protect Royals Sue Daily Mail Over U.K. Data Protection Act Violation By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:31 GMT Full Article headline government privacy britain data loss
protect How Can a Museum Best Protect Its Assets? By feeds.techsoup.org Published On :: Tue, 03 Oct 2017 14:03:00 GMT In this age of increasing hacks and cybercrime, the Norman Rockwell Museum has a lot of digital assets, museum operations data, and private patron data that need to be protected. Find out why Frank Kennedy, IT manager at the Rockwell museum, chose Veritas Backup Exec to be a key part of the museum's security strategy. About the Museum Norman Rockwell is one of the great iconic painters and illustrators of American life in the 20th century. His hundreds of covers for the Saturday Evening Post magazine alone are a national treasure. The Norman Rockwell Museum is located in Stockbridge, Massachusetts, where Rockwell spent the last part of his celebrated life. The museum started two years before Rockwell's death in 1978 and houses over 100,000 of his works and also those of other illustrators. The museum now has 140,000 annual visitors, and 220,000 people view its traveling exhibitions each year. It also has an active website with more than 600,000 worldwide unique visitors per year. The Museum's IT System IT Manager Frank Kennedy is an IT department of one (plus an occasional contractor). He supports 90 staff and volunteers and is responsible for critical information security and data protection for the museum. The museum's IT network consists of several large physical servers and many single-purpose virtual machines. The single-purpose virtual machines allow for emergency service without disrupting other departments. Frank says, "Most of our enterprise software is procured via TechSoup, which makes it affordable to license so many servers! We do not have to make do with weak, low-budget software." Digital Assets: Preserving Art over the Long Term Frank Kennedy explains that digital assets are of increasing importance in the work of museums. There are high-resolution images or copies of art works that must be carefully stored to preserve work in its best condition. He says that digital versions are often irreplaceable, as when the original object is disintegrating or would be damaged by further handling. The digital versions keep a faithful record of the art in its best state. The most sensitive objects of this museum include a collection of Rockwell's cellulose nitrate film negatives, which deteriorate over time. The museum also has analog audio and video tape and motion picture film that deteriorates, as well as works on paper that degrade with exposure to light. Other crucial data for the museum includes databases for collection management, point of sale records, donor management, and email. Frank's backup system is designed to be redundant on purpose. He says, "Protecting this data means keeping many copies in many places. Doing so becomes a big challenge when the size of the data becomes several terabytes. I use many layers of redundancy." The Backup Crisis As the museum's data got bigger and bigger, and server patches piled on, the museum's previous backup solution eventually became unstable. Frank reports that his backups were failing constantly and causing him stress in his careful, risk-based management approach. When he first went to get a new backup solution from TechSoup, he discovered that what he needed was not available. He says, "The cost for the options I use would have been over $4,000 per year, unbudgeted. TechSoup responded to users' desperate cry and worked with Veritas to bring Backup Exec back to TechSoup! I can't even describe my relief. Veritas Backup Exec is better than ever. It is so stable that I get suspicious and have to go look just to be sure it's really working!" Why the Norman Rockwell Museum Chose Backup Exec over Other Options Frank told me that the license he gets from TechSoup includes every option his museum needs. These options and features include Exchange Server backup Unlimited media server backups Unlimited agents for specific applications like VMware, Windows, Linux, and so on Simplified disaster recovery Protection against accidental deletion, damage, or overwriting Storing backups to disk, network share, tape (any type), or cloud — or all four at once Virtual machine snapshots that are viewable directly from the host's agent A deduplication engine so backed-up data is as clean as possible Backup retention periods that can be defined per job and per media server An excellent graphical user interface The status of every backed-up resource available at a glance Sending an email to the admin when anything goes wrong Running several jobs simultaneously (depending on server horsepower) Advice for Museums and Other Organizations Considering Veritas Backup Exec Backup Exec is powerful software geared toward backing up an entire network. It requires some study to do the installation and learn the software. You don't get phone