Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

Cloud Security

...legal and regulatory compliance obligations. For instance, the DPA (Data Protection Act) 2018 and GDPR (General Data Protection Regulation) apply to the processing of personal data regardless of where that...

Post

Risk Management under the DORA Regulation

...2021(Q2–Q4) 2022(Q2–Q4) Data breaches 855 752 (-12%) 630 (-16%) 648 (+3%) Cyber attacks 143 245 (+71%) 230 (-6%) 285 (+23%) Note 1: The ICO data set only provides the numbers...

Post

The PECR and EU ePrivacy Directive

...this means providers need to comply only with the PECR’s requirements relating to: Security and security breaches; Traffic data; Location data; Itemised billing; and Line identification services. However, some service...

Post

ISO 27017 and ISO 27018 Cloud Security

...critical – especially if you use them to process personal or sensitive information and must comply with data protection laws such as the GDPR (General Data Protection Regulation) and DPA...

Post

DPO as a Service Case Study

...their customers but requires strict monitoring from a data protection standpoint. It was clear to MyC’s founders when starting up that data protection was going to be integral to the...