News

Do not pay an invoice until you verify the request

Posted on

It is easy pretend to be somebody else in social media. Do not borrow money or pay an invoice until you verify the request.   I sociala media kan man lätt låtsas vara en annan person. Låna inte ut pengar eller betala inte en räckning utan att ha dubbelkollat informationen.   Sosiaalisessa mediassa voi helposti […]

News

Do not connect a foreign USB to your computer

Posted on

“Would you please print this document for me”. -Do not connect a foreign USB to your computer. It may contain malware that steals your personal information. “Olisitko kiltti ja tulostaisit tämän dokumentin minulle”. -Älä kytke vierasta USB-tikkua koneeseesi. Se voi sisältää haittaohjelman, joka varastaa henkilökohtaiset tietosi. “Kan du skriva ut en dokument åt mig”. -Anslut […]

News

Vote for Cynic

Posted on

Now it´s possible to vote for our wonderful project on: https://regiostarsawards.eu/ You can find it under Skills & Education for a digital Europe for a digital Europe header. Let’s activate our contacts to provide win for us. Please share! CYNIC Sweden, Finland The CYNIC project is contributing to an increase in digital services by providing […]

News

Think about what you share on social media

Posted on

Think about what you share on social media. Don’t tell about your travel plans. A burglar can visit you while you are away. Mieti, mitä jaat sosiaalisessa mediassa. Älä kerro matkasuunnitelmistasi. Murtovaras voi yllättää, kun olet poissa. (Cartoon in Finnish here) (In English:) Illustrator: Sara Kåll-Fröjdö

News

A black hat who never wins

Posted on

A VPN, or Virtual Private Network, encrypts information between a computer, cell phone, or tablet and a service. VPN protects the content of your internet traffic from attackers when using public when using public WiFi connections. (In Finnish in the end of this page). I am proud to present a totally new series of comic […]

News

Data Security expertise is shared across borders

Posted on

A Finnish expert tested how the website of a Swedish company selling office software survived “hacking” – An example of cross-border cooperation Hacking is an art form that requires, above all, imagination. It all depends on what the potential intruder comes up with. Of course, the internet is full of instructions and programs, but skills […]

News

Rethinking capabilities in information security risk management

Posted on

The latest article in CYNIC-project is now published: Rethinking capabilities in information security risk management: a systematic literature review Abstract: Information security risk management capabilities have predominantly focused on instrumental onsets, while largely ignoring the underlying intentions and knowledge these management practices entail. This article aims to study what capabilities are embedded in information security […]