SECURITY BLOG
Υβριδικός Πόλεμος: Η εργαλειοθήκη των σκανδάλων
Hybrid warfare involves a range of tactics, including the use of scandals. Whether authentic or manufactured, personal scandals can be leveraged to impact a country’s global reputation.
The article is hosted at the Simerini Newspaper.
…
Εισαγωγη στον Υβριδικο Πολεμο
Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.
The article is hosted at the Simerini Newspaper.
…
An Ancient Greek Philosophy at the Heart of a Novel Approach to Cyber Security
Master your business protection with this refreshingly novel approach to Cyber Security.
The article is hosted at the Cyprus Business School Blog page.
…
HUMAN SHIELDING TM
This research paper covers the behavioural security framework called “Human ShieldingTM”. The methodology is the intellectual property of Yiota Nicolaidou.
…
Η επομενη γενια ασφαλειας
Security Manager Magazine – Κεντρικό θέμα Τεύχος 102. H νέα αποτελεσματική προσέγγιση για ένα δυναμικά μεταβαλλόμενο περιβάλλον επιθέσεων & κυβερνο-πολέμου.
…
Συστηματα Διαχειρισης και Προσβασης Εισοδου
Security Manager Magazine – Κεντρικό θέμα Τεύχος 84. Το άρθρο πραγματεύεται το συστατικό επιτυχημένης προστασίας για τα συστήματα διαχείρισης και πρόσβασης εισόδου.
…
The Capital One hack initiates a chain reaction for other major companies & showcases the trend we should expect; high-profile hacks
It is considered the greatest hack after the Equifax hack and it is shaking big corporations after the latest Facebook penalties.
…
The $5 billion Facebook fine LESSON to all businesses about privacy violations (GDPR & US regulations)
Let’s talk about Privacy regulations, fines & lessons to be learned…
Elon Musk's Neuralink implant will "merge" humans with AI– “Brain hack” closer than ever before
Let’s challenge Neuralink’s protection from potential serious security concerns which may arise.
Personal, Professional & National Protection Strategy – RIK Interview
An interview from RIK – Saskia Unreserved
Another 6 ways to feel and be safe at home
Learn 6 more handy ways to both, feel safe as well as be safe and home
6 ways to feel and be safe at home
Learn 6 handy ways to both, feel safe as well as be safe and home
8 ways to feel and be safe on the go
Life has become so busy that we interact and communicate in so many ways both online and offline.
What chance do I have to protect my valuable assets when the hacker is smarter than me?
I get to hear this question all the time at the Security Awareness” seminars I deliver for business decision makers.
Prominent changes in the trajectory of the Cyber-security space Part 2
In the previous episode we have covered six of the twelve prominent changes in the trajectory of the cyber-security space.
Prominent changes in the trajectory of the Cyber-security space Part 1
I am certain you have all noticed that there are some changes around us affecting the way the world is formed recently.
…
The four forces behind cyber-security collapse
Cyber-security is collapsing and here are the four forces which are causing this to happen.
…
Security planning for 2019 Part 3
The third part of a three-part series about how the security levels of your business depend on your business cycle stage.
…
Security planning for 2019 Part 2
The second part of a three-part series about how the security levels of your business depend on your business cycle stage.
…
Security planning for 2019 Part 1
The first part of a three-part series about how the security levels of your business depend on your business cycle stage.
…
What are the areas your business should invest in to progress and succeed in 2019
The 8 areas you should focus on investing for your business growth in 2019. The seven are included in Tony Robbins Business Mastery and the 8th…
…
THE SELF-MADE PROTECTOR - THE EMERGENCE OF HUMAN SECURITY
The latest trend in security which is your ability to protect yourself. The emergence of human protection.
…
Protection holidays mode ON
It’s Christmas time and is it is also the time to set up and enable your holiday protection mode. Here are three tips to get you started.
…
Tips for shopping online securely
How to shop online securely this holiday season. Tips to enjoy your holiday shopping and avoid cyber-criminals in the process.
…
One simple and cheap tool in your protection arsenal with triple action & capabilities
I always talk about secure behaviors but rarely about tools. Well today I want to make an exception because my message is not to avoid tools.
…
Your protection spheres
How much in tune or out of tune your protection spheres are? Your protection spheres refer to your security influences and their impact for you.
…
How to write the best security script to follow - Why your business needs security policies & procedures
Protection manual: What are the basic components of an effective security script and its benefits for an organization or an individual.
…
Security Overload and how to overcome it
Do you ever feel like you have so, many things to do and time is running out? It is a common feeling for overachievers
…
Your assets Island - Your effective protection Security management team
Introducing the key players for your personal and professional protection.
…
The scale effect – compounding protection
The other day… And I though that’s it. That is the angle I am looking for to present the concept of compounding protection to you.
…
A protection hack all successful people apply to make a new habit stick
The EASE – REPEAT technique which you can apply to create habits that can stick with you; whether they are security related or not
…
A protection hack all successful people apply to succeed more and be more productive every day
What if I tell you that today I will teach a technique which you can apply to succeed more and be more productive every day!
…
Your Security Energy Tank
As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.
…
How much security is enough security?
I am often asked how much security is enough security and the answer I give is always “depending on your case”.
That is because
…
The perfect accessories for protection
Fashion week Fall 2018 and the perfect accessories for protection. Five security principles taught by the fashion industry.
…
5 More Habits of highly Successful & Protected people
The most successful people have a series of habits which are the reason they have reached success. Do you know them? Do you appy them?
…
5 Habits of successful & protected people
Success in our days goes hand in hand with protection as your assets value depends on your ability to secure & maintain them.
…
GDPR Interview - Part 7
GDPR: Your ability to control your protection
…
GDPR INTERVIEW PART 6
GDPR: Social media & Selection of the right tools
…
GDPR Interview - Part 5
Private Data & GDPR Implementation
…
GDPR INTERVIEW PART 4
GDPR Fines
…
GDPR Interview - Part 3
GDPR Compliance: Marketing Text Messages
…
GDPR INTERVIEW PART 2
Websites, Cookies & Email Marketing
…
GDPR Interview - Part 1
Understand GDPR. Know your rights and responsibilities
…
The inside job
Securing a high-stake facility has specific requirements.
…
Toxic Environment Alert
Just like when the human body is exposed to nuclear radiation it dissociates, the environment of a business can create toxicity and eventually damage the business itself.
…
The right message of Security Awareness
his is a concept that derives from questions I am often asked not only from private clients but from journalists as well.
…
The key component of effective protection – Your “protection sweet spot”
Perfectionism is a nasty thing as it is wasting valuable time and cognitive energy we could direct to something else and create more success
…
The decision which shapes your business destiny
I would like to tell you a story today as real stories manage to pass the most important messages in the most effortless way.
…
The 3 habits every CEO, decision maker, investor, politician and VIP should know
Each case I am evaluating is unique. However, I found some similarities
…
Are you really GDPR compliant? Can you afford not to be?The next day for businesses
On the 24th of May all business people waited to see what will happen by the 25th of May. Something like a dooms-day expectation feeling is in the air.
…
How to select data protection officer (DPO) for your company
Selecting the right data protection officer will make or break your GDPR compliance
…
How to select the database to comply with GDPR and protect my clients’ private data
One of the most common questions I get regarding GDPR is: What database am I “allowed” to use?
…
The benefits of becoming unpredictable to cyber-criminals.
Being unpredictable for cyber-criminals is perfect for three reasons
…
Three habits that can make or break your security (small business & entrepreneurs)
Here is one piece of advice I can give you without you spending a dime! The 3 most dangerous habits you have that can make or break your protection.
…
What are the most common locations hackers phish for unexpected victims?
Basically, cyber-criminals are everywhere. Why? Because of the internet but there are three common places hackers love to phish for their victims. Poor victims
…
You are predictable
Solutions start with stating the facts and the fact is: You are predictable.
Why this should bother you?
…
The Security paranoia game you didn’t know you were playing…yet you already lost
If you are paranoid about your security, then it is either poor and endangered or safe and protected. It depends on how you define the term “paranoia”.
…
5 ways your business is in danger of attacks during holidays
Today I’d like to share with you a non-exhaustive list of things for large or medium size companies to take care of the protection of your business during the holidays.
…
“I do not keep online data, only hard copies.” Do I still need GDPR compliance?
Lately, many people approach me asking questions related to GDPR. I understand the confusion about the new regulations
…
Business protection blocking rats you live with
Are you aware of the security threats you are exposed to when working from home? Today’s article is covering the 3 major risks for anyone working from home.
…
The Trojan horse of protection. The constant factor keeping you unprotected long-term is just a myth. Do you still believe it?
It is really fascinating to see how many myths and lies there are around cyber-security. Yet the worst of them is their impact
…
The best protection advice you will ever get
It is interesting how powerful a piece of advice can be to completely change our beliefs and actions for the best.
