Remove Data breaches Remove Education Remove Examples Remove Exercises
article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

Inconsistent data regulations. Countries have different data security laws, and these can get in the way of one another. For example, suppose you have workers in the EU. In that case, you must abide by the General Data Protection Regulation (GDPR), which imposes fines on some activities that are perfectly legal in the U.S.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed? That is absolutely ridiculous!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Cyber criminals continued to wreak havoc, with the likes of Twitter , Uber and Neopets all reporting mammoth data breaches. In total, we have so far reported more than 1,000 data breaches in 2022, with almost half a billion breached records. Did anyone purchase the apparently stolen data?

Security 132
article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

Among the organizations that have designated a DPO, the most represented sectors are, unsurprisingly, the public administration, education and health sectors. Such figures evidence the success of “mutualized” DPOs designated by two or more organizations. The Guide is composed of four main Parts : I. Provide information and advice.

GDPR 116
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

It was also the first to enact data breach notification legislation, which all other states have now followed. geolocation data. education information. For example, if geolocation data shows that a consumer regularly visits a particular place of business, it may be inferred that consumer is a patron of such a business.

GDPR 79
article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

For example, in the Enron financial fraud, executives and board members claimed ignorance or that they could not understand the financial maneuvering of Enron’s CFO (chief financial officer). In an ideal world, a team should also have the time to perform drills or tabletop exercises to simulate an event and practice the reporting process.

article thumbnail

Expert Insight: Cliff Martin

IT Governance

Before that, he taught computer systems and network technologies in further and higher education. For DDoS [distributed denial-of-service] attacks, for example, it faced over 30% of attacks, making it the second-most attacked sector. Banking and finance also faced 12% of malware attacks.

Risk 52