support with the charity licensing, so you need to be comfortable Googling for answers and working in the Veritas community support forum. Frank recommends dedicating a strong server for running the software. He likes eight cores and 32 GB of RAM; hot-swappable, hot-growable RAID-5; fast network connectivity; and a very large uninterruptible power supply (UPS). Avoid the temptation to install other services or applications on what seems to be a machine that is often idle. In a Nutshell Frank's experience is that "Veritas Backup Exec is the best, most reliable, most flexible, and versatile backup software you can get. Commit the needed resources to operate it, and you will be rewarded with peace of mind and business continuity. Your donors will be pleased that you are protecting their investment so carefully." Image: Norman Rockwell Museum / All rights reserved / Used with permission spanhidden Full Article security veritas museumorhistoricalorg backupandrestore
protect Protecting Yourself from Malware with Better Password Security By feeds.techsoup.org Published On :: Fri, 20 Oct 2017 22:36:00 GMT 4 In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news. Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world. Malware Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now. Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it. Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms. Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data. Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software. Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing. You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program. Tips for Protecting Yourself Against Malware Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips. Keep your operating system current. Keep your software up to date, particularly the software you use to browse the Internet. Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here). Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website. Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot. Spread the Word Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together. Password Security Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card! First, let's go over some facts. Passwords are the first line of defense to protect your personal and financial information. A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network. It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014) Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017). Best Practices for Effective Password Protection One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one. Pick a famous quote or saying and use the first letter of each word. Add a number that you can remember. Capitalize one letter. Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase. Make it between 16 and 24 characters. You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three. Additional Cybersecurity Resources In case you missed it, take a look at last week's post on recognizing suspicious emails. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. spanhidden Full Article
protect FDI screening moves to the fore as protectionism takes hold By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:26:58 +0000 Authorities in the US, the EU and across the developed world are stepping up efforts to scrutinise foreign investment on the grounds of both national security and tech sovereignty. Full Article
protect How Do We Really Protect the Grid from the Bad Guys? By feedproxy.google.com Published On :: 2014-03-24T11:34:00Z From David and Goliath to Luke Skywalker and the Death Star, the human race has been reminded again and again that big things have their vulnerable points. The U.S. power grid, sometimes called the world’s largest machine, is no exception. Full Article Microgrids Microgrids Hydropower Baseload Storage Bioenergy Wind Power Solar Geothermal
protect Protecting Workers and Communities During the Clean Energy Transition By feedproxy.google.com Published On :: 2015-02-17T16:19:00Z When I worked at the New York Attorney General's Office, we sued coal-fired power plants because their air pollution was making people sick. But in some towns, I saw that the reliance on coal really had people in a bind. The coal plant was making them sick, but it was also a major tax generator for the town. If the plant closed, the town might have to lay off teachers and cops, in addition to losing the plant jobs. Full Article Energy Efficiency Hydropower Baseload Storage Energy Efficiency Bioenergy Policy Wind Power Opinion & Commentary Solar Geothermal
protect PG&E Seeks Court Protection From Federal Regulators on Renewable Energy PPASs By feedproxy.google.com Published On :: 2019-01-30T20:39:45Z PG&E Corp. is seeking court protection to amend or cancel power purchase agreements with suppliers as part of its bankruptcy proceedings. Full Article Wind Power Solar News
