News

Data Security expertise is shared across borders

Posted on

A Finnish expert tested how the website of a Swedish company selling office software survived “hacking” – An example of cross-border cooperation Hacking is an art form that requires, above all, imagination. It all depends on what the potential intruder comes up with. Of course, the internet is full of instructions and programs, but skills […]

News

Rethinking capabilities in information security risk management

Posted on

The latest article in CYNIC-project is now published: Rethinking capabilities in information security risk management: a systematic literature review Abstract: Information security risk management capabilities have predominantly focused on instrumental onsets, while largely ignoring the underlying intentions and knowledge these management practices entail. This article aims to study what capabilities are embedded in information security […]

News

Stay safe in your home office!

Posted on

People who never before worked from home are doing it now in large scale. This creates good “market place” for cyber criminals. A lecturer Joni Jämsä told to audience – in their home offices – how to recognize phishing attacks, kryptolocker and a lot more. The scary thing is, that you may be unaware that […]

Ukategorisert

Interreg Nord Conference – Borderless opportunities for Sápmi

Posted on

Last week representatives from the CYNIC-project participated in the Interreg Nord Conference –  Borderless opportunities for Sápmi During the two days Interreg informed about the “Future of Interreg” since the programme period is about to end and new objectives and also functional areas was presented by the European Commission. Due to the extraordinary situation in […]

News

Cynic-playing cards are now available in Finnish too!

Posted on

The Cynic project is doing cross border co-operation. The playing cards have been translated into Finnish. Have fun learning the basics of data security. Good practices and awareness are the keywords In the game, you have a company that needs to be secured. You have to fight against data security threats. What do you do […]

CyberNorth

#CyberNorth

Posted on

The risk of being exposed to digital threats increases at the same time as the threats have changed shape. From the hacker and an interest in over-listing techniques to a criminal industry to make money. When the payment requirements will be sent, the question is how you become more aware of the risks and how […]