SlideShare a Scribd company logo
1
JMS Secure Data | Data Protection Services
Who is JMS Secure Data
The Team;The Team;
•Marlon Johnson – Managing Director
•Kuhan Selvananthan – Technical Operations
•Michelle Rumble - Engagement & Marketing
•Laurelle Hughes – Accounts & Administration
What do we do at JMS Secure Data
We are a Data Protection specialist providing practical and TechnicalWe are a Data Protection specialist providing practical and Technical
solutions to businesses who hold a Data Protection Licencesolutions to businesses who hold a Data Protection Licence
Our Service Goals are to;Our Service Goals are to;
•MeasureMeasure – work with data controllers by way of providing a Free Data Protection
Health Check Assessment to measure the risks to their business.
•EducateEducate – providing recommendations and advice where non-compliance has
been identified posing a risk to your confidential data regulatory status.
•SupportSupport – Implementing technical solutions to achieve Data Protection
compliance which also safeguards your confidential data and business
•MotivationMotivation – providing post implementation support and advisory service
which in our view motivates the customer to remain compliant with
their data
Your DataYour DataYour DataYour Data
Data Protection GovernanceData Protection GovernanceData Protection GovernanceData Protection Governance
• ICO DPA Compliance
• Policy Implementation
• Staff DPA Awareness
• ICO DPA Compliance
• Policy Implementation
• Staff DPA Awareness
Total Endpoint ProtectionTotal Endpoint ProtectionTotal Endpoint ProtectionTotal Endpoint Protection
• Data Encryption
• Compliance Check
• Anti-Malware / Program Control
• Firewall
• Data Encryption
• Compliance Check
• Anti-Malware / Program Control
• Firewall
Secure Cloud SharingSecure Cloud SharingSecure Cloud SharingSecure Cloud Sharing
• Access, edit, share and store,
from our all-in-one application
• Manage, access and
permission on all Projects,
folders and files
• Access, edit, share and store,
from our all-in-one application
• Manage, access and
permission on all Projects,
folders and files
BackupBackupBackupBackup
• Automatic daily backup to
secure offsite data centres
• 24/7/365 data availability
• Total security with AES 256 v6
encryption
• Automatic daily backup to
secure offsite data centres
• 24/7/365 data availability
• Total security with AES 256 v6
encryption
The Cycle of Data Protection
Who Needs Our Services
• Financial Services Sector
• Accounting Sector
• Legal Sector
• Education Sector
• Medical Sector
• Local Authorities
• Business Services
• Anyone who holds a Data
Protection Licence
What is Data Protection Governance
• Data Protection Licence
• ICO DPA Compliance
• Data Protection Act (8 Principles)
• DPA Policy
• Staff Training
• DPA Training Records
• Reviewed Annually
What all the fuss about Encryption Software?
Installing Encryption Software Is the Only
Secure Way to Protect Your Data
Encryption, is the process of changing information in such
a way as to make it unreadable by anyone except those
possessing special knowledge (usually referred to as a
"key") that allows them to change the information back to
its original, readable form
If the unthinkable happens and you lose your PC / Laptop
with everything stored on the hard disk, rest assured – with
Encryption the information is protected and cannot be
compromised which ensures peace of mind for your
business and your clients data
Remember.... setting a Windows password on
your Windows login does not protect your PC /
Laptop, it just makes it a little harder for
someone to gain access, but not impossible!
What does the ICO say about Encryption?
What the ICO Says
‘The ICO’s guidance is clear: all personal
information – the loss of which is liable to
cause individuals damage and distress - must
be encrypted. Encryption is one of the most
basic security measures and is not expensive
to put in place - yet we continue to see
incidents being reported to us. This type of
breach is inexcusable and is putting people’s
personal information at risk unnecessarily. ‘
Without Encryption software installed you risk being
in breach of ‘Principle 7’of the Data Protection Act
which can result in a fine of up to €100 Million or 5%
of your annual turnover…
A Snapshot of Incidents investigated by the
ICO for Q4 2014
Total Endpoint Protection
• Full Disk Encryption
• Media Encryption / Port Control
• Anti-Malware / Programme Control
• Webcheck
• Firewall
• Compliance Checklist
• 24/7 Support for password resets or
software conflict support
Secure Online Data Centre Backup
How it works...
