Archive for the ‘Information Privacy’ Category

So you thought your personal data was deleted? Not so fast

Here’s why it may be impossible to delete your personal information from Houseparty and other social media services – despite privacy legislation! Source: So you thought your personal data was deleted? Not so fast | WeLiveSecurity How to erase your iPhone — Apple Support

Leave a Comment

Guard your data with these privacy-focused search engines & browsers

Tracking allows the companies to improve their algorithm and app experience, but this experience comes at the cost of your digital data. In this guide, we’re going to focus on the search engines and browsers that you’ll want to use if you care about your online privacy. Popular search engines and browsers do a great […]

Leave a Comment

Privacy-focused search engine DuckDuckGo is growing fast

DuckDuckGo, the privacy-focused search engine, announced that August 2020 ended in over 2 billion total searches via its search platform. Source: Privacy-focused search engine DuckDuckGo is growing fast

Leave a Comment

Privacy eLearning – Staff InfoSec & Compliance Awareness

Privacy eLearning & Staff Awareness Access staff awareness e-learning programs and train staff on best practice processes Ensure staff can spot and respond to cybersecurity and privacy risks Comply with data protection and information security legislation and standards Test learner knowledge to prove compliance for auditing purposes Train staff under one, manageable contract with these […]

Leave a Comment

WSJ News Exclusive | TikTok Tracked User Data Using Tactic Banned by Google

TikTok skirted a privacy safeguard in Google’s Android operating system to collect unique identifiers from millions of mobile devices, data that allows the app to track users online without allowing them to opt out, a Wall Street Journal analysis has found. The tactic, which experts in mobile-phone security said was concealed through an unusual added […]

Leave a Comment

Twitter stepped up search to fill top security job ahead of hack

Search for a chief information security officer Twitter Inc had stepped up its search for a chief information security officer in recent weeks, two people familiar with the effort told Reuters, before the breach of high-profile accounts on Wednesday raised alarms about the platform’s security. Twitter said hackers had targeted employees with access to its […]

Leave a Comment

Tech firms suspend use of ‘biased’ facial recognition technology

Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use. Source: Tech firms suspend use of ‘biased’ facial recognition technology Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe to DISC InfoSec blog by Email Why Cities […]

Leave a Comment

State-Based Contact Tracing Apps Could Be a Mess

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large. Source: State-Based Contact Tracing Apps Could Be a Mess Big Tech’s Contact-Tracing Apps Might Make Things Worse | Mashable Coronavirus outbreak: What are the privacy risks behind ‘contact tracing’ apps? Ebola virus disease contact tracing activities, lessons learned Download a Security […]

Leave a Comment

ISO/IEC 27701 2019 Standard and Toolkit

ISO/IEC 27701 is the international standard that serves as an extension to an ISO 27001/ ISO 27002 #ISMS (information security management system). It provides guidelines for implementing, maintaining, and continually improving a #PIMS (privacy information management system). Develop a privacy information management system as an extension to your ISO 27001-conformant ISMS with ISO/IEC 27701. Supports […]

Comments (1)

A CISO’s Guide to Bolstering Cybersecurity Posture

When It Come Down To It, Cybersecurity Is All About Understanding Risk Risk Management Framework for Information Systems How to choose the right cybersecurity framework Improve Cybersecurity posture by using ISO/IEC 27032 Cybersecurity Summit 2018: David Petraeus and Lisa Monaco on America’s cybersecurity posture CSET Cyber Security Evaluation Tool – ICS/OT Subscribe to DISC InfoSec […]

Leave a Comment

What the New NIST Privacy Framework Means to You

Big news is coming when NIST takes the wraps off a new privacy framework. Thanks to the General Data Privacy Regulation (GDPR) of the European Union, which took full effect in May 2018, privacy is at center stage worldwide. Penalties are being meted out for violations, and organizations of all kinds need to understand and […]

Leave a Comment

How to become a data protection officer

As you might have expected, the GDPR (General Data Protection Regulation) has created a spike in demand for data protection and privacy experts. Organisations are desperate to hire people who can guide them towards regulatory compliance and avoid large fines. In this latest blog discover what a DPO’s tasks are and how to become one. For many organizations, this isn’t […]

Leave a Comment

How to write a GDPR data breach notification procedure – with template example

Discover how to write a GDPR data breach notification procedure to help you with your GDPR compliance. Including a free template example. Read now Source: How to write a GDPR data breach notification procedure – with template example – IT Governance Blog Personal data breach notification procedures under the GDPR Organizations must create a procedure […]

Leave a Comment

Secure, Share & Edit All Your Files From Anywhere | Box

Secure File Sharing – 256-bit AES encryption Secure File Sharing: Easily and securely share files—even sensitive or confidential ones—without worry. Source: Secure, Share & Edit All Your Files From Anywhere | Box  Subscribe in a reader

Leave a Comment

Cyberattacks against hospitals increased over 1000% last year

Cyberattacks against hospitals increased over 1000% last year : cybersecurity IICS Delhi Ethical Hacking Digital Forensics services Source: Cyberattacks against hospitals increased over 1000% last year What happens when hackers attack a hospital?  Subscribe in a reader

Leave a Comment

Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

Perceptics confirms intrusion and theft, stays quiet on details Source: Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online Car Security Security Breach   Digital License Plates: Convenience or Privacy Risk?  Subscribe in a reader

Leave a Comment

Microsoft wants a US privacy law that puts the burden on tech companies

On the first anniversary of #GDPR, Microsoft calls for a similar privacy law in the US that puts the burden on the companies that collect and use sensitive data. Europe’s privacy law went into effect nearly a year ago. It’s time for the US to catch up, the tech giant says. Source: Microsoft wants a […]

Leave a Comment

California is bringing law and order to big data. It could change the internet in the U.S.

   ⚖️ California is bringing law and order to big data ⚖️ California Expands Consumer Privacy Protections | The California Consumer Privacy Act, or CCPA, gives residents of California the ability to request the data that businesses collect on them, demand that it be deleted, and opt out of having that data sold to third parties, among other things. The state’s […]

Leave a Comment

Google’s location history data shared routinely with police

Law enforcement officials in the US have been routinely mining Google’s location history data for criminal investigations. Source: Google’s location history data shared routinely with police  Subscribe in a reader

Leave a Comment

Discovery of cameras built into airlines’ seats sparks privacy concerns

A viral tweet prompted closer scrutiny. Source: Discovery of cameras built into airlines’ seats sparks privacy concerns   Information Privacy  

Leave a Comment