What is the GDPR, its requirements and facts?

Posted on May 31st, 2019 by Responsible Cyber

Companies that collect data on citizens in European Union (EU) countriesl need to comply with strict new rules around protecting customer data. The General Data Protection Regulation (GDPR) sets a new standard for consumer rights regarding their data, but companies will be challenged as they put systems and processes in place to maintain compliance. Compliance will cause […]

Read More

First American Financial Corp. Data Records Leak

Posted on May 31st, 2019 by Responsible Cyber

Krebs on Security is reporting a massive data leak by the real estate title insurance company First American Financial Corp. “The title insurance agency collects all kinds of documents from both the buyer and seller, including Social Security numbers, drivers licenses, account statements, and even internal corporate documents if you’re a small business. You give […]

Read More

Why businesses don’t report cybercrimes to law enforcement

Posted on May 30th, 2019 by Responsible Cyber

Companies are often compelled to report security incidents such as data breaches to regulators. Companies in the UK, for example, will be legally obligated under GDPR to inform the Information Commissioner’s Office (ICO) if they suffer a breach involving personal information of customers or employees. Similar obligations exist under the likes of the Health Insurance […]

Read More

E-Retail Hacks More Lucrative Than Ever — Krebs on Security

Posted on May 23rd, 2019 by Responsible Cyber

For many years and until quite recently, credit card data stolen from online merchants has been worth far less in the cybercrime underground than cards pilfered from hacked brick-and-mortar stores. But new data suggests that over the past year, the economics of supply-and-demand have helped to double the average price fetched by card-not-present data, meaning […]

Read More

Four Critical Reasons for Investing in Your WAN Edge

Posted on May 23rd, 2019 by Responsible Cyber

The traditional network model of a central, physical data center hub with spokes running out to fixed locations has gone the way of the mainframe and electric typewriter – once mainstays of business. Today’s workforce is increasingly mobile, while business-critical productivity and collaboration applications run in the cloud. The rise of these cloud-based applications enable […]

Read More

Data Asset Management: What Do You Really Need?

Posted on May 23rd, 2019 by Responsible Cyber

At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company. INTEROP 2019 – LAS VEGAS – Nobody wants to admit they don’t know what kind of data they’re collecting, where it goes, or where their backups are located. In a room packed with IT professionals, […]

Read More

The Concept of “Return on Data”

Posted on May 23rd, 2019 by Responsible Cyber

This law review article by Noam Kolt, titled “Return on Data,” proposes an interesting new way of thinking of privacy law. Abstract: Consumers routinely supply personal data to technology companies in exchange for services. Yet, the relationship between the utility (U) consumers gain and the data (D) they supply — “return on data” (ROD) — […]

Read More

How to conduct a proper GDPR audit: 4 key steps

Posted on May 22nd, 2019 by Responsible Cyber

For many organizations, preparing for the European Union’s (EU) General Data Protection Regulation (GDPR) has been a time-consuming endeavor. Unfortunately, the work is not over. Now that GDPR is in effect, companies will need to do regular internal audits to assess their compliance levels. The ability to document these audits will be vital in the […]

Read More

Why reported breaches are the tip of the iceberg

Posted on May 22nd, 2019 by Responsible Cyber

According to the Identity Theft Resource Center (ITRC), 1,244 data breaches were reported in 2018 that compromised over 446 million records containing consumers’ personally identifiable information (PII). The key word in the last sentence is “reported.” Assuming every hacked business reports a breach, like they are supposed to do, we can look at 1,244 breaches […]

Read More

The ethical use of data

Posted on April 11th, 2019 by Responsible Cyber

Data privacy goes beyond protecting from data breaches. There are companies who regularly compromise their customer data as part of their business operations without ever telling the customer they’re doing so. These companies have that data legitimately, with permissions given to them by the user, but the company then goes on to sell the data […]

Read More