article thumbnail

FTC Posts Third Blog in Its “Stick with Security” Series

Hunton Privacy

On August 4, 2017, the FTC published the third blog post in its “Stick with Security” series. Limit Administrative Access : While it is essential that a system administrator has the ability to change network settings in a business, this privilege should be limited to a select few people.

IT 40
article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

represented in its privacy policy that the Company used encryption and authentication tools to protect information but failed to encrypt the data (at rest) on its computer systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to start your career in cyber security

IT Governance

A version of this blog was originally published on 8 December 2017. In this blog, we provide tips for getting your cyber security career started no matter your background. There are plenty of blogs dedicated to the practicalities of the cyber security industry; two good ones to start with are Troy Hunt’s and Daniel Miessler’s.

article thumbnail

Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data

Thales Cloud Protection & Licensing

With rising incidents of ransomware attacks, organisations are finally realising that merely implementing perimeter defense systems no longer suffice to protect their sensitive data. Below are a few pertinent questions that organisations should ask during the decoupling exercise: 1. Decoupling Encryption Keys From Encrypted Data.

article thumbnail

Best beginner cyber security certifications

IT Governance

System administrator Network administrator Security administrator IT auditor Security analyst or security specialist Security consultant. You’ll also receive exam preparation exercises designed to ensure that you pass the exam at the first attempt. Potential job roles. Potential job roles. Download now.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

In our earlier blog post , we had urged organizations to rethink their Enterprise Data Protection Strategy and recommended four key technologies for optimal data protection. This silo approach of multiple islands of encryption leads to a problem of plenty that makes the entire encryption exercise complex, inefficient and expensive.