Remove tag consumer-protection
article thumbnail

Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data

Security Affairs

Leaksmas: On Christmas Eve, multiple threat actors released substantial data leaks, Resecurity experts reported. On Christmas Eve, Resecurity protecting Fortune 100 and government agencies globally, observed multiple actors on the Dark Web releasing substantial data leaks.

article thumbnail

$10,000,000 civil penalty for disclosing personal data without consent

Data Protection Report

The claims related to the company’s sharing personal data without consumer consent and making it very difficult for consumers to cancel their subscriptions to this telehealth service. Its privacy policy stated that the company would treat the data confidentially, and the company would not share data without user consent.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keep Your Business Data Safe and Secure With Onehub

OneHub

Data security is one of the most important factors to consider when choosing how to store and share your business files. Some company decision-makers are hesitant to upgrade to cloud storage and file sharing due to concerns about protecting sensitive information. That’s a devastating price tag for many companies.

article thumbnail

Data management sets the next phase of zero-trust

Collibra

Nowadays zero-trust is being recognized as a principle and a best practice that can be applied to broad aspects of security, accelerated by industry’s innovations. Among the five pillars, what is most notable for the Chief Data Officers (CDOs) is Data Categorization as a central theme of the data pillar.

article thumbnail

Guest Post -- GDPR Compliance starts with Data Discovery

AIIM

You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Compliance starts with data discovery. This process can be time consuming and labor intensive.

GDPR 102
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

A hacker managed to identify a weak spot in a security camera model. Usually, the default settings are not focused on security. Furthermore, consumers believe that companies and services have the responsibility of keeping their data secure. The Threat is Definitely Real. What does this mean? Irregular Updates.

IoT 133
article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

The Regulation requires that Covered Entities establish and maintain a cybersecurity program designed to protect the confidentiality, integrity, and availability of its information systems and its customers’ NPI as defined in 23 NYCRR §§ 500.01(e) e) and 500.01(g), g), respectively.