Skip to content
CyberNorth
  • #CyberNorth
  • Home
  • News
  • About
  • Training
    • CyberAkuten
    • SÄKRA KORT
    • SÄKANO
    • Instance Lab
    • Riskify
Search
CyberNorth
Close menu
  • #CyberNorth
  • Home
  • News
  • About
  • Training
    • CyberAkuten
    • SÄKRA KORT
    • SÄKANO
    • Instance Lab
    • Riskify
CyberNorth
Search Toggle menu

Author: Laura Palovuori

13/07/202003/07/2020News

If you are charging your device from a USB connection in a foreign location, do not allow data transfer

do not allow data transfer

If you are charging your device from a USB connection in a foreign location, do not allow data transfer. Jos lataat laitteesi […]

06/07/202031/07/2020News

Banks or IT managers never ask for a password via email or phone

Phising

Phishing can be difficult to distinguish from a real login page. Don’t rush. Avoid clicking email links that provide  a login page […]

29/06/202024/07/2020News

Do not pay an invoice until you verify the request

It is easy pretend to be somebody else in social media. Do not borrow money or pay an invoice until you verify […]

22/06/202003/07/2020News

Do not connect a foreign USB to your computer

“Would you please print this document for me”. -Do not connect a foreign USB to your computer. It may contain malware that […]

17/06/202017/06/2020News

Vote for Cynic

Now it´s possible to vote for our wonderful project on: https://regiostarsawards.eu/ You can find it under Skills & Education for a digital […]

15/06/202031/07/2020News

Think about what you share on social media

Think about what you share on social media. Don’t tell about your travel plans. A burglar can visit you while you are […]

05/06/202031/07/2020News

A black hat who never wins

A VPN, or Virtual Private Network, encrypts information between a computer, cell phone, or tablet and a service. VPN protects the content […]

15/05/2020News, Technology

Data Security expertise is shared across borders

A Finnish expert tested how the website of a Swedish company selling office software survived “hacking” – An example of cross-border cooperation […]

11/05/202019/05/2020News

Information risk management in the digitalization of SMEs by Sara Carlsson

Data security is not just about technology. Most of the data security depends on the company’s personnel and communications. Therefore, it would […]

06/05/2020News

Stay safe in your home office!

People who never before worked from home are doing it now in large scale. This creates good “market place” for cyber criminals. […]

Posts pagination

< 1 … 3 4 5 >

Recent News

  • ISSUES – Popular report 2023-2025
  • Cybersecurity First Aid Clinic: Bridging the Gap Between Experts and Everyday Users
  • Students as the new cyber targets
  • Digital Skimming is Evolving
  • Webinar on How the Cyber Resilience Act Will Shape Product Security

CyberNorth.se

  • #CyberNorth
  • Home
  • News
  • About
  • Training
    • CyberAkuten
    • SÄKRA KORT
    • SÄKANO
    • Instance Lab
    • Riskify
© 2026 CyberNorth. Proudly powered by Sydney