The online data backup service is designed to be used
individually as a basis for a business continuity plan or
alongside our other services to give combined protection
in the event of a disaster recovery situation.
Key Features
•Automatic, daily backup
•Fast and reliable data restore
•Data is encrypted and sent to 2 UK Data Centres
•No need for additional backup hardware
•24/7 data availability & UK technical support
•Set & forget system that offer 60 day file version
recovery
Most importantly our Backup software and process
meets the cloud storage guidance mandated by the
ICO Cloud Computing Obligations
Secure Cloud Sharing
• Are you using the Cloud to share or store data?Are you using the Cloud to share or store data?
• Are you operating compliantly?Are you operating compliantly?
• Is your Data at risk?Is your Data at risk?
If you are unsure about any of the above then talk to
JMS Secure Data about Soonr Workplace
Cloud…
• Soonr Workplace One-App™ – Access, edit,
share and store, from our all-in-one application,
ensuring ease of use and no data leakage
• Optimized content delivery and rendering – Over
fifty file types are rendered to perfection on all
mobile devices
• Device support – iPad and iPhone, Android
smartphones and tablets, Windows Phone and
BlackBerry phones
• Team-based sharing – Manage, organize and
share files with ease, controlling access and
permission on all Projects, folders and files
• Compliant under the Data Protection Act
Client Case Study 1
IFA Company– 3 EmployeesIFA Company– 3 Employees
•Problem
The company had a large confidential client data base across 4 PC’s and wanted to
work in different locations but wanted to ensure the data was secure and protected
and also backed up to ensure they had Business Continuity (BC).
•Our Solution
Backup software was implemented to ensure BC, all 4 PC’s were encrypted thus
ensuring compliance and security in the event of loss or theft. We recommended the
Soonr Cloud platform to provide a sync and share system that allows all users (with
permission levels) to sync and share data & files between devices and employees.
•Result
A fully compliant business operation that is compliant, secure, has BC and works
smart allowing users to work from all devices & PC’s.
Client Case Study 2
Nursery Business – 7 EmployeesNursery Business – 7 Employees
•Problem
The owner was unsure about how to protect all the confidential data in the business
relating to all the child records, staffing records etc.. She also wanted a solution to
ensure that she could work from home and replace the Drobox system she was using
for backup and sync as she was aware of the security issues with Dropbox.
•Our Solution
Our health check assessment identified Dropbox was not a compliant option for the
confidential data under the data protection act and recommended Soonr Cloud which
works similar but is compliant. The PC’s in the nursery was encrypted thus making
them secure and backup software was installed on their main machine which
enabled data on all PC’s to be backed up daily as data was synced between them
•Result
A fully compliant nursery giving parent the confidence of knowing their children's data
is safe & secure even in the event of loss, theft or unauthorised access.
Why Choose JMS Secure Data?
Why should you choose JMS Secure Data for Business DataWhy should you choose JMS Secure Data for Business Data
Protection Compliance?Protection Compliance?
•We have over 15 years experience in IT Data Security.
•Our recommended products carry a FIPS 140-2 Level 1 Certification which is
recognised as the relevant benchmark as required to meet 'Principle 7' of the Data
Protection Act..
•All backed up data is stored in UK data centres, fully encrypted and protected even
before it leaves your computer.
•We provide 24/7 technical support which is UK based.
•All our product accounts are fully managed and monitored daily.
•No locked in or lengthy contracts, most of your account products are on a monthly
PAYG standing order billing process.
•30 Day Free Trials offered on all our software products to demonstrate suitability
and Data Protection compliance.
Still Unsure What to Do?
Contact us for a FREE Data Protection Health Check Assessment
to measure any risks to your business…
Getting Data Protection wrong can bring reputational, regulatory
and legal penalties. Getting it right will bring customer rewards in
terms of trust and confidence….
