same goes for the workplace: users want to be productive, have a consumer-like experience and get their needs fulfilled immediately or they will go around IT, resulting in shadow IT.

Processes

There are many processes that must be put in place to mitigate risk around GDPR. One example of a poorly defined or poorly enforced process might be how users manage their files – everything from deleting to locking their files. How many files are encrypted or contain personal information? Is data stored where it shouldn’t be? It is easy to assume there are a lot of people who – although not with malicious intent – store data in unsecure locations outside of the core network because it is simply easier to access and manage. And that is just one example of how a process that is not well-defined or enforced can lead to risk.

Mitigating Risk as the Cornerstone of GDPR Strategy

An organization’s GDPR strategy should address risk in all three of those areas: technology, people and processes. Organizations must not only ensure employees can carry out their jobs without disruption, but also enforce the processes and rules that need to be applied based on the context of the user (who they are, where they are, what device they are using, etc.). Then they must decide if the action they are trying to do is unusual or outside the rules. If controls are implemented correctly and automated, an organization will end up with a productive and secure environment.

When it comes to GDPR, the largest mountain to climb is mitigating risk around people and processes, without hindering productivity. Organizations need to make sure processes are strong and complete enough to ensure GDPR requirements, but flexible enough to let people still do their jobs. If not, workers will go around the system and open the organization up to even more risk. With self-service, context-aware technologies, and by automating the rules around processes, organizations can leverage technology to set boundaries (where files can be saved, automatic encryption, preventing rogue or unauthorized applications with whitelisting, etc.) and protect the infrastructure and data from vulnerabilities.

This piece was originally shared on RES’s “RES*OLUTION blog” and is republished here with permission.


Tags: CybercrimeGDPRRansomware
Previous Post

Revenue Recognition, Cybersecurity and PCAOB Inspection Reports Found to be Influencing Forces on Companies’ SOX Compliance Efforts

Next Post

Sovos Introduces Intelligent Compliance Cloud

Jason Allaway

Jason Allaway

Jason Allaway is Area VP for the U.K. and Ireland. As a registered GDPR data protection officer, he helps customers move their compliance strategy forward, mitigate risk and solve complex enterprise IT challenges.

Related Posts

robot hand pointing to sky

Agentic AI Can Be Force Multiplier — for Criminals, Too

by Steve Durbin
April 21, 2025

How polymorphic malware and synthetic identities are creating unprecedented attack vectors

origami tiger

Paper Tigers Won’t Protect You: The Reality of Effective NIS2 Compliance

by Hans Kayaert
March 24, 2025

Why Belgium's early adoption model could prevent another round of ‘compliance theater’ across Europe

examining data on laptop screen

Privacy Rights Surge Forces Rethink of Data Management

by Gal Ringel
March 14, 2025

As global privacy regulations multiply, organizations face mounting pressure to efficiently respond to data subject requests amid complex data environments

cyber insurance concept data and umbrella

Think Your Cyber Insurance Has You Covered? Think Again.

by Bill McLaughlin
February 20, 2025

Security audits and compliance frameworks often predict whether insurers will pay your claim

Next Post
Sovos Introduces Intelligent Compliance Cloud

Sovos Introduces Intelligent Compliance Cloud

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights