SECURITY BLOG

    PROTECTION TIPS SHOPPING ONLINE

    Υβριδικός Πόλεμος: Η εργαλειοθήκη των σκανδάλων

    Hybrid warfare involves a range of tactics, including the use of scandals. Whether authentic or manufactured, personal scandals can be leveraged to impact a country’s global reputation.

    The article is hosted at the Simerini Newspaper.

    PROTECTION TIPS SHOPPING ONLINE

    Εισαγωγη στον Υβριδικο Πολεμο

    Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.

    The article is hosted at the Simerini Newspaper.

    PROTECTION TIPS SHOPPING ONLINE

    An Ancient Greek Philosophy at the Heart of a Novel Approach to Cyber Security

    Master your business protection with this refreshingly novel approach to Cyber Security.

    The article is hosted at the Cyprus Business School Blog page.

    PROTECTION TIPS SHOPPING ONLINE

    HUMAN SHIELDING TM

    This research paper covers the behavioural security  framework called “Human ShieldingTM”.  The methodology is the intellectual property of Yiota Nicolaidou.

    PROTECTION TIPS SHOPPING ONLINE

    Η επομενη γενια ασφαλειας

    Security Manager Magazine – Κεντρικό θέμα Τεύχος 102. H νέα αποτελεσματική προσέγγιση για ένα δυναμικά μεταβαλλόμενο περιβάλλον επιθέσεων & κυβερνο-πολέμου.

    PROTECTION TIPS SHOPPING ONLINE

    Συστηματα Διαχειρισης και Προσβασης Εισοδου

    Security Manager Magazine – Κεντρικό θέμα Τεύχος 84. Το άρθρο πραγματεύεται το συστατικό επιτυχημένης προστασίας για τα συστήματα διαχείρισης και πρόσβασης εισόδου.

    PROTECTION TIPS SHOPPING ONLINE

    The Capital One hack initiates a chain reaction for other major companies & showcases the trend we should expect; high-profile hacks

    It is considered the greatest hack after the Equifax hack and it is shaking big corporations after the latest Facebook penalties.  

    PROTECTION TIPS SHOPPING ONLINE

    The $5 billion Facebook fine LESSON to all businesses about privacy violations (GDPR & US regulations)

    Let’s talk about Privacy regulations, fines & lessons to be learned…

    PROTECTION TIPS SHOPPING ONLINE

    Elon Musk's Neuralink implant will "merge" humans with AI– “Brain hack” closer than ever before

    Let’s challenge Neuralink’s protection from potential serious security concerns which may arise.

    PROTECTION TIPS SHOPPING ONLINE

    Another 6 ways to feel and be safe at home

    Learn 6 more  handy ways to both, feel safe as well as be safe and home

    PROTECTION TIPS SHOPPING ONLINE

    6 ways to feel and be safe at home

    Learn 6 handy ways to both, feel safe as well as be safe and home

    PROTECTION TIPS SHOPPING ONLINE

    8 ways to feel and be safe on the go

    Life has become so busy that we interact and communicate in so many ways both online and offline.

    PROTECTION TIPS SHOPPING ONLINE

    What chance do I have to protect my valuable assets when the hacker is smarter than me?

    I get to hear this question all the time at the Security Awareness” seminars I deliver for business decision makers.

    PROTECTION TIPS SHOPPING ONLINE

    Prominent changes in the trajectory of the Cyber-security space Part 2

    In the previous episode we have covered six of the twelve prominent changes in the trajectory of the cyber-security space.

    PROTECTION TIPS SHOPPING ONLINE

    Prominent changes in the trajectory of the Cyber-security space Part 1

    I am certain you have all noticed that there are some changes around us affecting the way the world is formed recently. 

    PROTECTION TIPS SHOPPING ONLINE

    The four forces behind cyber-security collapse

    Cyber-security is collapsing and here are the four forces which are causing this to happen.

