Remove Computer and Electronics Remove Government Remove Insurance Remove Manufacturing
article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. Our Cyber Incident Response service provides the help you need to deal with the threat, as our experts guide you through the recovery process. They’ll review the breach, mitigate the damage and ensure that you are up and running again as soon as possible.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

attack causes chaos in the Braunau town hall (unknown) Cyber ??attack

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard.

MDM 49
article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. The alarm manufacturers provide an app – which they claimed was “unhackable” – that allows users to lock their cars using their smartphone. IT Governance released its final Weekly Podcast.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

TB Turtlemint Source (New) Insurance India Yes 1,800,000 Chunghwa Telecom Source (New) Telecoms Taiwan Yes 1.7 Source (New) Engineering Japan Yes >5 TB Array Networks Source (New) Cyber security USA Yes 2.5

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.