How to ensure your business is DORA compliant

04/06/24 Wavenet
Male IT Specialist Holds Laptop and Discusses Work with Female Server Technician.

Financial services organisations experienced three times the number of cyber security breaches in 2023 than in 2022.

2023 was also the year that a piece of legislation was enacted that aims to strengthen security in financial services organisations – DORA (the Digital Operational Resilience Act). DORA applies to the many UK-based financial services organisations that have operations in the EU. These organisations must be compliant by 2025 or face fines of up to 2% of their global revenue.

To be compliant, DORA requires organisations to implement measures across – risk-management, incident reporting, operational resilience testing and ICT third-party risk monitoring. In return, DORA will significantly reduce the risk of cyber security breaches and will increase business leaders’ understanding of security.

While the long-term benefits are clear, the journey to compliance – and experiencing those benefits – may seem long and complicated. But, with improved network visibility you’ll find it’s easier than you thought.

Eradicate blind spots

The regulation: organisations need to safeguard their supply chains and customers from increasing cyber attacks.

The solution: improve your network visibility to reveal blind spots and protect against attack.

The high volume of sensitive data the financial services sector holds makes it the ideal target for cyber attackers – receiving the second highest level of attacks worldwide in 2023.

To safeguard your customers from attack you need effective systems and processes in place to ensure you’re always one step ahead of bad actors. The simplest way to do this is to improve your network visibility so you have clear oversight over your entire network, including any blind spots.

With this detailed insight into data traffic and network activity, you can identify and mitigate potential security threats before they cause significant disruption. By taking a proactive approach to security, you’ll meet DORA’s requirements for robust risk management.

How we can help: Gigamon Precryption provides you with the operational resilience you need to meet DORA requirements. With comprehensive visibility across your organisation's entire network, Precryption eliminates blind spots by revealing concealed threat activity and anomalous data before it hits an encryption library and moves on to your network. In other words, it stops threats before they can get a foot in the door.

Test regularly

The regulation: Organisations should implement resiliency testing programs based on their risk assessments.

The solution: Conduct regular stress tests to identify weaknesses, vulnerabilities and failures.

The threat landscape is constantly evolving so it’s vital that you’re up to date with the latest risks and regularly test your ability to defend against them.

Financial services organisations have long been on high alert for ransomware attacks, but cyber extortion is expected to be more common in 2024 –there’s always a new threat lurking around the corner hoping to exploit a weakness.

But you can strengthen your defences by conducting regular risk assessments to identity vulnerabilities before bad actors discover them. With improved network visibility, your risk assessments will be more accurate, and you’ll be able to create stronger resiliency testing programs.

How we can help: GigaSMART enables real-time monitoring of network performance, traffic and data, giving you the enhanced visibility you need to identity any weaknesses or vulnerabilities in your system. Armed with these insights, your resiliency testing programs will secure any gaps in your defences.


Report incidents

The regulation: The reporting of breaches needs to be faster to ensure quicker response and reduced impact.

The solution: Implement centralised management tools to increase incident response times.

If a bad actor does slip through the cracks, your customers could be severely impacted. You can reduce the impact of a breach by having efficient reporting systems that quickly identify the attack and remediate it.

You can speed up your response times by using a centralised management tool. These tools enable you to generate and maintain logs and records of network activity. With all your systems integrated in one location, you can compile reports and respond quickly to attacks without being slowed down by system incompatibilities. Which means that if a bad actor does slip through your defences, you’ll be able to send them straight back out again.

How we can help: GigaVUE Appliances provide real-time insights, helping you to rapidly identify the source and scope of the problem, and create a faster and more coordinated response.


Achieve compliance with network visibility

These solutions all have one thing in common – improved network visibility. The ultimate aim of DORA is to improve the resilience and security of the financial services sector and the best way to do that is to ensure that you have as much insight into your network as possible.

You can make this easy for yourself by implementing tools that have been specifically designed to provide you with this visibility. These tools will also help prevent threats and rapidly remediate them when they do occur.

With these systems in place, you can rest assured that you are DORA compliant. Then you can start enjoying the benefits of your new processes and the security of adhering to the new legislation.

To find out more about DORA and the steps you need to take to be compliant, join us at our free event on 26th June.

