Security Blog

One simple and cheap tool in your protection arsenal with triple action & capabilities

I always talk about secure behaviors but rarely about tools. Well today I want to make an exception because my message is not to avoid tools.

Your protection spheres

How much in tune or out of tune your protection spheres are? Your protection spheres refer to your security influences and their impact for you.

PROTECTION TRENDS 2018

How to write the best security script to follow - Why your business needs security policies & procedures

Protection manual: What are the basic components of an effective security script and its benefits for an organization or an individual.

Security Overload and how to overcome it

Do you ever feel like you have so, many things to do and time is running out? It is a common feeling for overachievers

PROTECTION TRENDS 2018

Your assets Island - Your effective protection Security management team

Introducing the key players for your personal and professional protection.

The scale effect – compounding protection

The other day… And I though that’s it. That is the angle I am looking for to present the concept of compounding protection to you.

PROTECTION TRENDS 2018

A protection hack all successful people apply to make a new habit stick

The EASE – REPEAT technique which you can apply to create habits that can stick with you; whether they are security related or not

A protection hack all successful people apply to succeed more and be more productive every day

What if I tell you that today I will teach a technique which you can apply to succeed more and be more productive every day!

PROTECTION TRENDS 2018

Your Security Energy Tank

As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.

How much security is enough security?

I am often asked how much security is enough security and the answer I give is always “depending on your case”.
That is because

PROTECTION TRENDS 2018

The perfect accessories for protection

Fashion week Fall 2018 and the perfect accessories for protection. Five security principles taught by the fashion industry.

5 More Habits of highly Successful & Protected people

The most successful people have a series of habits which are the reason they have reached success. Do you know them? Do you appy them?

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

5 Habits of successful & protected people

Success in our days goes hand in hand with protection as your assets value depends on your ability to secure & maintain them.

GDPR Interview - Part 7

GDPR: Your ability to control your protection

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

GDPR INTERVIEW PART 6

GDPR: Social media & Selection of the right tools

GDPR Interview - Part 5

Private Data & GDPR Implementation

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

GDPR INTERVIEW PART 4

GDPR Fines

GDPR Interview - Part 3

GDPR Compliance: Marketing Text Messages

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

GDPR INTERVIEW PART 2

Websites, Cookies & Email Marketing

GDPR Interview - Part 1

Understand GDPR. Know your rights and responsibilities

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The inside job

Securing a high-stake facility has specific requirements.

Toxic Environment Alert

Just like when the human body is exposed to nuclear radiation it dissociates, the environment of a business can create toxicity and eventually damage the business itself.

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The right message of Security Awareness

his is a concept that derives from questions I am often asked not only from private clients but from journalists as well.

The key component of effective protection – Your “protection sweet spot”

Perfectionism is a nasty thing as it is wasting valuable time and cognitive energy we could direct to something else and create more success

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The decision which shapes your business destiny

I would like to tell you a story today as real stories manage to pass the most important messages in the most effortless way.

The 3 habits every CEO, decision maker, investor, politician and VIP should know

Each case I am evaluating is unique. However, I found some similarities

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

Are you really GDPR compliant? Can you afford not to be?The next day for businesses

On the 24th of May all business people waited to see what will happen by the 25th of May. Something like a dooms-day expectation feeling is in the air.

How to select data protection officer (DPO) for your company

Selecting the right data protection officer will make or break your GDPR compliance

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

How to select the database to comply with GDPR and protect my clients’ private data

One of the most common questions I get regarding GDPR is: What database am I “allowed” to use?

The benefits of becoming unpredictable to cyber-criminals.

Being unpredictable for cyber-criminals is perfect for three reasons

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

Three habits that can make or break your security (small business & entrepreneurs)

 Here is one piece of advice I can give you without you spending a dime! The 3 most dangerous habits you have that can make or break your protection.

What are the most common locations hackers phish for unexpected victims?

Basically, cyber-criminals are everywhere. Why? Because of the internet but there are three common places hackers love to phish for their victims. Poor victims

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

You are predictable

Solutions start with stating the facts and the fact is: You are predictable.

Why this should bother you?

The Security paranoia game you didn’t know you were playing…yet you already lost

If you are paranoid about your security, then it is either poor and endangered or safe and protected. It depends on how you define the term “paranoia”.

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

5 ways your business is in danger of attacks during holidays

Today I’d like to share with you a non-exhaustive list of things for large or medium size companies to take care of the protection of your business during the holidays.

“I do not keep online data, only hard copies.” Do I still need GDPR compliance?

Lately, many people approach me asking questions related to GDPR. I understand the confusion about the new regulations

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

Business protection blocking rats you live with

Are you aware of the security threats you are exposed to when working from home? Today’s article is covering the 3 major risks for anyone working from home.

The Trojan horse of protection. The constant factor keeping you unprotected long-term is just a myth. Do you still believe it?

It is really fascinating to see how many myths and lies there are around cyber-security. Yet the worst of them is their impact

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The best protection advice you will ever get

It is interesting how powerful a piece of advice can be to completely change our beliefs and actions for the best.

