Security

SecurityTrendMicro

Customer data & marketing operations: Keeping your data safe on the journey to GDPR compliance

Credit to Author: Steve Neville| Date: Wed, 25 Apr 2018 14:48:46 +0000

Emails. Web forms. Events. [Oh my!] These marketing tactics are all designed to gather, store, and evolve relationships with your prospects, customers, and partners. Often times, they are the first point of contact for your organization from the outside world—and they all feed into your marketing automation systems. With the General Data Protection Regulation (GDPR)…

The post Customer data & marketing operations: Keeping your data safe on the journey to GDPR compliance appeared first on .

Read More
SecurityTrendMicro

The Risks of Bio-IoT

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 25 Apr 2018 13:00:34 +0000

The typical enterprise has more than 500 applications in place.

Trend Micro has been protecting its customers now for almost 30 years. Over that time our mission has not changed. We still fight every day to make the world a safer place to exchange digital information. However, our messaging has needed to evolve to take account of the ever-changing threat landscape, as well as the…

The post The Risks of Bio-IoT appeared first on .

Read More
ComputerWorldIndependent

Why we love lawyers (well, OUR lawyers, anyway)

Credit to Author: Sharky| Date: Wed, 25 Apr 2018 03:00:00 -0700

This IT pilot fish has spent the past year and a half helping his company’s clients prepare for the European Union’s upcoming General Data Protection Regulation, and with a month to go, it’s been smooth sailing — mostly.

“Over the last 18 months I’ve been asking my customers time and again about their readiness to implement the GDPR rules,” says fish. “We have mostly small companies as our customers, family businesses and one-to-ten-person outfits, and most of them had need of our services one way or another.

“But one customer, a lawyer, told me every time that this particular set of rules does not apply to him, because everything he does is governed by an obligation to confidentiality. Ten weeks before the final date, he still thought it had nothing to do with him.”

To read this article in full, please click here

Read More
ComputerWorldIndependent

Heads up: Total Meltdown exploit code now available on GitHub

Credit to Author: Woody Leonhard| Date: Tue, 24 Apr 2018 13:33:00 -0700

Remember the Total Meltdown security hole? Microsoft spread the vulnerability in every 64-bit Win7 and Server 2008 R2 patch released this year, prior to March 29. Specifically, if you installed any of these patches:

  • KB 4056894 Win7/Server 2008 R2 January Monthly Rollup
  • KB 4056897 Win7/Server 2008 R2 January Security-only patch
  • KB 4073578 Hotfix for “Unbootable state for AMD devices in Windows 7 SP1 and Windows Server 2008 R2 SP1” bug installed in the January Monthly Rollup and Security-only patches
  • KB 4057400 Win7/Server 2008 R2 Preview of the February Monthly Rollup
  • KB 4074598 Win7/Server 2008 R2 February Monthly Rollup
  • KB 4074587 Win7/Server 2008 R2 February Security-only patch
  • KB 4075211 Win7/Server 2008 R2 Preview of the March Monthly Rollup
  • KB 4091290 Hotfix for “smart card based operations fail with error with SCARD_E_NO_SERVICE” bug installed in the February Monthly Rollup
  • KB 4088875 Win7/Server 2008 R2 March Monthly Rollup
  • KB 4088878 Win7/Server 2008 R2 March Security-only patch
  • KB 4088881 Win7/Server 2008 R2 Preview of April Monthly Rollup

… your machine was left in an exposed state. Microsoft made changes to your PC that makes it easy for a running to program to look at, or modify, any data on your computer.

To read this article in full, please click here

Read More