For more information please visit: www.jms-securedata.co.uk

More Related Content

PDF
Jms secure data presentation
PPTX
Make the Upgrade: Data protection in the cloud
PPTX
GDPR Part 2: Quest Relevance
PPT
How Network Data Loss Prevention is Implemented
PDF
Security and privacy of cloud data: what you need to know (Interop)
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PDF
Symantec Data Loss Prevention 11
PPTX
Symantec Data Loss Prevention 9
Jms secure data presentation
Make the Upgrade: Data protection in the cloud
GDPR Part 2: Quest Relevance
How Network Data Loss Prevention is Implemented
Security and privacy of cloud data: what you need to know (Interop)
Cross border - off-shoring and outsourcing privacy sensitive data
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 9

What's hot (20)

PPTX
Data Driven Security in SSAS
PPTX
Information Governance Maturity for Financial Services
PDF
Cloud Services & the Development of ISO/IEC 27018
PPTX
The CISO’s Guide to Data Loss Prevention
PPTX
IT Asset Management by Miradore
PDF
IT Service & Asset Management Better Together
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
PDF
Data Loss Prevention: Brainstorming
PDF
7 Key GDPR Requirements & the Role of Data Governance
PDF
Introducing Data Loss Prevention 14
PPTX
BREACHED: Data Centric Security for SAP
PDF
Symantec Data Insight
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
PPTX
Cyberlink Deck
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PDF
Classification-HowToBoostInformationProtection
PPT
Shariyaz abdeen data leakage prevention presentation
PDF
Data security and privacy
PPTX
Data Retention and eDiscovery from Symantec
Data Driven Security in SSAS
Information Governance Maturity for Financial Services
Cloud Services & the Development of ISO/IEC 27018
The CISO’s Guide to Data Loss Prevention
IT Asset Management by Miradore
IT Service & Asset Management Better Together
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Data Loss Prevention: Brainstorming
7 Key GDPR Requirements & the Role of Data Governance
Introducing Data Loss Prevention 14
BREACHED: Data Centric Security for SAP
Symantec Data Insight
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Cyberlink Deck
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Classification-HowToBoostInformationProtection
Shariyaz abdeen data leakage prevention presentation
Data security and privacy
Data Retention and eDiscovery from Symantec
Ad

Similar to Jms secure data presentation (20)

DOCX
Fast, Reliable, and Secure IT Helpdesk Support – Powered by HEX64 Info Solutions
PPTX
Seclore Advantage Channel Program
PPTX
Security For Business: Are You And Your Customers Safe
DOCX
Unlock Seamless Operations with Expert Remote Infrastructure Management Servi...
PDF
Office 365 Security, Privacy and Compliance - SMB Nation 2015
PDF
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
PPTX
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
PPTX
Shield Your Startup: Essential Cloud Solutions for Data Protection - The Bu...
PPTX
SPSUK - When do you decide to go to the cloud?
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PDF
CT Business Solutions Catalogue
PDF
Datasheet: Security
PDF
A Cybersecurity Planning Guide for CFOs
PDF
3 ways to secure your law firm’s information and reputation
PPTX
Swiss Data Bank, the first data management bank
PPT
Data security in the cloud
PDF
NG-Brochure
PDF
2014 ota databreach3
DOCX
Reliable IT Helpdesk Services: Fast, Efficient, and Secure Support
PPTX
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Fast, Reliable, and Secure IT Helpdesk Support – Powered by HEX64 Info Solutions
Seclore Advantage Channel Program
Security For Business: Are You And Your Customers Safe
Unlock Seamless Operations with Expert Remote Infrastructure Management Servi...
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Shield Your Startup: Essential Cloud Solutions for Data Protection - The Bu...
SPSUK - When do you decide to go to the cloud?
