Blog
Filters
3 results
-
Privacy risks when logging in other applications with social media accounts
When we install a new app on our mobile device or access a service on a website for the first time we often have to create a user account in order to do so. As an alternative, more services are increasingly offering the possibility of registering using our Google, Apple, Instagram, TikTok, Twitter...
Read more
-
Personal data breaches: online productivity platforms
Business email has evolved to become the gateway to productivity and office automation technology platforms in the cloud, through which much of an organisation's information - including personal data - flows. The potential for accessing all this strategic and confidential information has, in recent...
Read more
-
Personal data security breaches: Top 5 technical measures to be taken into account
In this post, five technical measures will be explained with regard to security that play a main role in the processing of personal data in order to meet the obligations of proactive responsibility established in the GDPR. Such measures will be useful both to avoid security breaches of personal data...
Read more