The California Consumer Privacy Act of 2018 (CCPA) gives Californian consumers greater transparency into how their personal data is being handled. Under the CCPA, California residents have a right to: California's landmark move to greater privacy laws mirrors the consumer data protection posture outlined in the GDPR and Canada's propositions in Bill C-11. Guidance for complying with the CCPA is outlined through CCPA regulations.
The holidays are right around the corner. It’s a well-deserved time to spend with your friends and family, and it likely translates to increased online sales. But more eCommerce activity also means increased cybersecurity risks. Most organizations with eCommerce deploy cybersecurity measures such as Content Security Policies (CPSs), to help secure their site and protect their customer’s personally identifiable information from a breach.
More than a year of near-universal remote work has proven that many of us can reliably stay productive from anywhere — whether it be from home, co-working spaces or otherwise. Businesses have caught wind of this, and according to IDC, 60% of them will continue with remote work or implement a hybrid model even after they reopen their offices again. This calls for a paradigm shift in the way we conduct cybersecurity.
We’re getting into the end-of-year holiday season. In addition to our busy end-of-year business schedule, we need to plan for family visits, develop menus for special meals, and possibly do a little shopping while the deals are good. It’s a lot to keep track of. Just remember it’s when you are distracted that you tend to put your digital security most at risk. Digital criminals don’t take holidays.
Egnyte users want to get the files they need as fast as possible. Less time spent scouring folders means more time doing the work that really matters, and one of the best ways to do that is with the Egnyte Desktop App. With the Egnyte Desktop App you get real-time access to all your files and folders stored in the cloud, directly from your computer.
For the next instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve invited the CIO/CISO of World Insurance, Liz Tluchowski to share her thoughts on the state of Cybersecurity today. Liz is in charge of cybersecurity for both the corporate side of World Insurance, which is one of the 100 largest insurance brokerages in the U.S. and the 125 additional agencies around the country that they have acquired.
Social Engineering is a form of security fraud that relies on psychological manipulation techniques to trick people into revealing sensitive information. This is often carried out online using a variety of social engineering techniques; one of the more commonly referred to social engineering attacks are phishing attacks (including, vishing, smishing, spear phishing and whale phishing).
There’s little in the world of technology that qualifies as sui generis (that is, unique unto itself). What goes around really does come around and there is safety in respecting that. Why look back to then in cybersecurity? Because one of the best ways to understand how to protect your network, Wi-Fi, and endpoints is to familiarize yourself with what led to today’s tortuous threat landscape.