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
CT Business Solutions Catalogue
Datasheet: Security
A Cybersecurity Planning Guide for CFOs
3 ways to secure your law firm’s information and reputation
Swiss Data Bank, the first data management bank
Data security in the cloud
NG-Brochure
2014 ota databreach3
Reliable IT Helpdesk Services: Fast, Efficient, and Secure Support
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Ad

Jms secure data presentation

  • 1. 1 JMS Secure Data | Data Protection Services
  • 2. Who is JMS Secure Data The Team;The Team; •Marlon Johnson – Managing Director •Kuhan Selvananthan – Technical Operations •Michelle Rumble - Engagement & Marketing •Laurelle Hughes – Accounts & Administration
  • 3. What do we do at JMS Secure Data We are a Data Protection specialist providing practical and TechnicalWe are a Data Protection specialist providing practical and Technical solutions to businesses who hold a Data Protection Licencesolutions to businesses who hold a Data Protection Licence Our Service Goals are to;Our Service Goals are to; •MeasureMeasure – work with data controllers by way of providing a Free Data Protection Health Check Assessment to measure the risks to their business. •EducateEducate – providing recommendations and advice where non-compliance has been identified posing a risk to your confidential data regulatory status. •SupportSupport – Implementing technical solutions to achieve Data Protection compliance which also safeguards your confidential data and business •MotivationMotivation – providing post implementation support and advisory service which in our view motivates the customer to remain compliant with their data
  • 4. Your DataYour DataYour DataYour Data Data Protection GovernanceData Protection GovernanceData Protection GovernanceData Protection Governance • ICO DPA Compliance • Policy Implementation • Staff DPA Awareness • ICO DPA Compliance • Policy Implementation • Staff DPA Awareness Total Endpoint ProtectionTotal Endpoint ProtectionTotal Endpoint ProtectionTotal Endpoint Protection • Data Encryption • Compliance Check • Anti-Malware / Program Control • Firewall • Data Encryption • Compliance Check • Anti-Malware / Program Control • Firewall Secure Cloud SharingSecure Cloud SharingSecure Cloud SharingSecure Cloud Sharing • Access, edit, share and store, from our all-in-one application • Manage, access and permission on all Projects, folders and files • Access, edit, share and store, from our all-in-one application • Manage, access and permission on all Projects, folders and files BackupBackupBackupBackup • Automatic daily backup to secure offsite data centres • 24/7/365 data availability • Total security with AES 256 v6 encryption • Automatic daily backup to secure offsite data centres • 24/7/365 data availability • Total security with AES 256 v6 encryption The Cycle of Data Protection
  • 5. Who Needs Our Services • Financial Services Sector • Accounting Sector • Legal Sector • Education Sector • Medical Sector • Local Authorities • Business Services • Anyone who holds a Data Protection Licence
  • 6. What is Data Protection Governance • Data Protection Licence • ICO DPA Compliance • Data Protection Act (8 Principles) • DPA Policy • Staff Training • DPA Training Records • Reviewed Annually
  • 7. What all the fuss about Encryption Software? Installing Encryption Software Is the Only Secure Way to Protect Your Data Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to its original, readable form If the unthinkable happens and you lose your PC / Laptop with everything stored on the hard disk, rest assured – with Encryption the information is protected and cannot be compromised which ensures peace of mind for your business and your clients data Remember.... setting a Windows password on your Windows login does not protect your PC / Laptop, it just makes it a little harder for someone to gain access, but not impossible!
