Get your brain in motion

Tag: Cybersecurity (Page 1 of 2)

Would you give away your home keys to some random stranger? I bet not. Curiously enough, when it comes to internet personal security, people usually lower their guard, thus giving possibility to malwares, Trojans or identity thieves to have access to private data. Justin Schuh, one of the top Google’s information security engineers, here explains in five simple tips how to sensibly reduce risk of infection while surfing on the internet.

Because, as Jodi Rell once stated: “at the end of the day, the goals are simple: safety and security”

Never lower your guard

Image source: Bykst  (CC0 1.0)

Cybersecurity: Trust No One

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of December the attention is drawn on “Trust No One

Diplocalendar2014_Page_26Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Social Media

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of November the attention is drawn on “Social Media

Diplocalendar2014_Page_24Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Encryption

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of October the attention is drawn on “Encryption

Diplocalendar2014_Page_22Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Passwords

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For this month the attention is drawn on “Passwords

Diplocalendar2014_Page_04Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Flash Memory

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of August the attention is drawn on “Flash Memory

Diplocalendar2014_Page_18Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Downloads

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of July the attention is drawn on “Downloads

Diplocalendar2014_Page_16Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Backup

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of June the attention is drawn on “Backup

Diplocalendar2014_Page_14Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Synchronisation

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of May the attention is drawn on “Synchronisation

Diplocalendar2014_Page_12Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Phishing

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of March the attention is drawn on “Phishing

Diplocalendar2014_Page_10Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare.

« Older posts