Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 487 results

Post

Cyber Essentials: Secure Configuration

...but it’s not the most secure. Accepting the default settings without reviewing them can create serious security issues, and can allow cyber attackers to gain easyaccess to your data. Web...

Post

Digital Service Providers and the NIS Regulations

...monitored by their regulator, the ICO (Information Commissioner’s Office). Comparable to the EU GDPR (General Data Protection Regulation), organisations must report incidents of significant impact to the ICO within 72...

Post

Expert Insight: Cliff Martin

...way that the GDPR [General Data Protection Regulation] is a little vague on what constitutes a reportable personal data breach. This is for the simple reason that what is ‘major’...

Post

The 5 Biggest Phishing Scams of All Time

...of Peace’ leaked a reported 100 terabytes of data from the film studio Sony Pictures. The attackers laid their trap months earlier, according to Stuart McClure, the CEO of computer...

Post

The Benefits of Becoming an Ethical Hacker

...security. We’ve previously talked to him about the penetration test process and types, secure remote working, the CVSS (Common Vulnerability Scoring System), and mega breaches MOAB (mother of all breaches)...

Post

DFARS

...systems and data. Ensuring that all DoD systems and data are properly protected from unauthorised access, use or disclosure. Developing and implementing a plan to respond to cyber attacks and...

Post

EU Cybersecurity Act

...number of cyber security objectives, which are aligned with established best practice. These include: Information security To protect data against accidental or unauthorised storage, processing, access, disclosure, destruction, loss, alteration...