Your
Security Boost
DEMYSTIFY SECURITY – SIMPLIFY PROTECTION
STRATEGIC ADVICE
Εισαγωγη στον Υβριδικο Πολεμο
Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.
The article is hosted at the Simerini Newspaper.
…
An Ancient Greek Philosophy at the Heart of a Novel Approach to Cyber Security
Master your business protection with this refreshingly novel approach to Cyber Security.
The article is hosted at the Cyprus Business School Blog page.
…
Εισαγωγη στον Υβριδικο Πολεμο
Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.
The article is hosted at the Simerini Newspaper.
…
Η επομενη γενια ασφαλειας
Security Manager Magazine – Κεντρικό θέμα Τεύχος 102. H νέα αποτελεσματική προσέγγιση για ένα δυναμικά μεταβαλλόμενο περιβάλλον επιθέσεων & κυβερνο-πολέμου.
…
HUMAN SHIELDING TM
This research paper covers the behavioural security framework called “Human ShieldingTM”. The methodology is the intellectual property of Yiota Nicolaidou.
…
Συστηματα Διαχειρισης και Προσβασης Εισοδου
Security Manager Magazine – Κεντρικό θέμα Τεύχος 84. Το άρθρο πραγματεύεται το συστατικό επιτυχημένης προστασίας για τα συστήματα διαχείρισης και πρόσβασης εισόδου.
…
Prominent changes in the trajectory of the Cyber-security space Part 2
In the previous episode we have covered six of the twelve prominent changes in the trajectory of the cyber-security space.
Prominent changes in the trajectory of the Cyber-security space Part 1
I am certain you have all noticed that there are some changes around us affecting the way the world is formed recently.
…
The four forces behind cyber-security collapse
Cyber-security is collapsing and here are the four forces which are causing this to happen.
…
Security planning for 2019 Part 3
The third part of a three-part series about how the security levels of your business depend on your business cycle stage.
…
Security planning for 2019 Part 2
The second part of a three-part series about how the security levels of your business depend on your business cycle stage.
…
Security planning for 2019 Part 1
The first part of a three-part series about how the security levels of your business depend on your business cycle stage.
…
THE SELF-MADE PROTECTOR - THE EMERGENCE OF HUMAN SECURITY
The latest trend in security which is your ability to protect yourself. The emergence of human protection.
…
What are the areas your business should invest in to progress and succeed in 2019
The 8 areas you should focus on investing for your business growth in 2019. The seven are included in Tony Robbins Business Mastery and the 8th…
…
Your protection spheres
How much in tune or out of tune your protection spheres are? Your protection spheres refer to your security influences and their impact for you.
…
How to write the best security script to follow - Why your business needs security policies & procedures
Protection manual: What are the basic components of an effective security script and its benefits for an organization or an individual.
…
The scale effect – compounding protection
The other day… And I though that’s it. That is the angle I am looking for to present the concept of compounding protection to you.
…
Your assets Island - Your effective protection Security management team
Introducing the key players for your personal and professional protection.
…
The key component of effective protection – Your “protection sweet spot”
Perfectionism is a nasty thing as it is wasting valuable time and cognitive energy we could direct to something else and create more success
…
Your Security Energy Tank
As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.
…
The 3 habits every CEO, decision maker, investor, politician and VIP should know
Each case I am evaluating is unique. However, I found some similarities
…
The benefits of becoming unpredictable to cyber-criminals.
Being unpredictable for cyber-criminals is perfect for three reasons
…
Picking the Cyber Criminal Mind
A friend of mine asked me: “Is it scary to have a criminal mind?” In order to answer this question, I have to define what the criminal mind is
…
An ancient Greek philosophy – the novel approach to Cyber Security
The definition I like most about stoicism is given by Tim Ferriss. According to Mr. Ferriss, stoicism is considered a means of mental toughness training
…
The hidden dangers of our protection technology PART 3 – Understanding the Human Psychology
In this article I am going to a different indication factor which is not that obvious; human psychology. The Familiarity Factor
…
The hidden dangers of our protection technology PART 2- Understanding the threat probability
In the previous article I mentioned several scenarios that can transform widely used protection software like an antivirus into an attack station and what you need to know in order to decide on your security measures and controls. Now it is time to evaluate the likelihood of them happening.
…
The hidden dangers of our protection technology PART 1: Understanding Threat Mechanics
How to defuse vulnerabilities at their roots
Threats have humans as an initiating factor. Either a malicious programmer or a programmer with good intention who makes a mistake is enough to initiate the exploitation cycle.
…
You are predictable
Why are you so predictable? Solutions start with stating the facts and the fact is that: You are predictable.
…
The roots to your security problem
Cyber attacks: Let’s examine their roots! Cyber attacks are exponentially increasing with time. There are several types of threats that can be initiated by our adversaries and day by day they increase in volume, severity and impact.
…
Bringing needle-moving, highly actionable resources and smart strategies to help you demystify security and simplify protection right to your inbox. You in?

BECOME AN YN INSIDER
Sign up for exclusive content, emails & things Yiota doesn’t share anywhere else.
By entering your info, you’ll become an YN Insider – with FREE access to exclusive insights, private Q+As, and expert tips of Yiota, delivered with 💜 to your inbox. (Unsub anytime in a click.) You also agree to our Site Terms and Privacy Policy.