    PROTECTION TIPS SHOPPING ONLINE

    Security planning for 2019 Part 3

    The third part of a three-part series  about how the security levels of your business depend on your business cycle stage.

    PROTECTION TIPS SHOPPING ONLINE

    Security planning for 2019 Part 2

    The second part of a three-part series  about how the security levels of your business depend on your business cycle stage.

    PROTECTION TIPS SHOPPING ONLINE

    Security planning for 2019 Part 1

    The first part of a three-part series  about how the security levels of your business depend on your business cycle stage.

    What are the areas your business should invest in to progress and succeed in 2019

    The 8 areas you should focus on investing for your business growth in 2019. The seven are included in Tony Robbins Business Mastery and the 8th…

    PROTECTION TIPS SHOPPING ONLINE

    THE SELF-MADE PROTECTOR - THE EMERGENCE OF HUMAN SECURITY

    The latest trend in security which is your ability to protect yourself. The emergence of human protection.

    Protection holidays mode ON

    It’s Christmas time and is it is also the time to set up and enable your holiday protection mode. Here are three tips to get you started.

    PROTECTION TIPS SHOPPING ONLINE

    Tips for shopping online securely

    How to shop online securely this holiday season. Tips to enjoy your holiday shopping and avoid cyber-criminals in the process.

    One simple and cheap tool in your protection arsenal with triple action & capabilities

    I always talk about secure behaviors but rarely about tools. Well today I want to make an exception because my message is not to avoid tools.

    Your protection spheres

    How much in tune or out of tune your protection spheres are? Your protection spheres refer to your security influences and their impact for you.

    PROTECTION TRENDS 2018

    How to write the best security script to follow - Why your business needs security policies & procedures

    Protection manual: What are the basic components of an effective security script and its benefits for an organization or an individual.

    Security Overload and how to overcome it

    Do you ever feel like you have so, many things to do and time is running out? It is a common feeling for overachievers

    PROTECTION TRENDS 2018

    Your assets Island - Your effective protection Security management team

    Introducing the key players for your personal and professional protection.

    The scale effect – compounding protection

    The other day… And I though that’s it. That is the angle I am looking for to present the concept of compounding protection to you.

    PROTECTION TRENDS 2018

    A protection hack all successful people apply to make a new habit stick

    The EASE – REPEAT technique which you can apply to create habits that can stick with you; whether they are security related or not

    A protection hack all successful people apply to succeed more and be more productive every day

    What if I tell you that today I will teach a technique which you can apply to succeed more and be more productive every day!

    PROTECTION TRENDS 2018

    Your Security Energy Tank

    As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.

    How much security is enough security?

    I am often asked how much security is enough security and the answer I give is always “depending on your case”.
    That is because

    PROTECTION TRENDS 2018

    The perfect accessories for protection

    Fashion week Fall 2018 and the perfect accessories for protection. Five security principles taught by the fashion industry.

    5 More Habits of highly Successful & Protected people

    The most successful people have a series of habits which are the reason they have reached success. Do you know them? Do you appy them?

    GDPR, WEBSITES, COOKIES, EMAIL MARKETING

    5 Habits of successful & protected people

    Success in our days goes hand in hand with protection as your assets value depends on your ability to secure & maintain them.

    GDPR Interview - Part 7

    GDPR: Your ability to control your protection

    GDPR, WEBSITES, COOKIES, EMAIL MARKETING

    GDPR INTERVIEW PART 6

    GDPR: Social media & Selection of the right tools

    GDPR Interview - Part 5

    Private Data & GDPR Implementation

    GDPR Interview - Part 3

    GDPR Compliance: Marketing Text Messages

    GDPR, WEBSITES, COOKIES, EMAIL MARKETING

    GDPR INTERVIEW PART 2

    Websites, Cookies & Email Marketing

    GDPR Interview - Part 1

    Understand GDPR. Know your rights and responsibilities

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    The inside job

    Securing a high-stake facility has specific requirements.

    Toxic Environment Alert

    Just like when the human body is exposed to nuclear radiation it dissociates, the environment of a business can create toxicity and eventually damage the business itself.

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    The right message of Security Awareness

    his is a concept that derives from questions I am often asked not only from private clients but from journalists as well.

    The key component of effective protection – Your “protection sweet spot”

    Perfectionism is a nasty thing as it is wasting valuable time and cognitive energy we could direct to something else and create more success

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    The decision which shapes your business destiny

    I would like to tell you a story today as real stories manage to pass the most important messages in the most effortless way.

    The 3 habits every CEO, decision maker, investor, politician and VIP should know

    Each case I am evaluating is unique. However, I found some similarities

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    Are you really GDPR compliant? Can you afford not to be?The next day for businesses

    On the 24th of May all business people waited to see what will happen by the 25th of May. Something like a dooms-day expectation feeling is in the air.

    How to select data protection officer (DPO) for your company

    Selecting the right data protection officer will make or break your GDPR compliance

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    How to select the database to comply with GDPR and protect my clients’ private data

    One of the most common questions I get regarding GDPR is: What database am I “allowed” to use?

    The benefits of becoming unpredictable to cyber-criminals.

    Being unpredictable for cyber-criminals is perfect for three reasons

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    Three habits that can make or break your security (small business & entrepreneurs)

     Here is one piece of advice I can give you without you spending a dime! The 3 most dangerous habits you have that can make or break your protection.

    What are the most common locations hackers phish for unexpected victims?

    Basically, cyber-criminals are everywhere. Why? Because of the internet but there are three common places hackers love to phish for their victims. Poor victims

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    You are predictable

    Solutions start with stating the facts and the fact is: You are predictable.

    Why this should bother you?

    The Security paranoia game you didn’t know you were playing…yet you already lost

    If you are paranoid about your security, then it is either poor and endangered or safe and protected. It depends on how you define the term “paranoia”.

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    5 ways your business is in danger of attacks during holidays

    Today I’d like to share with you a non-exhaustive list of things for large or medium size companies to take care of the protection of your business during the holidays.

    “I do not keep online data, only hard copies.” Do I still need GDPR compliance?

    Lately, many people approach me asking questions related to GDPR. I understand the confusion about the new regulations

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    Business protection blocking rats you live with

    Are you aware of the security threats you are exposed to when working from home? Today’s article is covering the 3 major risks for anyone working from home.

    The Trojan horse of protection. The constant factor keeping you unprotected long-term is just a myth. Do you still believe it?

    It is really fascinating to see how many myths and lies there are around cyber-security. Yet the worst of them is their impact

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    The best protection advice you will ever get

    It is interesting how powerful a piece of advice can be to completely change our beliefs and actions for the best.

    GDPR Basics by example

    Do you remember the saying: bury your head in the sand? Guess what. This is not a good strategy, as GDPR will not go away.

    The 10 most dangerous security mistakes entrepreneurs and small size businesses make

    The 10 most dangerous mistakes entrepreneurs and small size businesses make about their security

    You will be surprised how basic these mistakes are and how you could easily avoid them.

    The 10 most dangerous cyber-security mistakes big corporations make about their security

    Even big corporations make mistakes regarding their security levels. Here are the 10 worst of those mistakes.

    Encryption is not the barrier to fight cyber-criminals. There are other solutions.

    From time to time governments are discussing about banning encryption but encryption is not the barrier to fight cyber-criminals.

    How you can understand the real facts behind an attack

    If you believe that someone is not professional enough if they got hacked, you are mistaken.

    Solving the cyber-security Gordian Knot

    In the Kingdom of all Kings in Phrygia, there was the Gordian Carriage devoted to the God Dias, Greek word for Zeus and Sabazios for Phrygians

    What data is really important? Understanding the first principle of GDPR.

    About six months ago, I got a call from a business owner in Germany. She was really upset about her safety but the interesting part was why

    Picking the Cyber Criminal Mind

    A friend of mine asked me: “Is it scary to have a criminal mind?” In order to answer this question, I have to define what the criminal mind is

    Is the protection of your business in a coma state?

