Skip to main content

UK Companies Not Protecting Data

UK Companies Not Protecting DataLast year 94 security breaches, where data was leaked, were reported to Britain’s Information Commissioner, the man charged with looking after data privacy.It was, he said, an “alarming” number. The data was recovered in only three cases.   Now he’s issued a call for all companies and all public bodies to make data protection anoverriding priority.   His stance was bolstered by a survey of 1,000 companies by Price Waterhouse Coopers that reveals around 90% of them allow employees toleave the office with data – some of it potentially private, on USB data sticks. 80% said that stolen computers had contained unencrypted data.   Information Commissioner Richard Thomassaid,   “The government, banks and other organisations need to regain the public’s trust by being far more careful with people’s personal information. Once again I urge business and publicsector leaders to make data protection a priority in their organisation."   The vast majority of reported security breaches came in the public sector, 62 of them, with 28 in the privatesector. Interestingly, even as data security has become a high-profile issue in the UK, the survey shows that fewer companies are encrypting data on laptops than did two years ago.   The reportadded that breaches in security cost British businesses several billion pounds every year.

Editors' Recommendations

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
How to create disposable email addresses

Fighting spam is an uphill battle. Each time you unsubscribe yourself from a junk email list, your inbox gets hit with double the amount the next day. What’s worse is not knowing how you got on that list in the first place.

While spam seems inevitable, you don’t have to put up with it anymore. We’re going to tell you everything you need to know about creating a disposable email address, which can help reduce junk mail flow.
Use the Gmail customized emails trick
Although Google doesn't have its own disposable email service, Gmail offers the ability to create customized emails that you can then throw away when you don't need them anymore. If Google's own ad features aren't taking care of the problem, here's how to use this tool.

Read more
Tesla factories’ security cameras caught up in wider hack
Tesla Gigafactory

A Silicon Valley startup offering cloud-based security camera services has had its systems breached in an attack that gave hackers access to numerous live feeds, some of them coming from Tesla factories.

Verkada, which launched in 2016, had around 150,000 of its cameras hacked, with many of the devices installed in hospitals, schools, police departments, prisons, and companies that besides Tesla also included software provider Cloudflare, according to a Bloomberg report on Tuesday, March 9.

Read more
How to secure your Wi-Fi network
man wearing wireless earbuds

Given how much valuable information we entrust to computers these days, it's more important than ever to ensure that your work and home networks are safe. All it takes is one chink in your Wi-Fi's armor to compromise your system, leading to ransomware, invasion of privacy, and the loss of invaluable personal data. Learn how to secure your Wi-Fi network today, and rest easier knowing you've prevented future outrages.
Why do I need to secure my Wi-Fi network?

Wi-Fi works by broadcasting the signal from your modem via a wireless router up to several hundred feet away, allowing any compatible device to connect to the internet. While this is undoubtedly a major convenience for both work and home networks, it also raises the unpleasant possibility that a cybercriminal could compromise the network and gain access to your devices and information. Should any crime be committed using your PC, such as spamming or harassment, the investigation would lead back to your computer, potentially putting you at legal risk.

Read more