Pizza versus privacy: How are you celebrating Data Privacy Day 2019?

After a seismic twelve months in the brief history of data breaches, Data Privacy Day 2019 could not be arriving at a more opportune moment. In the past year, we’ve seen the introduction of GDPR, the Facebook/Cambridge Analytica scandal, and the Marriott International’s breach. And just this past week Google was hit with a whopping £44m fine by the French data regulator CNIL, surely the most telling evidence to date that data privacy is rising closer to the top of both the corporate and political agenda.

With more sensitive data stored online than ever before, there is an even greater need for individual citizens to ensure that they understand the implications and have effective privacy measures in place as they move about the web. Human weakness remains the hackers’ go-to target when looking to make off with our personal data, not to mention their primary avenue for breaking into corporate networks to harvest data en masse.

And yet, in terms of the broader public consciousness, there remains the sense that data still isn’t being recognized as a major priority. We, the public, may be more aware that our data isn’t always secure, that it may have been shared with third parties without our consent. We may even claim that we’d cease to do business with an organization that admitted to compromising our personal data. But as individual participants within our data-driven economy, we’re still not sufficiently engaged with privacy issues, or enabled by technical know-how, to make the sort of substantive, lasting changes required to keep our digital selves safe and secure.

Against this backdrop, Data Privacy Day feels too slight, too fleeting. We have just one annual 24-hour window in which the issue is supposed to be lauded and promoted, and even then, Data Privacy Day is forced to vie for the public’s attention against Fun at Work Day, National Kazoo Day, and National Pizza Week.

Pizza may be important; data privacy is fundamental.

To find out more about Red Sift and how our award-winning platform can help secure your data privacy, get in touch.

Get in touch

PUBLISHED BY

Clare Holmes

28 Jan. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more
ASM

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more
Email

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more