Remove Article Remove Course Remove Retail Remove Security
article thumbnail

Google: Security Keys Neutralized Employee Phishing

Krebs on Security

Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity. A YubiKey Security Key made by Yubico. a mobile device). a mobile device).

Phishing 223
article thumbnail

Data breaches and cyber attacks quarterly review: Q3 2021

IT Governance

Welcome to our third quarterly review of security incidents for 2021, in which we take a closer look at the information gathered in our monthly list of cyber attacks and data breaches. In this article, you’ll find an overview of the cyber security landscape from the past three months, including the latest statistics and our observations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

LockBit claims responsibility for Capital Health security incident The LockBit ransomware group has claimed responsibility for an attack on Capital Health , a healthcare provider in Pennington, New Jersey, last November. They accessed 41.5 The compromised data allegedly includes names, email addresses and phone numbers.

article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q3 2022

IT Governance

Welcome to our third quarterly review of security incidents for 2022, in which we take a closer look at the information gathered in our monthly list of data breaches and cyber attacks. In this article, you’ll find an overview of the cyber security landscape from the past three months, including the latest statistics and our observations.

article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q1 2022

IT Governance

Welcome to our first quarterly review of security incidents for 2022, in which we take a closer look at the information gathered in our monthly list of data breaches and cyber attacks. In this article, you’ll find an overview of the cyber security landscape from the past three months, including the latest statistics and our observations.

article thumbnail

Data Breaches and Cyber Attacks Quarterly Review: Q2 2022

IT Governance

Welcome to our second quarterly review of security incidents for 2022, in which we take a closer look at the information gathered in our monthly list of data breaches and cyber attacks. In this article, you’ll find an overview of the cyber security landscape from the past three months, including the latest statistics and our observations.

article thumbnail

The GDPR: Everything you need to know about data controllers and data processors

IT Governance

This article explains what those roles involve and helps you understand if you are a controller, processor or both. For example, a marketing executive at a retailer hires a company to conduct a survey on shoppers’ browsing habits. But, of course, under the GDPR, you can’t just go ahead and start gathering that information.

GDPR 107