Search Results for: gdpr

Web host Hostinger resets 14 million customer passwords following data breach

Hostinger

Hosting company Hostinger has reset passwords for all of its customers after a data breach in which a database containing information about 14 million users was accessed "by an unauthorized third party".

Hostinger says that the password reset is a "precautionary measure" and explains that the security incident occurred when hackers used an authorization token found on one of the company's servers to access an internal system API. While no financial data is thought to have been accessed, hackers were able to access "client usernames, emails, hashed passwords, first names and IP addresses".

Continue reading

C-Suite in the hot seat -- Execs' responsibility regarding digital security

Are you killing your numbers? Crushing your targets? Growing your team? Leading with authenticity and building a loyal following? What a shame it is that your tenure may already be over.

While you were busy winning and shredding the competition, a cybercriminal breached your network. Don’t be too embarrassed, it happens to almost everyone these days. The average "dwell time" of an intruder is more than 100 days, so it’s hard to know exactly when that bucket of ice water was tossed on your dreams. Unfortunately, even if you’re doing everything right, recent examples illustrate that our jobs are on the line when hackers come a knockin’.

Continue reading

Half of companies won't move mission critical workloads to the cloud

cloud stop sign

A new report from enterprise file sharing platform FileCloud looks at cloud and data security and finds that 50 percent of companies don’t plan on moving mission critical workloads to the public cloud.

The survey of 150 professionals from industries including health care, financial services and educational institutions finds that shifts in perceptions of data security are impacting movement to the cloud.

Continue reading

Privacy: Google stops transcribing Assistant recordings and Apple stops listening to Siri recordings

Apple logo in squares

Following the revelations that Apple contractors are listening to recordings of things people say to Siri, and Google workers are manually transcribing Assistant recordings, both companies have said they will cease the practice -- at least temporarily.

Both Apple and Google were "listening in" on recordings with a view to improving their respective digital assistants, but privacy concerns have forced them to take action. But while Apple is suspending its "grading" program worldwide, Google is only changing the way it operates in Europe.

Continue reading

EU says that websites with Facebook Like buttons are liable for private data sharing

Facebook Like

The fingers of Facebook have spread like a cancer across the internet. Even people who have made the conscious decision to boycott the network find it near-impossible to completely avoid its reach thanks to the prevalence of Like buttons.

Now the Court of Justice of the European Union has ruled that websites with embedded Like buttons can be held responsible for the transmission of data to Facebook. This is a particularly important ruling due to the fact that Like buttons can be used to share information about site visitors without the need for the button to be clicked.

Continue reading

Migrating infrastructure to the cloud -- what the board needs to know

Board meeting

If you serve on the board of a UK organization, it’s likely that digital transformation is high on your agenda as you look strategically at futureproofing your business. A key part of that is ensuring that the IT infrastructure supporting your company is functioning robustly as a platform on which to build competitiveness, rather than a legacy anchor holding back innovation and growth. Moving to an Infrastructure-as-a-Service (IAAS) set-up is increasingly the way that companies aim to unlock potential and enable more dynamic, flexible business processes.

The benefits of IAAS are clear: It’s flexible and can easily scale as your business grows. It removes the burden of maintaining legacy systems and allows the easy deployment of new technology and, ideally, you only pay for what you use on a predictable opex basis; you won’t be paying to maintain capacity that is rarely needed. It also allows you to add on services such as analytics and disaster recovery-as-a-service and it’s the perfect environment for the big data projects requiring large workloads and integration with business intelligence tools.

Continue reading

German schools ban Microsoft Office 365 because of privacy concerns

Office 365

The German state of Hesse has banned schools from using Microsoft Office 365 because it fears the software opens up student and teachers' private information to the risk of "potential access by US authorities".

The Hesse Commissioner for Data Protection and Freedom of Information (HBDI) believes that Office 365 is in contravention of GDPR legislation, and also expressed concerns about the collection of telemetry data by Windows 10.

Continue reading

Why application security should be a key part of development [Q&A]

DevSecOps

As data protection legislation tightens and breaches continue to make headlines, there is increased pressure on businesses to implement security by design in their applications.

For many this has meant a move to DevSecOps. We spoke with Rusty Carter, vice president of product management at application security specialist Arxan to find out why this approach is becoming essential.

Continue reading

Yes, Google really is listening in on what you say to Google Assistant

Google Nest Hub

You may well have suspected it, but now Google has confirmed it -- contractors for the company are able to listen to what you say to Google Assistant.

The revelation came after recordings of people using the AI-powered digital assistant were leaked. Belgian broadcaster VRT News obtained a large number of Dutch language recordings and was able to hear highly personal information about users -- even if they had not used the "OK Google" trigger words.

Continue reading

Cloud identity solution lets developers deliver passwordless login and MFA

Login key

Identity specialist Ping identity is announcing an update to its PingOne for Customers IDaaS solution that means developers can now deliver passwordless and advanced multi-factor authentication from custom mobile applications.

Enhancements include a mobile SDK that allows development teams to send push notifications to custom mobile applications for MFA, APIs for logins via social media accounts, and support for single sign-on via Security Assertion Markup Language (SAML).

Continue reading

New tool helps protect sensitive data on Oracle databases

personal data

With GDPR in effect and privacy regulations being planned in other parts of the world, many organizations are looking at their database management to ensure stored data is complaint and doesn’t threaten the business.

For Oracle users, Quest Software is launching its Toad for Oracle -- Sensitive Data Protection (SDP) Module. This allows database admins to to detect and receive notification of personally identifiable information (PII) data residing in databases, select encryption and redaction options immediately after detection, and perform ongoing monitoring

Continue reading

Providing guardrails for developers to innovate while staying secure in the cloud

resistance to cloud

Enterprise cloud adoption has largely been driven by developers eager to take advantage of its agility. These developers are often moving very quickly and are under pressure to bring new products to market that provide competitive advantages. The speed of development combined with a lack of cloud security expertise often results in engineers and developers bypassing certain security and compliance policies. The result is a chaotic, "Wild, Wild West" cloud environment.

Alongside innovative apps and services, a common byproduct of this "free for all" mentality is data breaches, thanks to misconfigurations and other security glitches. This article shares advice on how organizations can empower their developers and engineers by providing a safe framework within which to operate, so they can stay agile and innovative, without inadvertently compromising security.

Continue reading

59% of adults experience stress in the workplace -- could business technology provide a means to help reduce this figure?

workplace stress

The combination of technology and mental health can often have negative connotations. There is plenty of media attention surrounding the negative impact the former can have on the latter. In fact, there is research identifying that social media and too much screen time can increase the risk of depression and anxiety, which can lead to hampered sleep and increased stress levels. A recipe for disaster?

Looking at the other side of the coin, technology can also work to improve mental health and stress levels. In recent years, technology has brought about hugely beneficial health apps like Headspace, Calm and Stop, Breathe & Think. This has provided people with a way to help manage their own mental health conditions on a daily basis, such as anxiety and depression. Businesses can also employ different technologies to help address workplace stress. Together, let’s take a deeper look at that below…

Continue reading

How open source is helping remove data silos in the enterprise [Q&A]

folder stack

Historically data has been stored in silos in order to deliver a quick solution. But in the longer term silos can slow down decision making, make modifying systems harder, and hinder compliance with regulations.

One of the ways to break down barriers between silos is to allow data to be freely shared between them and open source has a big part to play in this. We spoke to Mandy Chessell, distinguished engineer at IBM Cognitive Applications, and recently elected leader of the Technical Steering Committee of the ODPi, to learn more.

Continue reading

New privacy regulations mean your company needs better data management now

Data privacy

Do you know how every company you interact with uses your private data? Consider this: In December 2018, The New York Times revealed that tech and marketing companies use seemingly innocuous apps to gain access to users’ locations -- sometimes up to 14,000 times each day.

For example, the Weather Channel app funneled users’ location data to an IBM subsidiary, while Reveal Mobile, a location-based marketing firm, harvested users’ location data from code planted in more than 500 other apps. It’s safe to say that most people trusted the Weather Channel app to make daily decisions about what to wear or whether to take an umbrella. After the news broke, however, the Weather Channel’s status as a trusted institution was less certain.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.