Remove B2B Remove Education Remove Examples Remove Exercises
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. Take the sign-up form on HIBP as an example: And for good measure, I'll add the sign-up form for Report URI too: These are spartan. Best of all, it's about prevention rather than cure. That is absolutely ridiculous!

article thumbnail

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

To support this training, we created a methodology that guided the students through a digital transformation exercise. For example, digital renders distribution intermediaries obsolete (with limitless choice and price transparency). Let’s walk through an example. Captures “What Does Success Look Like?” Prepare for Vacation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

To support this training, we created a methodology that guided the students through a digital transformation exercise. For example, digital renders distribution intermediaries obsolete (with limitless choice and price transparency). Let’s walk through an example. Captures “What Does Success Look Like?” Prepare for Vacation.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Social engineering, for example, is a threat that makes use of human vulnerabilities for illegal access.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

For example: On May 12, 2021, President Biden signed an Executive Order on Improving the Nation’s Cybersecurity. The insidiousness and reiterative nature of these attacks could pose significant risk for small businesses, as well as B2B and B2C corporations that may sell or distribute devices to businesses and consumers. Agency (Feb.