<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CIATEC Staff, Author at CIATEC</title>
	<atom:link href="https://www.ciatec.com/author/ciasys/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/author/ciasys/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Wed, 24 Jul 2019 07:25:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>CIATEC Staff, Author at CIATEC</title>
	<link>https://www.ciatec.com/author/ciasys/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is SSL Certificate?</title>
		<link>https://www.ciatec.com/2019/07/what-is-ssl-certificate/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 16:38:17 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL Certificate]]></category>
		<category><![CDATA[Website Security]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6343</guid>

					<description><![CDATA[<p>What is SSL Certificate? SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website. In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>What is SSL Certificate?</h2>
<p>SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website.</p>
<p>In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address and credit card information.</p>
<p><img decoding="async" class="alignnone size-full wp-image-6349" src="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png" alt="Ciatec SSL Certificate" width="403" height="200" srcset="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png 403w, https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate-300x149.png 300w" sizes="(max-width: 403px) 100vw, 403px" /></p>
<h2>SSL Certificate components</h2>
<p>The certificate is composed of the following components:</p>
<ul>
<li>Digital signature of the issuing authority or the verifier</li>
<li>The certificate key or serial</li>
<li>Certificate expiry date</li>
<li>Certificate owner</li>
</ul>
<h2>Do you need SSL certificate for your website?</h2>
<p>If your website collects any sort of user information it will require an SSL certificate to keep the transfer of this information to-and-from the web server secure. Moreover, <a href="https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure/" target="_blank" rel="noopener noreferrer">google chrome started in July, 2018</a> marking website without SSL certificate as “Not Secure”. So if you care about your <a href="/seo" target="_blank" rel="noopener noreferrer">search engine ranking</a>, you definitely need to setup a certificate.</p>
<p>In the <a href="https://letsencrypt.org" target="_blank" rel="noopener noreferrer">Let’s Encrypt</a> era, where SSL certificates are given for free, the question is not whether you need a certificate for your website or not, because you most probably do. The question is whether you should go for a free or paid one.</p>
<h2>When should you start paying for your SSL Certificate?</h2>
<p>To answer this question first we need to look at the difference between free and paid certificates.</p>
<p><strong>Verification Level</strong><br />
Free certificates provides domain validation (DV) only, whereas paid versions provide organization validation (OV) and extended validation (EV), meaning that they provide validation for the site owner organization and not just the domain name.</p>
<p><strong>Duration</strong><br />
Free certificates usually have a validity period of three months while paid certificate can be renewed once every three years.</p>
<p><strong>Support and Warranty</strong><br />
All paid certificate comes with backend warranty several support packages to purchase and tech support are only a chat window or email message away. Obviously, free SSL comes with no warranties and if something goes wrong on the verifier’s side, you’re on your own.</p>
<p>So both choices provide a website with the famous green https lock. But the bottom line is that free certificates are great for a blog or an informative website that does not have much more than a simple contact form and a newsletter subscription. However, if trust a major issue for online business- and in most cases it is- especially in e-commerce websites, then paid certificate is the only option.</p>
<h2>Where to buy?</h2>
<p>When it comes to paid service providers there are many choices, where budget and service levels are the most deciding factors. To name a few service providers:</p>
<ul>
<li>DigiCert &#8211; <a href="https://www.digicert.com/" target="_blank" rel="noopener noreferrer">digicert.com</a></li>
<li>Symantec websecurity &#8211; acquired by Digicert in 2017</li>
<li>VeriSign &#8211; <a href="https://www.verisign.com/">verisign.com</a> acquired by Symantec in 2010</li>
<li>Sectigo &#8211; Formerly Comodo &#8211; <a href="https://sectigo.com" target="_blank" rel="noopener noreferrer">sectigo.com</a></li>
<li>GoDaddy &#8211; <a href="https://www.godaddy.com/web-security/ssl-certificate" target="_blank" rel="noopener noreferrer">godaddy.com</a></li>
<li>Network Solutions &#8211; <a href="https://www.networksolutions.com/SSL-certificates/index.jsp" target="_blank" rel="noopener noreferrer">networksolutions.com</a></li>
<li>Cheap SSL Security &#8211; <a href="https://cheapsslsecurity.com/" target="_blank" rel="noopener noreferrer">cheapsslsecurity.com</a></li>
<li>RapidSSL &#8211; <a href="https://www.rapidsslonline.com/ssl-brands/rapidssl/rapidssl-certificates.aspx" target="_blank" rel="noopener noreferrer">rapidsslonline.com</a></li>
</ul>
<h2>Need help?</h2>
<p>Hope that this article was helpful, if you require any help with setting up <strong>SSL certificate</strong> for your website let us know <a href="/contact">here</a>. We&#8217;ll be more than happy to help.</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</title>
		<link>https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 29 Jun 2019 07:15:54 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Fraud Warning]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Information Security in Banking]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6323</guid>

					<description><![CDATA[<p>Dubai&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching #SecureYourAccount campaign to raise awareness on banking fraud. The video released Thursday on social media channels of both Dubai Police and Emirates NBD bank uses Shaggy&#8217;s year 2000 hit &#8220;It wasn&#8217;t me&#8221; tune but with changed lyrics &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Dubai</strong>&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching <a href="https://www.linkedin.com/feed/hashtag/?keywords=%23SecureYourAccount" target="_blank" rel="noopener noreferrer"><strong>#SecureYourAccount</strong></a> campaign to raise awareness on banking fraud.</p>
<p>The video released Thursday on social media channels of both <a href="https://www.facebook.com/dubaipolicehq.en/videos/323008325289946/" target="_blank" rel="noopener noreferrer">Dubai Police</a> and <a href="https://twitter.com/EmiratesNBD_AE/status/1144866167040991232" target="_blank" rel="noopener noreferrer">Emirates NBD</a> bank uses Shaggy&#8217;s year 2000 hit &#8220;<em>It wasn&#8217;t me</em>&#8221; tune but with changed lyrics to warn users about banking fraud through social engineering techniques.</p>
