article thumbnail

Fixing Data Breaches Part 1: Education

Troy Hunt

The Red Cross Blood Service breach gave us our largest ever incident down here in Australia (and it included data on both my wife and I). CloudPets left their MongoDB exposed which subsequently exposed data collected from connected teddy bears (yes, they're really a thing). The difference is education.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Back to the bit about risks impacting data collected by IoT devices and back again to CloudPets, Context Security's piece aligned with my own story about kids' CloudPets messages being left exposed to the internet. Here we had a situation where an attacker could easily control moving parts within a car from a remote location.

IoT 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

The Last Watchdog

Through Data Privacy Week we hope to inspire better data stewardship and empower people to reclaim control of their digital footprints, balancing innovation with privacy.” This even includes information about a person’s physical well-being, like health data from apps. For more information, please visit [link].

article thumbnail

7 Top Tips for Accelerating your IoT Projects in 2021

CyberSecurity Insiders

Although this does take time, with training and upskilling programs , insightful workshops, and “Hacker Fridays” (where employees can try to hack a specific smart device), team members will become more capable of dealing with the new diagnostics support work, as well as any general IoT problems.

IoT 100
article thumbnail

On the 20th Safer Internet Day, what was security like back in 2004?

Malwarebytes

Data collected by the Internet Storm Center dug into “Survival Time History”, which is “calculated as the average time between reports for an average target IP address. Say hello to the meet and greets No wonder, then, that very big and visible safer day/week campaigns became such a huge deal.

article thumbnail

Top 10 Cloud Privacy Recommendations for Businesses

McAfee

As businesses continue to accelerate to the cloud, there’s no better time to review all aspects of cloud data collection, use, storage, transfer and processing. Work with GRC and workshop how users use cloud. Often, they are unsure how clouds are being used and what data is being uploaded, and therefore policies are general.

article thumbnail

16 Reasons why International Women’s Day Isn’t Worth Celebrating in Cybersecurity

Jane Frankland

Women are still not being researched You cannot affect the low numbers of women in cybersecurity through an annual day (IWD) or month (Women’s History Month) of celebration, a workshop on inclusion, a woman speaker, a female network, or even rules. This format cannot change organisational systems.