November, 2017

article thumbnail

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Data Breach Today

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.

221
221
article thumbnail

4 records management best practices for maximizing storage capacity

TAB OnRecord

If you want to save on records storage space, you can do that by deploying high-density shelving, which allows you to increase storage capacity by up to 330% in a given area. Another way to save is by evaluating your records management practices. Properly managing records can help reduce the volume of records, both now… Read More. The post 4 records management best practices for maximizing storage capacity appeared first on TAB Records Management Blog | TAB OnRecord.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In praise of. Elizabeth Stafford

Data Protector

Many of even the most dedicated members of the UK’s data protection fraternity may not have heard of Elizabeth Stafford. And that’s a shame. Why? Because she, along with a small band of colleagues in the Department of Digital, Culture, Media & Sport are doing great things. How? Because, as Head if EU Data Flows, not only is she working on ensuring UK businesses can rely on unencumbered data flows between the UK and the EU post Brexit, she’s also one of the key DDCMS officials working hard be

Privacy 120
article thumbnail

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

In this paper, we present the first longitudinal measurement study of the underground ecosystem fueling credential theft and assess the risk it poses to millions of users. Over the course of March, 2016–March, 2017, we identify 788,000 potential victims of off-theshelf keyloggers; 12.4 million potential victims of phishing kits; and 1.9 billion usernames and passwords exposed via data breaches and traded on blackmarket forums.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Supreme Court Must Understand That Cell Phones Aren’t Voluntary

WIRED Threat Level

Opinion: The US argues that police can access cell phone records freely because customers volunteer that data. But cell phones are no longer optional.

Access 111

More Trending

article thumbnail

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money?

IT 198
article thumbnail

How do you reduce physical file volumes? Get TAB SMART!

TAB OnRecord

Any place where you find physical files, you also find a great deal of unneeded documents. We regularly see physical records collections containing over 50 percent non-record content. These non-records include duplicates, convenience copies, and documents that have passed their required retention period. Need help getting rid of unneeded documents? Our TAB SMART program is… Read More.

article thumbnail

How much …? The rise of dynamic and personalised pricing

The Guardian Data Protection

Cheaper croissants in the morning is one thing; being charged according to your credit rating is another. As Black Friday approaches, should we trust the prices of online stores – and even bricks-and-mortar retailers? You wait 24 hours to book that flight, only to find it’s gone up by £100. You wait until Black Friday to buy that leather jacket and, sure enough, it’s been marked down.

Retail 108
article thumbnail

Ten things impacting the world: living to 150

OpenText Information Management

Over the course of human history, our life expectancy has been on an upward trend: increasing from 30 years (during prehistoric times) to 35 years (in the Classical Greek and Roman eras) to 48 years (in Medieval times). Better living conditions in the mid-20th century caused the average lifespan to jump to the 70-year mark. … The post Ten things impacting the world: living to 150 appeared first on OpenText Blogs.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apple MacOS High Sierra Security Flaw Lets Anyone Get Root Access, No Password Required

WIRED Threat Level

A Turkish company found a glaring flaw in Apple's desktop operating system that gives anyone deep access, no password required.

Passwords 112
article thumbnail

How to Tackle the Information Chaos Problem

AIIM

Many organizations are on some sort of Digital Transformation journey – or they should be. Everyone wants to “transform.” But what exactly is Digital Transformation? Most organizations and departments have a mandate to continuously improve operations. A conventional change agenda involves better tools and technology, better behaviors, and better processes, all focused on generating better efficiencies and improved productivity.

article thumbnail

Millions of Computers Affected By Intel Firmware Flaws

Data Breach Today

Numerous Manufacturers Must Prep and Distribute Customized Patches Security experts are readying for more details from chipmaker Intel about two classes of vulnerabilities in its chips that could put organizations' most trusted data at risk. Millions of computers are affected, and computer manufacturers must prep and distribute customized patches.

article thumbnail

4 essential RIM practices to prepare for mergers and acquisitions

TAB OnRecord

Records management teams have a key role to play in mergers, acquisitions and divestitures. Whether big or small, the sale of any corporate asset must be supported by accurate and complete records. These provide buyers with historical information, compliance documentation and other crucial records. Most importantly, complete and accurate records help demonstrate the full value… Read More.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK police to lose phone and web data search authorisation powers

The Guardian Data Protection

Change is one of several to snooper’s charter law proposed by ministers in attempt to comply with European court ruling Senior police officers are to lose the power to self-authorise access to personal phone and web browsing records under a series of late changes to the snooper’s charter law proposed by ministers in an attempt to comply with a European court ruling on Britain’s mass surveillance powers.

