Privacy Ref Blog

Social Engineering is a Massive Problem

Recently, a large number of YouTubers and other celebrities have been “hacked” or lost control of their accounts.  The truth of the matter is that they aren’t being hacked, but instead the person taking control of these accounts is just having others do it for them.  The people and groups helping them are not who you think.  They are not hackers, black market data dealers, or even criminals, but they are customer service representatives and other professionals who are meant to protect your data.

Continue reading this post…

Posted on July 25, 2016 by Ben Siegel - No Comments

 


Playing the Privacy Metagame

If you attended our most recent quarterly data breach review, you probably heard a new term: “metagame.”  The idea, put in its simplest form, is to take information from outside a scenario and use it to influence your choices.  It is amazing how using information that is not necessarily inside your environment can allow you to adjust and prepare for a lot of scenarios.  This in turn keeps you ahead of the game.

Continue reading this post…

Posted on May 25, 2016 by Ben Siegel - No Comments

 


What is the difference between privacy and security?

One question that I am frequently asked is “what is the difference between privacy and security?” It sounds simple enough, but the response often gets complicated. Maybe an analogy will help. Continue reading this post…

Posted on May 24, 2016 by Bob Siegel - 1 Comment
Tags: ,

 


My Mother Understands

Throughout my years in IT, product management, software development, and systems analysis, my Mother never understood what I do. It hasn’t been her fault, but mine; I couldn’t explain in “plain English” what I did. Since becoming a privacy professional she now understands. It may be not as good as being a doctor, but at least she can explain it to her friends.

Continue reading this post…

Posted on May 4, 2016 by Bob Siegel - No Comments
Tags:

 


Don’t Take the Bait

Irony is a state of affairs or an event that seems deliberately contrary to what one expects and is often amusing as a result.  So when I got a phone call asking to speak with Bob Siegel about his room for the upcoming IAPP Summit, I was surprised by the ironic situation I was faced with.  After all, one would expect that an event specifically about privacy would not be dealing with issues like phishing.

Continue reading this post…

Posted on February 29, 2016 by Ben Siegel - No Comments

 


Data Ages like Milk…

Very common questions we get from clients are how much information should they collect and how long they should keep it.  The standard answer is always to collect only what you need to do business and get rid of it when you no longer need it.  Now the questions become what information is truly needed and when is it no longer going to be used?

Continue reading this post…

Posted on February 23, 2016 by Ben Siegel - No Comments

 


Human Errors Will Create Privacy Issues

Regardless of the technology you put in place, the safeguards you have implemented, and the training you have provided, ultimately the success of your privacy program relies on the individuals in your organization. The most recent example of this came at the expense of the US National Women’s Soccer Team (USWNT). Continue reading this post…

Posted on February 8, 2016 by Bob Siegel - No Comments
Tags: , , , , ,

 


New Rules for Moving Data Across the Pond

Does your US organization do business in Europe? If so, the rules for collecting and moving the personal data of EU citizens across borders and into the US are about to change. A new EU regulation is taking shape under a tight deadline and intense pressure that will force changes to some common practices in the digital age which are regarded very differently by the two regions.

Continue reading this post…

Posted on February 5, 2016 by Kathy Stershic - No Comments

 


EU-US Privacy Shield is coming. Now what?

There seems to be a light at the end of the tunnel for organizations previously exporting personal information from the EU to the US under Safe Harbor, the EU-US Privacy Shield. Unfortunately the details of Privacy Shield are not yet available, so what is a privacy officer to do to prepare for utilizing the new agreement? Continue reading this post…

Posted on by Bob Siegel - No Comments
Tags: ,

 


All Steamed Up

Earlier this month, Valve experienced an issue with data caching and what some call a data breach.  Valve is a gaming company famous for many titles, but also for their virtual storefront, Steam.  The short story is that Valve’s virtual storefront, known as Steam, had a glitch that allowed someone logged in to potentially see another user’s personal information.  The personal information included names, digital identities, emails, and possibly credit card information.  For a more complete summary, check out this video.

Continue reading this post…

Posted on January 4, 2016 by Ben Siegel - No Comments

 


Next Page »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

August 19, 2016

New Offering for Adaptive Privacy
Privacy Ref is now offering the Adaptive Privacy Office. This offering allows you to utilize the services you need to bring your program to the next level. Read more about the offering here.

Latest Blog Posts

July 25, 2016

Social Engineering is a Massive Problem
Recently, a large number of YouTubers and other celebrities have been “hacked” or lost control of their accounts.  The truth of the matter is that they aren’t being hacked, but instead the person taking control of these accounts is just having others do it for them.  The people and groups helping them are not who you think.  They are not hackers, black market data dealers, or even criminals, but they are customer service representatives and other professionals who are meant to protect your data. Continue reading this post...

May 25, 2016

Playing the Privacy Metagame
If you attended our most recent quarterly data breach review, you probably heard a new term: “metagame.”  The idea, put in its simplest form, is to take information from outside a scenario and use it to influence your choices.  It is amazing how using information that is not necessarily inside your environment can allow you to adjust and prepare for a lot of scenarios.  This in turn keeps you ahead of the game. Continue reading this post...

Other Recent Posts

PRIVACY REF