<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breaches Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/data-breaches/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/data-breaches/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:03:53 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Data Breaches Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/data-breaches/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 099 Using the security.txt file</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Oct 2021 07:15:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Reporting a Data Breach]]></category>
		<category><![CDATA[Reporting Data Breaches]]></category>
		<category><![CDATA[Security Researchers]]></category>
		<category><![CDATA[security.txt]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Using the security.txt file]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2627</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file. Why is this a thing If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 99. This week we’re going to talk about using the security.txt file.<span id="more-2627"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2627-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4</a></video></div>
<h3>Why is this a thing</h3>
<p>If criminals break into a company&#8217;s systems and steal their data, its called a data breach, taking lots and lots of data belonging to a company. They may then try to sell this data on some underground forums, where they might try and sell it to other criminal gangs, for their use.</p>
<p>But there are also, usually, good guy security researchers in those forums too, keeping an eye on things. If they come across some company’s data being trying to be sold, they may try to notify the company that there has been a breach as they may not be aware of it. Sometimes the security researchers find it difficult to get through to these companies to make contact with somebody that they can discuss this data breach.</p>
<h3>How can using the security.txt file help</h3>
<p>That’s where the security.txt file comes in. This is just a simple text file that contains some contact information for somebody in the security area or in IT. Somebody that would be reachable by email and maybe if you want to do it securely they may also include the public encryption key for the email to make sure that all communications are kept secured so that the security researchers can reach out and contact the company. They can use the contact address and get in touch there to report the data breach and maybe other vulnerabilities that they may have discovered.</p>
<h3>Where can I find out more</h3>
<p>So it&#8217;s always good to have this and it&#8217;s usually placed on your website in a well-known location. Here is the <a href="https://securitytxt.org/" target="_blank" rel="noopener">security.txt proposed standard</a>.</p>
<p>So if you have a website, set-up this security.txt file for it.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-099-using-the-security-txt-file/">#WeekendWisdom 099 Using the security.txt file</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/10/WeekendWisdom-099-lo.mp4" length="35355646" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 074 Data Scraping or Data Breaches</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 16 Apr 2021 01:15:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Breaches]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Clubhouse]]></category>
		<category><![CDATA[Clubhouse Breach]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Scraping]]></category>
		<category><![CDATA[Data Scraping or Data Breaches]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Facebook breach]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[LinkedIn Breach]]></category>
		<category><![CDATA[Scraping]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2496</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 74. This week we&#8217;re going to talk about Data Scraping or Data Breaches? Why am I asking the question &#8220;Data Scraping or Data Breaches&#8221;? In recent weeks, three of the large social media companies have had lots and lots of personal data exposed online by cybercriminals. Now these social media companies&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/">#WeekendWisdom 074 Data Scraping or Data Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 74. This week we&#8217;re going to talk about Data Scraping or Data Breaches?<span id="more-2496"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2496-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4</a></video></div>
<h3>Why am I asking the question &#8220;Data Scraping or Data Breaches&#8221;?</h3>
<p>In recent weeks, three of the large social media companies have had lots and lots of personal data exposed online by cybercriminals. Now these social media companies are claiming that these were data that were scraped from their services. That this information that is already in the public domain.</p>
<h3>These may have been Data Scraping</h3>
<p>In the case of Clubhouse which had 1.3 million records exposed and LinkedIn which had 500 million records exposed. Yes all of the data that was exposed is stuff that you can see on their platforms. You can see this information very publicly on their platforms. That&#8217;s a reasonable expectation. That&#8217;s what you use these sites for.</p>
<p>But my issue here is that LinkedIn and Clubhouse should have done much more. They could prevent data being exposed and scraped like that, in such mass quantities. That stuff can be slowed down. It can be made non-economical.</p>
<p>So yes, that was data scraping, maybe not really a data breach but more should have been done.</p>
<h3>But this one is definitely a Data Breach</h3>
<p>Facebook, which had 533 million records exposed, this is a different situation. They had my mobile number and I had only given it to them for the purpose of authenticating my log on and I had set it to not expose that information to the public. My mobile number was exposed to the public. So therefore that is a data breach, simple as.</p>
