News

Anna Sarri from Enisa: SMEs are Facing Major Cybersecurity challenges

Posted on
Cyber security expert Anna Sarri from the European Union Agency for Cybersecurity, ENISA

It was a pleasure to have a cyber security expert Anna Sarri from the European Union Agency for Cybersecurity, ENISA speaking in our Cynic-webinar Cyber Security Awareness – Insights from ENISA on 7th of December. Already for 15 years, the EU Agency for Cybersecurity has been pushing forward cybersecurity initiatives to help small and medium-sized […]

News

Size doesn´t matter when talking about cyber security

Posted on
In this picture there is a box with a text Medium sizes an ad a box with text micro and small sized. And these rerfers to companies of different size.

Due to increased digitalization particularly, small companies became targeted by cybercriminals. Micro-enterprises may face the challenge of identifying and responding to threats due to lack of resources. Small businesses may have less ability to identify cyber threats and have less secure computer networks. Financial resources are also often met in expensive cybersecurity investments. However, risk […]

Event

Webinar: Kubernetes and cloud-native patterns 18.11.2021

Posted on
Containers and Kubernetes

Today there’s a lot of buzz around containers, Kubernetes and cloud-native, but what is it actually all about? What kind of benefits could your company get from adopting cloud-native technologies like Kubernetes, Docker or Prometheus? What is GitOps and how could it help standardize your technology stack and reduce mean time to recovery when (not […]

News

Vi behöver regler

Posted on

System baserade på artificiell intelligens (AI) bemannar redan våra larmcentraler, tar emot beställningar på snabbmatsrestauranger och hjälper till och med att köra våra bilar. Den artificiella intelligensen blir hela tiden mera framstående och den tar numera hand om åtskilliga sysslor i vårt samhälle. AI gör mycket gott, men när vi överlämnar allt mer av våra […]

News

Phishing affects us all

Posted on
This attachment opened a somewhat authentic looking Microsoft login page that had the targets email address already filled

An email that contains a link or an attachment is sent to the recipient with the purpose of retrieving data by directing the user to some fake web page on the internet, or by executing a malicious code from an attachment. Phishing campaigns often use the same formula. An email that contains a link or […]

News

A password is just like your house key

Posted on

Information security and data protection are usually concern that are emphasized in the corporate world. However, working from home increases the need for common rules for all the family; digitalization is reaching out to everyday life, homes and schools. Cyber security expert Helinä Turunen from the Finnish Transport and Communications Agency’s Cyber ​​Security Center is […]