…
GDPR Basics by example
Do you remember the saying: bury your head in the sand? Guess what. This is not a good strategy, as GDPR will not go away.
…
The 10 most dangerous mistakes entrepreneurs and small size businesses make about their security
You will be surprised how basic these mistakes are and how you could easily avoid them.
…
The 10 most dangerous cyber-security mistakes big corporations make about their security
Even big corporations make mistakes regarding their security levels. Here are the 10 worst of those mistakes.
…
Encryption is not the barrier to fight cyber-criminals. There are other solutions.
From time to time governments are discussing about banning encryption but encryption is not the barrier to fight cyber-criminals.
…
How you can understand the real facts behind an attack
If you believe that someone is not professional enough if they got hacked, you are mistaken.
…
Solving the cyber-security Gordian Knot
In the Kingdom of all Kings in Phrygia, there was the Gordian Carriage devoted to the God Dias, Greek word for Zeus and Sabazios for Phrygians
…
What data is really important? Understanding the first principle of GDPR.
About six months ago, I got a call from a business owner in Germany. She was really upset about her safety but the interesting part was why
…
Picking the Cyber Criminal Mind
A friend of mine asked me: “Is it scary to have a criminal mind?” In order to answer this question, I have to define what the criminal mind is
…
Is the protection of your business in a coma state?
Businesses operate in a risky environment, but there is a difference between a well calculated risk and sky-diving without a parachute.
…
An ancient Greek philosophy – the novel approach to Cyber Security
The definition I like most about stoicism is given by Tim Ferriss. According to Mr. Ferriss, stoicism is considered a means of mental toughness training
…
What children can teach us about security
Everything is possible. And this is the philosophy, I’m living by: everything is possible, if you deeply want it
…
Could your summer holidays put your business in danger of cyber and physical attacks?
Summer is here and for many businesses August is the official month for holidays. What about your businesses’ well-being? Have you prepared it for the holidays?
…
The hidden dangers of our protection technology PART 3 – Understanding the Human Psychology
In this article I am going to a different indication factor which is not that obvious; human psychology. The Familiarity Factor
…
The hidden dangers of our protection technology PART 2- Understanding the threat probability
In the previous article I mentioned several scenarios that can transform widely used protection software like an antivirus into an attack station and what you need to know in order to decide on your security measures and controls. Now it is time to evaluate the likelihood of them happening.
…
The hidden dangers of our protection technology PART 1: Understanding Threat Mechanics
How to defuse vulnerabilities at their roots
Threats have humans as an initiating factor. Either a malicious programmer or a programmer with good intention who makes a mistake is enough to initiate the exploitation cycle.
…
The Security paranoia game you didn’t know you are playing…but you have already lost
Do not read this… It is a secret
Mystery activates the drive in your mind. This is just one of the techniques hackers use. They trigger your psychology with social engineering. You cannot imagine how good they are at the art of deception
…
An encrypted message to governments
Stop looking at the back-door. In the light of so many exposures regarding mass surveillance acts and so many twisted protection hidden deals which always turn against the ones you are supposed to protect, If you want to solve the cyber terrorism problem how about asking security experts?
…
You are predictable
Why are you so predictable? Solutions start with stating the facts and the fact is that: You are predictable.
…
Business secret protection codes
Do you need the secret protection codes for your business? Cyber security always feels like a mystery that can’t be solved when in reality good security is built on simple easy to decode processes that will protect your business.
…
How to protect yourself from Ransomware
If you want to protect yourself and your business from WannaCry ransomware at least do the following immediately
…
Passwords: When the Rules are not working anymore make new ones!
This explosion of passwords use in combination to outrageous rules makes people confused, frustrated, not able to understand how to do it right and the most important from all, not secured. Yes that’s right; even if you follow all the rules around password setting you are not secured.
…
Passwords. You know how to? Statistics say you don’t!
If a day is dedicated worldwide to passwords it must be because passwords are very important. Right? Since the dawn of the Internet passwords remain the first point of attack and for good reason.
…
Password day 2017! Tips OR Solution? Your choice.
Can your passwords cover all of your needs and requirements? Welcome to a new era where YOU BECOME the strongest link to your security.
…
The roots to your security problem
Cyber attacks: Let’s examine their roots! Cyber attacks are exponentially increasing with time. There are several types of threats that can be initiated by our adversaries and day by day they increase in volume, severity and impact.
…