Blog Posts Tagged with "Data Protection"
Will We Get a GDPR for the IoT?
November 28, 2018 Added by:Scott Gordon
It might then be a good idea to imbue IoT security with the kind of weight that the GDPR gives personal data.
Comments (0)
Why Admin Rights Removal Is only the First Step towards Data Protection
September 11, 2018 Added by:Andrew Avanessian
Those that are committed to developing stronger safeguards against cyber threats shouldn’t rely on just one method to keep their data safe.
Comments (0)
4 Cybersecurity Tips for Staying Safe During the World Cup
June 13, 2018 Added by:Joseph Carson
As the first games approach, here are four cybersecurity best practices that you can use to stay safe during the 2018 World Cup.
Comments (0)
Unconventional Thinking — Four Practices to Help Mitigate Risk
April 02, 2018 Added by:Sanjay Ramnath
Organizations must proactively assess their security posture and focus on mitigating risk with unconventional approaches to achieve true security and reduction of successful cyber events.
Comments (0)
Why the GDPR is Important to Your Organization
August 14, 2017 Added by:Steve Durbin
The GDPR is the biggest shake-up of global privacy law in decades as it redefines the scope of EU data protection legislation.
Comments (0)
How to Choose the Right Data Protection Strategy
August 02, 2017 Added by:Dave Packer
A deep dive on data protection solutions and how they fit unique needs.
Comments (0)
Are Job Seekers at Risk of a Cyber Breach?
April 07, 2017 Added by:Amir Geri
Job seekers are regularly expected to input personal information about themselves to company and state databases, but it should be guaranteed that their information will remain secure.
Comments (0)
FriendFinder Breach Highlights the Need for Better Practice in Password Security
January 31, 2017 Added by:Donato Capitella
The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.
Comments (0)
Avoiding Ransomware with Strong Endpoint Security
May 26, 2016 Added by:Dean Dyche
Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.
Comments (0)
Six Things to Know About Computer Theft
March 15, 2016 Added by:Eyal Bek
Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.
Comments (0)
Managing My Company’s Security is a Nightmare
May 17, 2013 Added by:Luis Corrons
IT Departments are very often one step behind users, and unfortunately in most cases there is no real control over all devices on the corporate network. Despite perimeter solutions still being a necessity, the corporate perimeter must now expand to include new devices (mainly smartphones and tablets) that also handle confidential corporate information.
Comments (0)
Protect Data Not Devices?
April 05, 2013 Added by:Simon Moffatt
As the devices becomes smarter, greater emphasis is placed on the data and services those devices access. Smartphones today come with a healthy array of encryption features, remote backup, remote data syncing for things like contacts, pictures and music, as well device syncing software like Dropbox. How much data is actually specifically related to the device?
Comments (0)
Keeping Safe In The Cloud
September 09, 2012 Added by:Ben Kepes
“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”
Comments (0)
Losing Trust: Canadian Data Breach Spotlights Human Error
July 27, 2012 Added by:Kelly Colgan
It’s not just about protecting ourselves from identity theft or fraud like when our account number or government-issued ID numbers are exposed. It’s what I like to call privacy for the sake of privacy. Just knowing that someone could be looking at our personal histories doesn’t sit well with the public...
Comments (0)
BYOD is a Bunch of FUD
July 16, 2012 Added by:Marc Quibell
Times have changed , and I'm not talking about the technologies involved. I'm talking about the rules and regulations we have to follow, and the best practices we as employees must abide by - as opposed to the days of the old briefcase - when it comes to protecting the data with which we are entrusted...
Comments (2)
Call Centers and PCI Compliance
June 28, 2012 Added by:PCI Guru
In a call center environment where operators are taking orders over the phone and accepting credit/debit cards for payment, until the card transaction is either approved or declined, we are talking pre-authorization data. Only cardholder data after authorization or decline is covered by the PCI DSS...
Comments (2)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them