<p>Facebook are being disingenuous with their claim that this was data scraping.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/">#WeekendWisdom 074 Data Scraping or Data Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4" length="34654962" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 068 A Data Breach of Bank Details</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-068-a-data-breach-of-bank-details/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 05 Mar 2021 02:00:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Bank Details]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach of Bank Details]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[Data Protection Commission Report 2020]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2467</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 68. This week we&#8217;re going to talk about a data breach of bank details. Where is this coming from? As I said last week, the Data Protection Commission had issued a report for 2020. I&#8217;ve had a chance to read through it now in a bit more detail. I really love&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-068-a-data-breach-of-bank-details/">#WeekendWisdom 068 A Data Breach of Bank Details</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 68. This week we&#8217;re going to talk about a data breach of bank details.<span id="more-2467"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2467-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>As I said last week, the Data Protection Commission had issued a report for 2020. I&#8217;ve had a chance to read through it now in a bit more detail. I really love looking at the case studies that they include there because these are real life events that have occurred.</p>
<p>One of them struck me as something that could occur anywhere.</p>
<h3>What? A data breach of bank details??? That&#8217;s serious!</h3>
<p>It was Case Study 15: Bank details sent by WhatsApp. What had occurred was that a customer of a financial institution had gotten in contact with them wanting to get a copy of their BIC and IBAN details. The member of staff that was dealing with the enquiry knew this person. So, because of that, they took a picture of the details on their personal phone and sent them by WhatsApp to the customer.</p>
<h3>WhatsApp is encrypted, so it must be safe. Right?</h3>
<p>But it turns out the details that they took the photo of were for somebody else. So, when the customer reported this incident to the bank, they realised this was a data breach. That customer had seen somebody else&#8217;s personal details.</p>
<h3>How does a business prevent this type of issue?</h3>
<p>This is simply a staff training issue. Staff need to be aware that they should always follow proper protocols when dealing with people&#8217;s personal details. To make sure that they provide the correct details to the correct person.</p>
<p>As I say it could happen to anybody. So use that example with your staff today.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-068-a-data-breach-of-bank-details/">#WeekendWisdom 068 A Data Breach of Bank Details</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/03/WeekendWisdom-068-lo.mp4" length="31885243" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 067 Data Protection Commission Report 2020</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-067-data-protection-commission-report-2020/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 26 Feb 2021 02:15:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[Data Protection Commission Report 2020]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR Complaints]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2462</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 67. This week we&#8217;re going to talk about Data Protection Commission Report 2020. Yesterday the Data Protection Commission (DPC) in Ireland released their annual report for 2020 and I&#8217;ll just give a quick summary of its findings here. What is the number 1 complaint that the DPC get? The number one&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-067-data-protection-commission-report-2020/">#WeekendWisdom 067 Data Protection Commission Report 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 67. This week we&#8217;re going to talk about Data Protection Commission Report 2020.<span id="more-2462"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2462-4" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4</a></video></div>
<p>Yesterday the Data Protection Commission (DPC) in Ireland released their annual report for 2020 and I&#8217;ll just give a quick summary of its findings here.</p>
<h3>What is the number 1 complaint that the DPC get?</h3>
<p>The number one source of complaints for the third year in a row under the GDPR remains access requests. So, businesses out there are still having trouble giving people access to their data that they&#8217;re entitled to.</p>
<p>I always focus in the training to make sure that people get their access rights done properly. They have proper procedures in place to handle these requests from individuals.</p>
<h3>Any figures for Data Breaches?</h3>
<p>Over in regard to data breaches. The number of those reported to the Data Protection Commission has increased again by about 8% overall.</p>
<p>But the number one source of data breaches was unauthorised disclosures of personal data, which was up 12.5% over last year, to nearly 6,000 breaches, which is really, really significant.</p>
<p>Data Breaches caused by hacking were up about 40% and Ransomware incidents also doubled over last year. So, things are going the wrong way.</p>
<h3>Is there any good news in the Data Protection Commission Report 2020?</h3>
<p>Just to finish on a happy note. I was delighted to see that data breaches in regard to phishing have halved over last year. So that must mean people are getting really good training out there on how to spot dodgy emails.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-067-data-protection-commission-report-2020/">#WeekendWisdom 067 Data Protection Commission Report 2020</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/02/WeekendWisdom-067-lo.mp4" length="31011550" type="video/mp4" />

			</item>
	</channel>
</rss>
