article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

Most of the unstructured data generated in the course of conducting digital commerce doesn’t get stored in a database or any other formal management system. But with no orderly internal framework, unstructured data defies data mining tools. With unstructured data, out of sight is out of mind, leaving it ill protected.

article thumbnail

Is AIIM Membership Worth It? Pros and Cons

AIIM

For example, here are just a few of my personal favorites: State of the Content Services Industry (research) and How to Be GDPR Compliant (member toolkit). Of course, it’s not just your membership dues – it’s also your time, your energy, your feedback, and even how you respond to AIIM product and service offerings.

IT 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

Source (New) Software Luxembourg Yes 3,600,000 National Automobile Dealers Association Source (New) Retail USA Yes 1,065,000 Consórcio Canopus Source (New) Professional services Brazil Yes 1,400,000 The Teaching Company (Wondrium by The Great Courses) Source (New) Education USA Yes 1.3 TB Gräbener Maschinentechnik GmbH & Co.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

I'm going to refer a lot to the upcoming European General Data Protection Regulation (GDPR) that will hit Europe in May 2018 because protecting personal data is a cornerstone of the legislation. I wrote a free course for Varonis on GDPR earlier this year and I'm going to be referring to points from there quite a bit in this blog post.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Rather than dropping ransomware on victims’ machines and hoping they would pay to regain access to their files, cyber criminals were increasingly cutting out the middle man and infecting victims’ machines with software that used their spare processing power to mine for cryptocurrency. And, of course, on 25 May the GDPR came into effect.

article thumbnail

New Pluralsight Course: Defending Against JavaScript Keylogger Attacks on Payment Card Information

Troy Hunt

Only a few weeks ago, I wrote about a new GDPR course with John Elliott. We've been getting fantastic feedback on that course and I love the way John has been able to explain GDPR in a way that's actually practical and makes sense! In my experience, that's a bit of a rare talent in GDPR land.

GDPR 50
article thumbnail

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

Of course, our initial MDM project proposal was rejected outright! A passion of mine is imparting the knowledge and experience that the data leaders of today possess to the next generation of data professionals. Experience does of course count for a lot. And I returned to being a Junior Project Manager.

MDM 75