Remove Subscribe
article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. TB of ASA Electronics data to its leak site The ALPHV/BlackCat ransomware gang is attempting to extort a ransom from ASA Electronics for 2.7 Data breached: 2.7

article thumbnail

Marriott Breach: More than 500 Million Guest Affected

Adam Levin

If you prefer a more laid back approach, sign up for free transaction alerts from financial services institutions and credit card companies, or subscribe to a credit and identity monitoring program, 3. There are places to check your credit score for free online, and most credit cards let you see your FICO score.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

February 15 deadline looms for first DFS Cybersecurity Certification

Data Protection Report

February 15, 2018, is quickly approaching and any entity subject to New York’s cybersecurity regulation (23 NYCRR Part 500) must file its first annual certification of compliance with the New York State Department of Financial Services (DFS) by that date. To subscribe to posts from Data Protection Report , please click here.

article thumbnail

Executive Order on access to Americans’ bulk sensitive data and Attorney General proposed regulations – Part 2

Data Protection Report

China Cuba Iran North Korea Russia Venezuela What is “personally identifiable data” that is “in combination with each other”? These proposed regulations generally address only Section 2 of the Executive Order. Which countries are “countries of concern”? Note that the only difference between the two examples is the addition of IP addresses.

Access 59
article thumbnail

US: Coronavirus – Cybersecurity considerations for your newly remote workforce

DLA Piper Privacy Matters

In the context of this global crisis, cyber risk management involves balancing the productivity of a workforce with ensuring confidentiality, integrity and availability of the company’s own systems and data, as well as that of their supply chain. Secure systems enabling remote access.

article thumbnail

8 Interesting Predictions for the Intelligent Information Capture Market in 2022

Info Source

For example, when submitting an insurance claim for a damaged item, inputs will be provided through a variety of channels including eforms, fax, scanned documents, voice, or video. For information about how to subscribe to Infosource services, contact Petra at pb@info-source.com. But there is another angle to this.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data breached: 36 million records. Data breached: 6,935,412 individuals’ data. Data breached: 6.9 Only 3 definitely haven’t had data breached.