Archive for the ‘Information Privacy’ Category

Cell Phone Location Privacy

Leave a Comment

Brave browser-maker launches privacy-friendly news reader

By design, Brave Today doesn’t let the company or third parties build user profiles. Brave Software, maker of the Brave Web browser, is introducing a news reader that‚Äôs designed to protect user privacy by preventing parties‚ÄĒboth internal and third party‚ÄĒfrom tracking the sites, articles, and story topics people view. Brave Today, as the service is […]

Leave a Comment

Consumer Rights under the CALIFORNIA PRIVACY RIGHTS ACT (CPRA) OF 2020

Consumer Rights under the CALIFORNIA PRIVACY RIGHTS ACT (CPRA) OF 2020 Purpose and Intent. In enacting this Act, It is the purpose and intent of the people of the State of California to further protect consumers’ rights, including the constitutional right of privacy. The implementation of this Act shall be guided by the following principles: […]

Leave a Comment

Spotting a Common Scam

Spotting a Common¬†Scam¬† These scams seek to collect personal information about you, often appearing to come from a real business¬†or agency.¬†Someone may pose as an official disaster aid worker, or¬†send you a¬†fraudulent¬†COVID¬†contact tracing email.¬†If you receive a message with a link, you should not click it as it may download malware to your device to […]

Leave a Comment

Privacy-focused Brave browser grew over 130% in the past year

Brave Browser, the privacy-focused web browser, announced today that it grew in usage by over 130% in its first year of the release of its ‘Stable’ version. Source: Privacy-focused Brave browser grew over 130% in the past year Brave Browser Review 2020: Should you make the switch? Why you should download Brave Browser NOW!

Leave a Comment

So you thought your personal data was deleted? Not so fast

Here’s why it may be impossible to delete your personal information from Houseparty and other social media services ‚Äď despite privacy legislation! Source: So you thought your personal data was deleted? Not so fast | WeLiveSecurity How to erase your iPhone ‚ÄĒ Apple Support

Leave a Comment

Guard your data with these privacy-focused search engines & browsers

Tracking allows the companies to improve their algorithm and app experience, but this experience comes at the cost of your digital data. In this guide, we’re going to focus on the search engines and browsers that you’ll want to use if you care about your online privacy. Popular search engines and browsers do a great […]

Leave a Comment

Privacy-focused search engine DuckDuckGo is growing fast

DuckDuckGo, the privacy-focused search engine, announced that August 2020 ended in over 2 billion total searches via its search platform. Source: Privacy-focused search engine DuckDuckGo is growing fast

Leave a Comment

Privacy eLearning – Staff InfoSec & Compliance Awareness

Privacy eLearning & Staff Awareness Access staff awareness e-learning programs and train staff on best practice processes Ensure staff can spot and respond to cybersecurity and privacy risks Comply with data protection and information security legislation and standards Test learner knowledge to prove compliance for auditing purposes Train staff under one, manageable contract with these […]

Leave a Comment

WSJ News Exclusive | TikTok Tracked User Data Using Tactic Banned by Google

TikTok skirted a privacy safeguard in Google‚Äôs Android operating system to collect unique identifiers from millions of mobile devices, data that allows the app to track users online without allowing them to opt out, a Wall Street Journal analysis has found. The tactic, which experts in mobile-phone security said was concealed through an unusual added […]

Leave a Comment

Twitter stepped up search to fill top security job ahead of hack

Search for a chief information security officer Twitter Inc had stepped up its search for a chief information security officer in recent weeks, two people familiar with the effort told Reuters, before the breach of high-profile accounts on Wednesday raised alarms about the platform’s security. Twitter said hackers had targeted employees with access to its […]

Leave a Comment

Tech firms suspend use of ‘biased’ facial recognition technology

Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use. Source: Tech firms suspend use of ‘biased’ facial recognition technology Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe to DISC InfoSec blog by Email Why Cities […]

Leave a Comment

State-Based Contact Tracing Apps Could Be a Mess

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large. Source: State-Based Contact Tracing Apps Could Be a Mess Big Tech‚Äôs Contact-Tracing Apps Might Make Things Worse | Mashable Coronavirus outbreak: What are the privacy risks behind ‚Äėcontact tracing‚Äô apps? Ebola virus disease contact tracing activities, lessons learned Download a Security […]

Leave a Comment

ISO/IEC 27701 2019 Standard and Toolkit

ISO/IEC 27701 is the international standard that serves as an extension to an ISO 27001/ ISO 27002 #ISMS (information security management system). It provides guidelines for implementing, maintaining, and continually improving a #PIMS (privacy information management system). Develop a privacy information management system as an extension to your ISO 27001-conformant ISMS with ISO/IEC 27701. Supports […]

Comments (1)

A CISO’s Guide to Bolstering Cybersecurity Posture

When It Come Down To It, Cybersecurity Is All About Understanding Risk Risk Management Framework for Information Systems How to choose the right cybersecurity framework Improve Cybersecurity posture by using ISO/IEC 27032 Cybersecurity Summit 2018: David Petraeus and Lisa Monaco on America‚Äôs cybersecurity posture CSET Cyber Security Evaluation Tool – ICS/OT Subscribe to DISC InfoSec […]

Leave a Comment

What the New NIST Privacy Framework Means to You

Big news is coming when NIST takes the wraps off a new privacy framework. Thanks to the General Data Privacy Regulation (GDPR) of the European Union, which took full effect in May 2018, privacy is at center stage worldwide. Penalties are being meted out for violations, and organizations of all kinds need to understand and […]

Leave a Comment

How to become a data protection officer

As you might have expected, the¬†GDPR (General Data Protection Regulation)¬†has created¬†a spike in demand for data protection and privacy experts.¬†Organisations are desperate to hire people¬†who can guide them towards regulatory compliance and avoid large fines. In this latest blog discover what a DPO’s tasks are and how to become one. For many organizations, this isn‚Äôt […]

Leave a Comment

How to write a GDPR data breach notification procedure – with template example

Discover how to write a GDPR data breach notification procedure to help you with your GDPR compliance. Including a free template example. Read now Source: How to write a GDPR data breach notification procedure – with template example – IT Governance Blog Personal data breach notification procedures under the GDPR Organizations must create a procedure […]

Leave a Comment

Secure, Share & Edit All Your Files From Anywhere | Box

Secure File Sharing – 256-bit AES encryption Secure File Sharing:¬†Easily and securely share files‚ÄĒeven sensitive or confidential ones‚ÄĒwithout worry. Source: Secure, Share & Edit All Your Files From Anywhere | Box ¬†Subscribe in a reader

Leave a Comment

Cyberattacks against hospitals increased over 1000% last year

Cyberattacks against hospitals increased over 1000% last year : cybersecurity IICS Delhi Ethical Hacking Digital Forensics services Source: Cyberattacks against hospitals increased over 1000% last year What happens when hackers attack a hospital?  Subscribe in a reader

Leave a Comment