article thumbnail

Digital Transformation Examples: Three Industries Dominating Digital Transformation

erwin

Digital transformation examples can be found almost anywhere, in almost any industry. Amazon began as a disruptor to brick-and-mortar bookstores, eventually becoming one of the most obvious digital transformation examples as it went on to revolutionize online shopping. Digital Transformation in Hospitality.

article thumbnail

Infographic: Cyber Attacks and Data Breaches of 2019

IT Governance

Throughout 2019, we kept an eye on cyber attack and data breach reported in mainstream publications, releasing our findings in our monthly blog series. . Did you know, for example, that July was the worst month of the year in terms of breached records? Or that the leading cause of data breaches was internal error? .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to detect a phishing email – with examples

IT Governance

According to Verizon’s 2019 Data Breach Investigations Report , 32% of all cyber attacks involved phishing. In this blog, we use real-life examples to demonstrate five clues to help you spot phishing scams. For example, emails from Google will read ‘@google.com’. Take this example of a scam imitating Windows: Image: KnowBe4.

Phishing 111
article thumbnail

Anatomy of a spear phishing attack – with example scam

IT Governance

Let’s take a look at how it works, along with an example to help you spot the clues of an attack. Proofpoint’s 2019 State of the Phish Report found that 83% of respondents were hit by at least one spear phishing attack in last year. An example of a spear phishing email. Here’s an example of a real spear phishing email.

article thumbnail

From iPhone to NT AUTHORITYSYSTEM – exploit ‘Printconfig’ dll with a real-world example

Security Affairs

From iPhone to NT AUTHORITYSYSTEM – As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. of iTunes but did not fix the issue 12th December 2019: still no answer, the post has been published. But what does Apple’s iPhone have to do with it?? Side note. .

article thumbnail

Belgian Data Protection Authority Releases 2019 Annual Report

Hunton Privacy

On September 30, 2020, the Belgian Data Protection Authority (the “Belgian DPA”) released its 2019 Annual Report (the “Report”). Notably, 2019 was the year of the Belgian DPA’s first fines under the EU General Data Protection Regulation (the “GDPR”) and the release of the Belgian DPA’s 2019-2025 Strategic Plan.

GDPR 71
article thumbnail

Retail in 2019 needs security precautions

Thales Cloud Protection & Licensing

As we head into 2019, one thing is clear: more convenience is directly proportional to industry-wide risk. An example of these interconnected risks is the trend of cashierless environments which already started taking hold this past holiday season. The numbers don’t lie.

Retail 100