Remove Education Remove Insurance Remove Military Remove Security
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.

article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. You need to rely on external storage to securely transport your data. DataLocker actually got traction, early on, selling to the military.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Driving Conversations Around Careers In Telematics

Information Governance Perspectives

John Danenberger, CPCU, is Corporate Counsel at State Farm Insurance and specializes in addressing emerging issues around telematics. In 2015, he successfully transitioned from a military career as a trial attorney for the JAG Corps to working in telematics in corporate America for State Farm Insurance.

article thumbnail

Vermont’s Amendments to Data Breach Law and New Student Privacy Law Effective July 1, 2020

Hunton Privacy

Security Breach Notice Act. The amendments to Vermont’s Security Breach Notice Act include expanding the definition of Personally Identifiable Information (“PII”), expanding the definition of a breach to include login credentials and narrowing the permissible circumstances under which substitute notice may be used.

article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

Security awareness training still has a place to play here." Email and other elements of software infrastructure offer built-in fundamental security that largely guarantees we are not in danger until we ourselves take action," Tyson writes. Is the email enticing you to click on a link?' I'm being asked to do something here.'"

article thumbnail

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

The cyber security industry, much like the rest of the world, is on edge. In the final days of February, there were a flurry of security incidents related, either directly or indirectly, to the Ukraine conflict. It will take place on Thursday, 3 March at 3pm, and you can register for on our website.

article thumbnail

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

Security Affairs

The experts also discovered a large number of insurance certificates that expose various personally identifiable information (PII), such as names, phone numbers, postal and email addresses. CENTCOM requisition form for use of military aircraft. One of the files exposed via the malware analysis sandboxes appeared to be a U.S.