protect Protect your privacy with this half-price VPN By feeds.mashable.com Published On :: Sat, 09 May 2020 05:00:00 +0000 TL;DR: A one-year subscription to Norton Secure VPN is on sale for £2.50 per month, saving you 50% on list price. It feels like the world of VPNs is expanding, with more and more providers entering the market and increased demand from users. This market can be a daunting place, especially as you probably won't be familiar with most of the available providers. This doesn't mean you shouldn't consider these services, but we totally understand if you're reluctant to invest in an unknown provider. SEE ALSO: 5 of the best VPNs for streaming in the UK Fortunately for those who would prefer to subscribe to an established provider, there are plenty of options from the leading names in securityNorton is one such brand, with a comprehensive VPN service on sale for just £2.50 per month. Read more...More about Norton, Mashable Shopping, Shopping Uk, Uk Deals, and Norton Security Full Article Norton Mashable Shopping Shopping Uk Uk Deals Norton Security
protect Annual Report to Congress on Breaches of Unsecured Protected Health Information By www.databreachtoday.com Published On :: The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report. Full Article
protect Annual Report to Congress on Breaches of Unsecured Protected Health Information By www.databreachtoday.in Published On :: The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report. Full Article
protect Annual Report to Congress on Breaches of Unsecured Protected Health Information By www.databreachtoday.asia Published On :: The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report. Full Article
protect HR e-briefing 527: BIS announcements on collective consultation and protected conversations By www.eversheds.com Published On :: 2011-11-23 Today, Vince Cable has announced a number of measures with the stated aim of making “it easier for businesses when taking on, managing and letting go their staff, while also being fair to workers”. As well as announcing further details ... Full Article
protect Coronavirus Income protection Europe By www.eversheds.com Published On :: 2020-03-25 The COVID-19 global pandemic has moved faster than anyone could have anticipated and governments across the world have rushed to shore up protection on two key fronts: the health of the public and the economy. In the UK, measures were introduced by ... Full Article
protect Protecting Intellectual Property during Lockdown By www.eversheds.com Published On :: 2020-04-07 On 24 March 2020, the Companies and Intellectual Property Commission’s IP Registry suspended all internal and external-facing operations due to the national lockdown. The Registry will only resume operations two weeks after the national lockdo... Full Article
protect Protecting your IP when contracting with third parties IP development and exploitation agreements webinar By www.eversheds.com Published On :: 2020-05-27 In this webinar for education institutions we will consider: - contract principles - early questions to consider: what is the purpose of collaboration? what IP may be generated? who owns background IP? ... Full Article
protect IHC HR e-briefing 131 - Data protection: ICO flexes muscles with first use of new fines power By www.eversheds.com Published On :: 2010-11-25 The ICO has announced its first use of its recent power to issue fines or monetary penalties for serious breaches of the data protection legislation. The power became effective in April 2010 (see Full Article
protect Coronavirus - Compliance risks for companies under the Infection Protection Law - Germany By www.eversheds.com Published On :: 2020-03-31 I. Introduction The Covid-19 pandemic poses new challenges to society as a whole and to each individual. The rapid spread of the virus is currently prompting political decision-makers to react just as quickly by developing and adopting new measures... Full Article
protect Protecting companies from Coronavirus crime and fraud By www.eversheds.com Published On :: 2020-04-06 Protecting companies from Coronavirus crime and fraud Whilst our communities, including the business community, are pulling together like never before to protect the country and the National Health Service from the Coronavirus outbreak, fraudsters a... Full Article
protect Coronavirus (Scotland) Act (the Bill): Protection from Irritancy By www.eversheds.com Published On :: 2020-04-08 In light of the Covid-19 outbreak both the UK and the Scottish Government have introduced measures to give both private and business tenants temporary protection from eviction and irritancy. Of particular interest for businesses is the extension of ... Full Article
protect Coronavirus (Scotland) Act (the Bill): Protection from Irritancy By www.eversheds.com Published On :: 2020-04-08 In light of the Covid-19 outbreak both the UK and the Scottish Government have introduced measures to give both private and business tenants temporary protection from eviction and irritancy. Of particular interest for businesses is the extension of ... Full Article
