Securing data: EFDPO Congress in Berlin Data theft, data leaks and data security: this was the topic of the first day of the EFDPO Congress, which is currently taking place alongside the BvD Association Days in Berlin. Dr Christoph Bausewein from the international company Crowdstrike spoke about the resilience that companies need to develop in order to survive cyberattacks. According to him, data attacks have increased exponentially since the 1990s. Making systems secure against attacks and data theft ‘is the reality of the future,’ said Bausewein. In order to achieve cyber resilience, he explained the NIS 2 directive for network and information security, the update of the NIS 1 directive and the EU's DORA regulation for more resilience against cyber security in the financial sector. Christian Dürschmied used the most recent decisions of the European Court of Justice to show how complex the question of concrete material damage is for those affected whose data was disseminated without their consent. He looked at various decisions in which companies did not comply with the provisions of the GDPR, including the Deutsche Wohnen ruling of 5 December 2023 and against Media Markt of 25 January 2024. Dr Gwendal Le Grand from the European Data Protection Board (EDPB) had previously presented the Coordinated Enforcement Frameworks (CEF) and explained the EDPB's services, particularly for small and medium-sized enterprises. The EDPB website offers its own ‘Data Protection Guide’. According to Secretary General Pierre-Yves Lastic, 17 European countries currently belong to the European Federation of Data Protection Officers (EFDPO).
EFDPO European Federation of Data Protection Officers’ Post
More Relevant Posts
-
🚀 Starting today, I’m launching a monthly series of short summaries on security regulations! These posts will be simple and to the point, covering key requirements in just 2-3 lines and explaining their impact on businesses. Let’s kick off with a regulation that’s close to home in New York.🗽 Understanding DFS NY Regulation 500: 🔍 Who is being regulated: Financial institutions in New York, including banks, insurance companies, mortgage brokers, and other financial service providers. 📜 Key requirements: Designating a CISO, maintaining a cybersecurity program, implementing data encryption and proper access control including MFA, maintaining an incident response plans, and performing annual security assessments. 💼 Impact on businesses: Compliance with DFS NY Regulation 500 is legally required for organizations in New York's financial sector to operate. Organizations are required to notify DFS of any cyber events and submit an annual certification of compliance. I have added a link for those who want to read the official release: https://lnkd.in/en-4pAJz
To view or add a comment, sign in
-
𝐌𝐚𝐧𝐚𝐠𝐢𝐧𝐠 𝐅𝐢𝐧𝐚𝐧𝐜𝐢𝐚𝐥 𝐃𝐚𝐭𝐚 𝐒𝐞𝐜𝐮𝐫𝐞𝐥𝐲: 𝐒𝐚𝐟𝐞𝐠𝐮𝐚𝐫𝐝𝐢𝐧𝐠 𝐘𝐨𝐮𝐫 𝐅𝐮𝐭𝐮𝐫𝐞 In today's digital age, the importance of securing financial data cannot be overstated. Financial data breaches can lead to devastating consequences, including identity theft, financial loss, and reputational damage. To protect sensitive information, implementing robust data security measures is essential. First and foremost, encryption is a powerful tool in safeguarding data. Encrypting financial data ensures that even if unauthorized individuals gain access, they cannot decipher the information. Regular data backups are equally crucial, providing a safety net in case of data loss due to cyberattacks or system failures. Ensure that backups are stored securely and are regularly updated. Additionally, establishing strict access control procedures helps limit who can access financial data, reducing the risk of insider threats. Implementing multi-factor authentication (MFA) and regular audits can further enhance security. By prioritizing these data security methods, organizations can protect themselves and their clients from potential breaches. Let's take proactive steps to secure our financial data and build a safer digital environment for everyone. #DataSecurity #FinancialData #CyberSecurity #Encryption #DataBackup #AccessControl #MFA #SecureYourData
To view or add a comment, sign in
-
This is why #APISecurity today is a must for every #organization and in particular for #Telcos to avoid service disruption and most of all compromise your #brandreputation #security #cybersecurity #akamai https://lnkd.in/dNYz4Ydz
Coding error in forgotten API blamed for massive data breach
theregister.com
To view or add a comment, sign in
-
