GDPR Compliance

Services | GDPR Compliance

Start the GDPR compliance journey through technology. 

What is GDPR?

The General Data Protection Regulation (GDPR) is a regulation that places responsibility on organisations that collect, store and process personal data to comply with the new law. It has been designed to give individuals better control over their personal data and establish one single set of data protection rules across Europe. Non compliance can lead to significant fines. 

download (2)

Who does the GDPR apply to?

The GDPR applies to every organisation collecting and/or holding data on EU citizens, including companies not in Europe.

Understanding Personal Data

Personal data is defined as any information relating to an identified or identifiable person. This includes online identifiers, such as IP addresses and cookies if they are capable of being linked back to the data subject. This also includes indirect information which might include physical, physiological, genetic, mental, economic, cultural or social identities that can be traced back to a specific individual. There is no distinction between personal data about an individual in their private, public or work roles - all are covered.

To ensure your data and data processes are GDPR compliant these are some of the steps you must take:

  • Identify and understand the personal data your organisation holds and know where it is stored.
  • Manage how data is accessed and used through solid processes.
  • Establish security controls to prevent, detect and respond to vulnerabilities and data breaches.
  • Report on data requests and breach notifications and safely store required documentation.

GDPR Readiness Assessment

We will review your IT systems and policies to identify areas of risk for non compliance.

Technology services and solutions to assist you with GDPR compliance

Patch Management

Leaf provide patch management which automates and controls the deployment of software patches. This creates a consistent environment that is secure against vulnerabilities in operating systems and software applications. 

  • Windows Patch Management
  • Application Patch Management
  • Remote Control

Email Security

91% of cyberattacks start with an email and the results of an email security breach can be devastating.

  • Mail Anti Malware and Antivirus
  • Anti-Spam, Anti Phishing, Anti Whaling
  • Secure Messaging
  • Large File Send
  • Email Archiving

Training

As part of our cyber security services we offer training to your workforce to ensure your employees are educated on: 

  • Cybercrime
  • The risks they face
  • Phishing and whaling attacks
  • Minimising risk

Mobile Device Management

Many security breaches recently have been due to insecure mobile devices. Mobile Device Management gives your business control and secure access to smartphones and tablets and the data shared between them. 

  • Security Policy Enforcement
  • Selective wipe of company data
  • Application control and management

Data Leakage Prevention

We offer data leakage prevention that performs content inspection and contextual analysis of data on premises or in the cloud. This protects against data leaks and unauthorised distribution of sensitive company data.

  • Email DLP
  • File Permissions
  • Document Library and File Server Rights Mgmt

Ransomware Protection

With managed ransomware protection, Leaf have full visibility of the levels of protection against viruses and malware and have access to alerts if protection ever drops.

  • AntiVirus
  • AntiMalware
  • Behaviour Analysis                                                                                     

Internet Gateway Protection

Internet Gateway Protection prevents intrusions, blocks malware and controls applications for all your network traffic.

  • Gateway AV
  • Content Filtering
  • Deep Packet Inspection (SSL)
  • Intrusion Prevention
  • Download Sandboxing and behaviour analysis

Encryption

Encryption allows you to keep on top of evolving risks and gives the data inside all your environments protected, regardless of its location. 

  • Endpoint Encryption
  • Removable Drive Encryption
  • Email Encryption
  • Backup Encryption                                      

Multi-Factor Authentication

Multi-factor authentication means more than one method of authentication from independent categories of credentials to verify a user's identity. 

  • Use of SMS, Smartphone App
  • Token Device                                                                                         

GDPR Readiness Assessment

We will review your IT systems and policies to identify areas of risk for non compliance.