Remove 2021 Remove Encryption Remove Unstructured Data
article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

. “Cell C is aware that data compromised in the recent cybersecurity incident has been unlawfully disclosed by RansomHouse, the threat actor claiming responsibility.” “This follows a previously reported incident involving unauthorised access to unstructured data in some parts of our IT environment.”

article thumbnail

Don't Encrypt Everything; Protect Intelligently

Thales Cloud Protection & Licensing

Don't Encrypt Everything; Protect Intelligently. Thu, 11/11/2021 - 09:30. The volume of confidential documents created daily is, frankly, incalculable, and the volume of “everything” distributed across multiple data centers around the world is much, much more. Finding the right balance is the key.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key steps on the road to LGPD compliance

Thales Cloud Protection & Licensing

Thu, 02/18/2021 - 08:05. Brazil, the largest country in both South America and Latin America, released a data privacy law bringing new business opportunities, especially in the international domain. The end result is that you know exactly where your sensitive data resides and what you need to protect in order to be compliant.

article thumbnail

How Secure Is Cloud Storage? Features, Risks, & Protection

eSecurity Planet

According to Unitrends’ 2019 cloud storage research, 62% of respondents had successfully recovered data from the cloud. This trend is expected to increase as Gartner projects a threefold rise in unstructured data capacity by 2026. The increased scalability of cloud storage can assist effective data recovery solutions.

Risk 125
article thumbnail

How to Comply with GDPR, PIPL, and CCPA

eSecurity Planet

China’s new data privacy law just went into effect in November 2021. China’s Personal Information Protection Law (PIPL) is legislation that aims to outline and protect appropriate uses of personal data. Organizations need to understand all of the data they store and collect as well as where they’re storing it.

article thumbnail

How Can You Protect Critical Infrastructure from Ransomware Attacks

Thales Cloud Protection & Licensing

Thu, 06/10/2021 - 06:00. A ransomware is a vicious type of malware that cybercriminals use to block access to business critical systems by encrypting data in files, databases, or entire computer systems, until the victim pays a ransom. How Can You Protect Critical Infrastructure from Ransomware Attacks. Use RDP Gateways.

article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

By September of 2021, the number of publicly reported data breaches had already surpassed the total of the previous year by 17%. Increasingly, personal privacy is being viewed as a human right, and the way vendors handle consumer and employee data will determine how much the public trusts them and wants to conduct business with them.