Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.
There is now a new breed of highly sophisticated cyber criminals who are attracted by the huge financial gains made possible by highly targeted ransomware attacks. Today, with IoT being adopted across a wide variety of industries, it seems that it’s only a matter of time before cyber criminals take Internet of Things (IoT) devices hostage using ransomware, potentially placing hundreds of thousands of people at risk. In this article, we examine the rising threat of ransomware, the potential impact on the IoT environment and…
New smart home devices like the Amazon Echo and Google Home are raising numerous legal and privacy issues, primarily because they are recording conversations that you have in your daily life. If you wouldn’t want your friend recording one of your conversations, would you want a digital device doing the same? In this month's lead article, we examine the privacy issues with connected devices and look towards a future with artificial intelligence thrown into the mix.
Mobile smartphone usage is now reaching saturation point in the developed world. Increasingly mobile phones are becoming (or have become) indispensable business tools as well as powerful communication devices. However, with great power comes great responsibility – something that seems to have escaped U.S. President Donald Trump who is still using a legacy Android device. In this article we examine just why mobile devices present massive challenges when it comes to data security – and why business users need to be vigilant.
This article is based on a presentation made during the Data Privacy Asia 2016 conference held on 9-11 November 2016 by well-known and widely respected information security, privacy and compliance expert Rebecca Herold. Rebecca addresses how IT leaders are increasingly challenged by the myriad of physical, legal, political and logical considerations for data residency.
The decision in Privacy Commissioner v Telstra has important implications for metadata regulation in Australia, and for judicial oversight of the Australian Privacy Commissioner’s functions. This article examines the decision and discusses the key takeaways for businesses that are based in, or doing business with, Australia.
In this two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this second part, we look at the search for that digital ‘safe place’ where privacy is assured and just why that place is becoming ever more elusive.
In this first part of a two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this first part, we explore how serious the threat of cyber snooping by government surveillance is and why we shouldn’t panic just yet.
We give some insight into how companies could use a privacy impact assessment (PIA) in conjunction with data mapping practices to understand how data flows through an organisation, making it the perfect tool to document and track new initiatives.