Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2021

When and How to report GDPR personal data breaches (Article 33)

The Data Protection Act was brought in in 2018, and it controls and monitors the way that UK businesses and organizations use your personal data and information, such as credit, payment card, financial information, social security numbers, and any sensitive data. Under the act, it is up to everyone to ensure that they use data wisely and adhere to the data protection principles that are laid down in the act, which are.

Does a Ransomware Attack Constitute a Data Breach? Increasingly, It May

Historically, one difference between a company victimized by ransomware and those hit with a hacking intrusion that resulted in stolen data was that in a ransomware attack, the data wasn’t actually stolen, but was encrypted so that the victim would have to pay a ransom to regain access. Unlike traditional data thefts, ransomware—the theory went—didn’t really steal data. It encrypted it so that the authorized users couldn’t get to it unless a ransom was paid.

Understanding JusPay Data Breach

Juspay, an Indian payment service provider, which processes transactions for giants like Amazon, MakeMyTrip, Airtel, Flipkart, Uber and Swiggy suffered from a data breach resulting in 3.5 crore records of customer data being compromised. The data dump contains sensitive information including the card’s merchant brand, expiry date, the first six and last four digits, user name, email IDs and phone numbers. This data can be put together and used for phishing scams.