What role does data destruction play in cybersecurity?

Credit to Author: Kayla Matthews| Date: Fri, 20 Sep 2019 18:18:26 +0000

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Categories:

Tags:

(Read more…)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

Read more

How much personalization is too much?

Credit to Author: Seth Rosenblatt| Date: Mon, 19 Aug 2019 15:00:00 +0000

Personalization is the new mantra of marketers—and most people are perfectly okay with that. But when does personalization cross the line into invasive? And what can uncomfortable consumers do about blocking it?

Categories:

Tags:

(Read more…)

The post How much personalization is too much? appeared first on Malwarebytes Labs.

Read more

The top six takeaways for corporate data privacy compliance

Credit to Author: David Ruiz| Date: Fri, 03 May 2019 15:00:00 +0000

Here are Labs’ top six takeaways from our data privacy and cybersecurity law series on corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules help not just with legal liability, but also user trust.

Categories:

Tags:

(Read more…)

The post The top six takeaways for corporate data privacy compliance appeared first on Malwarebytes Labs.

Read more

What is personal information? In legal terms, it depends

Credit to Author: David Ruiz| Date: Thu, 11 Apr 2019 17:03:02 +0000

What exactly is the “personal information” that companies need to legally protect? Learn which data points organizations need to secure, from Social Security numbers to olfactory, smell-based data (!), to comply with the law.

Categories:

Tags:

(Read more…)

The post What is personal information? In legal terms, it depends appeared first on Malwarebytes Labs.

Read more

Reputation management in the age of cyberattacks against businesses

Credit to Author: Jovi Umawing| Date: Thu, 14 Mar 2019 16:15:59 +0000

A business’s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Read more

2018: The year of the data breach tsunami

Credit to Author: Logan Strain| Date: Fri, 28 Dec 2018 16:00:00 +0000

To get a sense of the grim state of data security today, take a look at this infographic from TruthFinder that explains why 2018 was the year of the data breach tsunami.

Categories:

Tags:

(Read more…)

The post 2018: The year of the data breach tsunami appeared first on Malwarebytes Labs.

Read more

Explained: What is big data?

Credit to Author: Pieter Arntz| Date: Fri, 03 Aug 2018 15:00:00 +0000

In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?

Categories:

Tags:

(Read more…)

The post Explained: What is big data? appeared first on Malwarebytes Labs.

Read more