Your 

Security Boost

DEMYSTIFY SECURITY – SIMPLIFY PROTECTION

STRATEGIC ADVICE

PROTECTION TIPS SHOPPING ONLINE

Εισαγωγη στον Υβριδικο Πολεμο

Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.

The article is hosted at the Simerini Newspaper.

PROTECTION TIPS SHOPPING ONLINE

An Ancient Greek Philosophy at the Heart of a Novel Approach to Cyber Security

Master your business protection with this refreshingly novel approach to Cyber Security.

The article is hosted at the Cyprus Business School Blog page.

PROTECTION TIPS SHOPPING ONLINE

Εισαγωγη στον Υβριδικο Πολεμο

Hybrid warfare has traditionally been associated with the military realm, but in recent years it has evolved to impact even seemingly unrelated organizations, including businesses.

The article is hosted at the Simerini Newspaper.

PROTECTION TIPS SHOPPING ONLINE

Η επομενη γενια ασφαλειας

Security Manager Magazine – Κεντρικό θέμα Τεύχος 102. H νέα αποτελεσματική προσέγγιση για ένα δυναμικά μεταβαλλόμενο περιβάλλον επιθέσεων & κυβερνο-πολέμου.

PROTECTION TIPS SHOPPING ONLINE

HUMAN SHIELDING TM

This research paper covers the behavioural security  framework called “Human ShieldingTM”.  The methodology is the intellectual property of Yiota Nicolaidou.

PROTECTION TIPS SHOPPING ONLINE

Συστηματα Διαχειρισης και Προσβασης Εισοδου

Security Manager Magazine – Κεντρικό θέμα Τεύχος 84. Το άρθρο πραγματεύεται το συστατικό επιτυχημένης προστασίας για τα συστήματα διαχείρισης και πρόσβασης εισόδου.

PROTECTION TIPS SHOPPING ONLINE

Prominent changes in the trajectory of the Cyber-security space Part 2

In the previous episode we have covered six of the twelve prominent changes in the trajectory of the cyber-security space.

PROTECTION TIPS SHOPPING ONLINE

Prominent changes in the trajectory of the Cyber-security space Part 1

I am certain you have all noticed that there are some changes around us affecting the way the world is formed recently. 

PROTECTION TIPS SHOPPING ONLINE

The four forces behind cyber-security collapse

Cyber-security is collapsing and here are the four forces which are causing this to happen.

PROTECTION TIPS SHOPPING ONLINE

Security planning for 2019 Part 3

The third part of a three-part series  about how the security levels of your business depend on your business cycle stage.

PROTECTION TIPS SHOPPING ONLINE

Security planning for 2019 Part 2

The second part of a three-part series  about how the security levels of your business depend on your business cycle stage.

PROTECTION TIPS SHOPPING ONLINE

Security planning for 2019 Part 1

The first part of a three-part series  about how the security levels of your business depend on your business cycle stage.

PROTECTION TIPS SHOPPING ONLINE

THE SELF-MADE PROTECTOR - THE EMERGENCE OF HUMAN SECURITY

The latest trend in security which is your ability to protect yourself. The emergence of human protection.

What are the areas your business should invest in to progress and succeed in 2019

The 8 areas you should focus on investing for your business growth in 2019. The seven are included in Tony Robbins Business Mastery and the 8th…

Your protection spheres

How much in tune or out of tune your protection spheres are? Your protection spheres refer to your security influences and their impact for you.

PROTECTION TRENDS 2018

How to write the best security script to follow - Why your business needs security policies & procedures

Protection manual: What are the basic components of an effective security script and its benefits for an organization or an individual.

The scale effect – compounding protection

The other day… And I though that’s it. That is the angle I am looking for to present the concept of compounding protection to you.

PROTECTION TRENDS 2018

Your assets Island - Your effective protection Security management team

Introducing the key players for your personal and professional protection.

The key component of effective protection – Your “protection sweet spot”

Perfectionism is a nasty thing as it is wasting valuable time and cognitive energy we could direct to something else and create more success

PROTECTION TRENDS 2018

Your Security Energy Tank

As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.

The 3 habits every CEO, decision maker, investor, politician and VIP should know

Each case I am evaluating is unique. However, I found some similarities

The benefits of becoming unpredictable to cyber-criminals.

Being unpredictable for cyber-criminals is perfect for three reasons

Picking the Cyber Criminal Mind

A friend of mine asked me: “Is it scary to have a criminal mind?” In order to answer this question, I have to define what the criminal mind is

An ancient Greek philosophy – the novel approach to Cyber Security

The definition I like most about stoicism is given by Tim Ferriss. According to Mr. Ferriss, stoicism is considered a means of mental toughness training

The hidden dangers of our protection technology PART 3 – Understanding the Human Psychology

In this article I am going to a different indication factor which is not that obvious; human psychology. The Familiarity Factor

The hidden dangers of our protection technology PART 2- Understanding the threat probability

In the previous article I mentioned several scenarios that can transform widely used protection software like an antivirus into an attack station and what you need to know in order to decide on your security measures and controls. Now it is time to evaluate the likelihood of them happening.

The hidden dangers of our protection technology PART 1: Understanding Threat Mechanics

In light of the recent announcement about the “Double agent” vulnerability method people are getting really confused. Clients have been asking me: Should I use antivirus software?

How to defuse vulnerabilities at their roots

Threats have humans as an initiating factor. Either a malicious programmer or a programmer with good intention who makes a mistake is enough to initiate the exploitation cycle.

You are predictable

Why are you so predictable? Solutions start with stating the facts and the fact is that: You are predictable.

The roots to your security problem

Cyber attacks: Let’s examine their roots! Cyber attacks are exponentially increasing with time. There are several types of threats that can be initiated by our adversaries and day by day they increase in volume, severity and impact.

Bringing needle-moving, highly actionable resources and smart strategies to help you demystify security and simplify protection right to your inbox. You in?

BECOME AN YN INSIDER

Sign up for exclusive content, emails & things Yiota doesn’t share anywhere else.

By entering your info, you’ll become an YN Insider – with FREE access to exclusive insights, private Q+As, and expert tips of Yiota, delivered with 💜 to your inbox. (Unsub anytime in a click.) You also agree to our Site Terms and Privacy Policy.