Recently, a data leak involving US-based MC2 and its background check services exposed sensitive personal information, including full names, social security numbers, and birthdates. As regulatory pressures increase and data privacy becomes a critical concern, incidents like these serve as reminders of the risks posed by unsecured systems. At GNS, we understand that protecting client data requires more than just meeting compliance standards—it's about anticipating threats and providing robust, ongoing cybersecurity solutions. Our managed IT services include continuous monitoring, data encryption, and proactive defense strategies to safeguard your business from such vulnerabilities. Stay protected and partner with a firm that puts data security first. https://lnkd.in/ehU8u8SH #Cybersecurity #DataPrivacy #ITManagement #GNS #ManagedIT #CyberSecurity #ManagedHosting #CloudManagement #FinancialServices #TechInnovation #DataProtection #CloudSolutions #ITConsulting #FinanceandTech #BusinessContinuity #Compliance #DigitalTransformation #ITStrategy #TechTrends #OperationalEfficiency #ScalableSolutions
One-third of the US population’s background info is now public | Cybernews
cybernews.com
To view or add a comment, sign in
-
SUMMARY: CSC ServiceWorks reported a data breach affecting confidential information following a cyberattack in early 2023. MAIN POINTS: - CSC ServiceWorks experienced a cyberattack resulting in a data breach in 2023. - The breach exposed sensitive information including names, addresses, and social security numbers. - The company has notified affected individuals and taken steps to improve security measures. TAKEAWAYS: - Data breaches can compromise highly sensitive personal information. - Organizations must enhance security protocols to prevent future cyberattacks. - Prompt notification and response are crucial after a data breach. #databreach #infosec #cybersecuritynews
CSC ServiceWorks discloses data breach after 2023 cyberattack
bleepingcomputer.com
To view or add a comment, sign in
-
What is data security? The term “data security” describes the procedures, equipment, and methods used to guard against theft, corruption, and illegal access to digital data. It entails applying a mix of administrative, technical, and physical safeguards to protect data at every stage of its lifetime, including during processing, transmission, and storage. In an increasingly data-driven world, maintaining data security is crucial for enterprises to uphold trust, adhere to legal requirements, and reduce risks to their finances and reputation. Data security is a key component of contemporary cybersecurity initiatives, ranging from securing critical company data to personal information like credit card numbers and passwords. Effective data security necessitates proactive measures, a thorough understanding of vulnerabilities, and the application of strong security solutions customized to match the needs of both individuals and organizations as threats change. https://lnkd.in/dVDdD-GX
What is data security?
https://jlor.xyz
To view or add a comment, sign in
-
📢 Data Breach at Optus: A Lesson in API Security and Oversight In a recent court filing, Australia's Communications and Media Authority (ACMA) detailed the significant data breach at Optus, which exposed the personal information of over nine million customers. This breach, traced back to a coding error that broke API access controls, highlights critical gaps in security practices and oversight. 🔍 The Incident: --Cause: The API had two entry points, each secured in 2017. In 2021, a coding error broke one of the access control lists (ACLs). Unfortunately, the defect was only detected in one of the entry points, despite both being impacted by the same flaw. --Detection: Optus identified and fixed the issue on the Main domain in 2021, but the Target domain remained vulnerable. --Impact: In September 2022, an attacker exploited this vulnerability, accessing customer information via Target APIs. The attack was not sophisticated, relying on simple trial and error. 💡 Key Takeaways: --Single Entry Point Strategy: While the obvious move was to ensure that the same fixes were applied to all entry points, the better move for future security is to have only one entry point, one set of security controls, and one instance to support, secure, document, and implement. --Segregation and Security: Ensuring that API traffic is segregated and properly secured is crucial. --Regular Audits: Continuous monitoring and auditing of all domains and access points can prevent prolonged vulnerabilities. --Timely Response: Rapid identification and rectification of security issues are essential to protect customer data. 🔍 Broader Implications: --API Vulnerabilities: APIs remain a common source of security flaws, reminiscent of web hacking from the early 2000s. It's critical to delve into API security and recognize their susceptibility to traditional attacks. --Reasonable Cybersecurity: This incident is the second recent determination by an Australian authority that a commercial business failed in implementing reasonable cybersecurity measures. While guides like the CIS framework are very specific and useful, defining and achieving reasonable cybersecurity is a global imperative. This incident serves as a stark reminder of the importance of robust security protocols and vigilant oversight in safeguarding sensitive customer information. 🔗 Stay informed and vigilant! #CyberSecurity #DataBreach #API #TechNews #ACMA #InfoSec #DataProtection #ReasonableCybersecurity
