Remove category identity-theft
article thumbnail

List of Data Breaches and Cyber Attacks in August 2023 – 79,729,271 Records Breached

IT Governance

IT Governance found 73 publicly disclosed security incidents in August 2023, accounting for 79,729,271 breached records. You can find the full list below, divided into four categories: cyber attacks, ransomware, data breaches, and malicious insiders and miscellaneous incidents.

article thumbnail

Nine States Pass New And Expanded Data Breach Notification Laws

Data Protection Report

Maine’s new Act to Protect the Privacy of Online Consumer Information prohibits ISPs from using, selling, or distributing consumer data without their consent. Maryland ( HB 1154 ) – Maryland imposes new requirements on entities following a security breach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 Best Password Management Software & Tools for 2022

eSecurity Planet

Since many people use the same passwords or patterns when generating passwords, hackers have more and more opportunities to gain access to sensitive company data. When this is enabled while a user is traveling, all sensitive data stored in the app is temporarily deleted. Differentiators: Site Breach Alert for dark web monitoring.

Passwords 119
article thumbnail

Best Password Management Software & Tools

eSecurity Planet

The password management tools in this list each have their own advantages, but all of them include the following key features: Strong encryption to protect data on a device, on the vendor’s servers, and for data-in-motion. When this is enabled while a user is traveling, all sensitive data stored in the app is temporarily deleted.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

A high-profile cyber incident may cause substantial financial and reputational losses to an organization, including the disruption of corporate business processes, destruction or theft of critical data assets, loss of goodwill, and shareholder and consumer litigation. Encrypting critical data assets. Managing digital identities.