The Data Protection and Privacy Podcast
The latest in Data Protection and Privacy Podcast by David Clarke
Follow me on Twitter @1davidclarke 100k Followers
Join Linkedin GDPR Group 27,500 Others Members for FREE
Top 50 B2B Thought Leaders & Influencers You Should Work With In 2024 (EMEA)
Top 25 Thought Leader Privacy 2023
Top 100 Thought Leader Social 2023
Top 100 Thought Leader Security 2023
Top 50 B2B Thought Leaders & Influencers You Should Work With In 2023 (EMEA)
Who’s Who in Cybersecurity? 2022
Who’s Who in Cybersecurity? 2020
Top 20 Privacy Thought Leaders September 2021 Thinkers 360
Top 50 Global Expert 2018 Kingston Technology
Top 20 Global Tech Influencers by @Thinkers360 2020/2021
Top 30 Thomson Reuters Top Influencers In Risk, Compliance 2017
Who's Who in Remote Working? 2021
Who’s Who in Risk Management? 2021
No 2 Thinkers360 Cybersecurity June 2019
This Podcast is sponsored by Vciso.co
www.vciso.co helps SAAS Companies SAAS Unicorns, B2B SAAS and Pre Revenue SAAS start-ups. to meet privacy and cyber security requirements and standards so they close sales deals quicker and can achieve cyber , privacy alignment certifications faster in minimum time .
The Data Protection and Privacy Podcast
What The EXPERTS Do Not TELL Us about Data Protection ? Part 23 Fortified Security: Protecting Legal Data in a Digital World with Rich Kanadjian from Kingston Technology .
Top 5 Key Points from the Podcast with Rich Kanadjian from Kingston Technology
1. Cybersecurity Importance:
- Critical for legal professionals to protect client confidentiality.
- Increased vulnerabilities due to remote work from the pandemic.
2. Common Vulnerabilities:
- Internal servers need strong intrusion protection.
- Human errors, stolen credentials, and social engineering are major breach causes.
3. Best Practices:
- Use air-gapped systems to disconnect sensitive data from the internet.
- Employ hardware encrypted drives like Kingston’s IronKey for data security.
4. Travel Risks:
- Public Wi-Fi at airports, hotels, and coffee shops are hotspots for hacking.
- Carry data on encrypted drives instead of connecting devices to public networks.
5. Customs and Legal Compliance:
- Customs can image devices, exposing data.
- Use encrypted drives with features like crypto erase to protect sensitive information.
Rich Kanadjian, Global Business Manager – Encrypted Solutions at Kingston Technology can be contacted here:
www.kingston.com / richard_kanadjian@kingston.com / www.linkedin.com/in/richkanadjian/
The latest in Data Protection and Privacy Podcast by David Clarke
Follow me on Twitter @1davidclarke 98.6k Followers
Join Linkedin GDPR Group 30,475 Others Members for FREE
CoAuthor of an ICO certified GDPR scheme