Remove Subscribe
Remove Analysis Remove Education Remove Insurance Remove Military
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Source (New) Finance USA Yes 3,494 Woodruff Sawyer Source (New) Insurance USA Yes 3,087 Blackburn College Source (New) Education USA Yes 3,039 CAIRE Inc.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 January 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Welcome to this week’s round-up of the biggest and most interesting news stories.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 April 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Other databases contained health insurance data, such as patents’ names, dates of birth, addresses and medical data. EyeCare Services Partners exposes more 3.5 million patients and 1.6

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Mobile Guardian, which is used to help parents manage their children’s device usage, was hacked on 19 April, according to the Singaporean Ministry of Education.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Source New Defence USA Yes 1,051 Connecticut College Source New Education USA Yes 954 American Alarm & Communications Inc. GB Signature Performance, Inc.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Next-generation firewalls (NGFWs): Improve the general security of a firewall with advanced packet analysis capabilities to block malware and known-malicious sites. Endpoint detection and response (EDR): Provides more advanced security than AV with more intelligent analysis of endpoint activity and automated remediation.

Security 117
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Board-management discussions about cyber risk should include identification of which risks to avoid, which to accept, and which to mitigate or transfer through insurance, as well as specific plans associated with each approach. Principle 5. Mandatory Access Control. Role-Based Access Control. Federation and Assertions.