06/07/202031/07/2020News Banks or IT managers never ask for a password via email or phone Phishing can be difficult to distinguish from a real login page. Don’t rush. Avoid clicking email links that provide a login page […]
29/06/202024/07/2020News Do not pay an invoice until you verify the request It is easy pretend to be somebody else in social media. Do not borrow money or pay an invoice until you verify […]
22/06/202003/07/2020News Do not connect a foreign USB to your computer “Would you please print this document for me”. -Do not connect a foreign USB to your computer. It may contain malware that […]
15/06/202031/07/2020News Think about what you share on social media Think about what you share on social media. Don’t tell about your travel plans. A burglar can visit you while you are […]
05/06/202031/07/2020News A black hat who never wins A VPN, or Virtual Private Network, encrypts information between a computer, cell phone, or tablet and a service. VPN protects the content […]
15/05/2020News, Technology Data Security expertise is shared across borders A Finnish expert tested how the website of a Swedish company selling office software survived “hacking” – An example of cross-border cooperation […]
11/05/202019/05/2020News Information risk management in the digitalization of SMEs by Sara Carlsson Data security is not just about technology. Most of the data security depends on the company’s personnel and communications. Therefore, it would […]
03/03/202009/03/2020CyberNorth, Interreg NORD, Uncategorized #CyberNorth The risk of being exposed to digital threats increases at the same time as the threats have changed shape. From the hacker […]