Stats Canada requesting banking information of 500,000 Canadians without their knowledge

November 01, 2018|Security Features

 

 

Documents obtained by Global News show the national statistical agency plans to collect “individual-level financial transactions data” and sensitive information, like social insurance numbers (SIN), from Canadian financial institutions to develop a “new institutional personal information bank.”

“Statistics Canada will be acquiring individual payments and income history information from financial institutions,” reads a document from Statistics Canada, which recognizes the “highly sensitive nature” of the data.

Read More

New security breach reporting guidelines come into force on November 1st

November 01, 2018|Security Features

opc-header

 

Organizations will be required to report any security or data breaches that pose a real risk of significant harm to affected individuals.

New security breach reporting guidelines are set to come into force on November 1st, 2018, compelling organizations to report any security or data breaches that pose significant harm to affected individuals.

Read More

List of data breaches and cyber attacks in October 2018 – 44,701,278 records leaked

November 01, 2018|Security Features

 

It’s been the usual mix of data breaches this month, with lots of mistakes being made and lots of ransoms being paid. This month’s total number of known leaked records is 44,701,278.It’s time for the month’s list of breaches and cyber attacks, and it’s a big one.

 

 

Read More

Tired from GDPR? Get ready — next is the ePrivacy Regulation

October 31, 2018|Security Features

Data privacy pros wiping their brows after preparing their companies for the new European General Data Protection Regulation (GDPR) better get ready for the next challenge: Preparing to comply with the upcoming EU ePrivacy Regulation.

Although it’s likely a year away from coming into effect, a Canadian lawyer told marketing and privacy experts last week that this proposed regulation covers content and metadata in everything from email messages and SMS texts, machine-to-machine communications and over-the-top providers like Skype, Facebook Messenger  and  WhatsApp.

 “I think it’s of great concern to marketers,” Bill Hearn, a regulatory law specialist in the Folger Rubinoff firm told a Toronto workshop sponsored by the Canadian Marketing Association.

Read More

Canadian companies are overconfident when it comes to cyberattacks, study finds

October 30, 2018|Security Features

 

Canadian Firms

Most firms have an incomplete picture of evolving security challenges.

 

Canadian companies tend to be overconfident or unprepared to protect sensitive information from data breaches — mostly because they have an incomplete or inadequate picture about the evolving challenges they face, according to cybersecurity experts.

A study conducted by Ovum for FICO — a California-based data analytics company that operates a global fraud detection system for banks, credit card companies and others — found 84 per cent of Canadian executives surveyed felt their organization was "better than average" or a "top performer."

Read More

Don’t panic: what to do if you’ve been left behind by GDPR

October 26, 2018|Security Features

 

There are a number of steps that must be taken to come up to speed with GDPR.

GDPR has already been in place for nearly six months and, despite a number of domesday predictions made in the lead-up to the implementation date on 25th May, most have not come to pass. This is of course welcome news for UK businesses, many of which were insufficiently prepared for the regulation when it launched.

Read More

Privacy watchdog asks Federal Court to rule on Google de-indexing question

October 22, 2018|Security Features

 

PIPEDA OPC GOOGLEThe OPC wants to find out if Google’s search engine is governed by PIPEDA

Canada’s privacy watchdog has asked the Federal Court to rule on Mountain View search giant Google’s indexing practices as they pertain to the Personal Information Protection and Electronic Documents Act (PIPEDA).

According to an October 10th, 2018 Federal Court filing, the Office of the Privacy Commissioner of Canada (OPC) wants legal help in determining PIPEDA’s scope when it comes to dealing with search engines like Google, as well as an individual’s right to request that search engines de-index results generated by searches of a person’s name.

Read More

How Canada Surrendered Policy Flexibility for Data Localization Rules in the USMCA

October 18, 2018|Security Features

 

data localizationThe digital policy implications of the USMCA have attracted increasing attention as Canadians consider the risks that the agreement could limit future policy flexibility. In particular, the agreement restricts the use of data localization, an increasingly popular legal method for addressing public interest concerns associated with the collection of online information by mandating that data be stored within the local jurisdiction.

Read More

21 Terrifying Cyber Crime Statistics

October 16, 2018|Security Features

 

It may not be a nice topic to talk about, but it is essential that the world is aware of the terrifying cyber crime statistics in 2018.

Unfortunately, with technology on the rise, there’s more room for cybercrime in 2018. According to the Cyber Security Breaches Survey 2018, 43% of businesses were a victim of a cyber security breach in the last 12 months. In the U.S., the state of California lost more than $214 million through cyber crime alone.

VPN’s are being used more and more in order to protect people’s privacy online. Though, despite being made aware of the risks of clicking a link, or opening an email, the figures show that attacks are ever increasing.

With evolving technology comes evolving hackers; the world are not keeping up with the fight against cybercrime – and that’s scary!

Read More

Attribute Based Access Control (ABAC)

October 15, 2018|DataStealth Team

 "We tried to implement access controls on our Cloud document storage, but found the available solutions were either locked to a specific storage technology or required a ton of resources and time to implement.

We deployed DataStealth for our legacy applications and were able to control access at the most granular level."

 - Senior Manager Infrastructure, Outsourcing and Technology Solutions for Financial Services

Read More