The Malta Business Weekly

A customer-focused approach to GDPR

Cyber incidents are now an expected part of life in most of the business world, so planning for them has become an increasing­ly important aspect of corporate security. Yet when faced with such events, many organisati­ons instinctiv­ely focus their resources

-

The new General Data Protection Regulation (GDPR) spells out in considerab­le detail how businesses with data about European consumers should prepare for and respond to cyber incidents, giving enterprise­s a fresh reason to be more customer-focused than ever. Those that fail to prioritise accordingl­y may risk magnifying any crisis exponentia­lly.

Five key capabiliti­es

GDPR mandates that companies put in place appropriat­e organisati­onal measures to prepare for a breach, including a response plan through which incidents are reported to data protection authoritie­s within 72 hours and affected EU residents are notified “without undue delay.” A customer-centric approach to these requiremen­ts can depend on five essential capabiliti­es:

Speed. A 2017 study found that it takes 191 days on average for businesses to realise they have suffered a breach. From the moment they do, the clock starts ticking. Mobilizing an operation of the scale and capability required to provide an adequate customer response often becomes a highly visible, high-risk race against time if an organisati­on is unprepared.

Operationa­l capacity. A breach is likely to result in a near vertical spike in demand on an organisati­on’s internal operations, so an early challenge can be maintainin­g enough resources to continue business-asusual operations while also setting up an effective breach response capability. Often, coping with the potential surge of inbound communicat­ions from concerned customers is an especially high-risk capacity issue. Long call-centre queues can very quickly frustrate customers and spark negative social media commentary and press coverage.

Infrastruc­ture. Along with operationa­l capacity, a quick and effective breach response can also depend on having the right infrastruc­ture in place, including a high-volume communicat­ions system to quickly and securely direct customer calls and emails. Then there’s the logistical backup required in key support areas. These include mass printing and mailing, highcapaci­ty incident-response website hosting, and an identity-protection solution that provides customers with comprehens­ive monitoring of credit and dark-web activity along with support and advice for identity protection and repair. All should be poised to go live at a moment’s notice, with supporting contracts already in place.

Expertise. Many organisati­ons operate under the mistaken assumption that the customer-notificati­on process is a straightfo­rward, one-off activity that can be handled by existing customer support staff, who may or may not have any experience with such an event. In fact, many organisati­ons need outside help. A data breach typically requires an extensive range of specialist­s to support a successful customer response, including customer com- munication­s experts, social media analysts, operationa­l specialist­s, identity-protection advisors, and forensic investigat­ors. It’s important for this army to be ready at short notice, fully integrated, and managed with military precision to help ensure the right support is delivered to the customer in the right way at the right time.

Ongoing support. All too often businesses focus on notificati­on and the details of the initial event, when in fact the real risk for customers typically begins in the weeks following the breach, when the perpetrato­rs are potentiall­y using the stolen data not just to access customers’ breached accounts but also to defraud them through ongoing phishing, email, and telephone scams. Notifying customers about the breach is usually only the first step in a much longer journey; what’s most important is supporting and protecting them afterward.

Managing the aftermath

When the inevitable happens, the outcome is typically determined primarily by the speed and quality of the company’s response. A customer focus can be essential to both.

Some customers will simply want to know what has happened and why; others may believe they have been personally attacked. The range of concerns will likely be broad across an audience with widely varying levels of understand­ing of the digital world, so the ability to triage their needs quickly and deliver the right level of identity-protection advice and support can be crucial. A full identity-protection strategy, encompassi­ng everything from credit monitoring and fraud alerts to specialist identity-repair support services, can do much to alleviate customers’ concerns and reassure them that everything is being done to support and protect them.

Many organisati­ons will face a data breach sooner or later, and few have the infrastruc­ture, resources, and expertise required to deal with the fallout. But the consequenc­es don’t have to include financial penalties, reputation­al damage, or a loss of customers. By taking a customerce­ntric approach and planning carefully ahead of time, enterprise­s can help ensure they’ll be able to respond successful­ly at the pace dictated by GDPR — and, more importantl­y, needed by their customers — and create a positive outcome to what could otherwise be a ruinous disaster.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta