Shopper+ – 878,290 breached accounts

In March 2023, “Canada’s online shopping mall” Shopper+ disclosed a data breach discovered on a public hacking forum. The breach dated back to September 2020 and included 878k customer records with email and physical addresses, names, phone numbers and in some cases, genders and dates of birth.

Read More

HDB Financial Services – 1,658,750 breached accounts

In March 2023, the Indian non-bank lending unit HDB Financial Services suffered a data breach that disclosed over 70M customer records. Containing 1.6M unique email addresses, the breach also disclosed names, dates of birth, phone numbers, genders, post codes and loan information belonging to the customers.

Read More
3 Reasons Cyber Security Training is Essential

3 Reasons Cyber Security Training is Essential

Organisations are always looking for ways to improve their security practices, and one of the most effective ways to achieve this is by providing employees with cyber security training. According to the cyber security firm AAG, 67% of small and mid-sized organisations say they don’t have the in-house skills needed to deal with cyber security concerns. It’s an understandable problem. There is a huge demand for skilled data protection professionals, which makes it hard to find qualified candidates at reasonable salaries. This presents a major challenge for organisations, but it offers huge opportunities for people looking to enter the information security
The post 3 Reasons Cyber Security Training is Essential appeared first on IT Governance UK Blog.

Read More

cyberwarfare

What is cyberwarfare? The generally accepted definition of cyberwarfare is a series of cyber attacks against a nation-state, causing it […]

Read More

Remote access policy

PURPOSE This policy outlines guidelines and processes for requesting, obtaining, using and terminating remote access to organization networks, systems and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: DETERMINING ELIGIBLE USERS Only users with a demonstrable business need …
The post Remote access policy appeared first on TechRepublic.

Read More
X