article thumbnail

Weekly Update 360

Troy Hunt

😊 The new subscription model launched this week and as many of you know from your own past experiences, pushing major new code live is always a bit of a nail-biting exercise. One thing I talk a bit about in the video today are the 2 new APIs someone reached out and requested. Get started with Aura today.

article thumbnail

How to Keep Your Information Safe for Data Privacy Day 2020

Thales Cloud Protection & Licensing

An extension of the celebration for Data Protection Day in Europe, Data Privacy Day functions as the signature event of the National Cyber Security Centre’s ongoing education and awareness efforts surrounding online privacy. Fortunately, organizations can minimize the risk of these types of attacks by exercising key management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Gamifying Your Cybersecurity Awareness Training Program

Security Affairs

In today’s technological world, educating people about cybersecurity awareness is an absolute necessity. It is important when developing and implementing these programs to be aware of what methods of education work best. Team Exercises. In service of that end, gamification is a highly effective tactic. Visual Aids.

article thumbnail

Knowledge Sharing: 5 Strategies to Share Knowledge In the Workplace

AIIM

This can comprise increased interactions, team-building exercises, quizzes, and collaborations. Among others, MS Teams and Slack are some of the most common knowledge sharing tools where employees can share resources, webinars, business blogs , podcasts, and even their own videos sharing opinions on a particular topic.

article thumbnail

CyberheistNews Vol 13 #14 [Eyes on the Prize] How Crafty Cons Attempted a 36 Million Vendor Email Heist

KnowBe4

The voices of third sector representatives (NGOs, foundations, and educational institutions) are considered by government officials when justifying policy positions and determining how resources and political capital are spent. Education about cybersecurity needs to start early," Karabin says. Erika has been a pleasure to work with.

article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

That includes pictures and videos, which is why you should be careful about the way you use CCTV. Let’s take a look at the steps you should follow to ensure your video surveillance methods are GDPR-compliant. Make sure people know they’re being recorded. Transparency is a core principle of the GDPR.

GDPR 110
article thumbnail

Rightfully Hers exhibit now open

Archives Blogs

But it also reminds modern-day citizens of their responsibilities and encourages all to be ‘election ready’ and exercise the right to vote. Exhibit curator Corrine Porter dedicated the past two years creating an exhibit that includes the artifacts and documents we believed would best tell this story.