Remove category general
article thumbnail

ISO 27001 and Physical Security

IT Governance

Physical access control, physical security monitoring, CCTV, and more When we hear the term ‘information security’ – or, for that matter, ‘ISO 27001’ – our thoughts usually turn straight to cyber security. However, physical security is also an important aspect of information and data security.

article thumbnail

REMnux Tools List for Malware Analysis

Lenny Zeltser

To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. For another perspective on the REMnux tools you can use for examining malicious software, see the one-page REMnux Usage Tips cheat sheet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is Data Minimisation? Definition & Examples

IT Governance

Data minimisation is a key part of information security and the GDPR (General Data Protection Regulation) in particular. Its principles are at the heart of effective data protection practices, and are intended to prevent privacy breaches and minimise the damage when security incidents occur. What is data minimisation?

GDPR 132
article thumbnail

What is data loss and how does it work?

IT Governance

It’s a specific type of data breach, falling into the ‘availability’ category of data security (the other two categories being ‘confidentiality’ and ‘integrity’). In this blog, we explain what you need to know and provide data loss prevention tips. appeared first on IT Governance UK Blog. Human error.

IT 98
article thumbnail

The heat is on, is your school #BreachReady?

IT Governance

Welcome to the new education sector blog series. In our first blog ( sign up to the series here ) , we explore data breaches. In education, losing information – either on paper or unencrypted devices and cyber incidents follow closely as does a failure to redact data with breaches in general seeing a 32% rise across the sector. .

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Here are our picks for the top threat intelligence feeds that security teams should consider adding to their defensive arsenal: AlienVault Open Threat Exchange: Best for community-driven threat feeds FBI InfraGard: Best for critical infrastructure security abuse.ch

article thumbnail

Why risk assessments are essential for GDPR compliance

IT Governance

Any organisation that’s required to comply with the GDPR (General Data Protection Regulation) must conduct regular risk assessments. The goal of any information security risk assessment methodology is to make sure everybody conducting the assessment or interpreting its findings are on the same page. The software tool is: Easy to use.

GDPR 71