2017

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Data Breach Today

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report

174
174

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

WIRED Threat Level

The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol. Security

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Records Disrupted: Blockchain as a Transformative Force

Weissman's World

Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) If records and content management issues such as security, privacy, and compliance seem everlasting, that’s because they are! What aren’t everlasting though, are the so-called information governance “technologies” we use to bring these matters to heel. In recent decades, we have cycled through imaging, document […]. The post Records Disrupted: Blockchain as a Transformative Force appeared first on Holly Group.

Dispelling 3 most common myths about AI and big data

Information Management Resources

The intelligence in AI comes from the humans who train it! All initiatives need smart human assistance to function successfully. Artificial intelligence Machine learning Data management

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

The case for delaying the date the GDPR applies for a couple more years

Data Protector

A huge percentage of the organisations I’ve recently come into contact with have little chance of becoming “GDPR compliant” by May 2018. To be fair, a good proportion of these organisations have spent the past decade or so ignoring the professional advice that's available on how to better comply with the requirements of the existing data protection legislation.

GDPR 139

More Trending

Virtually Celebrate New Year’s Eve in Every Timezone with the ‘VRChat’ Community

IBM Big Data Hub

Ever wished you could jet set around the world fast enough to ring in the New Year at a party in every timezone? Well that might not be quite possible, but VRChat is offering something close. VRChat , a social VR experience supporting major PC VR headsets via Steam , is celebrating New Year’s Eve virtually in every timezone, every hour, on the hour. Fireworks included. Image courtesy VRChat.

87

Ten things impacting the world: living to 150

OpenText Information Management

Over the course of human history, our life expectancy has been on an upward trend: increasing from 30 years (during prehistoric times) to 35 years (in the Classical Greek and Roman eras) to 48 years (in Medieval times). Better living conditions in the mid-20th century caused the average lifespan to jump to the 70-year mark. … The post Ten things impacting the world: living to 150 appeared first on OpenText Blogs.

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales eSecurity

At Thales eSecurity we are always eager to obtain data on how the world perceives threats to personal data, because it has the potential to inform us on how to make our everyday lives more safe and secure. Together with an independent firm, we recently conducted a survey of 1,000 consumers across the U.S. and UK and found that ownership of internet-connected cars is on the rise. Survey data shows that ownership of connected cars in 2017 is 28% in the U.S.

4 records management best practices for maximizing storage capacity

TAB OnRecord

If you want to save on records storage space, you can do that by deploying high-density shelving, which allows you to increase storage capacity by up to 330% in a given area. Another way to save is by evaluating your records management practices. Properly managing records can help reduce the volume of records, both now… Read More. The post 4 records management best practices for maximizing storage capacity appeared first on TAB Records Management Blog | TAB OnRecord. Physical filing

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Tracking People Without GPS

Schneier on Security

Interesting research : The trick in accurately tracking a person with this method is finding out what kind of activity they're performing. Whether they're walking, driving a car, or riding in a train or airplane, it's pretty easy to figure out when you know what you're looking for. The sensors can determine how fast a person is traveling and what kind of movements they make. Moving at a slow pace in one direction indicates walking.

Paper 80

Data Breach Today - Untitled Article

Data Breach Today

18 Best 2018 B2B Lead Generation Strategies For Marketers. Have you yet planned your best 2018 B2B lead generation strategies? Well if you have not until now then you should probably know that when it comes to B2B lead Generation, 2018 is going to become the lifeblood of modern sales process. With loads of strategies to choose from, it has become very challenging for businesses to survive the competition.

B2B 170

Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System

WIRED Threat Level

The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks. Security

Bitcoin ? Blockchain

Weissman's World

Seems like not an hour goes by that I don’t see a headline about the soaring value of bitcoin – followed near-immediately by another that warns of the imminent bursting of the bitcoin bubble. Since I’m not a bitcoin owner, my interest in these goings-on is more academic than practical. But I am invested (intellectually, […]. The post Bitcoin ≠ Blockchain appeared first on Holly Group. bitcoin Blockchain process management records management information governance

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

Predictions 2018: 5 trends driving the IoT and IIoT

Information Management Resources

Adoption of the Internet of things and the Industrial Internet of Things show no signs of slowing down. If anything, adoption and implementations will only increase. Internet of things Data management Data and information management

IoT 113

What (currently ignored) privacy area might result in early enforcement action when the GDPR is in force?

