The Information Commissioner's Office (ICO) has prosecuted a GP surgery manager for unlawfully accessing the medical records of almost 2,000 patients registered with the practice. 37-year-old Steven Tennison was employed by the College ...
Tags: Patient Data, medical records, GP Surgery
The Information Commissioner's Office (ICO) has warned organisations that even temporary workers need data protection training in order to properly prevent against a breach. Its warning comes following four data breaches at the Great ...
SAN FRANCISCO (AP) -- Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the world. ...
Tags: Yahoo, Encrypt, Users'Personal Data
“Collecting more and more unstructured data will open up another whole degree of attractiveness and may well lead to attackers seeing value in a form not previously recognised by the organisation that owns the data.” So ...
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
Two-thirds of public sector officials feel that security should play a bigger role in the government's Digital by Default reform agenda, according to research by McAfee. The research, conducted in association with specialist political ...
Tags: Computer Products, software
The US National Security Agency (NSA) is attempting to beef up its security by letting go of 90 per cent of its system administrators, automating their roles instead. The NSA has faced increased scrutiny after former contractor Edward ...
Tags: NSA, System Administrators
In every business there comes a situation where you have to interact with tons of papers and documents which are of no use. However, these documents should not be thrown open, as it may contain any confidential information which in return ...
Tags: Processing Machinery
HMRC has spent over £3.7bn with integrator Capgemini over the past five years for its work under the Aspire contract. Capgemini is the lead supplier under the Aspire deal, in which around 300 subcontractors - including Fujitsu and ...
Tags: HMRC, integrator Capgemini
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
As digital commerce extends into mobile technologies, growing numbers of consumers are integrating smartphones into their purchasing processes. This worldwide trend is moving fastest in certain emerging markets, where switched-on consumers ...
Tags: E-Commerce, Mobile Shopping, Americans
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localisation to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
The competition watchdog has revealed that Telstra has breached measures designed to stop the telco giant from gaining unfair advantages over its rivals during the rollout of the National Broadband Network. The telco giant on seven ...
According to Protiviti’s 2013 Security and Privacy Survey, a large number of companies are not adequately prepared to respond to a data breach of IT security crisis, despite a broader recognition that cyber threats are more prevalent. ...
Tags: Data Breaches, Security