Pizza versus privacy: How are you celebrating Data Privacy Day 2019?

After a seismic twelve months in the brief history of data breaches, Data Privacy Day 2019 could not be arriving at a more opportune moment. In the past year, we’ve seen the introduction of GDPR, the Facebook/Cambridge Analytica scandal, and the Marriott International’s breach. And just this past week Google was hit with a whopping £44m fine by the French data regulator CNIL, surely the most telling evidence to date that data privacy is rising closer to the top of both the corporate and political agenda.

With more sensitive data stored online than ever before, there is an even greater need for individual citizens to ensure that they understand the implications and have effective privacy measures in place as they move about the web. Human weakness remains the hackers’ go-to target when looking to make off with our personal data, not to mention their primary avenue for breaking into corporate networks to harvest data en masse.

And yet, in terms of the broader public consciousness, there remains the sense that data still isn’t being recognized as a major priority. We, the public, may be more aware that our data isn’t always secure, that it may have been shared with third parties without our consent. We may even claim that we’d cease to do business with an organization that admitted to compromising our personal data. But as individual participants within our data-driven economy, we’re still not sufficiently engaged with privacy issues, or enabled by technical know-how, to make the sort of substantive, lasting changes required to keep our digital selves safe and secure.

Against this backdrop, Data Privacy Day feels too slight, too fleeting. We have just one annual 24-hour window in which the issue is supposed to be lauded and promoted, and even then, Data Privacy Day is forced to vie for the public’s attention against Fun at Work Day, National Kazoo Day, and National Pizza Week.

Pizza may be important; data privacy is fundamental.

To find out more about Red Sift and how our award-winning platform can help secure your data privacy, get in touch.

Get in touch

PUBLISHED BY

Red Sift

28 Jan. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Product Release

Red Sift’s Quarterly Product Release, Fall 2025

Francesca Rünger-Field

This Fall marks a major expansion of Red Sift Brand Trust with the launch of Social Media Monitoring, a new add-on that helps organizations detect and respond to fraudulent company and executive profiles across platforms such as Facebook, Instagram, LinkedIn, TikTok, and X. By extending protection beyond domains, Brand Trust now gives security teams…

Read more
AI

Red Sift’s AI Agent, Part III: Performance in action

Phong Nguyen

This is the third article in our AI Agent series. In Part 1, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent solution for handling the ambiguous cases that rule-based automation can’t confidently resolve, offering analyst-grade triage autonomously. In Part 2, we took readers behind the scenes to explore the engineering…

Read more
Finance

41% of top Fintech companies are vulnerable to email phishing

Jack Lilley

Only 26% of leading Fintechs enforce DMARC at p=reject, the strongest protection against spoofing by bad actors. Phishing remains a top driver of breaches and fraud. Financial services are a prime target because email moves money, resets passwords, and confirms identity. Verizon’s 2025 Data Breach Investigations Report again lists social engineering and phishing among…

Read more
Certificates

New in Certificates Lite: Active certificate scanning and smarter expiry alerts

Francesca Rünger-Field

A quick recap Earlier this year, we launched Red Sift Certificates Lite, the free TLS certificate expiration monitoring service recommended by Let’s Encrypt. Since launch, thousands of organizations have adopted it to track their certificates and avoid expiry-related outages. What we heard from customers At launch, we had adopted Let’s Encrypt’s approach for consistency…

Read more