<p>As Information security awareness professionals at <a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong></a>, we loved the video that got all the elements of a successful <a href="https://www.ciatec.com/services/information-security-awareness-program/#samples" target="_blank" rel="noopener noreferrer">information security awareness material</a>. It is a job well done conveying the message of keeping personal banking information safe using a 20 years well known rap song. This type of awareness material has proven to have a high penetration rate among audience.</p>
<p>Enjoy the video, and always remember to #SecureYourAccount.</p>
<hr />
<p><em><strong>Many organizations struggle to convey information security awareness material to users and customers. If that sound like your organization, <a href="https://www.ciatec.com/services/information-security-awareness-program/#quote" target="_blank" rel="noopener noreferrer">contact us</a> today to start your <a href="https://www.ciatec.com/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</strong></em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security Awareness Assessment Quiz for Employees</title>
		<link>https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Thu, 16 May 2019 19:40:34 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Employees security assessment]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Inofmration security training for employees]]></category>
		<category><![CDATA[Quiz]]></category>
		<category><![CDATA[security awareness assessment]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6292</guid>

					<description><![CDATA[<p>Information Security Awareness Assessment Quiz for Employees The first step in building a security awareness program is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly. The following security awareness assessment quiz is a beginner-level, 10 questions quiz &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">Information Security Awareness Assessment Quiz for Employees</span></h2>
<p>The first step in building a <a href="/services/information-security-awareness-program/">security awareness program</a> is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly.</p>
<p>The following security awareness assessment quiz is a <strong>beginner-level</strong>, <strong>10 questions quiz</strong> that can determine, for a certain extent, whether an employee is a security <strong>asset or a vulnerability</strong> that needs to be remediated. However, it is worth mentioning that there is no way to cover all information security domains in such a short quiz.</p>
<p>Similar information security trainings and <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulations</a>, along with comprehensive information security awareness material are all part of CIATEC&#8217;s information security awareness program. You can check program packages <a href="/services/information-security-awareness-program/#packages" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2><span style="color: #31aaa2;">Ready? Let&#8217;s go</span></h2>
<style type="text/css" id="wq-trivia-custom-css">.wq-quiz-6263 {
--wq-question-width: 100%;
--wq-question-color: #009cff;
--wq-question-height: auto;
--wq-bar-color: #31aaa2;
--wq-font-color: #444;
--wq-background-color: #f2f2f2;
}
</style><!-- wp quiz -->
<div id="wp-quiz-6263" class="wq_quizCtr single trivia_quiz wq-quiz wq-quiz-6263 wq-quiz-trivia wq-layout-single wq-skin-traditional" data-quiz-id="6263">
<div class="wq-questions wq_questionsCtr">
	<div class="wq-question wq_singleQuestionWrapper" data-index="0">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Your passwords should be easy to remember and hard to guess, which of the following is an example of strong password?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img decoding="async" width="1280" height="856" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-300x201.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-768x514.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-1024x685.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="kmawp">
			<label class="wq_answerTxtCtr">Passw0rd</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1esrj">
			<label class="wq_answerTxtCtr">29Feb1980</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="nmba7">
			<label class="wq_answerTxtCtr">MyPetName</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="d4cit">
			<label class="wq_answerTxtCtr">$ayN02#ackers</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A password should be at least 8 characters long and includes special characters, numbers, a mix of uppercase and lowercase letters and doesn't not contain a dictionary word or phrase. This will make it hard to guess by hacking scripts.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="1">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Personal Identifiable Information (PII) is used to verify your identity and distinguish one person from another. Which of the following is an example of PII?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="864" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - PII" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-300x203.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-768x518.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-1024x691.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-220x150.jpg 220w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/TheDigitalWay-3008341/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">TheDigitalWay</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="8w1xi">
			<label class="wq_answerTxtCtr">ID Number</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4q279">
			<label class="wq_answerTxtCtr">Date of Birth</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="bstu9">
			<label class="wq_answerTxtCtr">Home Address</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="5f4g8">
			<label class="wq_answerTxtCtr">All of the answers are correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Personal identifiable information are "Personal" and should only be shared on need-to-know basis. Keep all your personal identifiable information (PII) to yourself and do NOT share it with any untrusted party.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="2">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? A phishing attack can harm your personal computer only, but not your company’s network.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="832" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-300x195.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-768x499.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-1024x666.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/Tumisu-148124/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Tumisu</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="n7qud">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="gr0io">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A phishing attack may download a worm or other form of malware that can easily spread over the network and cause harm to all computers, servers and network peripherals. </p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="3">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Information security is the responsibility of:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="745" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - NOC" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-300x175.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-768x447.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-1024x596.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="utjqb">