Coding error in forgotten API blamed for massive data breach
theregister.com
To view or add a comment, sign in
-
Don't let a simple coding error become a costly cyber nightmare! This data breach shows why robust cyber insurance and vigilant security practices are essential. #CyberSecurity #DataBreach #CyberInsurance https://lnkd.in/dYZuReQN Get in touch info@BGi.uk
Coding error in forgotten API blamed for massive data breach
theregister.com
To view or add a comment, sign in
-
🚨 Massive Data Breach: NADRA's Negligence Exposes Millions In a shocking revelation, the Standing Committee of Pakistan’s National Assembly has been informed that 2.7 million Pakistanis' sensitive data was stolen from NADRA’s servers over a year ago. This is not just a breach; it is a catastrophic failure of responsibility. Names, addresses, and other crucial identity details now sit on the dark web, up for sale to the highest bidder. This isn't just an invasion of privacy—it's an unforgivable threat to national security. NADRA, the institution tasked with protecting the civil records of every Pakistani, has not just failed; it has put millions at risk due to incompetence. The involvement of employees within NADRA in the data theft adds an infuriating layer of betrayal to this disaster. This breach is a clear testament to the negligence and disarray in the country's approach to cybersecurity. The bureaucracy's complacency is alarming, with the implications of this breach echoing far beyond personal data theft—it exposes vulnerabilities that can destabilize national integrity. No amount of posturing or public statements can erase the fact that the safety of citizens’ most personal information was treated with glaring carelessness. It’s time to recognize this breach for what it is: a national embarrassment and a failure that the government cannot excuse or downplay. 🔒 Data is not just valuable; it’s priceless. Negligence isn’t an option—it’s a crime. NADRA
Nadra data leak | The Express Tribune
tribune.com.pk
To view or add a comment, sign in
-
The Case of the Phantom Hacker" A Morning Shock: In the bustling city of Technation, the Department of Digital Compliance (DDC) worked to protect sensitive data from cybercrime. One cold winter Monday, lead counsel Jemimah Shaw received an urgent call about a major breach at the City’s Central Data Hub. The breach involved an unauthorized 2:13 AM login and data siphoning, with suspicion of insider collaboration. The compromised credentials belonged to Linda Watford, a senior programmer. The Breach: At the DDC’s war room, analysts confirmed the hacker exploited Linda’s credentials. Linda denied involvement and admitted she had clicked on a suspicious email claiming to be from IT support. Lead analyst William deduced it was a spear-phishing attack designed to steal her credentials. Unraveling the Mystery: As Jemimah assessed legal implications, the team worked to trace the breach. Under privacy laws, they were required to notify affected parties and regulators, with stricter penalties possible under sabotage laws. Meanwhile, William set up a honeytrap network to bait the hacker. The Trap: The hacker took the bait, leading the team to a warehouse where law enforcement apprehended Riley Smith, a disgruntled ex-employee. Fired months earlier for resource misuse, Riley orchestrated the attack to retaliate against the department. Lessons Learned: In the aftermath, Jemimah emphasized the importance of employee training and robust security controls. The DDC introduced mandatory cybersecurity awareness programs, teaching employees to identify phishing attempts and handle sensitive data responsibly. They also implemented a zero-trust security framework. The Bigger Picture: The city issued a public statement explaining the breach and mitigation steps, maintaining transparency. Riley was prosecuted under data protection and sabotage laws. Reflecting on the incident, Jemimah concluded that law and cybersecurity were inseparable. Though Technation was safe again, the DDC remained vigilant for future threats.
To view or add a comment, sign in
1,453 followers