    Businesses operate in a risky environment, but there is a difference between a well calculated risk and sky-diving without a parachute.

    An ancient Greek philosophy – the novel approach to Cyber Security

    The definition I like most about stoicism is given by Tim Ferriss. According to Mr. Ferriss, stoicism is considered a means of mental toughness training

    What children can teach us about security

    Everything is possible. And this is the philosophy, I’m living by: everything is possible, if you deeply want it

    Could your summer holidays put your business in danger of cyber and physical attacks?

    Summer is here and for many businesses August is the official month for holidays. What about your businesses’ well-being? Have you prepared it for the holidays?

    The hidden dangers of our protection technology PART 3 – Understanding the Human Psychology

    In this article I am going to a different indication factor which is not that obvious; human psychology. The Familiarity Factor

    The hidden dangers of our protection technology PART 2- Understanding the threat probability

    In the previous article I mentioned several scenarios that can transform widely used protection software like an antivirus into an attack station and what you need to know in order to decide on your security measures and controls. Now it is time to evaluate the likelihood of them happening.

    The hidden dangers of our protection technology PART 1: Understanding Threat Mechanics

    In light of the recent announcement about the “Double agent” vulnerability method people are getting really confused. Clients have been asking me: Should I use antivirus software?

    How to defuse vulnerabilities at their roots

    Threats have humans as an initiating factor. Either a malicious programmer or a programmer with good intention who makes a mistake is enough to initiate the exploitation cycle.

    The Security paranoia game you didn’t know you are playing…but you have already lost

    If you are security paranoid, your security is either poor, endangered, imperiled OR safe and protected. It depends how you define the term paranoia.

    Do not read this… It is a secret

    Mystery activates the drive in your mind. This is just one of the techniques hackers use. They trigger your psychology with social engineering. You cannot imagine how good they are at the art of deception

    An encrypted message to governments

    Stop looking at the back-door. In the light of so many exposures regarding mass surveillance acts and so many twisted protection hidden deals which always turn against the ones you are supposed to protect, If you want to solve the cyber terrorism problem how about asking security experts?

    You are predictable

    Why are you so predictable? Solutions start with stating the facts and the fact is that: You are predictable.

    Business secret protection codes

    Do you need the secret protection codes for your business? Cyber security always feels like a mystery that can’t be solved when in reality good security is built on simple easy to decode processes that will protect your business.

    How to protect yourself from Ransomware

    If you want to protect yourself and your business from WannaCry ransomware at least do the following immediately

    Passwords: When the Rules are not working anymore make new ones!

    This explosion of passwords use in combination to outrageous rules makes people confused, frustrated, not able to understand how to do it right and the most important from all, not secured. Yes that’s right; even if you follow all the rules around password setting you are not secured.

    Passwords. You know how to? Statistics say you don’t!

    If a day is dedicated worldwide to passwords it must be because passwords are very important. Right? Since the dawn of the Internet passwords remain the first point of attack and for good reason.

    Password day 2017! Tips OR Solution? Your choice.

    Can your passwords cover all of your needs and requirements? Welcome to a new era where YOU BECOME the strongest link to your security.

    The roots to your security problem

    Cyber attacks: Let’s examine their roots! Cyber attacks are exponentially increasing with time. There are several types of threats that can be initiated by our adversaries and day by day they increase in volume, severity and impact.

    Almost there!

    Get An Insider Information On Threats & Solutions.

     

    This form collects information we will use to send you free resources & updates about promotions, special offers, and news. 

    We promise to keep your name and email address safe.You can unsubscribe at any time.

    For more info you can read our Privacy Policy.

    You have Successfully Subscribed!

    Eliminate Dangers Related To Social Media!

    [it's 100% FREE]

     

    You have Successfully Subscribed!

    Eliminate Dangers Related To Social Media!

    [it's 100% FREE]

     

    Done!