protect Coronavirus - How to use fraud prevention controls to protect your business from scams Global By www.eversheds.com Published On :: 2020-04-24 Since the outbreak of the coronavirus pandemic just a few months ago, unfortunately we have seen a continuous rise in coronavirus related frauds targeting individuals, businesses and health authorities. Recent estimates suggest that already ov... Full Article
protect Coronavirus - Additional legal protections for residential and commercial tenants in England and Wales - UK By www.eversheds.com Published On :: 2020-04-06 In addition to the FCA’s recent guidance (see our note summarising the main points here) on payment holidays and repossession actions addressed to mortgage lenders, mortgage administrators, home purchase providers and home purc... Full Article
protect Legal professional privilege update: protections and pitfalls By www.eversheds.com Published On :: 2019-06-04 ... Full Article
protect Coronavirus - Import duty and VAT on medical supplies, equipment and protective clothing - Europe By www.eversheds.com Published On :: 2020-04-06 In order to help in the fight against COVID-19, the European Commission has adopted a Decision, addressed to the Member States, which allows for tax authorities across Europe to offer import tax reliefs to importers of personal protective equipment ... Full Article
protect Ansell: Global Leader In Protective Gloves And Germ Prevention By seekingalpha.com Published On :: Fri, 08 May 2020 17:18:11 -0400 Full Article ANSLF ANSLY Holmes Osborne
protect Protection of employees (Temporary Agency Work) Bill 2011 By www.eversheds.com Published On :: 2011-12-22 Introduction The Protection of Employees (Temporary Agency Work) Bill 2011 (“the Bill”) was published on Friday 16 December 2011. The Bill is intended to give effect to an EU Directive (Directive 2008/104/EC) on... Full Article
protect Not Tested, Not Protected, Badly Paid: Ukraine's Medics Speak Out By www.rferl.org Published On :: Fri, 08 May 2020 12:56:00 +0000 The Ukrainian government promised that all medical personnel would be tested for COVID-19 once every five days, but doctors have told RFE/RL that has not happened. Medics also said that there were shortages of protective gear and that government promises of increased pay have not been met. Full Article Ukraine Ukraine Video Archive Picks Videos The Coronavirus Crisis
protect Alg�rie: R�vision de la Constitution - Des garanties pour une protection plus efficace des deniers publics By article.wn.com Published On :: Sat, 09 May 2020 15:33 GMT Alger -Le projet de r�vision de la Constitution dont les... Full Article
protect Cyber liability: how can businesses protect themselves against underestimated cyber risks? By www.eversheds.com Published On :: 2014-12-03 Cyber risk is the risk of financial loss, disruption, or damage to reputation as a result of breaches of data security, including unauthorised disclosure of data, and compromise or failures of IT systems. Specific examples include: ... Full Article
protect Recommendation on the protection of health-related data By www.eversheds.com Published On :: 2019-07-19 Recommendation CM/Rec(2019)2 of the Committee of Ministers to member States on the protection of health-related data Mobile health apps and other technical applications in the health sector are becoming more and more popular. Whether it's heart rate... Full Article
protect Changes on the horizon in 2020: China and Hong Kongs proposed reforms to data protection, cyber security and Internet content regulation By www.eversheds.com Published On :: 2020-01-24 2020 looks set to be a significant year for privacy, cyber security and Internet content reforms in China and Hong Kong. On 20 December 2019, the Cyberspace Administration of China released the “Regulation on Governance of Internet Information... Full Article
protect Changes to Charity Law The Charities (Protection and Social Investment) Bill 2015 By www.eversheds.com Published On :: 2015-09-24 Introduction The Charities (Protection and Social Investment) Bill 2015 (“the Bill”) is currently before Parliament. The Bill is relatively short and deals with two areas in particular: i) the powers of charities to make social investmen... Full Article
protect The proposal for an EC Directive on the protection of trade secrets A state of play By www.eversheds.com Published On :: 2015-05-29 The protection of trade secrets has been on the European legislator’s agenda since 2011. It was felt that the lack of harmonisation in this field is very disadvantageous for cross-border innovation in Europe. After the initial report requested... Full Article
protect Closing the GAP: Guaranteed Asset Protection insurance - competition remedy By www.eversheds.com Published On :: 2015-06-22 New rules in the FCA’s policy statement on Guaranteed Asset Protection (GAP) insurance (PS15/13) are about to change the way GAP insurance sold alongside the sale of a motor vehicle (add-on GAP Insurance) is sold to both consumers and commerci... Full Article
protect The new Swedish Protective Security Act By www.eversheds.com Published On :: 2019-05-29 ... Full Article