Data Protector

We have 480 days to go before the General Data Protection Regulation is “in force”. And then what? That's the question I’m being increasingly asked these days. Does it really mean that in 481 days, European privacy regulators will be heralding the first megafine for non-compliance with one of the GDPR’s more obscure requirements? I think not.

GDPR 131

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices. At its peak in September 2016, Mirai temporarily crippled several high-profile services such as. OVH. , Dyn. , Krebs on Security. via massive. distributed Denial of service attacks (DDoS). reported that these attacks exceeded 1Tbps—the largest on public record.

IoT 83

Learning Machine Learning? Six articles you don’t want to miss

IBM Big Data Hub

Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution

87

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

How my Apple Watch gave me a window into a world of IoT in Retail

OpenText Information Management

The Internet of Things (IoT) is beginning to have a major impact in many industry sectors. IoT is a network of connected devices with embedded sensors othat can communicate, analyze and share data over the cloud. So far, the Retail sector has been slow to embrace IoT but it’s beginning to happen. Buying an Apple … The post How my Apple Watch gave me a window into a world of IoT in Retail appeared first on OpenText Blogs.

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. To borrow from Shakespeare’s Macbeth: “Each new morn, new widows howl, new orphans cry, new sorrows slap Internet giants on the face”.

Weekly Update 66

The E-Learning Curve

This week, it's all about fixing data breaches. Following on from my Congressional testimony last month, I committed to writing about how we can address the root causes which has led to the 5-part epic that was this week's posts. These posts consumed a huge amount of time this week which is why the weekly update is going up a day late, but it's here now and it's a whopper! iTunes podcast | Google Play Music podcast | RSS podcast. References.

Cloud Leaks Continue: 123 Million U.S. Households' Personal Information Exposed Online

eSecurity Planet

The information, from data analytics firm Alteryx, was in an Amazon S3 bucket configured to provide any AWS user with access

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money

IT 162

In 'Star Wars: The Last Jedi', the Resistance Keeps Making the Same Tactical Mistake

WIRED Threat Level

The urge to fight one decisive battle has undone countless real-world rebellions—and those in the Star Wars universe as well. Security

View From AIIM17: New Blood or Fresh Meat?

Weissman's World

Like so many others, I have lots of nice things to say about last week’s AIIM17 conference in Orlando, FL. Energy levels were high, sessions were engaging, exhibitors seemed happy, and a good time was had by all. However, rather than write yet another trip report on the subject (links to some are listed below), […]. The post View From AIIM17: New Blood or Fresh Meat? appeared first on Holly Group. AIIM ECM information professional information governance information management

ECM 146

How do you reduce physical file volumes? Get TAB SMART!

TAB OnRecord

Any place where you find physical files, you also find a great deal of unneeded documents. We regularly see physical records collections containing over 50 percent non-record content. These non-records include duplicates, convenience copies, and documents that have passed their required retention period. Need help getting rid of unneeded documents? Our TAB SMART program is… Read More. The post How do you reduce physical file volumes? Get TAB SMART!

Design Thinking for Product Teams: Leverage Human Insight Throughout Development

Product teams must increase their exposure hours with customers—seeing and hearing them. Human insights and the design thinking framework can be applied to your development cycle to help you build better products and experiences for your customers.

When does the General Data Protection Regulation not require firms to appoint a Data Protection Officer?

Data Protector

I’m increasingly asked whether particular firms actually need to appoint a Data Protection Officer in order to comply with the requirements of the GDPR. Given that the potential fine for non-compliance (with Article 37) is €10 million Euros or up to 2% of the total worldwide annual turnover, companies quite understandably don't want to get such a basic issue wrong.

B2B 131

Exposing the inner-workings of the ransomware economy

Elie

This blog post shed light on the inner workings of the ransomsphere economics and exposes which cybercriminal groups are the biggest earners. This is the second blog post in my series about ransomware economics. The first post. is dedicated to the methodology and techniques needed to trace ransomware payments end-to-end. As this post builds on that methodology, I encourage you to read through the first post if you haven’t done so. final post.

Influencers assess 2017 and make predictions for 2018

IBM Big Data Hub

As the year winds down, questions tend to arise about what the big trends of the past year have been and what the year to come may hold

86