Six most common cyber attacks

Cyber crime is at an all-time high, and at the same time as organizations are trying to counter these attacks, criminal hackers are becoming more innovative with the different types of cyber attacks they are choosing to deploy.  What is a cyber attack? Cyber attacks are deliberate and malicious. They are attempts to breach …

List of free GDPR resources

The General Data Protection Regulation (GDPR) will be enforced from May, requiring all organizations that handle EU residents’ data to abide by its strict terms. If yours is one of the millions of organizations that need to comply with the GDPR, then no doubt …

The 3 pillars of information security

Many people mistakenly think that information security is all about technology. It obviously plays a massive part in any organization’s security measures, but technology alone can’t protect you from modern cyber threats. Rather, it forms one of three pillars on …

Apple vs. Facebook

New technologies, whether from Apple, Facebook or other organizations always cause regulatory confusion. When cars were first developed and sold in large numbers in the early 20th century, the streets were chaos: there were no stop signs, warning signs, traffic …

Fewer breaches, more stolen data

2018 may have seen fewer breaches than 2017, but more sensitive information was compromised. According to a report by Identity Theft Resource Center and CyberScout, the number of exposed records more than doubled from 2017–2018. Findings The number of breaches …

RMIA hit by malware attack

At the beginning of the month, RMIA (Reproductive Medicine and Infertility Associates) in Woodbury, Minnesota informed its patients that a malware attack had potentially exposed their PII (personally identifiable information). In its announcement, RMIA said: “On December 5, 2018, we …