A desk clerk had difficulty logging into the hospital information system and asked aloud “How do I log in?” To a colleague who also had a patient in front of the splash screen.Then the login code and then the password were loud and audible for everyone. In hospitals people are notoriously careless, careless and thoughtless […]
Yesterday Uber’s former security chief Joe Sullivan was charged with attempting to conceal a hack from federal investigators. This hack exposed the email addresses and phone numbers of 57 million drivers and passengers. As a result the former CISO could face up to eight years in prison for not promptly disclosing to the employee and […]
NCSC published the following Small Business Guide for Cyber Security with the following steps for which ID Control gives some free trials of cloud security services: Backing up your data; Protecting your organization from malware (f.e. https://antivirusservice.eu/ ); Keep your mobile devices safe (f.e. https://antivirusservice.eu/ ); Using password to keep your data safe (f.e. https://idcontrol.pw); Avoid phishing attacks. […]
Cruise line operator Carnival Corporation has disclosed that one of their brands suffered a ransomware attack on 15 August and filed this with the Securities and Exchange Commission (SEC). Carnival expects that the security event included unauthorized access to personal data of guests and employees, which may result in potential claims from guests, employees, shareholders, […]
One month after the termination of the “Privacy Shield” data treaty between the EU and the US, privacy activist Max Schrems takes websites that continue to send data to the US.8 Belgian and Dutch are also being charged: PostNL, Takeaway, Marktplaats and Lieferando. A month after that ruling, the Schrems organization has now taken stock […]
Research by the Knowledge Institute for Mobility Policy shows that 71% of the Dutch are positive about working from home.45% of homeworkers want to continue to do this more often after the crisis. Currently, about 48% of workers (partly) work at home.Most home workers (about 60%) expect to work from home one to two days […]
What happens to data such as personal data that is offered via an American cloud software supplier now that the EU-US Privacy Shield has been declared invalid?Because the Foreign Intelligence Surveillance Act (FISA) concerns “electronic communication service providers”, this ruling has an effect on a lot of cloud software within your organization.The biggest problem with […]
Transmitted information via satellite broadband connections – something that’s useful in areas where fixed internet connections might be slow or non-existent – could get their traffic sniffed, potentially putting usernames and passwords into the hands of attackers, as well as the ability to track sensitive but often not encrypted information about individuals or corporations. You […]
The FBI has provided Internet users with tips for recognizing malicious web stores. According to the U.S. Service, there is an increase in the number of victims being tracked down through fake online stores. The US regulator FTC also reports an increase in the number of shoppers who do not receive ordered goods. These include […]
Twitter Hack Zoom court hearing was interrupted by a Porn Video as the meeting was Zoombombed. “Zoombombing” is when an uninvited person joins a Zoom meeting. This is usually done in an attempt to gain a few cheap laughs at the expense of the participants. Zoombombers often hurl racial slurs or profanity, or share pornography […]