article thumbnail

What Is Data Minimisation? Definition & Examples

IT Governance

Data minimisation is a key part of information security and the GDPR (General Data Protection Regulation) in particular. Its principles are at the heart of effective data protection practices, and are intended to prevent privacy breaches and minimise the damage when security incidents occur. What is data minimisation?

GDPR 132
article thumbnail

What is Tailgating? Definition, Examples & Prevention

IT Governance

Fraudsters have countless tricks up their sleeves to bypass security measures and access sensitive information. The same principle, believe it or not, applies in a cyber security context. More specifically, the fraudster is trying to gain physical access to a secure part of the premises so that they can steal confidential information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Vishing? Definition, Examples and Prevention

IT Governance

Examples of vishing HR scam In this scam, an organisation’s HR manager receives a phone call from someone claiming to be from the bank. They often do this under the guise of being of tax or social security payments. Definition, Examples and Prevention appeared first on IT Governance UK Blog.

article thumbnail

What Is Packet Filtering? Definition, Advantages & How It Works

eSecurity Planet

computers, phones, routers, security cameras) need to communicate, they send data packets to each other. The filter process delivers allowed packets to the destination device or passes the packet on to the next security screening feature. Only a small number of commercial firewalls still focus on packet filtering.

IT 100
article thumbnail

What Is a Firewall Policy? Steps, Examples & Free Template

eSecurity Planet

It aims to prevent unauthorized access, manage data movement, and guard against potential security threats. When creating the firewall policy draft, these elements make up a detailed set of rules and guidelines controlling the use, management, and security configurations of a firewall inside an organization.

article thumbnail

What Is a Circuit-Level Gateway? Definitive Guide

eSecurity Planet

CLGs are important because they provide specialized security filtering and prevent the discovery of IP addresses and open ports on CLG-protected devices. CLGs can be combined with threat feeds to inform security policies that block known-malicious URLs and IP addresses.

article thumbnail

What is Information Capture? Definition, Purpose, and Value

AIIM

AIIM's training offers this definition for Capture: Capture is the process of getting records (or documents) that you have created into some sort of information management system, and recording their existence in the system. Whether paper or electronic, records are often created and related to other records - for example, all personnel files.