Cyber Security, Financial services, Network Intelligence, Gigamon

Latest blogs

See all posts
Placeholder thumbnail
Fusing networks and security to create tomorrow's digital infrastructure

Embrace a seamless digital transformation with SASE technology In the whirl of digital advancement, the lines between networking and security have blurred, paving the way for a new approach to connectivity and protection: Secure Access Service Edge or SASE. Imagine SASE as the ultimate multi-tasker - merging high-speed avenues like SD-WAN with the digital world's watchdogs - firewalls, Zero-Trust Network Access (ZTNA), and cloud security tools - all in one, cloud-delivered package. This powerhouse ensures that connectivity doesn't just mean getting online; it means doing so swiftly, securely, and smartly. Why we champion an integrated approach At our core, we champion simplicity and security. Connectivity and security shouldn't be complicated or separate. Our mission is to standardise and deliver cutting-edge SASE solutions that are easy to manage, highly secure, and adaptable - because in today's digital world, flexibility isn't just an advantage; it's a business imperative. What SASE means for your business Let's dive into what this really means for businesses moving through the clouds and beyond. With SASE, networking and security no longer run on different wavelengths. They're part of the same conversation, which means deploying and managing a network that's as secure as it is flexible. The benefits of SASE that you can expect: Lightning-fast, direct access to all the apps and data you need, with no lag. A single, cloud-native platform that manages all your monitoring and security needs - simplifying life for your IT team. Upgraded protection for your on-the-go staff, keeping them safe wherever work takes them. Unmatched control and insights into every SaaS application you use, whether it's on the radar or not. A network infrastructure that not only scales with your business but does so smoothly and efficiently. And for those pondering the complexities of integrating SASE into their existing network, we've got your back. As a seasoned Cisco Gold Partner, our team of Cisco-certified experts are ready to tailor a highly reliable, scalable, and ironclad SASE strategy for you. With over two decades of experience to draw on, we're not just offering a service; we're driving transformation. Our proven Cisco-centric SASE solutions As a Cisco Gold Partner, we leverage over twenty years of expertise to tailor a dependable, scalable, and robust SASE strategy for your organisation: Cisco Umbrella SIG with Secure Connect: Offering unparalleled, location-agnostic connectivity that seamlessly links your team and technology, while simultaneously bolstering your defence against security threats through a unified approach. Providing your business with leading cloud security that proactively safeguards your digital landscape, ensuring tailored, comprehensive protection for your vital assets. Built with Cisco Secure Access and Umbrella SIG. Cisco Meraki SD-WAN: Modernise your network with an optimised WAN that guarantees strong performance and reliable connectivity for every user and device across your organisation. Cisco Thousand Eyes: Harness unmatched visibility and performance insights across your network, cloud, and SaaS ecosystems, empowering your enterprise to optimise digital experiences decisively. Ready to rethink your digital infrastructure? If you're keen on a future where connectivity and security walk hand in hand, let's get the conversation started. With us, you're not just adopting SASE; you're embracing a secure, integrated, and incredibly agile digital infrastructure. Picture setting up your new digital base with us as piecing together your favourite puzzle; you don't need all the pieces initially. We build your dream setup step by step, ensuring each piece fits perfectly over time to create a seamless, unified solution tailored for your business needs. Welcome to the forefront of networking and security. Welcome to your new digital baseline.

Read more
Placeholder thumbnail
How can businesses dispose of devices in an environmentally friendly way?

What is WEEE compliance? Electronic waste (e-waste) is one of the fastest growing waste streams today, with the UK generating 1.7 million tonnes* per year. As our reliance on electronic devices such as laptops, desktops, mobiles, and office equipment increases, so does the importance of responsible IT equipment disposal in the UK. When devices become faulty or outdated, the vast majority are simply disposed of, adding to the mounting electronic waste (e-waste) in landfills. This creates even more WEEE (Waste Electrical and Electronic Equipment). Effective responsible IT asset disposal in the UK is crucial to reduce environmental impact and support a sustainable future. With rapid technological advancements, upgrading IT infrastructure, and increasing regulations on WEEE compliance, adopting eco-friendly electronics recycling solutions is more important than ever. If we don’t all start to reduce, reuse, and recycle electronic devices, this is only set to get worse. We all have a role in minimising e-waste in the workplace, supporting the planet, and reducing demand for resource-intensive manufacturing What do companies do with old electronic devices? According to Sue Owens, Head of Supply Chain Services at Wavenet: “There isn’t a single answer to the climate crisis, or how we can recycle our way out of trouble, but responsible electronic device recycling and secure data destruction are essential parts of the solution. We need to look at all methods of recycling. Even the smallest contribution in reducing e-waste in the workplace adds up to be part of the bigger picture.” Recycling old laptops, mobiles, and other IT hardware not only helps manage the rising tide of end-of-life equipment recycling but also ensures compliance with WEEE directives. Proper certified electronic waste disposal providers help companies turn obsolete devices into environmentally safe recyclables or components, reducing the need for raw material extraction. Sue continues: ”The more organisations recycle, the less we need to mine. While the mining industry is a major contributor to planet-warming emissions, it also holds the key to a net-zero future. We don’t need to extract more – we need less. As clean energy and EVs expand, the total amount of materials mined will actually decrease, and we can significantly reduce reliance on coal that still fuels the industry’s revenues. Less mining, more sustainability – that’s the future we must build. To make a difference, it’s up to organisations to recycle whatever we can; however, data destruction is critical to the security of your business. Compliance with the WEEE directive and recycling units back into the market, either as components, or broken down into their elements is a huge contributor.” How do businesses recycle computers and phones?

