Blog Posts - Data Protection
Kaspersky Lab Survey Highlights Data Protection as the Top Priority for Businesses when Combating Cyberthreats

43% of businesses experienced data loss due to a targeted attack 20% of enterprises had four or more data breaches within a year Loss or exposure of sensitive data is the worst outcome of a......
by Pinoy Bisnes - Business ideas for Entrepreneurs on Dec 4, 2016
Data Protection and the Virtual Assistant

Data Protection is one of those areas where if you ask 10 different people “Do I need to be registered?” you’ll get 10 different answers. So we wanted to clear this one up: As a UK VA, you DO need … Continue reading →...
by Society Of Virtual Assistants on Jul 21, 2016
Internet Of Things- how to use IoT to make sales

How brands will use the Internet of Things (IoT) to develop their customer relationships. The Internet of Things will soon become a significant channel through which brands will be able to create and deepen relationships with their customers, a new...
by Dyenamic Solutions on May 6, 2016
EU watchdogs demand revisions to Safe Harbour replacement

EU privacy watchdogs have demanded changes to a pact meant to govern cross Atlantic data transfers. The group urged the US and European Commission to revise and clarify several points in the proposed Privacy Shield agreement in order to safeguard EU...
by Dyenamic Solutions on Apr 18, 2016
Legal ruling that computer hacking by GCHQ is not illegal

GCHQ is within UK law when it hacks into computers and smart phones, a security tribunal has ruled. Campaigners Privacy International have lost a legal challenge claiming the spying post’s hacking operations are too intrusive and break European...
by Dyenamic Solutions on Feb 21, 2016
Ashley Madison password protection was flawed

Hackers stole gigabytes of data from Ashley Madison including login names, passwords and website code. More than 11 million passwords stolen from the Ashley Madison infidelity dating website have been decoded, says a password cracking group. When sto...
by Dyenamic Solutions on Jan 19, 2016
Only 'Limited Assurance' for Brent Council data protection in ICO Audit

The Information Commissioner's Office recent audit of data protection at Brent Council resulted in a 'Limited Assurance' grade - the second lowest.The report LINK Executive Summary states:There is a limited level of assurance that processes and...
by wembleymatters on Dec 24, 2015
Google stores children’s data claims civil liberties group

Google collects schoolchildren’s personal data, including internet searches, a civil liberties group says. In a complaint to the US Federal Trade Commission (FTC), the Electronic Frontier Foundation (EFF) said the alleged practice broke both Go...
by Dyenamic Solutions on Dec 20, 2015
Spyware demo shows how to hack phones

A UK security firm has shown how one phone hacking tool actually works. It allows spies to take secret pictures with a phone’s camera and record conversations with the microphone, without the phone owner knowing. Hacking Team’s software w...
by Dyenamic Solutions on Oct 7, 2015
How to set up a VPN

A VPN is a virtual version of a secure, physical network—a web of computers linked together to share files. But VPNs connect to the outside world over the Internet, and they can serve to secure general Internet traffic in addition to corporate asse...
by Dyenamic Solutions on Sep 7, 2015
An apparent lack of empathy

Yesterday I wrote about the process of requesting details from Political Parties of the details they retain after holding conversations with us as potential voters. My blog followed on from an earlier tweet which some of the local party activists an...
by IanChisnall on Aug 29, 2015
Subject access request

These words “subject access request” meant nothing to me until yesterday when I learnt that the Information Commissioners Office (ICO) developed this phrase to allow people like you and me to demand that organisations which are register...
by IanChisnall on Aug 28, 2015
Cars can be hacked using digital radio broadcasts

Several car infotainment systems are vulnerable to a hacking that could potentially put lives at risk. Car infotainment systems can allow drivers to see vehicle status updates, play music and videos, view maps and in some cases run third-party apps,...
by Dyenamic Solutions on Aug 15, 2015
Brent Council: Same two questions – why no answers?

Philip Grant wondered if Wembley Matters readers could stand another posting on 'The Two Questions' when he submitted this guest blog. One of Brent Council's strategies is to continue to stonewall until complainants give up. Philip's persistence is a...
by wembleymatters on Aug 13, 2015
Internet Magna Carta vote launched by British Library

Thousands of young people are taking part in a UK debate about what should be included in a “Magna Carta” for the digital age by the British Library. Their most popular priority was safety on the net, followed by protecting freedom of spe...
by Dyenamic Solutions on Jun 15, 2015
Legal Contact, Impressum Regulations in Germany and Other European Countries

Among the most critical of website compliance regulations in both Germany and other European Countries are mandatory legal contact — or “impressum” — directives requiring website operators to include very specific regulatory i...
by Law Offices of L Rump, Attorney at Law on Jun 8, 2015
Google centraises it’s privacy and security settings

Google has centralised all its privacy and security controls into a single place. The My Account hub brings together settings previously spread over different web pages. Google says the move is designed to make it easier for people to see and control...
by Dyenamic Solutions on Jun 2, 2015
End-to-End Encryption Saves the Day

In our day and age of unconstitutional government spying, decisively using end-to-end encryption for electronic communications may be the only way to counter illegal government surveillance. In the United States as well as European and other countrie...
by Law Offices of L Rump, Attorney at Law on May 25, 2015
Is the Digital Era changing history?

Is the digital transformation of our society changing the future of recorded history? Nowadays most of our photos, videos, conversations, research and writings are stored as strings of ones and noughts on local computers or in data centres distribute...
by Dyenamic Solutions on May 13, 2015
Samsung S5 fingerprint hackable

Hackers can use copies of the fingerprints used to unlock the Samsung Galaxy S5 phones. A flaw in the Android software makes it possible to steal the personal information so it can be used elsewhere, said the experts from security firm FireEye. Other...
by Dyenamic Solutions on May 3, 2015