Remove Blog Remove Exercises Remove Risk Remove Systems administration
article thumbnail

FTC Posts Third Blog in Its “Stick with Security” Series

Hunton Privacy

On August 4, 2017, the FTC published the third blog post in its “Stick with Security” series. Additionally, a clean desk policy minimizes the risk that data may be accessed by an unauthorized person after hours. The FTC’s next blog post, to be published Friday, August 11, will focus on secure passwords and authentication.

IT 40
article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

represented in its privacy policy that the Company used encryption and authentication tools to protect information but failed to encrypt the data (at rest) on its computer systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data

Thales Cloud Protection & Licensing

With rising incidents of ransomware attacks, organisations are finally realising that merely implementing perimeter defense systems no longer suffice to protect their sensitive data. With data encryption, the risk is transferred from the data to the encryption keys, and hence safeguarding the encryption keys is pivotal to data protection.

article thumbnail

Best beginner cyber security certifications

IT Governance

It was created in 2002 to meet the growing demand for qualified and specialised information professionals, and covers a range of topics, including network security, access controls, cryptography and risk management. You’ll also receive exam preparation exercises designed to ensure that you pass the exam at the first attempt.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

In our earlier blog post , we had urged organizations to rethink their Enterprise Data Protection Strategy and recommended four key technologies for optimal data protection. This silo approach of multiple islands of encryption leads to a problem of plenty that makes the entire encryption exercise complex, inefficient and expensive.