protect Six reasons to care about Brazils new data protection law By www.eversheds.com Published On :: 2019-06-11 ... Full Article
protect Irish Data Protection Commissioner (DPC) issues guidance on CCTV for controllers By www.eversheds.com Published On :: 2019-07-08 The DPC has published useful guidance on CCTV usage for controllers. The guidance is intended to assist owners and occupiers of premises to understand their responsibilities and obligations regarding data protection when using CCTV. This is particul... Full Article
protect German data protection authorities agree on calculation model for GDPR fines By www.eversheds.com Published On :: 2019-10-14 While fines recently imposed by the French and UK data protection supervisory authorities have been high, the supervisory authorities in Germany have so far imposed rather moderate penalties. This could now be changed by a new model for calculating ... Full Article
protect Floodgates open on class actions in data protection By www.eversheds.com Published On :: 2019-10-15 Court of appeal overturns High Court judgment in Lloyd v Google LLC [2019] EWCA Civ 1599 Court of Appeal judgment The Court of Appeal has given the go-ahead for a representative claim to be served on Google LLC in the U.S. for alleged data breaches,... Full Article
protect Speed read: Useful November 2019 guidelines on controller, processor and joint controllership concepts from the European Data Protection Supervisor By www.eversheds.com Published On :: 2019-12-06 Summary On 7 November 2019 the EDPS issued guidance on how to determine who is a controller, processor and joint controller. The EDPS is an independent supervisory authority whose primary objective is to ensure EU institutions and bodies respect the... Full Article
protect Commencement of the Protection of Personal Information Act 1 April 2020 By www.eversheds.com Published On :: 2020-01-28 President Cyril Ramaphosa has received a request from the Information Regulator Chairperson to declare that the remaining provisions of the Protection of Personal Information Act (POPIA) commence on 1 April 2020. If the President acts on the Informa... Full Article
protect Coronavirus Data Protection considerations for alternative communication platforms Global By www.eversheds.com Published On :: 2020-03-25 How does the communication within a team take place in the home office? Due to the increasing intensity of preventive measures against the spread of corona, more and more companies are closing down their locations and, where possible, relocating bus... Full Article
protect Coronavirus - Protecting your company and brand - Global By www.eversheds.com Published On :: 2020-04-14 ... Full Article
protect Coronavirus - Impact on International Trade & overview of unilateral protectionist measures By www.eversheds.com Published On :: 2020-03-06 Introduction Following the declaration by the World Health Organisation (WHO) on 30 January of a Public Health Emergency of International Concern (PHEIC) in response to the coronavirus crisis (please see our last briefing here), the vi... Full Article
protect Coronavirus - Impact on International Trade & overview of unilateral protectionist measures By www.eversheds.com Published On :: 2020-03-06 Introduction Following the declaration by the World Health Organisation (WHO) on 30 January of a Public Health Emergency of International Concern (PHEIC) in response to the coronavirus crisis (please see our last briefing here), the vi... Full Article
protect Protecting your interests - A guide to taking security in 21 countries worldwide By www.eversheds.com Published On :: 2018-02-13 Companies trade in an increasingly global market. Despite this, the process of taking security in support of financial obligations remains essentially a question of the national law in the country where the assets over which security is granted are ... Full Article
protect Global Corrosion Protection Polymer Coating Market 2020 Key Players Analysis, Segmentation, Growth, Future Trend, Gross ... By article.wn.com Published On :: Sat, 09 May 2020 16:46 GMT (MENAFN - CDN Newswire) A report added to the rich database of MarketsandResearch.biz , titled [To enable links in your articles, contact MENAFN Cl... ...... Full Article
protect RNC Launches 'Protect the Vote' to Fight Left's Vote-by-Mail Scheme By article.wn.com Published On :: Sat, 09 May 2020 16:25 GMT The Republican National Committee... Full Article
protect US Toughens Visa Rules for Chinese Journalists to Add to ‘Greater National Security Protections’ By article.wn.com Published On :: Sat, 09 May 2020 12:51 GMT In late February, China expelled three Wall Street Journal correspondents after the newspaper’s publication of an opinion column that Beijing condemned as racist. ...... Full Article
protect Hungary: 'Yes to Protecting Women, No to Gender Ideology, Illegal Migration' By article.wn.com Published On :: Sat, 09 May 2020 15:12 GMT Hungary's parliament has passed a... Full Article