Search Results for: gdpr

32 percent of data breaches lead to executive job loss

Boss firing employee message card

In North America 32 percent of data breaches have resulted in a C-level manager, president or CEO losing their job, according to new research.

The study from Kaspersky Lab shows that 42 percent of businesses worldwide experienced at least one data breach in the last year. When a data breach occurs it not only results in a costly recovery burden, now put at $1.23 million on average, but it can also impact the company's reputation, customer privacy, and even severely impact employees' careers.

Continue reading

70 percent of businesses have experienced unplanned IT disruption in the last year

Panic

A new study from IT solutions provider US Signal reveals that 70 percent of companies have had at least one unplanned IT disruption in the last year.

These outages are caused by a variety of factors with natural disasters accounting for 53 percent, errors while implementing new technology (26 percent), ransomware (21 percent) and IT overloads (21 percent).

Continue reading

Data and containers and the keys to success

Digital data

In the beginning, workloads, tools, and requirements for big data were simple because big data wasn’t really all that big. When we hit 5TB of data, however, things got complicated. Large data sets weren’t well suited to traditional storage like NAS, and large sequential reading of terabytes of data didn’t work well with traditional shared storage.

As big data evolved, the analytics tools graduated from custom code like MapReduce, Hive, and Pig to tools like Spark, Python, and Tensorflow, which made analysis easier. With these newer tools came additional requirements that traditional big data storage couldn’t handle, including millions of files, read-writes, and random access for updates. The only constant was the data itself.

Continue reading

Developers must give their apps a privacy policy or Apple will kick them out of the App Store

Metallic Apple logo

Apple has announced that all apps submitted to the App Store must have a privacy policy, including those apps which are undergoing beta testing.

The change is due to come into force on October 3, and after this date any app lacking a privacy policy that lets users know how their data is being used faces ejection from the App Store.

Continue reading

Does your website risk leaking personal data?

data leak tap

Recent scandals surrounding the use of personal data, such as the Cambridge Analytica scandal, plus the large fines that can be levied under GDPR, have focused minds on the protection of information.

But is your website at risk of exposing your visitors' data? Auditing and monitoring specialist DataTrue has produced an infographic looking at the risks site tags may pose to privacy.

Continue reading

82 percent of organizations moving to analytics don't know where their critical data is located

data search

Although 75 percent of organizations are moving away from traditional business intelligence towards data analytics, a worrying 82 percent say they don't know where their critical data is located.

A study for analytics database vendor Exasol, conducted by researchers Vanson Bourne, reveals 'dark data' is still a major challenge for businesses trying to move to an analytics model.

Continue reading

Apricorn unveils Aegis Secure Key 3NX 256-bit AES XTS hardware-encrypted USB drive

Storing files in the cloud is very convenient, but understandably, if they contain extremely sensitive information -- such as trade secrets -- you may not want to transmit them over the internet. For this, locally stored data is probably a better move. Of course, if possible, you should encrypt the storage drive. Encryption may even be required as a result of new laws and regulations such as California's Consumer Privacy Act and GDPR.

Software-based encryption for storage drives is better than nothing, but hardware-based is obviously superior. Apricorn has been producing hardware-encrypted USB drives for a while now, and they are very well respected. Today, the company unveils its latest such drive. Called "Aegis Secure Key 3NX," it uses 256-bit AES XTS hardware-encryption -- FIPS 140-2 Level 3 validation is pending. The successor to the well-received Secure Key 3z features a convenient keypad, making it easy to lock and unlock when needed.

Continue reading

Warning: DO NOT install the latest version of CCleaner [Updated]

A month ago, I wrote about how I felt Avast was ruining CCleaner, the excellent system cleaning software it took over when it acquired Piriform last year.

In Avast's short tenure, we've already seen CCleaner suffer from malware, bundled software, and pop-up ads. In my article headline I asked "what’s next?" Well, with a new version of CCleaner available to download, we now have the answer. Inevitably, it's not good.

Continue reading

AlgoSec launches updated security management for cloud and hybrid

Secure cloud

As businesses shift their systems to the cloud there is inevitably an increase in complexity that makes maintaining security more of a challenge.

Security policy management specialist AlgoSec is launching a new version of its Security Management Solution to enable policy management across clouds and software-define networks.

Continue reading

Free template helps businesses deal with data breaches

Breach detection

Thanks to legislation like GDPR businesses need to report data breaches promptly or face large fines. However, in the heat of a security incident it can be easy to overlook vital procedures.

Privileged account management specialist Thycotic is aiming to help with the launch of a free Incident Response Policy Template to help businesses take the right steps at the right time.

Continue reading

Syncsort helps compliance for IBM i users

Compliance gauge

IBM's i operating system -- originally known as OS/400 -- is still popular in many larger and mid-sized organizations, and it is of course subject to the same security and compliance challenges as other systems.

Big data specialist Syncsort is launching additions to its Syncsort Assure family of products to help i users achieve compliance with GDPR and other legislation, and strengthen security with multi-factor authentication.

Continue reading

Software supply chain attacks set to become a major threat

Broken chain

According to a new study, 80 percent of IT decision makers and IT security professionals believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years.

The survey by Vanson Bourne for endpoint security company CrowdStrike  finds two-thirds of the surveyed organizations experienced a software supply chain attack in the past 12 months.

Continue reading

Google, Facebook, Microsoft and Twitter team up on open source Data Transfer Project to ease your data moving woes

Four giants of the technology world have joined forces in an attempt to make it easier for people to move data between services. The collaboration between Google, Facebook, Microsoft and Twitter takes the form of the open source Data Transfer Project, the aim of which is to make it possible to "transfer data directly from one service to another, without needing to download and re-upload it".

The four companies joining announced the data portability platform which currently makes use of public APIs to offer support for photos, mail, contacts, calendars and tasks from the founders as well as other companies who are encouraged to get involved.

Continue reading

Half of retailers experience security breaches in the past year

data breach

According to a new report, 52 percent of US retailers have suffered a data breach in the past year and 75 percent have had one at some time in the past.

The latest Thales Data Threat Report, Retail Edition, also shows that US retail data breaches more than doubled from 19 percent in the 2017 survey to 50 percent, making retail the second most breached industry vertical this year.

Continue reading

Timehop admits its security breach was worse than first thought

Timehop on mobile

The security breach suffered by Timehop on July 4 was much more serious than the company first thought. In an update to its original announcement, the company has revealed that while the number of account affected by the breach -- 21 million -- has not changed, the range of personal data accessed by hackers is much broader.

Timehop has released an updated timeline of events, having initially felt forced by new GDPR rules to publish some details of the breach before all information had been gathered. The company says that it is also unsure of where it stands with GDPR, and is working with specialists and EU authorities to ensure compliance.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.