Multiple media outlets are reporting news of British Airways facing a massive fine fora data breach. Below are three sources regarding the breach. https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/07/ico-announces-intention-to-fine-british-airways/?mkt_tok=eyJpIjoiTURrek1EQXhaREZqWmpObCIsInQiOiJBb0d2XC9LZUw0SjZVOTJKY09xU3BrWWhmcnJseVwva3NQbkc4WlMwbXc2OVVLWVU2Vmo2QktvNlRYNUp5NjljMUV1VytVdVFsc3FjRkM1bGI1MThmN2IwdTBsVGQzaTFqb3krbGxLaU9qZktoUDNkaGR6bDk3NHFMTGFMS2NiVkNqIn0%3D https://www.nytimes.com/2019/07/08/business/british-airways-data-breach-fine.html https://iapp.org/news/a/ico-intends-to-fine-british-airways-183m-gbp-for-gdpr-violations-over-breach/
December 17, 2020 The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) released its 2016-2017 HIPAA Audits Industry Report that reviewed selected health care entities and business associates for compliance with certain provisions...
Featured Speakers: Brenda Barnhill, JD, LL.M. – Director & Consulting Specialist at Access Steve Neilly, CRM – President, Consulting Services at Access Privacy laws aren’t just arbitrary legal impositions. There are moral and ethical aspects inherent in each decision.Understanding these ethical underpinnings can...
Organizations to collaborate on joint venture to bring the Certificate of Cloud Auditing Knowledge (CCAK) to the market via ISACA
PROVIDENCE, R.I. (WPRI) — Thousands of Rhode Island's most historic documents sit in a rented building, and one of its features fills R.I. Secretary of State Nellie Gorbea with anxiety. "The fact that we are in a geographic flood zone during...
The week of infographics and guides! Check out the NIST CISA Cyber Essentials guide here.
June 20th, 2019 via DailyHodl Following a cyber attack that began on May 29th, the city council of Riviera Beach, Florida has agreed to pay hackers $600,000 in Bitcoin to get its computer system restored and back online. All online services...
Image from Pixabay.com by Amy Cavendish October 8, 2020 There have been numerous stories of individuals becoming rich as they invest in cryptocurrency. Because of the surge in crypto value, cyber-attackers are escalating efforts in a bid to lay their hands on...
Check out the article here by Andrew Ysasi at Vital Records Control
via JD Supra - 4/29/2019 Whether we like it or not, a reality of today’s world is that often important business is conducted by text messages. And so, when it is time to issue a litigation hold notice, you must include an...
Check out this free on-demand webinar provided by Access and ARMA International. This webinar is pre-recorded and free to registrants. Start here.
Albany, NY, ICRM Business Office, September 1, 2020 - The Institute is launching Online Testing September 1. Candidates can now take exams through proctored online testing in the comfort and safety of their own environments, whether home or office. In...
A smart city is pretty much an urban region that makes use of information and communication technology, with electronic sensors to optimize efficiency, collect data, share information, and better the services rendered by the government and the lives of...
Avoiding digital snoops takes more than throwing money at the problem, but that part can be really fun.
Check out this clever post and diagram explaining "as-a-service" with Pizza.
Tools used by red teams to infiltrate networks were taken. Check out the article here.
(Palmyra, NJ – March 20, 2020) – The Foundation is a leading organization that enhances the practical and scholarly knowledge of information management by funding and promoting research, scholarship, and educational opportunities for information management professionals. The Foundation is...
You can check out this article on Art News http://www.artnews.com/2019/05/31/google-spreadsheet-museum-workers-disclose-salaries/
A fantastic resource to help organizations train, educate, and help their stakeholders how to avoid scams.
Check out the article our founder wrote in the latest IG World issue on page 19.
Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat.