Your 

Security Boost

DEMYSTIFY SECURITY – SIMPLIFY PROTECTION

CATEGORIES

PROTECTION TIPS SHOPPING ONLINE

Υβριδικός Πόλεμος: Η εργαλειοθήκη των σκανδάλων

Hybrid warfare involves a range of tactics, including the use of scandals. Whether authentic or manufactured, personal scandals can be leveraged to impact a country’s global reputation.

The article is hosted at the Simerini Newspaper.

PROTECTION TIPS SHOPPING ONLINE

Εισαγωγη στον Υβριδικο Πολεμο

Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.

The article is hosted at the Simerini Newspaper.

PROTECTION TIPS SHOPPING ONLINE

An Ancient Greek Philosophy at the Heart of a Novel Approach to Cyber Security

Master your business protection with this refreshingly novel approach to Cyber Security.

The article is hosted at the Cyprus Business School Blog page.

PROTECTION TIPS SHOPPING ONLINE

HUMAN SHIELDING TM

This research paper covers the behavioural security  framework called “Human ShieldingTM”.  The methodology is the intellectual property of Yiota Nicolaidou.

PROTECTION TIPS SHOPPING ONLINE

Η επομενη γενια ασφαλειας

Security Manager Magazine – Κεντρικό θέμα Τεύχος 102. H νέα αποτελεσματική προσέγγιση για ένα δυναμικά μεταβαλλόμενο περιβάλλον επιθέσεων & κυβερνο-πολέμου.

PROTECTION TIPS SHOPPING ONLINE

Συστηματα Διαχειρισης και Προσβασης Εισοδου

Security Manager Magazine – Κεντρικό θέμα Τεύχος 84. Το άρθρο πραγματεύεται το συστατικό επιτυχημένης προστασίας για τα συστήματα διαχείρισης και πρόσβασης εισόδου.

PROTECTION TIPS SHOPPING ONLINE

The Capital One hack initiates a chain reaction for other major companies & showcases the trend we should expect; high-profile hacks

It is considered the greatest hack after the Equifax hack and it is shaking big corporations after the latest Facebook penalties.  

PROTECTION TIPS SHOPPING ONLINE

The $5 billion Facebook fine LESSON to all businesses about privacy violations (GDPR & US regulations)

Let’s talk about Privacy regulations, fines & lessons to be learned…

PROTECTION TIPS SHOPPING ONLINE

Elon Musk's Neuralink implant will "merge" humans with AI– “Brain hack” closer than ever before

Let’s challenge Neuralink’s protection from potential serious security concerns which may arise.

PROTECTION TIPS SHOPPING ONLINE

Another 6 ways to feel and be safe at home

Learn 6 more  handy ways to both, feel safe as well as be safe and home

PROTECTION TIPS SHOPPING ONLINE

6 ways to feel and be safe at home

Learn 6 handy ways to both, feel safe as well as be safe and home

PROTECTION TIPS SHOPPING ONLINE

8 ways to feel and be safe on the go

Life has become so busy that we interact and communicate in so many ways both online and offline.

PROTECTION TIPS SHOPPING ONLINE

What chance do I have to protect my valuable assets when the hacker is smarter than me?

I get to hear this question all the time at the Security Awareness” seminars I deliver for business decision makers.

PROTECTION TIPS SHOPPING ONLINE

Prominent changes in the trajectory of the Cyber-security space Part 2

In the previous episode we have covered six of the twelve prominent changes in the trajectory of the cyber-security space.

PROTECTION TIPS SHOPPING ONLINE

Prominent changes in the trajectory of the Cyber-security space Part 1

I am certain you have all noticed that there are some changes around us affecting the way the world is formed recently. 

PROTECTION TIPS SHOPPING ONLINE

The four forces behind cyber-security collapse

Cyber-security is collapsing and here are the four forces which are causing this to happen.

PROTECTION TIPS SHOPPING ONLINE

Security planning for 2019 Part 3

The third part of a three-part series  about how the security levels of your business depend on your business cycle stage.

PROTECTION TIPS SHOPPING ONLINE

Security planning for 2019 Part 2

The second part of a three-part series  about how the security levels of your business depend on your business cycle stage.

PROTECTION TIPS SHOPPING ONLINE

Security planning for 2019 Part 1

The first part of a three-part series  about how the security levels of your business depend on your business cycle stage.

What are the areas your business should invest in to progress and succeed in 2019

The 8 areas you should focus on investing for your business growth in 2019. The seven are included in Tony Robbins Business Mastery and the 8th…

PROTECTION TIPS SHOPPING ONLINE

THE SELF-MADE PROTECTOR - THE EMERGENCE OF HUMAN SECURITY

The latest trend in security which is your ability to protect yourself. The emergence of human protection.

Protection holidays mode ON

It’s Christmas time and is it is also the time to set up and enable your holiday protection mode. Here are three tips to get you started.

PROTECTION TIPS SHOPPING ONLINE

Tips for shopping online securely

How to shop online securely this holiday season. Tips to enjoy your holiday shopping and avoid cyber-criminals in the process.

One simple and cheap tool in your protection arsenal with triple action & capabilities

I always talk about secure behaviors but rarely about tools. Well today I want to make an exception because my message is not to avoid tools.

Your protection spheres

How much in tune or out of tune your protection spheres are? Your protection spheres refer to your security influences and their impact for you.

PROTECTION TRENDS 2018

How to write the best security script to follow - Why your business needs security policies & procedures

Protection manual: What are the basic components of an effective security script and its benefits for an organization or an individual.

Security Overload and how to overcome it

Do you ever feel like you have so, many things to do and time is running out? It is a common feeling for overachievers

PROTECTION TRENDS 2018

Your assets Island - Your effective protection Security management team

Introducing the key players for your personal and professional protection.

The scale effect – compounding protection

The other day… And I though that’s it. That is the angle I am looking for to present the concept of compounding protection to you.

PROTECTION TRENDS 2018

A protection hack all successful people apply to make a new habit stick

The EASE – REPEAT technique which you can apply to create habits that can stick with you; whether they are security related or not

A protection hack all successful people apply to succeed more and be more productive every day

What if I tell you that today I will teach a technique which you can apply to succeed more and be more productive every day!

PROTECTION TRENDS 2018

Your Security Energy Tank

As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.

How much security is enough security?

I am often asked how much security is enough security and the answer I give is always “depending on your case”.
That is because

PROTECTION TRENDS 2018

The perfect accessories for protection

Fashion week Fall 2018 and the perfect accessories for protection. Five security principles taught by the fashion industry.

5 More Habits of highly Successful & Protected people

The most successful people have a series of habits which are the reason they have reached success. Do you know them? Do you appy them?

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

5 Habits of successful & protected people

Success in our days goes hand in hand with protection as your assets value depends on your ability to secure & maintain them.

GDPR Interview - Part 7

GDPR: Your ability to control your protection

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

GDPR INTERVIEW PART 6

GDPR: Social media & Selection of the right tools

GDPR Interview - Part 5

Private Data & GDPR Implementation

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

GDPR INTERVIEW PART 4

GDPR Fines

GDPR Interview - Part 3

GDPR Compliance: Marketing Text Messages

GDPR, WEBSITES, COOKIES, EMAIL MARKETING

GDPR INTERVIEW PART 2

Websites, Cookies & Email Marketing

GDPR Interview - Part 1

Understand GDPR. Know your rights and responsibilities

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The inside job

Securing a high-stake facility has specific requirements.

Toxic Environment Alert

Just like when the human body is exposed to nuclear radiation it dissociates, the environment of a business can create toxicity and eventually damage the business itself.

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The right message of Security Awareness

his is a concept that derives from questions I am often asked not only from private clients but from journalists as well.

The key component of effective protection – Your “protection sweet spot”

Perfectionism is a nasty thing as it is wasting valuable time and cognitive energy we could direct to something else and create more success

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The decision which shapes your business destiny

I would like to tell you a story today as real stories manage to pass the most important messages in the most effortless way.

The 3 habits every CEO, decision maker, investor, politician and VIP should know

Each case I am evaluating is unique. However, I found some similarities

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

Are you really GDPR compliant? Can you afford not to be?The next day for businesses

On the 24th of May all business people waited to see what will happen by the 25th of May. Something like a dooms-day expectation feeling is in the air.

How to select data protection officer (DPO) for your company

Selecting the right data protection officer will make or break your GDPR compliance

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

How to select the database to comply with GDPR and protect my clients’ private data

One of the most common questions I get regarding GDPR is: What database am I “allowed” to use?

The benefits of becoming unpredictable to cyber-criminals.

Being unpredictable for cyber-criminals is perfect for three reasons

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

Three habits that can make or break your security (small business & entrepreneurs)

 Here is one piece of advice I can give you without you spending a dime! The 3 most dangerous habits you have that can make or break your protection.

What are the most common locations hackers phish for unexpected victims?

Basically, cyber-criminals are everywhere. Why? Because of the internet but there are three common places hackers love to phish for their victims. Poor victims

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

You are predictable

Solutions start with stating the facts and the fact is: You are predictable.

Why this should bother you?

The Security paranoia game you didn’t know you were playing…yet you already lost

If you are paranoid about your security, then it is either poor and endangered or safe and protected. It depends on how you define the term “paranoia”.

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

5 ways your business is in danger of attacks during holidays

Today I’d like to share with you a non-exhaustive list of things for large or medium size companies to take care of the protection of your business during the holidays.

“I do not keep online data, only hard copies.” Do I still need GDPR compliance?

Lately, many people approach me asking questions related to GDPR. I understand the confusion about the new regulations

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

Business protection blocking rats you live with

Are you aware of the security threats you are exposed to when working from home? Today’s article is covering the 3 major risks for anyone working from home.

The Trojan horse of protection. The constant factor keeping you unprotected long-term is just a myth. Do you still believe it?

It is really fascinating to see how many myths and lies there are around cyber-security. Yet the worst of them is their impact

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The best protection advice you will ever get

It is interesting how powerful a piece of advice can be to completely change our beliefs and actions for the best.

