Remove Agriculture Remove Definition Remove Insurance Remove Risk
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. Only 2 definitely haven’t had data breached. 184 of them are known to have had data exfiltrated, exposed or otherwise breached.

article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

Only 5 definitely haven’t had data breached. TB exfiltrated Comcast Cable Communications, LLC (Xfinity) Source 1 ; source 2 (New) Telecoms USA Yes 35,879,455 Tecnoquadri Srl Source (New) Manufacturing Italy Yes 33,000,000 Asia Insurance Co. 711 of them are known to have had data exfiltrated, exposed or breached.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 April 2024

IT Governance

Other databases contained health insurance data, such as patents’ names, dates of birth, addresses and medical data. Only 2 definitely haven’t had data breached. EyeCare Services Partners exposes more 3.5 The biggest database in the blob contained 3.1 million patients and 1.6 million unique Social Security numbers.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Only 3 definitely haven’t had data breached. Source (New) Transport USA Yes 129,611 Tcman Source (New) Manufacturing Spain Yes 108 GB (179 files) Compass Group Italia Source (New) Hospitality Italy Yes 107 GB Pan-American Life Insurance Group, Inc. Incorporated Source (Update) Insurance USA Yes 7,361 Advantis Global, Inc.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

Only 5 definitely haven’t had data breached. It provides accessible advice on the theory and practice of CTI products and services, outlining key concepts and principles underpinning CTI, along with the ways organisations can use CTI to predict, prevent, detect and respond to potential cyber security threats and reduce cyber risk.