Identity theft enabled by fun quizzes.

What is your identity theft name

If you are on social media, you will no doubt have come across those fun quizzes. You know the ones, “What’s your Westeros name?” or “What was the number 1 song the day you were born?”

Read More

VPN Logs. Should you be concerned?

VPN logs

I’ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service?

Read More

Data breach video series – CCTV Leakage

Data Breach CCTV Leakage

Data Breach CCTV Leakage. This short video talks about how allowing CCTV footage to be leaked online is a serious data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Data breach video series – Open Plan Office

Data Breach Open Plan Office

Data Breach Open Plan Office. This short video talks about how having a public space near to an open plan office may lead to a data breach under the #GDPR. A breach may arise where your staff are speaking to other staff or to people on the phone and they are speaking items of personal…

Read More

Data breach video series – Sharing a Password

Data Breach Sharing a Password

Data Breach Sharing a Password. This short video talks about how simply sharing your password could be a data breach under the #GDPR. This is because, by giving somebody your password, you are giving them access to everything that you have access to. If you are authorised to access certain personal data, which they are…

Read More

Data breach video series – Personal data on display

Date Breach Personal data on display

Date Breach Personal data on display. This short video talks about how simply leaving somebody’s personal data on display in a public place is a data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Who’s been reading your Gmail?

Who's been reading your Gmail

For a long time the answer to the question “Who’s been reading your Gmail?” has been Google’s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being…

Read More

Data breach video series – E-mailing the wrong person

Data Breach E-mailing wrong person

Data Breach E-mailing wrong person This short video talks about how sending an e-mail with personal data to the wrong person is a data breach under the #GDPR. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Data breach video series – Ransomware

Data Breach Ransomware

Data Breach Ransomware This short video talks about how being affected by #Ransomware is actually classified as a data breach under the #GDPR. You will need to check to see if the data has been accessed by the evil doers and if so, you will need to notify the Data Protection Commissioner. For more information…

Read More

Data breach video series – Shredding left out

Data Breach Shredding left out

Data Breach Shredding left out This short video talks about how leaving out straight cut shredding for the bin men is a data breach under the #GDPR. This is because straight cut shredding is not actually securely destroyed. It can be re-assembled like a jig saw. For more information or to contact us please visit…

Read More

Data breach video series – Unrestricted USB stick use

Data Breach Unrestricted USB stick use

Data Breach Unrestricted USB stick use This short video talks about how unrestricted access to USB Memory sticks can lead to a potentially massive data breach under the #GDPR, as you could be unaware of people copying data to these devices. For more information or to contact us please visit our website at https://www.L2CyberSecurity.com

Read More

Data breach video series – Use of the To field on e-mail

Data Breach Use of the To field on e-mail This short video talks about the inappropriate use of the “To” address field to send e-mails to groups of people who should not know the others e-mail addresses. This will quite likely be a data breach under the GDPR. For more information or to contact us…

Read More

Data breach video series – mobile device loss

Data Breach mobile device loss

Data Breach Mobile Device Loss This short video talks about the implications of mobile device loss as a data breach under the GDPR. For more information or to contact us please visit our website and specifically our GDPR section.

Read More

Data breach video series – introduction

Data Breach introduction

Data Breach Introduction: This is the introduction to a series of short videos discussing different types of data breach under the GDPR. For more information or to contact us please visit our website and specifically our GDPR section.

Read More

Data Protection Policy Template

data protection policy

The GDPR requires every business to have a data protection policy, which needs to be reviewed regularly.

Read More