Remove Encryption Remove Identity Theft Remove Unstructured Data
article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

. “Cell C is aware that data compromised in the recent cybersecurity incident has been unlawfully disclosed by RansomHouse, the threat actor claiming responsibility.” “This follows a previously reported incident involving unauthorised access to unstructured data in some parts of our IT environment.”

article thumbnail

How to Keep Your Information Safe for Data Privacy Day 2020

Thales Cloud Protection & Licensing

Namely, they should implement encryption, key management and identity and access management (IAM) to help preserve the privacy of their stored data. Encryption. An organization’s digital security strategy would not be complete without encryption. A Streamlined Data Security Strategy. Key Management.