We’re announcing the availability of our new Security Assessment tool, which is part of our Collaborative Security Management (CSM) framework.
Thanks to our great Clients, Partners, Colleagues, Family and Friends, we’re celebrating our first year in business.
We’ve built great relationships, and we’re looking forward to strengthening them further.
To our customers, partners, colleagues and readers thank you for giving us the opportunity to work with you this year.
Our relationship with you is one thing we treasure. It has been an honour and a valuable experience for us.
We wish you and all your coworkers, family and friends a lovely holiday season and a prosperous new year filled with joy.
When we search online, links are included and ranked using our personal profile. While we can expect the search results to be localized, e.g. for services like weather and restaurants, the algorithms decide in fact what we see regardless of the topic and context, based on data we often don’t even suspect to have shared.
We look at a service useful to regain a bit of freedom from internet giants: privacy oriented search engines.
What is a secure password?
Why are they required to be “complex”?
Why must we change them regularly?
Why should we never reuse the same password?
These are few of the questions often asked by users.
We look at one aspect of the passwords, their complexity, and how to make them more secure.
In comparison to previous data protection laws, the GDPR1 gives individuals greater control over how organizations process their personal data.
Personal data consists of anything that could identify a living person, such as names, locations, emails, addresses, photos, birth date and health records to name a few.
Swiss organizations should as well consider complying with the GDPR even if not processing data of European data subjects - the Swiss Law is being reviewed in a way that will be compliant with GDPR.
By definition, blockchains are immutable. Good, but do they match the requirements of the GDPR?
If any personal information is stored on them, simply no.
So, how should a blockchain service be designed and what should users take care of?
If you use Google Analytics on your website and are in scope of the GDPR, make sure to use the
An IP address is in fact considered personal data and with analytics you’re collecting it without consent.
Under the new regulation, any company operating with European data subjects can receive requests from any individual for their own data.
An interesting case is that of current or former employees requesting their data records.
The regulation removes the cost for the requester, reduces the time for delivering the data and increases penalties for companies not complying. On the other hand, such requests can be quite resource intensive.
As you know from the news some companies have been able to profile millions of Facebook users without their knowledge, let alone their consent.
All this data has not been stolen, it’s been misused by actors exploiting the business model put in place by Facebook.
This is a huge data protection issue, where the rights of the data subjects have been ignored and the requirements of the data controllers and processors haven’t been enforced.