The draft bill has a number of issues, ranging from an insecure mechanism that leaves people’s data vulnerable to attacks, to a lack of mandatory disclosure of data breaches.
Companies tend to focus on appeasing angry customers after a data breach. New research shows they may want to pay more attention to customers who are afraid to return to their site.
Camélia Radu, Université du Québec à Montréal (UQAM) and Nadia Smaili, Université du Québec à Montréal (UQAM)
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Following a privacy policy change in 2016, Google has collected users’ data from third-party websites and apps. The ACCC argues users were misled into signing away their privacy.
Australia is coming under sustained cyber attack by a ‘state-based’ actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.