<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GDPR Breach Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/gdpr-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/gdpr-breach/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 23 Jul 2020 20:55:20 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>GDPR Breach Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/gdpr-breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 038 Shadow IT</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 23:05:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Amazon S3 Bucket]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Breach]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Internet Hotspot]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[USB Memory Sticks]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2233</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT. What is shadow IT? It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples: Used for risky Internet access&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT.<span id="more-2233"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2233-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4</a></video></div>
<h3>What is shadow IT?</h3>
<p>It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples:</p>
<h3>Used for risky Internet access</h3>
<p>One would be where staff might use their mobile phones as an internet hotspot to be able to access the internet unrestricted, through their phone rather than through maybe a tightly controlled firewall on their local network. The risk here is that they may be able to access sites that may bring malware into the network and effectively they&#8217;re bridging the insecure internet to your local network.</p>
<h3>USB memory sticks &#8211; burn them with fire</h3>
<p>There&#8217;s always the risks as well associated with the use of USB memory sticks, that people are picking up at conferences and things like that. With no idea where they&#8217;re coming from. What&#8217;s on them. So there&#8217;s always been a risk around those.</p>
<h3>Cloud Storage &#8211; it&#8217;s only as secure as you can make it</h3>
<p>Finally if Staff were to use personal cloud storage services like a Dropbox or a Google drive or an Amazon S3 bucket, the organisation if they are unaware that, they don&#8217;t know how well secured those platforms are. They don&#8217;t know whether the data could be potentially breached from those cloud storage services. So there is a risk there.</p>
<h3>What&#8217;s the real problem that Shadow IT creates?</h3>
<p>And with all these technologies, the main risk here is in fact that they&#8217;re probably going to give you a breach of the GDPR in that you&#8217;re not in control of your IT security.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We can conduct an audit on your infrastructure and look for signs of Shadow IT. When we find it, we can provide guidance on how to remediate it to everyone&#8217;s satisfaction.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4" length="25454938" type="video/mp4" />

			</item>
	</channel>
</rss>
