Remove en legal-restrictions
article thumbnail

Hackers exploit coronavirus fears as cyber attacks soar

IT Governance

Organisations can also set up controls that mitigate risks, such as restricting remote workers’ access to third-party websites that could be exploited by cyber criminals. Management will have to decide whether to suspend whatever practice requires the use of that site, or lift the restrictions, exposing them to a cyber attack.

Phishing 114
article thumbnail

CIPL Holds Safe Harbor “Essential Equivalence” Roundtable with Top European Voices

Hunton Privacy

The roundtable brought together leading lawyers, corporate privacy officers, legal experts, regulators and policymakers to discuss the critical issues and impact of the new “essential equivalence” requirement for global data transfers set by the CJEU, and its relevance to the current EU-U.S. negotiations of a new Safe Harbor agreement.

Privacy 40
article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

Source (New) Legal USA Yes 1,933 City Facilities Management (US) LLC Source (New) Professional services USA Yes 1,854 RevSpring and Waystar Source (New) IT services and software USA No 1,706 BlueCross BlueShield of Tennessee Source (New) Insurance USA Yes 1,665 Donald W.