Archive for the ‘data security’ Category

CyberSecurity for Digital Operations

  This report examines the general state of security within business today, exploring the hurdles that are preventing companies from an ideal security posture and suggesting the steps that can lead to improved security in the digital economy. As the technology industry enters the next phase of maturity, there are more questions about the implications […]

Leave a Comment

Data Loss Prevention: Protect Yourself, Your Family, and Your Business

    photo courtesy of Unsplash By Jasmine Dyoco Another day, another data breach. Lately, it seems like we can’t go more than a few days without hearing about another cyber attack. Data breaches have recently occurred at health insurance providers like Anthem, banks like Capital One, and even the Equifax credit bureau. If there’s anything […]

Comments (1)

Millions of Instagram influencers had their private contact data scraped and exposed

Millions of Instagram influencers had their private contact data scraped and exposed A massive database containing contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The database, hosted by Amazon Web Services, was left exposed and without a password allowing anyone to look inside. At the time of writing, […]

Leave a Comment

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals Reportedly, the unsecured SkyMed database exposed huge records having medical and personal information of US citizens online. Source: Unsecured SkyMed Database Exposed PII Data Of 137K Individuals ISO/IEC 27018:2014, 1st Edition: Information technology – Security techniques – Code of practice for protection of personally identifiable information […]

Leave a Comment

Firefox Send’s free encrypted file transfers are now available to all

Source: Firefox Send’s free encrypted file transfers are now available to all

Leave a Comment

3 data leaks that could be undermining your online privacy

Protecting your online privacy is important. There has been a lot of discussion in recent years about how to stay safe online, and an increasing number of people are turning to Virtual Private Netw… Source: 3 data leaks that could be undermining your online privacy DISC InfoSec 🔒 securing the business 🔒  Data Security  

Leave a Comment

The biggest ever data dump just hit a colossal 2.2 billion accounts

Data Security Thought Collection #1 was big? Collection #2-5 just dwarfed it Source: The biggest ever data dump just hit a colossal 2.2 billion accounts

Leave a Comment

Equifax fined by ICO over data breach that hit Britons

Credit rating agency Equifax is to be fined £500,000 by the Information Commissioner’s Office (ICO) after it failed to protect the personal data of 15 million Britons. A 2017 cyber-attack exposed information belonging to 146 million people around the world, mostly in the US. The compromised systems were also US-based. But the ICO ruled Equifax’s […]

Leave a Comment

Secure File Sharing from any device

Easy Desktop Access to Cloud Files Ditch Email Attachments. With your files in the cloud, you can easily share them with anyone — even if they’re outside your company firewall — with a simple link via email or straight from Box. Keep Everybody on the Same Page. Easily share files and folders, and add, move or edit […]

Leave a Comment

Nine Things That Are Poised To Impact Cybersecurity

Read Forbes Technology Council list nine things that can impact cybersecurity on Forbes : From the Equifax breach this past September to the recent hack of MyFitnessPal data through Under Armour, the number of high-profile cyberattacks has continued to climb in recent months. Every company, regardless of size, must be prepared for the possibility that they […]

Leave a Comment

Top 5 Programming Languages In 2018

Top 5 Programming Languages In 2018  Eslam Medhat  Programming world is rising exponentially with every passing year. With over 600 unique programming languages. The main question which comes to everyone’s thought is which language is most appropriate given the current and future market needs. Let’s see which programming languages are popular enough today to deserve […]

Leave a Comment

GDPR essentials and how to achieve compliance

The GDPR will replace these with a pan-European regulatory framework effective from 25 May 2018.  The GDPR applies to all EU organizations – whether commercial business or public authority – that collect, store or process the personal data (PII) of EU individuals. Organizations based outside the EU that monitor or offer goods and services to […]

Leave a Comment

Data flow mapping under the EU GDPR

As part of an EU General Data Protection Regulation (GDPR) compliance project, organisations will need to map their data and information flows in order to assess their privacy risks. This is also an essential first step for completing a data protection impact assessment (DPIA), which is mandatory for certain types of processing. The key elements of […]

Leave a Comment

Secure usb flash drive – password protected and Encrypted

Encrypted Flash Drives Top Rated Kingston Digital 8GB Data Traveler AES Encrypted

Leave a Comment

Encryption keeps you safe from malware

  The Electronic Frontier Foundation aims to protect Web traffic by encrypting the entire Internet using HTTPS. Chrome now puts a little warning marker in the Address Bar next to any non-secure HTTP address. Encryption is important, and not only for Web surfing. If you encrypt all of the sensitive documents on your desktop or […]

Leave a Comment

The Protection of Personal Information Act (POPI) in South Africa – Benefits and Challenges

by Ilenia Vidili In South Africa the Protection of Personal information Act (POPI) aims to regulate how companies secure the integrity and confidentiality of their data assets by taking technical and organisational measures to prevent the loss of, and damage and unauthorised access to, personal information. POPI was signed into law on 26th November 2013 […]

Leave a Comment

Most common type of data breaches

Cyber attacks have become a regular occurrence in the last few years; in fact, you can’t turn the news on without some mention of a business suffering an attack. Most attacks are fuelled by criminals looking to steal valuable information, but what type of information is being stolen? According to a report by Veracode, the […]

Leave a Comment

Hacking Point of Sale

A hands-on guide to achieve better security at point of sale Hacking Point of Sale – A must-have guide for those responsible for securing payment card transactions. Hacking Point of Sale is a book that tackles the issue of payment card data theft head on. It covers issues from how attacks are structured to the […]

Leave a Comment

Why to use hardware-encrypted USB sticks

Hardware encryption has tangible benefits as file sharing and mobility tools, as backup drives and much more. Also hardware based encryption is more secure because the keys are embedded in the flash drive, require physical access to get, and very specialized knowledge to extract them. Safeguard keys and critical security parameters within crypto-hardware Authentication takes place on the […]

Leave a Comment

Looking for a secure USB stick with hardware encryption

CESG Approved USB Stick CESG is the UK Government’s National Technical Authority for Information Assurance Over 1 million SafeSticks are now in use in the NHS helping to keep patient data and other confidential data secure! Buy your SafeStick today! SafeStick is a secure USB stick with AES 256 bit hardware encryption and is FIPS […]

Comments (5)