  • 8. What does the ICO say about Encryption? What the ICO Says ‘The ICO’s guidance is clear: all personal information – the loss of which is liable to cause individuals damage and distress - must be encrypted. Encryption is one of the most basic security measures and is not expensive to put in place - yet we continue to see incidents being reported to us. This type of breach is inexcusable and is putting people’s personal information at risk unnecessarily. ‘ Without Encryption software installed you risk being in breach of ‘Principle 7’of the Data Protection Act which can result in a fine of up to €100 Million or 5% of your annual turnover…
  • 9. A Snapshot of Incidents investigated by the ICO for Q4 2014
  • 10. Total Endpoint Protection • Full Disk Encryption • Media Encryption / Port Control • Anti-Malware / Programme Control • Webcheck • Firewall • Compliance Checklist • 24/7 Support for password resets or software conflict support
  • 11. Secure Online Data Centre Backup How it works... The online data backup service is designed to be used individually as a basis for a business continuity plan or alongside our other services to give combined protection in the event of a disaster recovery situation. Key Features •Automatic, daily backup •Fast and reliable data restore •Data is encrypted and sent to 2 UK Data Centres •No need for additional backup hardware •24/7 data availability & UK technical support •Set & forget system that offer 60 day file version recovery Most importantly our Backup software and process meets the cloud storage guidance mandated by the ICO Cloud Computing Obligations
  • 12. Secure Cloud Sharing • Are you using the Cloud to share or store data?Are you using the Cloud to share or store data? • Are you operating compliantly?Are you operating compliantly? • Is your Data at risk?Is your Data at risk? If you are unsure about any of the above then talk to JMS Secure Data about Soonr Workplace Cloud… • Soonr Workplace One-App™ – Access, edit, share and store, from our all-in-one application, ensuring ease of use and no data leakage • Optimized content delivery and rendering – Over fifty file types are rendered to perfection on all mobile devices • Device support – iPad and iPhone, Android smartphones and tablets, Windows Phone and BlackBerry phones • Team-based sharing – Manage, organize and share files with ease, controlling access and permission on all Projects, folders and files • Compliant under the Data Protection Act
  • 13. Client Case Study 1 IFA Company– 3 EmployeesIFA Company– 3 Employees •Problem The company had a large confidential client data base across 4 PC’s and wanted to work in different locations but wanted to ensure the data was secure and protected and also backed up to ensure they had Business Continuity (BC). •Our Solution Backup software was implemented to ensure BC, all 4 PC’s were encrypted thus ensuring compliance and security in the event of loss or theft. We recommended the Soonr Cloud platform to provide a sync and share system that allows all users (with permission levels) to sync and share data & files between devices and employees. •Result A fully compliant business operation that is compliant, secure, has BC and works smart allowing users to work from all devices & PC’s.
  • 14. Client Case Study 2 Nursery Business – 7 EmployeesNursery Business – 7 Employees •Problem The owner was unsure about how to protect all the confidential data in the business relating to all the child records, staffing records etc.. She also wanted a solution to ensure that she could work from home and replace the Drobox system she was using for backup and sync as she was aware of the security issues with Dropbox. •Our Solution Our health check assessment identified Dropbox was not a compliant option for the confidential data under the data protection act and recommended Soonr Cloud which works similar but is compliant. The PC’s in the nursery was encrypted thus making them secure and backup software was installed on their main machine which enabled data on all PC’s to be backed up daily as data was synced between them •Result A fully compliant nursery giving parent the confidence of knowing their children's data is safe & secure even in the event of loss, theft or unauthorised access.
  • 15. Why Choose JMS Secure Data? Why should you choose JMS Secure Data for Business DataWhy should you choose JMS Secure Data for Business Data Protection Compliance?Protection Compliance? •We have over 15 years experience in IT Data Security. •Our recommended products carry a FIPS 140-2 Level 1 Certification which is recognised as the relevant benchmark as required to meet 'Principle 7' of the Data Protection Act.. •All backed up data is stored in UK data centres, fully encrypted and protected even before it leaves your computer. •We provide 24/7 technical support which is UK based. •All our product accounts are fully managed and monitored daily. •No locked in or lengthy contracts, most of your account products are on a monthly PAYG standing order billing process. •30 Day Free Trials offered on all our software products to demonstrate suitability and Data Protection compliance.
  • 16. Still Unsure What to Do? Contact us for a FREE Data Protection Health Check Assessment to measure any risks to your business… Getting Data Protection wrong can bring reputational, regulatory and legal penalties. Getting it right will bring customer rewards in terms of trust and confidence…. For more information please visit: www.jms-securedata.co.uk