TagData Breach

What is it that bad actors want?

W

It’s important to know what threats you’re protecting yourself from by following the work of Privacy Rightfully. This article helps answer that question as most people don’t take cybersecurity seriously until they fall victim to some of the examples outlined throughout this article.

The risks posed by Interactive Insurance Policies

T

Introduction

There is an emerging trend of insurance companies leveraging IoT devices or their own surveillance-based devices to harvest more data from our daily lives with the promise of a cost saving (amongst other rewards).  This is the typical ‘data for dollars’ business model trending at the moment whereby a product or service is free or discounted in exchange for user data.  Let’s have a look at some of the risks this can pose.

Recent Posts

Contact us