Scope Creep

When new technologies arrive on the scene, there is a rush to use them everywhere. Bluetooth technology led to including it in almost any new product regardless of whether it actually adds anything. Internet connectivity has also seen a similar reaction; most notably I recall a juicer that was co...

Segregation of Duties and Data Inventories

A basic component of a privacy program is understanding what data you collect, where that data resides, and how it flows through your data processing systems. When combined with other characteristics of the data, this knowledge allows a privacy professional to understand what laws and regulations...

Data Breach

Havenly Data Breach Havenly, an interior design website, was recently a victim of a data breach. A group or individual hacker was able to gain access to databases containing roughly 1.3 million records. How this information was accessed is unclear, however there is a significant amount of informa...

The Weakest Embedded Link

The Weakest Embedded Link One of the most difficult vulnerabilities to overcome is human error. You cannot simply program your employees to only open specific emails or attachments and there is no guarantee that training will be effective. When it comes to phishing, you are only as strong as the ...