Topics of Our Exercises

A chaotic desktop is a gold mine for the malicious attackers. We can talk about the physical desk or desktop at your computer as well. How can an attacker use your documents, notes, written passwords to an attack? We help you to understand the importance of transparency.

Nowadays, people have their own devices (laptop, smartphones,
tablets, etc.) and they want to use them at work too. The management of the different devices and platforms might be a huge challenge for most of the companies. Synergy is the key at this point both sides have to understand the other.

If you rent a house, the landlord may have a key to access the building, but he/she does not have authority to your private things. This is the same in the digital world. The systems are the apartments, and your data is your private belonging. EU just came out with a regulation of data protection, but to understand it and to be compliant needs practice.

One infected USB stick could cause substantial damage to even a country’s nuclear program. Removable device handling is a critical point from cybersecurity perspective in all companies’ life. Companies can have the best controls of it, but users will find a way to by-pass them. They need to understand the seriousness of it and learn to act accordingly.

We all know a person whose computer is always slow and all the time something strange happens with the device. Most of the time the reason behind is bad, unsafe and irresponsible internet habits. The good news is that there are several simple, easy to use, but effective steps that can help those friends. How to use VPN and sandbox? Where to click and where not? From where and what to download? We can scale up the relevant knowledge with this training.

Even when we talk about the threats of the digital world, we cannot pass by the physical security issues. Industrial spies, ad-hoc thieves sometimes do not spend time with password cracking or other time-consuming hacking techniques. They just enter the building and steal information and other values. With our dedicated trainings you can prepare against different social engineering techniques that are well known and used by malicious actors.

The smart devices like TVs, watches, lighting, security cameras and routers in smart homes and offices are not secure by design. Even so they are connected to the internet and most of them contain a small computer inside, but their defence is distinct from a traditional computer. There is no antivirus or other security software installed on them. Most of the time, the only thing that you can do is to be aware and identify the signs.

There are several books and studies on the dangers of social media. These platforms are usually out of control for the companies and serious information leakages are happening via social media. Social media is also a good entry point for blackmailing and other crims as well. There are no workarounds as these platforms became part of our lives. But we can use them in a more conscious way, so we can have better control of our digital presence.

Until the point when we find a better way for authentication, passwords will stay the main tools to get access to our systems. But if people use weak passwords, write them down or use the same one everywhere, it generates a false sense of security. Password handling in a secure way is not black magic and we can help you to improve your related habits.

E-mail is the main communication channel next to instant message applications. To use it in a secure way is essential. People usually do not deal with the amount of confidential information that can be found in their messaging. We help to raise more attention to everything that is going out of the company’s control in the format of emails and instant messaging.

Phishing is an easy and effective way to infect companies or get confidential information via e-mails (phishing), phone calls (vishing) or sms (smishing). People must recognize these activities before they become a victim.

The phishing attack can be more effective when the attacker makes personalized content. Usually they make researches on the target before they send out the malicious e-mail. They can prepare highly personalized content based on the gathered information so the victim will likely click on the link or open the attachment. Phishing attacks can be identified in their early stage and we help you to get routine in the recognition and stay protected.

Everyone knows that there are malicious applications against computers. But the computer virus is just a part of the malicious applications (malware). Some of them can log the keyboard activity or can open virtual doors to the attackers (trojans). Few of them is just sending you unwanted advertisements. People need to know what to do with the different types of the malwares and we provide an easy-to-understand training on this topic.

Nowadays, we can easily generate content on a massive number of various platforms. To find the original/true content is tough. Fake news and hoax can destroy personal lives and lead companies into bankruptcy. This problem is more serious than most of us think. We need to be able to identify reliable sources and close out the fake generators to protect ourselves and our companies. Whit our related trainings we offer a helping hand to develop skills against fake news and hoax.

With wireless technologies, the use of our internet connection became more comfortable. But even when we can’t see the connected cables, the data runs around us. Furthermore, it can be accessed for everyone around us as this technology has lots of vulnerabilities but most of the users don’t know anything about the risks. We help to recognize the malicious wireless activities in order to prevent malicious actors to catch confidential business information.

The Home Office is increasingly popular and general nowadays, but employees can not establish the same secure working environment as an employer in the office. The same problem comes up when the employee has to work from a partner/customer or coffees and airports. These situations are common, but employees are not prepared for these circumstances however it is more dangerous than working from the office.

Those people who use digital devices and various digital platforms leave little pieces of their activities. For the first sight it does not look like a dangerous thing. But a malicious actor can quickly put together the small details when they want to make a targeted attack against you, your company or even in your name. It is necessary to be aware of our footprint and know which peace can be used for what against the us or the company.

To separate the private and professional digital life is a basic requirement nowadays as blurred user habits can cause trouble. If you neglect this area, it may have legal consequences or even material/moral damages as well. Well informed and vigilant employees who have the capability to separate their private and professional digital life provide less chance for a potential data breach.