Posts tagged with data privacy protection

Cybersecurity Strategy · Data Security · Encryption

Local Laws Start to Fragment Privacy Picture

For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data. Now, for the first time, serious questions are...

Cybersecurity Strategy · Data Security · Internet of Things · Privacy · VPN

How to Keep IoT Devices Secure

Office environments everywhere are being transformed as more and more Internet of Things (IoT) devices enter the workplace. From intelligent air conditioning units and smart lighting to digital...

Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

Friend or Foe: The Importance of Multi-Factor Authentication

The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

Blog · Data Security · Encryption

Retailers must balance data privacy with personalization

The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

Data Security · Encryption

Can Governments be trusted to keep our data private?

Governments and state agencies everywhere would like us to believe that our personal data is safe in their hands. They say this information is vital. Without it, they claim, it would be impossible to...

Connected Cars · Data Security · Digital Signage · Internet of Things

Smart cities – Big data meets Big Brother

Smart Cities are evolving at a phenomenal pace. Not so long ago, smart city initiatives were little more than a series of discrete pilot projects. Now, public officials worldwide have latched on to...

Data Security

Forces push data privacy to the forefront

Until very recently, data privacy has never ranked very high in the public consciousness. In opinion polls last year, people were nearly split evenly when asked about the need for stricter regulations...

Data Security

Extended Mass Surveillance Increases Pressure to Keep Data Comms Private

Congress has approved a six-year extension of Section 702 of the U.S. surveillance law. This means the continuation of PRISM, the controversial mass surveillance program first exposed by Edward...

Data Security · VPN

More anonymity with Tor and VPN?

Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users...

globe data lock
Data Security

The World after Safe Harbor

In October 2015, the European Court of Justice (ECJ) declared the Safe Harbor Agreement for transferring data to the USA invalid. The decision was based on a lawsuit filed by the Austrian, Maximilian...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK