Hacking, the act of infiltrating or using computer systems or networks, can be many things: ruthless, dastardly, however, at the same time, an effective weapon […]
Category: Uncategorized
Victim of a ransomware A Digital Extortion Threat
Ransomware is a form of malicious software that locks up a victim’s files and makes them unusable. The attacker then issues the ransom payment in […]
Malware A Digital Menace
Malware is a software all of you know, it is anything used to intentionally damage a computer system or network. Cancer exists in a number […]
IoT Privacy Dealing With Internet of Things Devices
From a data perspective, the IoT transformed our lives into a living connected machine from systems to devices. But, the increasing number of IoT devices […]
Money Matters Safeguarding Your Finances
In this modern digital world, the relevant concern for most people is financial privacy or protection of personal data or information. As banking becomes more […]
HIPAA Protecting the Health Information of Patients
The Health Insurance Portability and Accountability Act (HIPAA) is a US law that was created in 1996 that aims to create protections against the disclosure […]
Data minimization The less you use in the digital world, the more you have.
Data minimization means that you collect, process and store only as much personal data as you need for a specific purpose. The principle is inherent […]
Lesson 4 — Data Masking Hiding Sensitive Data
The answer above refers to Data Masking, which is a technique that allows to protect sensitive data but have an unreadable data that resembles the […]
Pseudonymization A Partial Privacy Solution
When personal identifiers are replaced by pseudonyms (artificial identifiers) we refer to the pseudonymization process. This does not remove all personal data but removes most […]
Forget — A Digital Age Privacy Protection
Anonymization is the approach of cleaning or masking identifiers where addresses can not be known on individual-level to data records. In an era where data […]