Skip to content
L2 Cyber Security Solutions
  • Home
  • Services
  • Prices
  • GDPR
  • Blog
  • Testimonials
  • About Us
  • Contact Us
L2 Cyber Security Solutions
  • Home
  • Services
  • Prices
  • GDPR
  • Blog
  • Testimonials
  • About Us
  • Contact Us

Posts Tagged ‘IBM’

Data Breach Handling – 3 recent examples.

July 25, 2017 | Comments Off on Data Breach Handling – 3 recent examples.
Data breach

You might remember that last year, Yahoo! were shown to have suffered a data breach not once, but twice which led to the personal data associated with ~1.5 billion accounts being stolen by evil doers. This was a pretty massive story at the time and it was widely reported.

Read More

The Ten Commandments

View our Ten Commandments of Cyber Security.

Recent Posts

  • ESB text message scam.
  • #WeekendWisdom 100 Something Completely Different
  • #WeekendWisdom 099 Using the security.txt file
  • #WeekendWisdom 098 Lessons from the Facebook Outage
  • #WeekendWisdom 097 Record Number of Zero Days

Search

Tags

#SecuritySimplified #WeekendWisdom Backups Best Practice Botnet Breach CEO Fraud Clare Commandments Covid-19 Covid19 CyberSecMonth Cyber Security Data Breach Data Privacy Data Protection Data Protection Commission DDOS Defence in Depth DPC Facebook Fake Fraud GDPR Internet of Things IoT Limerick LinkedIn Malware Microsoft Mobile Security Password Phishing Ransomware Scam Security Social Engineering Spear-Phishing Tipperary Training Two-Factor-Authentication USB Vulnerability Webinar Yahoo
© 2017-2023 L2 Cyber Security | Data Protection Notice
Scroll To Top