Can my ISP see request data being posted to a website when a DNS leak occurs

From what I understand, the ISP can see the host you’re trying to connect to in the event of a DNS leak. But does that mean they can see the data being sent like the requests body? or even headers?
Or can they just see the IPs/Hosts you’re… Continue reading Can my ISP see request data being posted to a website when a DNS leak occurs

Which kind of data breaches or risk can happen if there is no virtual/physical disk encryption

There is an Azure-based internal database server and is not public-facing. There is another front-end application. A specific user group can connect with a VPN. There is no encryption applied at the disk level. So what risk or specific ga… Continue reading Which kind of data breaches or risk can happen if there is no virtual/physical disk encryption

My fingerprint was leaked by a hackers who obtained them from vulnerable voting system of our Government, should I avoid using biometric features?

Way back in 2016, our government’s Commission on Election database was hacked. I am one of those 55 million people whose personal data was hacked, including our fingerprints.
Fast forward, we are now at the age where smartphone apps moving… Continue reading My fingerprint was leaked by a hackers who obtained them from vulnerable voting system of our Government, should I avoid using biometric features?

Our fingerprint were leaked from the vulnerable voting system made by our Government, should I avoid using biometric system from now on?

Way back in 2016, our government’s Commission on Election database was hacked. I am one of those 55 million people whose personal data was leaked and exposed including our fingerprints.
We are now at the age where smartphone apps are movin… Continue reading Our fingerprint were leaked from the vulnerable voting system made by our Government, should I avoid using biometric system from now on?

Microsoft Purview Sensitivity labels, best practices for setup?

Background
There have been more than a handful of recent security breaches at my company, involving social engineering and spoofed emails.
A malicious actor fraudulently spoofing one of our customers, sends an email to a user at my company… Continue reading Microsoft Purview Sensitivity labels, best practices for setup?