Why Cybersecurity Awareness Month is Every Month

Cybersecurity is a year-round issue Cybersecurity awareness is important year-round for the security of our businesses and customers. We’re proud to be a supporter of Cybersecurity Awareness Month. It has been invaluable ...
PII Microsoft Koverse data protection impact assessment DPIA Dell AWS data protection cybersecurity

Common Challenges When Handling PII Data

Personally identifiable information (PII) is information that can be used to distinguish or trace an individual’s identity. Understandably, if compromised, such sensitive information may be used for identity theft, fraud and other ...
Security Boulevard
data privacy TriggerMesh IBM cloud threat suspicious activitylogging

5 Ways to Automate Data Privacy Management

In my previous article, I discussed why data privacy management in its current form, which is all about filling out form after form, is unsustainable. In her recent address at the IAPP ...
Security Boulevard
Planned Parenthood Ransomware Attack Has Far Reaching Implications

Planned Parenthood Ransomware Attack Has Far Reaching Implications

The Planned Parenthood Los Angeles affiliate announced that their computer network was hit by a ransomware attack. The compromise occurred between October 9 and 17 and affected around 400,000 patients’ data ...
Planned Parenthood Ransomware Attack Puts Lives at Risk

Planned Parenthood Ransomware Attack Puts Lives at Risk

The Planned Parenthood branch in Los Angeles revealed that it was the victim of a ransomware attack that resulted in attackers obtaining sensitive information on about 400,000 patients. All ransomware attacks and ...
1touch.io Inventa - How it Works (Detailed Version)

4 Ways Mishandling Sensitive Data Wastes Your Time

Besides ignoring the fundamental principles of IT security, nothing can lead to a cybersecurity breach faster than carelessly handling sensitive data. This problem has been prevalent in recent years. However, it seems ...
Malicious Life Podcast: Smart TVs - a New Security Battlefield

Malicious Life Podcast: Smart TVs – a New Security Battlefield

Smart Homes are slowly but surely becoming a part of our everyday lives, and so far it seems that Smart TVs - equipped with microphones, cameras, and an internet connection - are ...
1touch.io Inventa - How it Works (Detailed Version)

Sensitive Data Discovery and Classification Explained

Sensitive data is any type of classified information that must be protected and made inaccessible to parties without the proper authorization. This type of data includes personally identifiable information (PII) and protected ...
Malicious Life Podcast: Should the U.S. Ban Chinese and Russian Technology?

Malicious Life Podcast: Should the U.S. Ban Chinese and Russian Technology?

Every year, seemingly, there’s a new story of some software like 'Tik Tok' or 'FaceApp' from a hostile country that may or may not be a security threat to us in the ...