;
  1. Home
  2. In General

Category: In General

In General
How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

For many organizations, preparing for the European Union’s (EU) General Data Protection Regulation (GDPR) has been a time-consuming endeavor. Unfortunately, the work is not over. Now that GDPR is in effect, companies will need to do regular…

In General
Top 10 Most Common Types of Cyber Attacks

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the…

In General
Think twice before you share our faces online, say children

Think twice before you share our faces online, say children

It’s become an accepted part of keeping up to date with extended family and friends, but if schoolchildren were in their parents’ shoes, the majority wouldn’t share posts of their sons and daughters online. Over…

In General
Data Center Security: Not Just About Cyber

Data Center Security: Not Just About Cyber

e need to talk about the importance of physical security at data centers. The triumvirate of “bulletproof” security — “something you know, something you have and something you are” — isn’t complete without it. Data is…

In General
Most firms still unprepared for cybersecurity attack, says report

Most firms still unprepared for cybersecurity attack, says report

The results of a global study sponsored by tech behemoth IBM have revealed that a great majority of organizations remain unprepared in cybersecurity incident response. The report, titled “The 2019 Cyber Resilient Organization”, explored the…

In General
What’s true? Cybersecurity in the age of social media

What’s true? Cybersecurity in the age of social media

For many people, technology is part of everyday life. Whether it’s emailing your boss or looking up funny videos out of boredom, people rely on technology. Even though digital use is incredibly fulfilling, it does…

In General
Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

Google Chrome to Introduce Improved Cookie Controls Against Online Tracking

At the company’s I/O 2019 developer conference, Google has announced its plan to introduce two new privacy and security-oriented features in the upcoming versions of its Chrome web browser. In an attempt to allow users…

In General
It’s time for Congress to act on Facebook’s privacy policies. Here’s how.

It’s time for Congress to act on Facebook’s privacy policies. Here’s how.

Consumers have a right to know exactly what information is being taken from them on Facebook and how it is being used. (Pixabay) It seemed as though, after years of privacy scandals, Facebook had finally…

In General
JOLTT: Where law and technology collide

JOLTT: Where law and technology collide

Austin has become an attractive hub for technology and startup companies. Yet, when attorney Alex Shahrestani came to UT School of Law in 2015, he said he was surprised to find technology law was not…

In General
Cybercrime organizations work just like any other business: Here’s what they do each day

Cybercrime organizations work just like any other business: Here’s what they do each day

Cybercriminal organizations compete with each other for customers, fight for the best project managers and even look for leaders who serve in a CEO-like role to help them stay organized and on the task of…