Access 105
article thumbnail

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales Cloud Protection & Licensing

At Thales eSecurity we are always eager to obtain data on how the world perceives threats to personal data, because it has the potential to inform us on how to make our everyday lives more safe and secure. Together with an independent firm, we recently conducted a survey of 1,000 consumers across the U.S. and UK and found that ownership of internet-connected cars is on the rise.

Security 103
article thumbnail

North Korea’s Missile Test Puts the Entire US in Range

WIRED Threat Level

The bad news: Tuesday's missile test shows that North Korea's ICBM can likely hit the US. The slightly less bad news: It's still a long way off from actually doing so.

IT 111
article thumbnail

Guest Post -- GDPR Compliance starts with Data Discovery

AIIM

This is the seventh post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

ENISA: Software vulnerability prevention initiatives

Data Breach Today

The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities.

article thumbnail

How my Apple Watch gave me a window into a world of IoT in Retail

OpenText Information Management

The Internet of Things (IoT) is beginning to have a major impact in many industry sectors. IoT is a network of connected devices with embedded sensors othat can communicate, analyze and share data over the cloud. So far, the Retail sector has been slow to embrace IoT but it’s beginning to happen. Buying an Apple … The post How my Apple Watch gave me a window into a world of IoT in Retail appeared first on OpenText Blogs.

Retail 102
article thumbnail

Data breach hits Department of Social Services credit card system

The Guardian Data Protection

Exclusive: Data includes employees’ names, user names, work phone numbers, work emails and system passwords The Department of Social Services has written to 8,500 current and former employees warning them their personal data held by a contractor has been breached. In letters sent in early November the department alerted the employees to “a data compromise relating to staff profiles within the department’s credit card management system prior to 2016”.

article thumbnail

How to lose your password

Thales Cloud Protection & Licensing

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. To borrow from Shakespeare’s Macbeth: “Each new morn, new widows howl, new orphans cry, new sorrows slap Internet giants on the face”. The modern era of mass data breaches perhaps began in 2009, with the hack of 32 million account credentials held by software developer RockYou, in which a SQL injection attack revealed that passwo

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

What Amazon Echo and Google Home Do With Your Voice Data—And How to Delete It

WIRED Threat Level

Like the idea of Amazon Echo and Google Home, but feel uneasy about all that recording? Here's what they listen to—and how to delete it.

IT 111
article thumbnail

Document Capture Automation Tools to Improve the Way You Work With Data

AIIM

Your business deals with documents on a constant basis. Without technology in place, organizing the different types of files and contact points for written communication can be intense. You might have paper contracts, email and attachments, faxes, and web forms all integral to the same client or customer file. This is where capture automation becomes effective in streamlining your productivity and organizational ability.

ECM 101
article thumbnail

Accounting of Disclosures Under the HITECH Act

Data Breach Today

A notice of proposed rulemaking from the HHS Office for Civil Rights that would modify the HIPAA Privacy Rule standard for accounting of disclosures of protected health information and add new requirements for access reports.

Privacy 179
article thumbnail

Here's What I'm Telling US Congress about Data Breaches

Troy Hunt

Last week I wrote about my upcoming congressional testimony and wow - you guys are awesome! Seriously, the feedback there was absolutely sensational and it's helped shape what I'll be saying to the US Congress, including lifting specific wording and phrases provided by some of you. Thank you! As I explained in that first blog post, I'm required to submit a written testimony 48 hours in advance of the event.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

No, Facebook isn't spying on you. At least not with the microphone

The Guardian Data Protection

The sheer volume of data Facebook has on you is difficult to comprehend, which makes it incredibly creepy – and ripe for conspiracy theories Last week, Facebook issued yet another denial that the company eavesdrops on its users to target them with adverts. “Just not true,” said Rob Goldman, the company’s head of ad product , in response to an open query from podcast Reply All.

IT 104
article thumbnail

4 cyber security predictions for 2018

IT Governance

From Yahoo to Equifax, this year’s headlines have been dominated by high-profile digital disasters. With the cyber threat landscape only set to grow in 2018, we spoke to a number of industry experts for an insight into the challenges and innovations IT professionals can expect to face in 2018. 1. Healthcare will become an increasing target. Healthcare surpassed the public sector in cyber security incident reports in the second quarter of 2017, according to the latest threat report by security

article thumbnail

'Vapor Wake' Explosive-Sniffing Dogs Help Protect the Thanksgiving Day Parade

WIRED Threat Level

This year, a team of Labrador retrievers trained to sniff out body-worn explosives will help lock down NYC's Macy's Thanksgiving Day Parade.

Security 112