Because of the ease of data aggregation, all data for individuals or small groups needs to be treated as if it was personal data.
How do Apple, Google, and Spotify say they protect your personal data, and should you trust them?
Current UK and EU data protection law was drafted before Google or the Cloud existed, and fails to protect us in many ways.
You come into work to discover that your Mac or server have been hacked, or appears to be under the control of an intruder. What do you do next?
I needed a one-way method of generating a unique key for each subject name that would not permit the reverse process, of working out the name for a given key: something known as a ‘one-way hash key’.
It took 22 years to turn the telegraph into a useful commercial system, 16 years to do the same with the telephone, only 8 years for the transistor, and 6 years for the mobile phone. How long before computers transform homeworking and healthcare?
Losing documents – cherished photos, or vital work – is tragic, costly, and wastes time. Combat the risk by designing a backup strategy.
How should you protect documents containing sensitive information from loss or theft?