GDPR Basics by example

Do you remember the saying: bury your head in the sand? Guess what. This is not a good strategy, as GDPR will not go away.

The 10 most dangerous security mistakes entrepreneurs and small size businesses make

The 10 most dangerous mistakes entrepreneurs and small size businesses make about their security

You will be surprised how basic these mistakes are and how you could easily avoid them.

The 10 most dangerous cyber-security mistakes big corporations make about their security

Even big corporations make mistakes regarding their security levels. Here are the 10 worst of those mistakes.

Encryption is not the barrier to fight cyber-criminals. There are other solutions.

From time to time governments are discussing about banning encryption but encryption is not the barrier to fight cyber-criminals.

How you can understand the real facts behind an attack

If you believe that someone is not professional enough if they got hacked, you are mistaken.

Solving the cyber-security Gordian Knot

In the Kingdom of all Kings in Phrygia, there was the Gordian Carriage devoted to the God Dias, Greek word for Zeus and Sabazios for Phrygians

What data is really important? Understanding the first principle of GDPR.

About six months ago, I got a call from a business owner in Germany. She was really upset about her safety but the interesting part was why

Picking the Cyber Criminal Mind

A friend of mine asked me: “Is it scary to have a criminal mind?” In order to answer this question, I have to define what the criminal mind is

Is the protection of your business in a coma state?

Businesses operate in a risky environment, but there is a difference between a well calculated risk and sky-diving without a parachute.

An ancient Greek philosophy – the novel approach to Cyber Security

The definition I like most about stoicism is given by Tim Ferriss. According to Mr. Ferriss, stoicism is considered a means of mental toughness training

What children can teach us about security

Everything is possible. And this is the philosophy, I’m living by: everything is possible, if you deeply want it

Could your summer holidays put your business in danger of cyber and physical attacks?

Summer is here and for many businesses August is the official month for holidays. What about your businesses’ well-being? Have you prepared it for the holidays?

The hidden dangers of our protection technology PART 3 – Understanding the Human Psychology

In this article I am going to a different indication factor which is not that obvious; human psychology. The Familiarity Factor

The hidden dangers of our protection technology PART 2- Understanding the threat probability

In the previous article I mentioned several scenarios that can transform widely used protection software like an antivirus into an attack station and what you need to know in order to decide on your security measures and controls. Now it is time to evaluate the likelihood of them happening.

The hidden dangers of our protection technology PART 1: Understanding Threat Mechanics

In light of the recent announcement about the “Double agent” vulnerability method people are getting really confused. Clients have been asking me: Should I use antivirus software?

How to defuse vulnerabilities at their roots

Threats have humans as an initiating factor. Either a malicious programmer or a programmer with good intention who makes a mistake is enough to initiate the exploitation cycle.

The Security paranoia game you didn’t know you are playing…but you have already lost

If you are security paranoid, your security is either poor, endangered, imperiled OR safe and protected. It depends how you define the term paranoia.

Do not read this… It is a secret

Mystery activates the drive in your mind. This is just one of the techniques hackers use. They trigger your psychology with social engineering. You cannot imagine how good they are at the art of deception

An encrypted message to governments

Stop looking at the back-door. In the light of so many exposures regarding mass surveillance acts and so many twisted protection hidden deals which always turn against the ones you are supposed to protect, If you want to solve the cyber terrorism problem how about asking security experts?

You are predictable

Why are you so predictable? Solutions start with stating the facts and the fact is that: You are predictable.

Business secret protection codes

Do you need the secret protection codes for your business? Cyber security always feels like a mystery that can’t be solved when in reality good security is built on simple easy to decode processes that will protect your business.

How to protect yourself from Ransomware

If you want to protect yourself and your business from WannaCry ransomware at least do the following immediately

Passwords: When the Rules are not working anymore make new ones!

This explosion of passwords use in combination to outrageous rules makes people confused, frustrated, not able to understand how to do it right and the most important from all, not secured. Yes that’s right; even if you follow all the rules around password setting you are not secured.

Passwords. You know how to? Statistics say you don’t!

If a day is dedicated worldwide to passwords it must be because passwords are very important. Right? Since the dawn of the Internet passwords remain the first point of attack and for good reason.

Password day 2017! Tips OR Solution? Your choice.

Can your passwords cover all of your needs and requirements? Welcome to a new era where YOU BECOME the strongest link to your security.

The roots to your security problem

Cyber attacks: Let’s examine their roots! Cyber attacks are exponentially increasing with time. There are several types of threats that can be initiated by our adversaries and day by day they increase in volume, severity and impact.

Bringing needle-moving, highly actionable resources and smart strategies to help you demystify security and simplify protection right to your inbox. You in?

BECOME AN YN INSIDER

Sign up for exclusive content, emails & things Yiota doesn’t share anywhere else.

By entering your info, you’ll become an YN Insider – with FREE access to exclusive insights, private Q+As, and expert tips of Yiota, delivered with 💜 to your inbox. (Unsub anytime in a click.) You also agree to our Site Terms and Privacy Policy.