Remove Cloud Remove Healthcare Remove Libraries Remove Security
article thumbnail

How does GDPR impact digital preservation solutions in the Cloud?

Preservica

If approached positively it provides an opportunity for long-term improvements in your records management, digital preservation and operations in the cloud. First of all, the cloud. But what if your chosen processor uses another processor whose service is in the cloud and does that make it harder for you to comply?

article thumbnail

List of data breaches and cyber attacks in November 2020 – 586 million records breached

IT Governance

We recorded 103 cyber security incidents in November, which accounted for 586,771,602 leaked records. million) Phil i ppines COVID-19 track and trace app leaks citizens’ data (unknown) Contractor mistakenly removed data from Hong Kong’s Queen Mary Hospital (442) Cloud Clusters Inc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. Edinburgh mental health clinic in probe after client information accessed in scam (unknown) Iranian Hackers Hit H&M Israel (unknown) South Africa’s VirginActive goes offline after cyber attack (unknown) B.C. Ransomware. Spargo & Associates Inc.

article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

billion records The security researcher Jeremiah Fowler discovered an unprotected database exposing more than 1.5 Fowler contacted the company, which secured the database. The security researcher Bob Diachenko identified the leak in September and contacted TuneFab, which fixed the misconfiguration within 24 hours.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

I’m just not convinced that a fingerprint or an image of my face is secure enough. In security we traditionally define the different factors of authentication as something you know, so that could be the username and password, or an answer to a security question. I'm a cyber security professional, I guess.