Top 10 list of dark web activities that indicate a breach

August 06, 2018|Security Features

 

Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incidents, has taken place.

Despite increased security budgets and better defenses, organizations are losing the battle against cyber attacks. According to the 2018 Cost of Data Breach Study: Global Overview by Ponemon Institute and IBM Security, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year .

Read More

List of data breaches and cyber attacks in July 2018 – 139,731,894 million records leaked

August 02, 2018|Security Features

 

List-of-data-breach-itgov

Another month passes where I’m left thinking ‘I should really create a Healthcare category’. So, from next month – I’ll be doing exactly that.

There were some incredibly sensitive breaches this month, the majority of which were caused by human error. I imagine human error will continue to be the main cause of data breaches for decades to come – damn humans.

I count this month’s list of known leaked records to be 139,731,894

Read More

The California Consumer Privacy Act should be Condemned, not Celebrated

August 02, 2018|Security Features

 

California Consumer Privacy Act-1


For years, many privacy professionals yearned for a comprehensive U.S. privacy law. So when California enacted the California Consumer Privacy Act, a comprehensive privacy law, you’d expect the privacy community to cheer loudly. However, the celebration has been muted—for good reason. It’s impossible to cheer a terrible law that passed via a terrible procedure.

Read More

How Rogue Data Puts Organizations At Risk of GDPR Noncompliance

August 02, 2018|Security Features

 

The GDPR compliance deadline came in by force on 25th May 2018 and applies to all organizations processing and holding the personal information of data subjects. This includes contacts such as customers, partners and patients. Much has been written about the immense efforts of organizations to improve their data privacy procedures in order to comply with GDPR, but there is a largely undiscussed oversight lurking just under the surface which, if left unaddressed, still leaves organizations exposed to potential risks and hidden costs.

Read More

WHAT?! Where’s your InfoSec Awareness Program!?

July 31, 2018|Jason Wittick

The task of establishing and maintaining an effective information security (InfoSec) awareness program that provides personnel with all the security and privacy information they need for their jobs is complex, frustrating, and thankless, but also unavoidable.

There is a growing number of data protection and security laws, regulations, and guidelines that explicitly require employees undergo specific, formal, and ongoing InfoSec or privacy awareness training. Now more than ever, personnel who have not been sufficiently educated are exposing their employers to an increased risk of being deemed noncompliant.

Read More

California Passes Landmark Privacy Legislation

July 30, 2018|Security Features

 

In a last-minute action, just a few hours before a looming deadline Thursday afternoon, the California legislature passed AB 375, the California Consumer Privacy Act of 2018. As a result of its passage, Alastair Mactaggart, the man behind a November ballot initiative to pass a similar law, has agreed to pull his bill from the ballot.

Read More

Chrome Browser to Display “Not Secure” Warnings for HTTP Sites on July 24

July 23, 2018|Security Features

 

Google’s Chrome browser will begin warning users that non-HTTPS sites are “not secure” starting this week.  The exact date of the rollout is July 24, which is tomorrow.

After that date, when a Chrome user lands on a HTTP site, there will be a warning in the address bar that the site is “Not Secure.”

Read More

Accelerate GDPR and PIPEDA Compliance via PCI

July 18, 2018|Jason Wittick

Accelerate GDPR and PIPEDA Compliance via PCI

Data security challenges and threat vectors vary according to business or industry context, but all data security standards and governing legislation have one thing in common: they are all, fundamentally, mechanisms or strategies for protecting specific data within a particular environment.

Read More

Digital DNA: Every time we go online we leave a bit of ourselves behind

July 17, 2018|Security Features

 

 

EVERY TIME WE go online we leave a little bit of ourselves behind, and most of the time we aren’t even aware of it.

An insatiable desire for information 24/7 is fed by the immediacy of the internet and the ease of access to it from our smartphones. While most of us can’t fathom a day without these devices, it is this very immediacy that compromises how our personal data – our digital DNA – is shared.

Read More

Average cost of a data breach exceeds $3.8 million

July 12, 2018|Security Features

Data breaches are getting more expensive.

That’s one of the findings of a new global study by the Ponemon Institute that examines the financial impact of a corporate data breach.

So what is the actual cost of a data breach? Well, obviously it varies depending on the nature of the organisation that has lost control of its data, the nature of data that has been breached and the severity of the attack.

Read More