GDPR Basics by example

Do you remember the saying: bury your head in the sand? Guess what. This is not a good strategy, as GDPR will not go away.

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The 10 most dangerous mistakes entrepreneurs and small size businesses make about their security

You will be surprised how basic these mistakes are and how you could easily avoid them.

The 10 most dangerous cyber-security mistakes big corporations make about their security

Even big corporations make mistakes regarding their security levels. Here are the 10 worst of those mistakes.

Encryption is not the barrier to fight cyber-criminals. There are other solutions.

From time to time governments are discussing about banning encryption but encryption is not the barrier to fight cyber-criminals.

How you can understand the real facts behind an attack

If you believe that someone is not professional enough if they got hacked, you are mistaken.

Solving the cyber-security Gordian Knot

In the Kingdom of all Kings in Phrygia, there was the Gordian Carriage devoted to the God Dias, Greek word for Zeus and Sabazios for Phrygians

What data is really important? Understanding the first principle of GDPR.

About six months ago, I got a call from a business owner in Germany. She was really upset about her safety but the interesting part was why

Picking the Cyber Criminal Mind

A friend of mine asked me: “Is it scary to have a criminal mind?” In order to answer this question, I have to define what the criminal mind is

Is the protection of your business in a coma state?

Businesses operate in a risky environment, but there is a difference between a well calculated risk and sky-diving without a parachute.

An ancient Greek philosophy – the novel approach to Cyber Security

The definition I like most about stoicism is given by Tim Ferriss. According to Mr. Ferriss, stoicism is considered a means of mental toughness training

What children can teach us about security

Everything is possible. And this is the philosophy, I’m living by: everything is possible, if you deeply want it

Could your summer holidays put your business in danger of cyber and physical attacks?

Summer is here and for many businesses August is the official month for holidays. What about your businesses’ well-being? Have you prepared it for the holidays?

The hidden dangers of our protection technology PART 3 – Understanding the Human Psychology

In this article I am going to a different indication factor which is not that obvious; human psychology. The Familiarity Factor

The hidden dangers of our protection technology PART 2- Understanding the threat probability

In the previous article I mentioned several scenarios that can transform widely used protection software like an antivirus into an attack station and what you need to know in order to decide on your security measures and controls. Now it is time to evaluate the likelihood of them happening.

The hidden dangers of our protection technology PART 1: Understanding Threat Mechanics

In light of the recent announcement about the “Double agent” vulnerability method people are getting really confused. Clients have been asking me: Should I use antivirus software?

How to defuse vulnerabilities at their roots

Threats have humans as an initiating factor. Either a malicious programmer or a programmer with good intention who makes a mistake is enough to initiate the exploitation cycle.

The Security paranoia game you didn’t know you are playing…but you have already lost

If you are security paranoid, your security is either poor, endangered, imperiled OR safe and protected. It depends how you define the term paranoia.

Do not read this… It is a secret

Mystery activates the drive in your mind. This is just one of the techniques hackers use. They trigger your psychology with social engineering. You cannot imagine how good they are at the art of deception

An encrypted message to governments

Stop looking at the back-door. In the light of so many exposures regarding mass surveillance acts and so many twisted protection hidden deals which always turn against the ones you are supposed to protect, If you want to solve the cyber terrorism problem how about asking security experts?

You are predictable

Why are you so predictable? Solutions start with stating the facts and the fact is that: You are predictable.

Business secret protection codes

Do you need the secret protection codes for your business? Cyber security always feels like a mystery that can’t be solved when in reality good security is built on simple easy to decode processes that will protect your business.

How to protect yourself from Ransomware

If you want to protect yourself and your business from WannaCry ransomware at least do the following immediately

Passwords: When the Rules are not working anymore make new ones!

This explosion of passwords use in combination to outrageous rules makes people confused, frustrated, not able to understand how to do it right and the most important from all, not secured. Yes that’s right; even if you follow all the rules around password setting you are not secured.

Passwords. You know how to? Statistics say you don’t!

If a day is dedicated worldwide to passwords it must be because passwords are very important. Right? Since the dawn of the Internet passwords remain the first point of attack and for good reason.

Password day 2017! Tips OR Solution? Your choice.

Can your passwords cover all of your needs and requirements? Welcome to a new era where YOU BECOME the strongest link to your security.

The roots to your security problem

Cyber attacks: Let’s examine their roots! Cyber attacks are exponentially increasing with time. There are several types of threats that can be initiated by our adversaries and day by day they increase in volume, severity and impact.

Almost there!

Get An Insider Information On Threats & Solutions.

 

This form collects information we will use to send you free resources & updates about promotions, special offers, and news. 

We promise to keep your name and email address safe.You can unsubscribe at any time.

For more info you can read our Privacy Policy.

You have Successfully Subscribed!

Eliminate Dangers Related To Social Media!

[it's 100% FREE]

 

You have Successfully Subscribed!

Eliminate Dangers Related To Social Media!

[it's 100% FREE]

 

Done!