The General Data Protection Regulation Is your business ready?

On 25th May 2018 the General Data Protection Regulation will come into effect and all business’s trading with or in the European Union will have to be compliant. Although many of the concepts under the current Data Protection Directive will remain the same, there are some key changes that company’s need to be prepared for to avoid fines in future. Encrypting data can satisfy many requirements of the GDPR, for Databax –  DESlock Encryption by ESET is the best way to safely encrypt your data and secure your hard drives, removable media, files and email.


Why encrypt your data?

Data is a critical part of all businesses and is now their most valuable asset. Although the current regulation does not require businesses to encrypt data, the seventh data protection principle requires company’s to take appropriate measures to ensure any personal data they hold secure. Due to the low cost of encryption and its accessibility, if data is not encrypted and a breach occurs, the ICO takes the view that the data was not appropriately secured and regulatory action will follow.

Encryption is now becoming so vital for businesses as from 25th May 2018, The General Data Protection Regulation (GDPR) will come into effect, replacing the current EU data protection law, the Data Protection Directive. The aim of the GDPR is to update the regulation and unify the EU under one harmonised law. Currently, as there are 28 member states within the European Union, companies encounter difficulties ensuring they are compliant with a patchwork-quilt continent of approaches to the directive.

Key Changes

  • One continent, one law – a single European law for all 28 member states.
  • Stronger enforcement of the rules – Data Protection authorities will be able to fine companies who don’t comply  up to 4% of their global annual turnover or €10 million, whichever is higher
  • The right to know when data has been hacked – organisations must notify the national supervisory authority of data breaches and communicate to the data subject as soon as possible
  • Notification of data breaches – the National Authority must be notified of data breaches as soon as possible, any notification beyone 72 hours after the incident must be accompanied by justification for the delay
  • Data protection by design and default – data protection safeguards must be built into products and services from the earliest stage of development
  • No exceptions – If non EU companies are active in the EU market, even if they’re goods & services offered are free, the same law and regulations still apply

DESlock Encryption by ESET

With the GDPR coming into effect next year, businesses are being advised to take action now to secure their data and ensure they are compliant in order avoid fines under the new regulations. As encryption is the easiest and safest way to secure data, Databax use DESLock encryption, secure in the knowledge that both our own and our customers data is encrypted and another layer of security is added to our systems. DESLock is a simple and easy to use encryption application and is a cost effective way to prevent data breaches for all sizes of organisation.

Secure data across all devices, wherever you are

Whether on the move, in the office or at home, DESlock encryption ensures your data is secured. DESlock encryption includes file, folder, full disk & removable media encryption

Secure transfer of data across locations

DESlock includes clipboard, attachment and removable media encryption, securing data across all mail clients and data stored on CD or DVD.

Secure data through controlled access

DESlock encrypts data and management are able to distribute keys to certain data when required. Similarly keys can be withdrawn and access blocked at any time.

Secure safe storage of personal data

DESlock is FIPS-140-2 validated and uses reliable, approved and secure industry standard encryption algorithms.

Secure destruction of redundant data

DESlock’s Shredder Tool securely deletes data to the DoD-5220.22-M standard, ensuring its completely unrecoverable.

Despite the UK opting to leave the European Union, the implementation of the GDPR on UK businesses will not change, and all organisations must be compliant. All it takes for your company to be in breach of the regulations is one USB stick to go missing. If any device containing personal data is lost, hacked, stolen or missing, the ICO must be notified within 72 hours, the credibility of the business is destroyed and a fine of up to €10,000,000 will follow.

Could your company survive?

Encrypt your data today and secure your business’s future.

Call 0161 660 4160

How secure is your network?

Mimecast Logo

82 seconds, that’s how long it takes for a person in your organisation to click onto a phishing scam that has dropped into their inbox and for a company’s network to be compromised. 95% of all cyber-crime begins with an email, so how sure are you that your networks armoury is prepared to defend your business against the diverse and constantly evolving world of cyber-crime?

For Databax, that’s where Mimecast TTP steps in. Email is the simplest and cheapest way for criminals to compromise your network and of all the scams that are dropping into users’ inboxes 23% of recipients will open the email and 11% will run the attachment, how would you tackle this?

Mimecast Targeted Threat Protection is an advanced security package, which offers a comprehensive security suite to help companies protect themselves against malicious email attacks.

Mimecast TTP protects against


URL Spoofing


Malicious Attachments



So what are the benefits?

Real time scanning of all inbound emails

As emails pass through the Mimecast gateway, all components of the message are scanned including the display name, domain name & age and the body of the message. The company’s administrator has the control to decide what to do with emails that fail a combination of these tests – they can be blocked or held and marked as suspicious for the user to determine whether the email is safe or not.

Sandboxing of File Attachments


Businesses can block certain types of attachments that are sent and received, however, documents such as Microsoft Word, Microsoft Excel and PDF’s are all legitimate documents colleagues would need to send to each other, and are easily weaponised. Attachments that could contain malicious code are removed from inbound emails and replaced with a transcribed, safe copy. If users deem the attachment as safe, they can request for the original document.

Protection from Malicious URL’s

Any links sent via email are sent through the Mimecast gateway and URL Protect rewrites all URL’s in every email. If URL’s are clicked Mimecast scans the site and  if seen as malicious the site is blocked, all others deemed as safe become accessible immediately.

Protection on & off corporate network

All features of Mimecast TTP – URL Protect, Attachment Protect and Impersonation Protect, are featured for all inbound emails for a business, meaning whether a user is accessing their email from their office, their smartphone or their own computer at home, every click, everywhere, across all devices used is secured.

Increased User Awareness


In addition to Mimecast TTP’s security, another layer which is improved through using Mimecast, is User Awareness. Users are prompted to review and either accept or deny links or attachments in emails which Mimecast have deemed as suspicious. Moreover, the company’s administrator is able to review users’ activity – so if certain users are repeat offenders for clicking on malicious links and attachments, they are prompted more frequently to review emails until their awareness improves. This helps to build a ‘Human Firewall’ and add extra security to the network by increasing all users’ awareness.

Get in touch & secure your network today

Once a malicious email has penetrated a network, it can stay undetected for 205 days, with the average data breach costing a UK company £1.2 million per incident and the recovery time estimated at around 2 months. Mimecast TTP offers a comprehensive set of security features to protect your network from malicious cyber attacks and with 95% of breaches coming through email how sure are you that your network is protected against them?

Secure your inbox from cyber threats today
Call 0161 660 4160