News

Do not pay an invoice until you verify the request

Posted on

It is easy pretend to be somebody else in social media. Do not borrow money or pay an invoice until you verify the request.   I sociala media kan man lätt låtsas vara en annan person. Låna inte ut pengar eller betala inte en räckning utan att ha dubbelkollat informationen.   Sosiaalisessa mediassa voi helposti […]

News

Do not connect a foreign USB to your computer

Posted on

“Would you please print this document for me”. -Do not connect a foreign USB to your computer. It may contain malware that steals your personal information. “Olisitko kiltti ja tulostaisit tämän dokumentin minulle”. -Älä kytke vierasta USB-tikkua koneeseesi. Se voi sisältää haittaohjelman, joka varastaa henkilökohtaiset tietosi. “Kan du skriva ut en dokument åt mig”. -Anslut […]

News

Think about what you share on social media

Posted on

Think about what you share on social media. Don’t tell about your travel plans. A burglar can visit you while you are away. Mieti, mitä jaat sosiaalisessa mediassa. Älä kerro matkasuunnitelmistasi. Murtovaras voi yllättää, kun olet poissa. (Cartoon in Finnish here) (In English:) Illustrator: Sara Kåll-Fröjdö

News

A black hat who never wins

Posted on

A VPN, or Virtual Private Network, encrypts information between a computer, cell phone, or tablet and a service. VPN protects the content of messages from spionage when using public WiFi connections. (In Finnish in the end of this page). I am proud to present a totally new series of comic strips The author´s name is […]

News

Data Security expertise is shared across borders

Posted on

A Finnish expert tested how the website of a Swedish company selling office software survived “hacking” – An example of cross-border cooperation Hacking is an art form that requires, above all, imagination. It all depends on what the potential intruder comes up with. Of course, the internet is full of instructions and programs, but skills […]

CyberNorth

#CyberNorth

Posted on

The risk of being exposed to digital threats increases at the same time as the threats have changed shape. From the hacker and an interest in over-listing techniques to a criminal industry to make money. When the payment requirements will be sent, the question is how you become more aware of the risks and how […]