Xero two-factor authentication

Xero Two-Factor Authentication (Xero 2FA): We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA) before, especially how you MUST enable it for all sensitive accounts. Personally I include ALL users.

Internet of Things (IoT)

Dog collars to toasters are connected as part of the Internet of Things (IoT), with experts predicting that by 2020 more than 50% of new businesses will run on the IoT. However, cyber security and privacy are the biggest challenges for IoT, collecting large amounts of personal identifiable information. As soon as some financial benefit from hacking smart devices appears, cyber criminals will find a way to take advantage of it.

GDPR Principles

This glossary is the second in the General Data Protection Regulation (GDPR) series. GDPR aims to bring data protection into the 21st century and it is easy to get caught up with what needs to be done to be GDPR compliant. What is less frequently elaborated on in blog posts are the reasons and principles for the introduction of GDPR. In my experience, I have found it easier to understand the practical implications of GDPR after breaking down the EU’s theoretical reasons for introducing the regulation.

GDPR FAQ

I have found that many blog posts and articles seem to assume that you are a GDPR expert. As I am currently researching the General Protection Data Regulation, I am coming across websites which are unclear as to the very basics of the regulation and therefore I thought it would be useful to write some answers to GDPR FAQs to refer back to when reading some more complex documents. I chose these questions to ground more complex GDPR issues.

Charges that the research firm Cambridge Analytica have misused the information of over 50 million Facebook users has been like oil to a flame in questioning the privacy of social media. How much information have social networks stored about you?

GDPR Glossary

This is the first part of four of our GDPR Glossary. GDPR is an EU regulation to be implemented on the 25th May 2018 which seeks to give people more control over how organisations use their data, introduce greater penalties for organisations who fail to comply with these rules and greater protection for those that suffer a breach of data.

EU Data Protection Regulation

The tech industry in the UK has issued a warming to ministers that a transition away from EU data protection standards following Brexit will damage the UK’s status as a technology hub. Amid the growing misunderstanding amongst Brexiteers that diverging from the tough EU data protection laws will give Britain a competitive advantage compared to other EU states in this fast growing sector.

Data protection law will protect scammers

WHOIS, one of oldest tools on internet for verifying real identities, is at risk of being killed due to tough data protection with new GDPR regulations. The General Data Protection Regulation (GDPR) comes into effect in May and is an attempt to strengthen European data protection. However, it is thought that some of the new rights and responsibilities will conflict with existing technologies that have provided transparency on the internet.

Brexit data flows EU UK

UK government is under increasing pressure to confirm whether BREXIT data flow between the UK and EU will be allowed to remain uninterrupted post-Brexit. Lack of even initial negotiations on data, now the lifeblood of the digital economy representing hundreds of billions of pounds of annual trade, raising concerns that the UK focus on tech in its post-Brexit plans, may run into problems if it can’t retain access to or process EU data.