{ JUNE 2022 }

TikTok's potential privacy violations, upcoming changes to the California Consumer Privacy Act, Zola hack affects 3,000 users, Twitter violates users' privacy and a Nacha rule update

{ THE NEWS }

 

TikTok Data Privacy Hero Image

 

Potential violations of privacy that likely led TikTok to settle for $92 million
TikTok has settled a class-action lawsuit comprised of 21 lawsuits brought against the company that applied to roughly 89 million TikTok users. While we can only speculate since the suit was settled out of court, we deduced the likely privacy violations based on the allegations and TikTok's choice to settle.
LEARN MORE

Upcoming changes to the California Consumer Privacy Act

An unexpected preliminary draft of the California Consumer Privacy Act (CCPA) was released by the California Privacy Protection Agency (CPPA) with the finalized regulations expected towards the end of this year. Even though the proposed regulations are under discussion, organizations can utilize the draft to guide preparations to remain compliant.

LEARN MORE

Zola hack results in stolen credit cards and gifted funds from 3,000 users
Zola, a popular wedding planning startup, reported that hackers gained unauthorized access to its users' accounts via a credential stuffing attack. Learn more about this type of hack and how utilizing two-factor authentication (2FA) can prevent it.
LEARN MORE

Twitter violated users' privacy and Federal Trade Commission guidelines
Federal investigators from the Federal Trade Commission and the Department of Justice have settled a claim that the social media giant, Twitter, illegally utilized its users' personal data. Under the premise of security purposes, Twitter collected email addresses and phone numbers from users, which Twitter also utilized to sell targeted advertisements.
LEARN MORE

Nacha updates operating rules and guidelines, effective June 30th
The new Nacha rule will require electronically stored ACH account numbers to be protected by rendering them unreadable. This particular phase (Phase 2) applies to ACH originators and third parties that process more than 2 million ACH payments per year.
LEARN MORE
 

{ THE KNOW }

AdobeStock_196963791 (1)
ENCRYPTION

What is Polymorphic Encryption?

Encryption uses complex algorithms to protect data from being compromised if it falls into the hands of malicious actors. However, not all kinds of encryption secure data in the same way.

LEARN MORE
Recurring Payments for Merchants IG
PAYMENTS

Benefits of Recurring Payments for Merchants

There are numerous advantages to using recurring payments as merchants, such as saving time, reducing paper waste, and increasing payment data security.

LEARN MORE
What is CEO Fraud Instagram Post
PAYMENTS

What is CEO Fraud Phishing?

As companies bolster their security infrastructure and increase budgets to deflect growing cyber-attacks, hackers are attacking the weakest link: human error.

LEARN MORE
Data Masking Instagram Post
DATA SECURITY

Data Masking vs Encryption: Are you using the right data security tool?

If you’re looking for a data security solution, you’ve probably heard of both data masking and data encryption tools. But what’s the difference between these two tools? Is one better than the other?

LEARN MORE

 

{ THE FUN }

What does ROC stand for?

A. Report on Compliance
B. Registration of Commerce
C. Remote Operations Company
D. Reset on Connection

 

REVEAL ANSWER

 


{ SIGN UP }

Fill out the form below to subscribe