This is the next in our series based on a report on data processing at work by the Article 29 Working Party (‘WP29’), an independent European advisory body on data protection and privacy. It has become commonplace for employers to offer Continue reading Data protection in the workplace: Monitoring of home and remote working
This is the next in our series of articles based on a report on data processing at work by the Article 29 Working Party (‘WP29’), an independent European advisory body on data protection and privacy. Traditionally, the monitoring of electronic communications Continue reading Data protection in the workplace: monitoring IT usage at work
A recent parliamentary report, (Cyber Security: Protection of Personal Data Online) recommends several new measures that businesses should adopt to improve their cybersecurity including: A portion of CEO compensation should be linked to effective cybersecurity, in a way to be Continue reading MPs say CEO pay should be linked to effective cybersecurity
A Chief Executive, (who had been in that role for the past 17 years) and Finance Director have been dismissed after their company lost £31 million in an email scam. This news, when it emerged, caused the company’s shares to Continue reading Senior management jobs at risk over data security failures
Recently it has emerged that hackers, (or perhaps as we should more accurately call them, cyber-thieves), took about $80m (about £56m) from Bangladesh’s central bank. Apparently the bank had no firewall and used second-hand routers that cost $10 to connect to Continue reading Spelling error saves bank $920 million!
Willie Sutton, when asked why he (frequently) robbed banks allegedly replied, “Because that’s where the money is”. (Mr. Sutton had a way with words and more of his simple-but-brilliant observations can be read below). Banks have always received a lot Continue reading Because that’s where the money is!
‘Social engineering’, in the context of information security refers to the psychological manipulation of people into performing actions or divulging confidential information. In other words, it’s a type of confidence trick for the purpose of information gathering, fraud, or system access. An Continue reading Social engineering and social media
All businesses collect and hold personal data about their customers, employees and other individuals that they have dealings with. This data is a valuable asset and businesses are (rightly) investing resources to protect that data by putting in place technical Continue reading Why creating a culture of data security is essential
In November 2015 the database of VTech, a global supplier of electronic toys, was hacked. It admitted that millions of customer’s accounts were affected. On 24 December 2015 VTech issued new terms and conditions that include: “You acknowledge and agree Continue reading A brilliant solution to hacking-change your T&Cs!
Technology firms such as Google, Amazon, eBay and Cisco, (but not social networks like Facebook) and those running critical services, such as transport, energy, health and finance will have to report cyber-breaches, under new rules proposed by MEPs. The rules Continue reading EU proposes new cybersecurity law