Federal Breach Notification Rules Finalized; In Force November 2018

April 17, 2018|Security Features

Nearly 3 years after passing amendments to Canada’s federal private sector privacy law to include mandatory breach notification and record-keeping requirements, the Government has finalized some related regulations and announced that the new obligations will come into force on November 1, 2018

Read More

A day in the life of your stolen data

April 13, 2018|Security Features

WITHOUT even realizing it, you are opening yourself up to huge risk every day. These are the habits that could cost you.

Read More

How the human factor puts your company at risk

April 10, 2018|Security Features

 

Positive Technologies has released a new report with statistics on the success rates of social engineering attacks, based on the 10 largest and most illustrative pentesting projects performed for clients in 2016 and 2017.

Read More

Employees confused about cybersecurity responsibilities

April 02, 2018|Security Features

 

 

Forty per cent of employees believe they bear zero responsibility for securing information,
pointing to the need for a more comprehensive strategy that makes security everyone’s business.

“As data breaches become increasingly commonplace, companies must develop
proactive solutions from both individual and business perspectives."

Read More

Data Residency: Securing data and documents in the Cloud

March 26, 2018|DataStealth Team

 

Many companies collect and process vast quantities of customer data, and much of it contains highly sensitive personal information such as dates of birth, social insurance numbers, payment card information, bank account details, online banking credentials, or credit scores.

Read More

GDPR Compliance Step-by-Step: Part 2 – Data Discovery

March 21, 2018|David Froud

 

In truth, this should be called Data Discovery & Asset Management, because there’s absolutely no point having one without the other. Nor should these things not already be part of your standard practices.

It’s 2018 and I can think of very few businesses who don’t have data as some of their most critical assets. No businesses bothering to read my blog anyway. So if data assets are that critical, why don’t you already KNOW where all of your personal data is? Why don’t you already have a record of who has access to it, and what they are doing with it?

Read More

GDPR Compliance Step-by-Step: Part 1 – The Prerequisites

March 19, 2018|David Froud

 

Roughly half the blogs I’ve written in the last 6 months have been about the GDPR or privacy in general. I could take this as a good sign in that it beats hands-down writing about PCI, but the reasons I write about both of these ‘regulations’ in the first place are two-fold:

  1. Organisations do so little homework on applicable regulatory compliance that they leave themselves wide open to unscrupulous vendors and consultants; and

  2. I want to do everything in my power to protect organisations from those unscrupulous vendors and consultants.
Read More

Cyber attacks becoming No. 1 business risk

March 13, 2018|Security Features

 

SonicWall recorded 9.32 billion malware attacks in 2017 and saw more than 12,500 new Common Vulnerabilities and Exposures (CVE) reported for the year.

The cyber arms race affects every government, business, organization and individual. It cannot be won by any one of us,” said SonicWall CEO Bill Conner. “Our latest proprietary data and findings show a series of strategic attacks and countermeasures as the cyber arms race continues to escalate. By sharing actionable intelligence, we collectively improve our business and security postures against today’s most malicious threats and criminals.”

Read More

Why Cyber Security is the New Health and Safety

March 09, 2018|Security Features

 

Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings. Today, it controls the safety of equipment used on process plants, the time professional drivers may spend behind the wheel, and even how long someone can stare at a computer screen for.

Read More

10 reasons not to innovate your cyber security

March 05, 2018|Security Features

 Cyber Security.jpg

When was the last time you assessed your cybersecurity strategy? Given today’s ever-changing security landscape, it’s probably been too long.  

In this world of constant cyber threats, businesses can’t afford to be complacent. Yet, despite the near constant stream of data breaches making headlines, far too many organisations insist that their current security model is good enough.  

Read More