Mar 7, 2020 | Asset Management, Attack Vectors, Audit Logs, Best Practices, Business, Compliance, Critical data, cyberattacks, Data, Data Assets, data sharing, Data Storage, Databases, Disaster Recovery, Hard Disks, Intricate Data Systems, Policies and Procedures, Privacy, Radio Show, Radio_Show, records, Security, Security, Technology, Unsecured
Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Apr 26, 2019 | 2019, Breaches, March
Who: Gateshead Council # of Accounts Breached: 19 breaches What was affected: Private information including personal medical details When it happened: May 2018 – March 2019 How it happened: A council has admitted a series of data breaches, including uploading...
Jan 26, 2019 | Internet, Radio Show, Security
EU Privacy Law Snares Its First Tech Giant: Google French regulators fined Google €50 million (equivalent to $57 million) on Monday for violating European Union privacy law. That’s not much considering Google’s parent company Alphabet reported $33.7...