article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

•Social security number •Passport number •Driver’s license •Credit card information •Biometric data (fingerprint, eye scan, facial recognition data) •Health records Bruggeman When demographic information and sensitive information are combined and then inappropriately disclosed, you end up with a data disclosure incident or a data breach.

article thumbnail

MITRE ResilienCyCon: You Will Be Breached So Be Ready

eSecurity Planet

JupiterOne CISO Sounil Yu, creator of a Cyber Defense Matrix adopted by OWASP, noted the concentration of security products in protection and detection and wondered, “Is our industry actually solving the right problems? Backup Is Hard. “ Immutable backups ” are often touted as the answer here. Patching Is Hard.

Backups 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. Additionally, that data stored in the cloud – which includes public clouds, government-owned clouds, private clouds, and cloud storage providers – is expected to climb to 100 zettabytes by 2025.

CISO 130
article thumbnail

Breach of healthcare debt collection firm exposes 1.9M patients – cyber experts weigh in

CyberSecurity Insiders

We’ve spoken with several cybersecurity experts to hear their insights about this breach. In the recent data breach confirmed by PFC, an unauthorized third party accessed and disabled some of PFC’s computer systems. This helps neutralize all possible data-related leverage and limits the need for breach disclosure.”.

article thumbnail

Cybersecurity CEO: 5 Cybercrime Trends to Watch for in 2021

Herjavec Group

At the onset of the year, we predicted that the top priority for any CISO or CIO will be to manage the risk associated with digital transformation and enhance their security programs in order to keep up with new technological complexity. More than half of data breaches over the past year involved insider threats.

article thumbnail

How CIOs Can Protect Data Against Ransomware Attacks in 2022

Security Boulevard

Here are 4 ways to protect your organization’s most precious asset—data—against the ransomware pandemic. Ransomware has become one of the most dangerous and high-profile problems facing CIOs and CISOs worldwide. Hims Pawar. Oct 27, 2021. A recent U.S. government in the first six months of 2021. . Configure Endpoint Management .

article thumbnail

Ransomware Protection: 8 Best Strategies and Solutions in 2021

Spinone

No wonder this threat keeps our client’s CISO and security teams up at night. We know it firsthand – helping them to keep data safe is our job as a SaaS data protection company. Data Security: Airtight Backup If you don’t have a robust Data Loss Protection (DLP) plan, all your security strategy will fall apart.