The Information Commissioner’s Office (ICO), the data watchdog, has stated that it has received around 90 reports regarding possible breaches connected to Capita.
In the realm of data protection in the UK, the Information Commissioner’s Office (ICO) takes on the role of a guardian. Its primary function involves enforcing laws that govern communication, networking, and the security of data.
The ICO ensures that businesses and organizations adhere to these laws, with the aim of safeguarding individuals’ personal information.
Its most notable role is in upholding the EU’s General Data Protection Regulation (GDPR).
Its most notable role is in upholding the EU’s General Data Protection Regulation (GDPR).
The ICO’s primary objective is to ensure that businesses operating in the UK adhere to rigorous data protection principles, safeguarding individuals’ privacy and personal information.
Capita is a major supplier to UK government departments and is involved in various contracts within the private sector.
Capita is a major supplier to UK government departments and is involved in various contracts within the private sector.
These reports pertain to both the cyberattack that occurred in March and the recent discovery of an unsecured database.
As per the information from the Information Commissioner’s Office (ICO), it said that it is currently investigating two cyber incidents related to Capita. In March, Capita experienced a cyber attack that resulted in staff being locked out of Microsoft’s Office 3
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
As per the information from the Information Commissioner’s Office (ICO), it said that it is currently investigating two cyber incidents related to Capita. In March, Capita experienced a cyber attack that resulted in staff being locked out of Microsoft’s Office 3
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: