What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial … More Face scanning – privacy concern or identity protection?
An ESET-commissioned survey among enterprises also shows that while respondents in most countries agree on the need to bolster cyber-defenses, some are reluctant to adopt cybersecurity solutions. As technology evolves by leaps and bounds every year, so does the threat landscape and bad actors keep coming up with new threats. That’s not scaremongering, it’s a … More Can regulations improve cybersecurity? In APAC, opinions vary
Some tips that businesses can do to get better at it without breaking the bank. Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored, but that’s no … More RSA – IoT security meets SMB
A strong password is a great start, but there are more ways to make sure that your email is as secure as possible. Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are available or even advisable to … More Email security does not end with your password
Your data is very, very valuable to the right (or wrong) people. Every single piece of data has value, it doesn’t matter how mundane it might seem, any and all data can be used to build up a profile of you for advertisers or could be the key to accessing your online accounts. Jake Moore, … More How do companies use your data?