ICO Data Protection Checklist for Processors
The British Information Commissioners Office (ICO) has released an extensive guide to explain the new EU General Data Protection Regulation (GDPR) and assist corporations in achieving compliance. One extremely useful first step, found in the ICO site is the Data Protection Self-Assessment questionnaire for organizations. This ICO Data Protection Checklist[…]
Read More »Virus Back to Basics Attacks – Wiper – Erase & Destroy
When the first Malware appeared quite a few years ago one of the most common types were Erase and Destroy – Wiper Malware. The actions that these viruses would perform, would be to erase and/or wipe data from hard disks. Attackers who would use this attack angle have the singular[…]
Read More »ICO Data Protection Checklist for Controllers
The British Information Commissioners Office (ICO) has released an extensive guide to explain the new EU General Data Protection Regulation (GDPR) and assist corporations in achieving compliance. One extremely useful first step, found in the ICO site is the Data Protection Self-Assessment questionnaire for organizations. This ICO Data Protection Checklist[…]
Read More »CYBERTECH® proud supporter of Junior Basketball
CYBERTECH® INFORMATION SYSTEMS LTD is the proud sponsor and supporter of the Milon Mini Basketball Team
Read More »