Remove category workplace-privacy
article thumbnail

ISO 27001 and Physical Security

IT Governance

Physical access control, physical security monitoring, CCTV, and more When we hear the term ‘information security’ – or, for that matter, ‘ISO 27001’ – our thoughts usually turn straight to cyber security. However, physical security is also an important aspect of information and data security.

article thumbnail

CyberheistNews Vol 13 #07 [Scam of the Week] The Turkey-Syria Earthquake

KnowBe4

link] Spear Phishing Attacks Increase 127% As Use of Impersonation Skyrockets Impersonation of users, domains and brands is on the rise, as is the use of malicious links, in response to security vendors improving their ability to detect malicious attachments. Blog post with links: [link] Are Your Users Making Risky Security Mistakes?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DPIAs for retail and hospitality 

IT Governance

You can build a picture of their behaviour and may even process special category data, such as health data. Use of facial/voice recognition and fingerprints to govern access constitutes biometric data which is special category data, the processing of which would constitute a reason to conduct a DPIA. Online tracking by third parties.

Retail 78
article thumbnail

European Parliament Agrees on Position on the AI Act

Hunton Privacy

Foundation model,” which means an “AI model that is trained on broad data at scale, is designed for generality of output, and can be adapted to a wide range of distinctive tasks.” Providers of foundation models are now subject to a number of specific obligations under the AI Act. Carry out the Fundamental Rights Impact Assessment (see below).

Risk 55
article thumbnail

Catches of the month: Phishing scams for January 2020

IT Governance

Security researchers at ESET are warning people about a new scam targeting PayPal users. You don’t often see these in phishing scams, perhaps because it creates an extra step between users clicking the link and landing on the fraudulent page, but it gives the illusion that the page the victim is about to enter is secure.

article thumbnail

7 Best Email Security Software & Tools in 2023

eSecurity Planet

That makes email security software a worthwhile investment for organizations of all sizes. We analyzed the market for email security tools and software to arrive at this list of 7 top email security solutions, including their standout features, limitations and ideal use cases, followed by issues prospective buyers should consider.

Security 131
article thumbnail

Does Your Content Drive Organizational Value?

AIIM

We break these up into five key categories of actions or aspirations: Creating and Capturing Information. The first IIM category is all about your content – creating it, capturing it, and collaborating with it. These are the ideal attributes of a Digital Workplace that leverages Organizational Intelligence.