Remove B2B Remove Data breaches Remove Data collection Remove Passwords
article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed? Data Collection Should be Minimised, Not Maximisation.

article thumbnail

ChatGPT at work: how chatbots help employees, but threaten business

SecureList

While the first factor in most cases is a password, the second can be a one-time code sent by text/email or generated in a special app ; or it can be something far more complex, such as a hardware security key. The privacy policy has this to say about it: “Private mode: no data collection.