Read more
A happy house tenant is using an app on her phone to report a home issue to her housing provider
From risk to resolution: how Active Assessor helps you stay ahead of Awaab's Law

What does Awaab's Law mean and why does it matter? Damp and mould aren’t just inconvenient maintenance problems - they’re serious risks to tenant health, regulatory compliance, and the reputation of housing providers. Nearly 1 in 7 social homes in England failed to meet the Decent Homes Standard in 2023¹. On top of that, the NHS is estimated to spend £1.4 billion a year treating health issues related to cold, damp housing². And yet, more than half of tenants experiencing condensation, damp or mould don’t report it. Often, they don’t recognise the early signs, or they simply don’t believe they’ll be taken seriously. This silence leaves landlords in the dark and turns small, fixable issues into expensive, high-risk problems. From October, social landlords will be legally required to fix emergency hazards within 24 hours and investigate and repair dangerous damp and mould within set timeframes, under new legislation known as Awaab’s Law. Introduced in memory of two-year-old Awaab Ishak, who tragically died in 2020 after prolonged exposure to mould in his social housing, the law represents a major step toward improving housing safety and quality. It allows tenants to take legal action if landlords fail to comply and will be rolled out in phases, beginning with damp and mould, to ensure effective implementation. This approach aims to deliver meaningful, lasting change while honouring the efforts of Awaab’s family to secure justice. Awaab’s Law also supports the government’s broader plan for change, which includes a commitment to building 1.5 million new homes and delivering the biggest improvement to social and affordable housing in a generation. The challenge: strained teams & outdated systems Most housing providers care deeply about tenant safety. The problem isn’t willingness—it’s capacity. Maintenance teams, IT departments, and customer contact centres are already stretched thin. Spotting early-stage issues requires tools they simply don’t have. Traditional, manual inspections are expensive and slow. Reactive workflows leave little room to get ahead of problems. And despite growing demand for proactive service, only 13% of customers actually receive it. The systems many teams rely on today are fragmented, outdated, and not fit for the pressures of a post-Awaab world. The solution: Active Assessor by 8x8

Read more
Placeholder thumbnail
There's more to the PSTN switch-off than meets the eye

What is the PSTN switch-off? The impending PSTN (Public Switched Telephone Network) switch-off isn’t just about replacing traditional lines. It’s a seismic shift that impacts far more than most realise – and if you’re not prepared, it could cost your business dearly. Most companies are aware that traditional analogue lines and ISDN systems for calls and broadband are being phased out by January 2027. But what many don’t see is the vast ripple effect of this transition – touching everything from lifts to life-critical systems, cash machines, and even traffic lights. What does the PSTN switch-off mean in simple terms? When it comes to the PSTN switch-off, it’s easy to think that it is just about phone lines. But the truth is, it’s much more complex. Here is what’s at stake: Life-saving systems: fire alarms, major medical and safety devices, emergency alarms in care homes, emergency pendants, telemetry services monitoring boiler rooms, dams, sluice gates, and substations. Public infrastructure: traffic lights, bus stops, speed cameras, and traffic management systems. Business-critical devices: PDQ and payment terminals, ATMS, CCTV, video surveillance, door entry, security systems, and remote access points. Transport & emergency services: roadside AA/RAC recovery alerts and devices, and emergency phone lines in hazardous environments. Telecommunications & internet: leased lines, private networking facilities, dial-up lines, broadband DSL services, and international leased lines. Community & public services: emergency teams and vehicles, payphones, modems, industrial control, public alerts, and more. If every one of these vital systems suddenly loses connectivity – chaos, downtime, and danger could follow. The possible business impact of the PSTN switch-off could be financial losses, public safety risks and erosion of customer trust. The PSTN switch-off is a vital business resilience issue – the time to act is now Unlike many providers who may focus on the obvious, we see what others miss. Our team dives beneath the surface, examining your entire network ecosystem to identify what’s at risk when the PSTN switches off. We have mapped out the hidden web of critical systems that rely on legacy infrastructure – and yes, we’ve prepared solutions for each one. Check out our iceberg infographic to see a quick glance of the PSTN switch-off picture. The switch-off is just the tip of the iceberg. Without planning, your operations could face catastrophic disruption. Don’t let your business be caught unaware. Reach out today for an in-depth assessment, and explore solutions tailored to your critical systems. Because when it comes to the PSTN switch-off, we see beyond the iceberg – and help your business stay afloat.

Read more

Stay service-savvy

Get all the latest news and insights straight to your inbox.