HOW TO PROTECT CONSUMER PRIVACY AND DATA SECURITY IN THE AGE OF 5G?

February 21, 2019

This policy primer looks at current privacy risks for European consumers, how current legal rules are insufficient in protecting consumers’ privacy in the age of 5G technologies, and what can be done by legal change and other policy measures to minimize consumers’ exposure to data leaks and privacy breaches.

Spotlight

Connections for Business

Technology is a competitive advantage that too many companies don’t fully leverage as much as they could. This is primarily due to not having the right technology staff or provider working with you. Let’s face it -- keeping up with innovative technologies is a full time job. That’s our job…to become your internal IT department and give you that competitive advantage without the burden. For over three decades, Connections for Business has provided small and mid-size businesses with the right mix of professional services and technology expertise to grow and gain a competitive edge. Our team of motivated and highly-skilled associates takes the time to understand the needs of your business. We deliver technology solutions and support services that are designed exclusively for your company and will derive meaningful results.

OTHER WHITEPAPERS
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

Building the next generation of security and privacy professionals

whitePaper | October 4, 2022

Organizational practices in the digital age are inevitably linked to the processing of data, and built upon the systems that support these efforts. Collectively, cybersecurity and privacy professionals are responsible for guiding and implementing organizational decisions that ensure data is collected, processed, protected and shared consistent with evolving norms.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

Cybersecurity: A Comprehensive Risk Management Approach for Healthcare

whitePaper | August 19, 2022

Healthcare entities continue to face evolving cybersecurity threats that can put patient safety, privacy and operations at risk. Health information security breaches occur daily and will continue to accelerate as cyber-criminals recognize the value of patient data and the critical need for provider organizations to keep systems up and running. The cost of a data breach is astounding, and one few healthcare organizations can absorb as they continue to deal with the effects of the COVID-19 pandemic.

Read More

Spotlight

Connections for Business

Technology is a competitive advantage that too many companies don’t fully leverage as much as they could. This is primarily due to not having the right technology staff or provider working with you. Let’s face it -- keeping up with innovative technologies is a full time job. That’s our job…to become your internal IT department and give you that competitive advantage without the burden. For over three decades, Connections for Business has provided small and mid-size businesses with the right mix of professional services and technology expertise to grow and gain a competitive edge. Our team of motivated and highly-skilled associates takes the time to understand the needs of your business. We deliver technology solutions and support services that are designed exclusively for your company and will derive meaningful results.

Events