Este breve documento busca plantear reflexiones alrededor de la realidad del ransomware con el fin de brindar espacios para pensar sobre cómo abordar este reto, qué margen de acción se puede lograr y, sobremanera, cómo encontrar algunos patrones que adviertan sobre el avance de este tipo de amenazas en la organización.
Nota Completa
shareShare This
Related Stories
Ecuador's draft data protection bill
Ecuador is on the cusp of having its first data protection law. The Data Protection Bill is currently being debated in Congress and follows the European regulatory standard.
Data protection has not been a priority in the Ecuadorian legal system. Even though the Constitution recognizes the right of ...
Exploring Ecuador's draft data protection bill
Ecuador is on the cusp of having its first data protection law. The Data Protection Bill is currently being debated in Congress and follows the European regulatory standard. CorralRosales Senior Associate Rafael Serrano Barona breaks down the different elements of the bill, including the introductio...
Top-5 most-read privacy stories for the week of March 1, 2021
In an article for Privacy Tracker, IAPP Westin Research Fellow Sarah Rippy reported on Virginia's Consumer Data Protection Act, including its scope, exemptions and the data rights it gives to state residents, as well as how it compares to other privacy laws.
IAPP Staff Writer Joe Duball compiled...
Notes from the Asia-Pacific region, 5 March 2021
Dear, privacy pros.
As we march (pun intended) into the second quarter of 2021, I hope the dust is settling on the vaccination schedule in your country and that we won’t hear more news of people jumping the queue.
Things have been generally quiet in Singapore after a muted Lunar New Year, bereft o...
Breach exposes data of Malaysia Airlines’ frequent flyer members
A “data security incident” via a third-party IT service provider has impacted the personal information of Malaysia Airlines’ Enrich frequent flyer members, Channel Asia reports. Members were notified via email of the breach, which took place sometime between March 2010 and June 2019, that exposed me...
Comments
If you want to comment on this post, you need to login.