Mar 7, 2020 | Asset Management, Attack Vectors, Audit Logs, Best Practices, Business, Compliance, Critical data, cyberattacks, Data, Data Assets, data sharing, Data Storage, Databases, Disaster Recovery, Hard Disks, Intricate Data Systems, Policies and Procedures, Privacy, Radio Show, Radio_Show, records, Security, Security, Technology, Unsecured
Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Apr 26, 2019 | 2019, Breaches, March
Who: Gateshead Council # of Accounts Breached: 19 breaches What was affected: Private information including personal medical details When it happened: May 2018 – March 2019 How it happened: A council has admitted a series of data breaches, including uploading...
Jan 26, 2019 | Internet, Radio Show, Security
EU Privacy Law Snares Its First Tech Giant: Google French regulators fined Google €50 million (equivalent to $57 million) on Monday for violating European Union privacy law. That’s not much considering Google’s parent company Alphabet reported $33.7...
May 30, 2018 | Podcast, Radio Show
Ambien Tweeting, Drunk Dealing, GDPR affect in US, FBI Router Warning: AS HEARD ON -The WGAN Morning News [05-30-18]...
May 26, 2018 | Internet, Radio Show, Security
What You Need to Know About GDPR Breach Disclosure, Response Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when...