After the commemoration on January 28 of the day of Data Protection and with the news of the imminent entry into force of European Data Protection Legislation invading the front pages of all media, all alarms goes throw between the self-employed and SMEs, as many wonder how they will affect their day by day.

The titlewould be: The key is in the "Risk".

Not in the Risk that can be assumed if the new regulations are ignored, whose penalties may reach more than 20 million euros or, failing that, the payment of 4% of the annual sales of the company in particular; but the main difference with the current regulations is why the RGPD leaves of the hand of the entities the self-evaluation of their risks for the determination to implant the concrete measures of protection.

El pasado lunes 17 de noviembre se conoció una notícia que ha hecho tambalear la ciberseguridad de todo el planeta. Los medios de comunicación de todo el mundo se han hecho eco de la notícia a lo largo de esta semana. Unos investigadores de la universidad de Leuven (Bélgica) han descubierto que el protocolo WPA" el más avanzado y seguro que se usa en todo el mundo para conexiones via wifi cun qualquier tipo de dispositivio informático, es vulnerable. 

Tal y como informaba La Vanguarda, en su edición digital del 17 de octubre en este artículo:

May 2017 will be remembered for the irruption of the computer virus Wannacry, which appeared in mass media around the world. Although a month later a new virus far surpassed it, the virus Petya, the consequences of Wannacry in companies of the whole planet were very serious. Today in the blog we will see some of the most important cases that demonstrate the devasting reach that these viruses have if you do not take the necessary security measures.

To businesses whose clients are on the top of society are asked one thing above the rest: maximum discretion and absolute privacy. Often exposed to public opinion, these clients demand that their data remain in complete secrecy, as some of the services they have hired are completely private and would be very annoying if they were exposed. One of the clearest examples of this are the cosmetic centers and their plastic surgery operations.

With TV series like The Walking Dead and movies like 28 days later, the phenomenon zombie is again very fashionable. These terrifying charachters have also been used to name one of the most current IT threats: zombie viruses. Today, in this new post of our blog, we give you more information about these viruses and how we fight them from MyIdeal-IT.

The Guardian informed in August that in 2012 the popular cloud storage firm Dropbox had been hacked. The data stolen, that includes encrypted passwords and details of around two-thirds of cloud's firm costumers, has been now leaked.

Although the attack took place during 2012, Dropbox did not report that the passwords had been stolen until all this info has been leaked. Is it an act of corporative irresponsibility?

Informationisbeautiful is the David McCandless's website, a London-based author, writer and designer. The whole website is dedicated to distilling's the world data, information and knowledge into beautiful, interesting and, above all, useful visualizations, infographics and diagrams. The tool that we show you today is exactly all of these things: a list of the "World's Biggest Data Breaches".

Page 1 of 2