Intelligent CIO APAC Issue 52 | Page 46

CIO OPINION light of the growing prevalence of privacy protection laws like the Personal Data Protection Act ( PDPA ) in Singapore . Some organisations may not be able to fully comply with data erasure demands due to poor data hygiene and negligent data governance adherence , as they may not have a thorough understanding of all the potential locations for data points . However , they need to put in measures to ensure they comply with local regulations .
Authentication is the process by which users prove their identity and gain access to data . A password may be required for certain systems while biometric indicators like fingerprints or facial scans may be used for others . Authorised parties can access data that has been locked through authentication . This can be implemented at the file , application , or network level .
Backups and recovery are also vital for businesses . It describes how you store data and how you intend to restore it in the event of a problem . Similar to consumer-level services that protect you if you misplace your phone or accidentally erase a file , enterprise-level backup involves dispersing data over several safe locations to offer redundancy . An exact snapshot of the data is used by the other site in case the first location fails . To ascertain what data is recovered and how long it takes , organisations employ Recovery Point Objective ( RPO ), which is the largest amount of time that data can be retrieved from , which may or may not result in data and Recovery Time
Objective ( RTO ) metrics which is the desired amount of time between the failure event and the point at which activities resume is known as the recovery time goal .
How is technology enhancing data privacy efforts
Thanks to technological advancements , businesses can now more easily comply with a variety of data privacy laws by using automated solutions that monitor and enforce compliance standards in realtime , reducing the risk of human error . In 2024 , many solutions will be integrated into AI to help turbocharge organisations ' IT capabilities , increasing the effectiveness of these fundamental data protection controls .
Technological innovations in data security , such as encryption and tokenisation , as mentioned earlier , enable organisations to protect sensitive data , improving overall data resilience against potential breaches as these tools make it difficult for unauthorised users to access or misuse data , even if it is intercepted .
Multi-factor authentication provides a reliable defence against password attacks but , with technological advancements , password-less options are now available . The recurring requirement for password changes is gradually disappearing as a result of our devices ' use of trusted authentication and biometrics . p .
46 INTELLIGENTCIO APAC www . intelligentcio . com