			<label class="wq_answerTxtCtr">Everyone in the company</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4j5vd">
			<label class="wq_answerTxtCtr">IT Security Department</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ubvl9">
			<label class="wq_answerTxtCtr">Security Guard</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="60lz5">
			<label class="wq_answerTxtCtr">Top Management</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Information security is everyone's responsibility.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="4">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? It is OK to use the same password for all your online accounts as long as you keep it a secret.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="918" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-300x215.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-768x551.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-1024x734.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="mlweo">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1ufy1">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Don't put all your eggs in one basket. You don't want all your accounts to be comprised just because one account is hacked. Use a separate password for each account. To remember your passwords, you can fix a part of the password and make the second part variable and linked some how to the service used.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="5">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Spear Phishing is:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="768" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg" class="attachment-full size-full" alt="Information-Security-Awareness-Assessment-Quiz-for-Employees Spear" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-300x225.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-768x576.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
			<span><a href="https://www.freepik.com/free-photos-vectors/character">Character vector created by freepik </a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="viyvh">
			<label class="wq_answerTxtCtr">An attack on your company’s email server</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vj4vp">
			<label class="wq_answerTxtCtr">A phishing attempt targeting you personally</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="xb0vj">
			<label class="wq_answerTxtCtr">A random attempt to hack any point of weakness</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="qzrx7">
			<label class="wq_answerTxtCtr">A massive spam email attack on all employees</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Spear phishing is a unique form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.
Spear phishing works better than phishing because it uses information that it can find about you from email databases, friends’ lists, and the like. You can learn about the different types of phishing <a href="/2018/02/phishing-techniques/">here</a></p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="6">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Hackers can crack your passwords by repeatedly trying to guess it. This password cracking method is called:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="854" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password Hack" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-1024x683.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span> Photo by Soumil Kumar from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="k3gy1">
			<label class="wq_answerTxtCtr">The “G” attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vv26h">
			<label class="wq_answerTxtCtr">Brute-Force attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="sif2m">
			<label class="wq_answerTxtCtr">Phishing attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="wxdt9">
			<label class="wq_answerTxtCtr">None of the answers is correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A brute-force attack works by repeatedly trying to guess your password until it is cracked. That is why you should always use long and complex passwords that will take ages to guess.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="7">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False: Physical security is NOT related to information security.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="853" src="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-1024x682.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/PublicDomainPictures-14/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">PublicDomainPictures</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="hiu9q">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="a7sbm">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Physical security controls are at the heart of any information security program. At the end of the day, information assets are stored on physical media such as hard disks, flash drives or simply papers.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="8">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>The FIRST objective of a "Security Aware Employee" is to be able to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1279" height="838" src="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg 1279w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-300x197.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-768x503.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-1024x671.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" />	
			<span> Photo by Miguel Á. Padriñán from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="i48j9">
			<label class="wq_answerTxtCtr">Avoid a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="8jfnq">
			<label class="wq_answerTxtCtr">Manage a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="7ydt1">
			<label class="wq_answerTxtCtr">Report a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ix6gb">
			<label class="wq_answerTxtCtr">Recognize a security threat</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">The first step in the information security awareness ladder is to make sure that the average employee is able to identify threats and then report it to the right party. Threat avoidance and management are not the main responsibility of an average employee.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="9">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Tailgating is a form of social engineering that allows hackers to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-768x768.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="uv321">
			<label class="wq_answerTxtCtr">Watch company’s main gate 24/7</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="fruct">
			<label class="wq_answerTxtCtr">Get unauthorized access to restricted areas</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="9vd90">
			<label class="wq_answerTxtCtr">Watch employees as they leave the gate</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vaw5z">
			<label class="wq_answerTxtCtr">Following an employee after leaving work</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">In information security, tailgating is a social engineering technique used by hackers to deceive organization's officials through direct speech or actions in order to gain access into restricted areas. An example of tailgating is when one person tags along with an authorized employee to access a building or pass a certain checkpoint.</p>
		</div>
	</div>

	
</div>
</div>
<div class="wq-results wq_resultsCtr">
	<span class="wq-result-quiz-title wq_quizTitle">Information Security Awareness Assessment Quiz for Employees</span>
<div class="wq-result wq_singleResultWrapper" data-id="ffvm7">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">Your score is low. Security awareness is urgently needed. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/0-4-Score.jpg" alt="Awareness Quiz low score"></div>

	
	<div class="wq_resultDesc">We highly recommend that you get involved in an information security awareness program that will help you recognize cyber security threat when you see one. The good news is that we are here to help. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a></div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="497nf">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">There is a room for improvement. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/5-7-score.jpg" alt="Awareness Quiz score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a sense of security when it comes to cyber threats, but there room for some improvement. We can help you with that. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="38y5z">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">You have a good sense of security, you are an asset! <br>
<img decoding="async" src="/wp-content/uploads/2019/05/8-10-score.jpg" alt="Awareness Quiz high score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a very good sense of security when it comes to cyber threats in the subject domains. But what about your colleagues? Do they all have the same security awareness level? <br>
A well implemented security awareness program will harden the human layer of security of security.<a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<!-- social share -->
<div class="wq-share wq_shareCtr">
			<p style="font-size: 14px;">Share your Results:</p>
	
			<button class="wq-share-fb wq_shareFB" data-url="https://www.ciatec.com/author/ciasys/feed"><i class="sprite sprite-facebook"></i><span>Facebook</span></button>
	
			<button class="wq-share-tw wq_shareTwitter" data-url="https://www.ciatec.com/author/ciasys/feed"><i class="sprite sprite-twitter"></i><span>Twitter</span></button>
	
	
	</div>
<!--// social share-->
</div><!-- End .wq-results -->
<!-- retake button -->
<div class="wq-retake-quiz wq_retakeQuizCtr">
	<button class="wq-retake-quiz-btn wq_retakeQuizBtn" type="button">
		<i class="wq-icon wq-icon-undo"></i>&nbsp; Play Again!	</button>
</div>
<!-- // retake button -->
</div>
<!-- // wp quiz-->

<h2><span style="color: #31aaa2;">Interested in our information security awareness services?</span></h2>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</title>
		<link>https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 04 May 2019 09:43:31 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Phishing Simulation]]></category>
		<category><![CDATA[Phishing training]]></category>
		<category><![CDATA[Phishing training for employees]]></category>
		<category><![CDATA[Phishmark]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6155</guid>

					<description><![CDATA[<p>PhishMark: Phishing Training and Awareness Solution for Employees Why do companies need phishing training and awareness solution for their employees? &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)! And this year 9 out of &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">PhishMark: Phishing Training and Awareness Solution for Employees</span></h2>
<p><strong>Why do companies need phishing training and awareness solution for their employees?</strong> &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)!<br />
And this year 9 out of 10 phishing attempts are ransomware attacks that encrypts your data and won’t release it unless a ransom is paid.<br />
And no matter how big the investment in high-tech security solutions is, the number of breaches from phishing and complicated social engineering attacks continue to rise bypassing all network security defenses and often making its way into users mailboxes. Luckily, Phishmark is here to reduce this risk, especially when implemented as part of a comprehensive <a href="/cyber-security-awareness/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">What is Phishmark?</span></h2>
<p><a href="http://www.phishmark.com" target="_blank" rel="noopener noreferrer"><strong>PhishMark</strong></a> is an affordable phishing simulation framework that allows information security staff to schedule and launch phishing simulation campaigns utilizing a variety of ready-made email templates. Campaign results will identify, in-real time, the users who took the bait, and provide awareness material on the spot by redirecting them into a pre-designed educational landing page. Statistical reports will provide top management with an overview of the current status and the progress of users in identifying and reporting phishing attacks and adapting safe habits.</p>
<h2><span style="color: #31aaa2;">Phishing Training for Employees &#8211; Life Cycle</span></h2>
<p>Once-a-year security awareness and training session is one way of doing things, yet, it is not enough! You need an on-going solution that meets the trends and can point out the weakest link so you can harden it.<br />
CIATEC’s PhishMark is the solution you need to empower &#8220;<strong>the human firewall</strong>&#8220;!</p>
<figure id="attachment_6177" aria-describedby="caption-attachment-6177" style="width: 300px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6177" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png" alt="Phishing Training for Employees Life Cycle" width="300" height="297" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-6177" class="wp-caption-text">Phishing Training for Employees Life Cycle</figcaption></figure>
<p>Phishmark is a phishing training and awareness solution for employees that goes around the year running simulations to cover every angle a hacker might use to get into a company&#8217;s network through phishing and social engineering attacks. We follow the below steps:</p>
<ol>
<li><strong>Baseline</strong>: The first step is to establish baseline by running an initial campaign.</li>
<li><strong>Train</strong>: Provide awareness material based on the results of the first campaign.</li>
<li><strong>Phish</strong>: Run new phishing campaign.</li>
<li><strong>Analyze</strong>: Analyze the results and measure the progress.</li>
</ol>
<p>It is important to note that Phishmark is proven to provide better results when integrated with Ciatec&#8217;s <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">PhishMark &#8211; Phishing Training Main Features</span></h2>
<h3>Dashboard</h3>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-6187 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg" alt="PhisMark - Phishing Training for employees" width="1601" height="332" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg 1601w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-300x62.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-768x159.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-1024x212.jpg 1024w" sizes="(max-width: 1601px) 100vw, 1601px" /></p>
<p>PhishMark will show a dashboard for all campaigns as well as separate dashboard for every single campaign. The dashboard will show:</p>
<ol>
<li>Number of phishing simulation emails &#8220;or baits&#8221; successfully delivered.</li>
<li>Number of employees that opened the simulation phishing email.</li>
<li>Percentage of employees that actually took the bait, i.e.; clicked the link.</li>
<li>Number of users who actually submitted data to the pretend hacker.</li>
<li>And finally, the information security specialist running the simulation will be able to count the number of employees that actually reported the threat.</li>
</ol>
<h3>Email Templates</h3>
<p>Administrator will be able to create his own email templates that fits his organization. Or use ready-made email templates covering many domains and season, including: Banking, social media, eCommerce and many more.</p>
<h3>Grouping Users</h3>
<p>The solution allows creation of target groups. Useful for targeting every department with a separate phishing campaign.</p>
<h3>Landing Pages</h3>
<p>Employees who fall victims for phishing campaigns will be redirected to a previously designed landing page similar to the below. Administrator is free to use ready-made phishing awareness landing pages provided by PhishMark, or upload his/her own.</p>
<figure id="attachment_6190" aria-describedby="caption-attachment-6190" style="width: 1024px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6190" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg" alt="Phishmark Phishing Training &amp; Awareness Landing Page" width="1024" height="683" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-768x512.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-6190" class="wp-caption-text">Example Landing Page</figcaption></figure>
<hr />
<h2><span style="font-size: 14pt; color: #31aaa2;">Questions?</span></h2>
<p><span style="font-size: 14pt;">Ask us on ask@ciatec.com or <a href="/contact"><strong>contact us</strong></a> today to start using PhishMark to <strong>Phish</strong> and <strong>Mark</strong> employees that need further training and awareness on phishing and social engineering.</span></p>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CIATEC signs partnership agreement with PECB</title>
		<link>https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 06 Apr 2019 13:23:29 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ISO Audit]]></category>
		<category><![CDATA[ISO Training]]></category>
		<category><![CDATA[Partners]]></category>
		<category><![CDATA[PECB]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6089</guid>

					<description><![CDATA[<p>CIATEC is thrilled to announce its newly signed partnership agreement with PECB, the well-known ISO certification and training provider. By signing this agreement, CIATEC is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to: Information Security &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong> </a>is thrilled to announce its newly signed partnership agreement with <strong>PECB</strong>, the well-known ISO certification and training provider. By signing this agreement, <strong>CIATEC</strong> is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to:</p>
<ul>
<li><strong>Information Security Management</strong>: ISO/IEC 27001 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Information Security</a>.</li>
<li><strong>IT Security</strong>: ISO/IEC 27032 Cyber Security and ISO/IEC 27035 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Incident Management</a>.</li>
<li><strong>Continuity and Resilience</strong>: ISO 22301 Business Continuity Management System.</li>
<li><strong>Service Management</strong>: ISO/IEC 20000 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">IT Service Management</a> and ISO/IEC 55001 Asset Management.</li>
<li><strong>Quality Management Systems</strong> (example: ISO 9001 Quality Management Systems, ISO 13053 Six Sigma, ISO 21500 Project Management).</li>
<li><strong>Health, Safety and Environment</strong> (example: ISO 14001 Environmental Management, ISO 22000 Food Safety Management, ISO 45001 Occupational Health and Safety Management).</li>
</ul>
<blockquote class="alignleft "><p>together we can build a strong and value-based society <cite>Eric Lachapelle, CEO of PECB</cite></p></blockquote>
<p>PECB issued an official press release announcing this partnership, where Mr. Eric Lachapelle, CEO of PECB, expressed PECB&#8217;s determination to make a renewed and positive contribution towards building a strong value-based society (<em><strong>Read full press release</strong> <strong><a href="https://pecb.com/en/newsDetail?nid=1027&amp;lid=1" target="_blank" rel="noopener noreferrer">here</a></strong></em>).</p>
<p>&nbsp;</p>
<p>At CIATEC, we truly believe that adopting and adapting internationally recognized standards and frameworks can transform organizations and lift them up to a whole new level. And this partnership with PECB will definitely contribute to CIATEC&#8217;s mission to provide our clients with the highest quality of management systems implementation, consulting and training services. We look forward to a successful long-term partnership with PECB.</p>
<h4 class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;size&quot;:10}" data-doc-id="4397000283481219"><span style="color: #31aaa2;">About PECB </span></h4>
<p>PECB is a certification body for persons, management systems, and products on a wide range of international standards. As a global provider of training, examination, audit, and certification services, PECB offers its expertise on multiple fields, including but not limited to Information Security, IT, Business Continuity, Service Management, Quality Management Systems, Risk &amp; Management, Health, Safety, and Environment. For more detailed information regarding PECB principal objectives and activities, visit <a href="https://www.pecb.com" target="_blank" rel="noopener noreferrer">www.pecb.com</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dubai: Using AI to Measure People&#8217;s Happiness</title>
		<link>https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 13 Mar 2019 11:01:38 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Customer Experience]]></category>
		<category><![CDATA[CX]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<category><![CDATA[UX]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5888</guid>

					<description><![CDATA[<p>Dubai is not settling for smiley faces buttons to measure customers satisfaction. Dubai&#8217;s Roads and Transport Authority (RTA), has announced on Monday the use of highly accurate smart cameras powered by artificial intelligence (AI) technology in four &#8220;Customer Happiness Centers&#8221; in Dubai. Not a surprising name or call from a state that has a minister &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/">Dubai: Using AI to Measure People&#8217;s Happiness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dubai is not settling for smiley faces buttons to measure customers satisfaction. <a href="https://www.rta.ae" target="_blank" rel="noopener noreferrer">Dubai&#8217;s Roads and Transport Authority (RTA)</a>, has announced on Monday the use of highly accurate smart cameras powered by artificial intelligence (AI) technology in four &#8220;Customer Happiness Centers&#8221; in Dubai. Not a surprising name or call from a state that has a <a href="https://www.happy.ae/en" target="_blank" rel="noopener noreferrer">minister of state for happiness</a>!</p>
<p>&#8220;The initiative aims to measure customers happiness index through smart cameras that analyze the extent of their happiness,&#8221; <em>Maher Shirah</em>, director of Smart Services at RTA&#8217;s Corporate Technology Support Services Sector. The system was able to produce detailed reports of a customer&#8217;s happiness levels, with instant alerts triggered when a center&#8217;s &#8220;happiness rating&#8221; drops below a predefined level. When this happens, actions can be taken to &#8220;restore customers&#8217; happiness level.&#8221;</p>
<p>As far as privacy is concerned, authorities indicated that the system analyses facial expressions and convert it into numeral value but doesn&#8217;t save the visual information.</p>
<p>This is one of the many uses AI can serve in service management measurement and metrics. And it will definitely contribute to raising the level of users satisfaction, the ultimate goal of successful <a href="/services/itsm/" target="_blank" rel="noopener noreferrer">service management system</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/">Dubai: Using AI to Measure People&#8217;s Happiness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Successful Cyber Security Awareness Program Elements</title>
		<link>https://www.ciatec.com/2019/02/cyber-security-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 13:42:16 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4928</guid>

					<description><![CDATA[<p>The Cyber Security Awareness Program Every Organization Needs Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to Gartner, spending on information security products and services reached a value of $114 billion US dollars in 2018, with an increase of 12.4 percent from 2017. On the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #31aaa2;"><span style="color: #800000;">The Cyber Security Awareness Program Every Organization Needs</span><br />
</span></h3>
<p>Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to <a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019" target="_blank" rel="noopener noreferrer">Gartner</a>, spending on information security products and services reached a value of <strong>$114 billion US dollars</strong> in 2018, with an increase of 12.4 percent from 2017. On the other hand, the average total cost of a data breach in 2017 was<strong> $3.62 million </strong>according to<a href="https://www.ibm.com/downloads/cas/ZYKLN2E3" target="_blank" rel="noopener noreferrer"> IBM and Ponemon Institute</a>. And 2019 forecasts are not any better. When you dig deeper in the studies, you realize that a high percentage of data breaches surprisingly took place in organizations of high IT security budget. And while some attacks could be traced back to disgruntled workers, a great deal of other attacks are simply a result of actions done by naive and non-harmful employees that simply weren&#8217;t well informed.</p>
<p>Over the past years, IT became the main enabler of almost every business. And security has always been a major concern. Implementing a security awareness program has become a must for an organization, regardless of it&#8217;s size, industry, or location.</p>
<figure id="attachment_5628" aria-describedby="caption-attachment-5628" style="width: 2415px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5628 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg" alt="Cyber Security Awareness Maturity Model" width="2415" height="1116" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg 2415w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-300x139.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-768x355.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-1024x473.jpg 1024w" sizes="(max-width: 2415px) 100vw, 2415px" /><figcaption id="caption-attachment-5628" class="wp-caption-text">Cyber Security Awareness Maturity Model [Source: SANS Institute]</figcaption></figure>At <strong>CIATEC</strong>, <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer"><strong>information security awareness</strong></a> is one of the main services provided. Our Security awareness program is a continuous cycle that goes around year. A well implemented security awareness program helps preventing a breach or at least mitigate the risks. In this article, we compiled lists of:</p>
<ul>
<li><a href="#main-reasons-of-cyber-security-breaches">Main causes of Cyber Security Breaches</a></li>
<li><a href="#Importance-Cyber-Security-Awareness-Training">Importance of Cyber Security Awareness and Training</a></li>
<li><a href="#Cyber-Security-Awareness-Topics">Cyber Security Awareness Topics</a></li>
<li><a href="#Cyber-Security-Awareness-Channels">Cyber Security Awareness Channels</a></li>
</ul>
<h3><span style="color: #800000;"><a id="main-reasons-of-cyber-security-breaches"></a>Top Reasons of Cyber Security Breaches</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>&nbsp;</p>
<figure id="attachment_5626" aria-describedby="caption-attachment-5626" style="width: 1677px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg"><img loading="lazy" decoding="async" class="wp-image-5626 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg" alt="" width="1677" height="736" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg 1677w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-300x132.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-768x337.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-1024x449.jpg 1024w" sizes="(max-width: 1677px) 100vw, 1677px" /></a><figcaption id="caption-attachment-5626" class="wp-caption-text">Reasons of Cyber Security Breaches</figcaption></figure>
<h4>1- Uninformed Employees</h4>
<p>Uninformed, naive and non-harmful employees lacking information security awareness and training tops the list of causes. Our experience taught us that technology alone cannot completely secure IT environments, there will always be the human factor involved, whether within IT department side or at end users side. Unfortunately, human brain cannot be patched same as a computer! It can only be nourished by knowledge, <a href="/services/training-courses/" target="_blank" rel="noopener noreferrer">training</a> and <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness material</a>.</p>
<p>It only takes one single uninformed employee who takes the bait of a phishing email to compromise organization&#8217;s cyber security.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Deploy <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">Information Security Awareness Program</a> that goes around the year and keep it up-to-date with the latest threat trends, accompanied with <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulation solution</a>.</em></p>
<h4>2- Human Errors</h4>
<p>Human errors of regular IT users are always a threat. However, the bigger threat are the errors done by IT administrators! Lack of knowledge, sometimes lack of focus leads to configuration errors that leaves some doors open for hackers.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Adapt a framework or a standard that organizes change, event, problem and incident management, such as ISO 27001, ISO 20000 or ITIL.</em></p>
<h4>3- Malware</h4>
<p>Successful malware attacks such as ransomware, viruses, worms, and trojans are always a threat to cyber security and a reason behind security breaches.</p>
<p><strong><span style="text-decoration: underline;"><span style="text-decoration: underline;">Hint</span></span></strong>: <em>Train your staff on how to deal with malware attacks and apply <a href="/services/defenses-and-controls/" target="_blank" rel="noopener noreferrer">endpoint security</a> best practices.</em></p>
<h4>4- Stolen Devices</h4>
<p>Laptops and mobile devices that are sometimes stolen during commuting or traveling pose a significant risk that should be handled by risk management.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Raising <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness</a> and applying mobile devices encryption.</em></p>
<h4>5- Disgruntled workers</h4>
<p>Dissatisfied employees and third-party contractors with bad intentions.</p>
<p><em><strong>Hint</strong>: Deploy proper employee termination, segregation of duties, and vendor management processes.</em></p>
<h4>6- Lack of Funds</h4>
<p>Low cyber security budget is a problem on its own for some organizations. While other organizations fall in the trap of &#8220;budget maldistribution&#8221;, where most of the budget goes for sophisticated security software and hardware appliances while employees information security awareness and training are neglected; <strong>Big Mistake!</strong></p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>If there is no way to increase cyber security budget, existing budget should at least be distributed properly.</em><span style="color: #0000ff;"><br />
</span></p>
<h3><span style="color: #800000;"><a id="Importance-Cyber-Security-Awareness-Training"></a>What will Security Awareness and Training add?</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Cyber security awareness and training provides the following benefits:</p>
<figure id="attachment_5622" aria-describedby="caption-attachment-5622" style="width: 1408px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg"><img loading="lazy" decoding="async" class="wp-image-5622 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg" alt="" width="1408" height="390" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg 1408w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-300x83.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-768x213.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-1024x284.jpg 1024w" sizes="(max-width: 1408px) 100vw, 1408px" /></a><figcaption id="caption-attachment-5622" class="wp-caption-text">Benefits of Cyber Security Awareness</figcaption></figure>
<h4>1-  Hardening the Last Layer of Defense</h4>
<p>Employees are the last layer of defense, and in some case they are the first layer, depending on the nature of the attack. Yet, they are the weakest link in the cyber security chain, this has become a universal truth. A well implemented and maintained cyber security awareness program will insure hardening this link and empowering a stronger network.</p>
<h4>2- Compliance Requirement</h4>
<p>All major information security standards and frameworks such as ISO/IEC 27001 requires an <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a> to be in place.</p>
<h4>3- Adapt with the Continuously Changing Threats</h4>
<p>The complexity of threats and attacks is increasing every day. Cyber security units needs to keep up and more importantly, cyber security awareness units needs to keep all users informed about the latest threats and cyber attacks trends.</p>
<h4>4- Increase Engagement</h4>
<p>Does your organization have an information security handbook containing all your information security policies? Is it updated and distributed to users on regular basis? If so, how many of them do actually read it, understand it and become familiar with its content?</p>
<p>With awareness things are different. Running cyber security awareness campaigns all over the year and on various channels will create a culture of security within the organization and engage employees in information security practices.</p>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Topics"></a>Cyber Security Awareness Topics</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Importance of cyber security awareness topics varies from one organization to another. Each organization has its own priorities. Yet, it is always recommended to work holistically on covering all topics when implementing a cyber security awareness program. The major topics that should be covered in an information security awareness program:</p>
<figure id="attachment_5624" aria-describedby="caption-attachment-5624" style="width: 2406px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5624 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg" alt="" width="2406" height="676" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg 2406w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-300x84.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-768x216.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-1024x288.jpg 1024w" sizes="(max-width: 2406px) 100vw, 2406px" /><figcaption id="caption-attachment-5624" class="wp-caption-text">Cyber Security Awareness Topics</figcaption></figure>
<h4>1- Physical Security</h4>
<p>Physical security is a sub-domain of information security that goes beyond IT to address issues related to entrance points, locked doors, drawers, cabinets, desks, as well as desktops, laptops and mobile devices security. Users should be aware and able to deal with physical security threats of all kinds.</p>
<h4>2- Data Security</h4>
<p>Cyber security is all about protecting information assets, right? Educating users on how to handle data security should be a major topic in any cyber security awareness program.</p>
<h4>3- Print Security</h4>
<p>Whether in hard copies or in soft copies, information needs to be secured. Print security is one of the many topics address in information security awareness program.</p>
<p>In addition to making users aware of concepts of secure printing, there are plenty of built-in and third-party printing solution that can be of great use in implementing secure printing policies.</p>
<h4>4- Network and Wireless Security</h4>
<p>Given the insecure nature of wireless networks, enterprises counts on employees awareness to better harden this area. An organization owned laptop or other mobile device, has at least 10 wireless networks SSID stored. SSID&#8217;s of office, home, airport, hotel, coffee shop&#8230;etc. Sniffing can occur on any wireless network jeopardizing the organization information assets. Hence, wireless network security awareness.</p>
<p>On the other hand, with sophisticated wired network security solutions, organizations might reach a significant level of security. Yet, awareness is always needed to harden the weakest link.</p>
<h4>5- Data Destruction</h4>
<p>Security doesn&#8217;t stop when you stop using a certain device. If a device still got your data, security policies will still apply, even if the device is not used any more. And if the device is to be disposed, it must be disposed securely. Cyber security awareness programs should cover topics on how to get rid of old devices in a secure manner.</p>
<h4>6- Password Security</h4>
<p>Password security is one of the most challenging domains in cyber security awareness. A lot of resistance is found here, users hate to be forced to remember new passwords and have a difficulty creating new passwords that meet complexity requirements.</p>
<p>Luckily, there is a solution: <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">CIATEC&#8217;s information security awareness program</a> helps users get over this.</p>
<h4>7- Phishing and Email Security</h4>
<p>Phishing attacks are getting serious. 9 out of 10 phishing attacks are now ransomware, and pseudo ransomware is a new trend. Pseudo ransomware attacks are here to make users pay a ransome for data that is not even encrypted!</p>
<p>Training on how to avoid phishing scams and what to do in the event of an attack is a high priority in cyber security awareness program. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing awareness and training</a> cycle goes through four steps: <strong>Asses</strong>, <strong>Educate</strong>, <strong>Phish</strong>, <strong>Get results</strong>, and <strong>REPEAT</strong>. Phishing awareness, like any other cyber security awareness component, is a continuous cycle.</p>
<p>For more info about phishing awareness: <a href="https://www.ciatec.com/phishing" target="_blank" rel="noopener noreferrer">ciatec.com/phishing</a></p>
<h4>8- Malware</h4>
<p>Users in any business industry, size, or even home users should have the ability to identify a malware attack when they see one. It is also important that users identify the malware type (virus, trojan, worm, adware, spyware, ransomware&#8230;). But what&#8217;s more important is to know how to act in the event of malware infection. A good cyber security awareness program should provide this know how.</p>
<h4>9- Mobile Devices Security</h4>
<p>Mobile devices, whether personal or corporate owned, holds information assets that must be protected. Mobile devices security is a serious topic that should be addressed thoroughly in a corporate cyber security awareness program.</p>
<h4>10- Browser Security</h4>
<p>Training users on how to check URLs and ssl encrypted site (i.e.<em>,</em><em>https</em>), keeping browsers up-to-date, minimal plugin usage, and scan any downloaded files are basic browser security awareness material.</p>
<blockquote><p>Cyber Security is everyone&#8217;s responsibility.</p></blockquote>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Channels"></a>Cyber Security Awareness Channels</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Communicating the information is as important as the information itself. What fits one organization, may not necessarily fit another. Communicating cyber security awareness material to the right audience and using the right channels is what an awareness program is all about. Here is a list of the most commonly used cyber security awareness channels.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-youtube-play " ></i> </span>Educational Videos</h4>
<p>Videos are one of the most effective learning material. CIATEC provides cyber security awareness videos hosted on CIATEC&#8217;s servers or on client&#8217;s portal. Like all cyber security awareness material, videos are continuously updated to keep up with the latest cyber security awareness trends as well as latest animation trends.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-picture-o " ></i> </span>Billboard or Roll-up Banners</h4>
<p>A roll-up banner in a meeting room, in the lobby, or any other public space will help raising cyber security awareness without an effort.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-desktop " ></i> </span>Screen Posters</h4>
<p>Same as roll-up banners, displaying cyber security awareness material on screens if available in public places will help raising cyber security awareness by targeting all staff.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-envelope-o " ></i> </span>Email Posters and Newsletters</h4>
<p>Email posters and newsletter is another channel, that can become handy when trying to address specific topics in cyber security awareness program. Especially, when presented as an element of a bigger campaign.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-gamepad " ></i> </span>Gaming material</h4>
<p>This has also proved to be one of the most effective techniques to pass the awareness message in atmosphere of fun and entertainment. Whether a simple cross-words puzzle or matching gaming, or much more sophisticated information security gaming material, it all helps to easily relay the information to users.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-book " ></i> </span>Educational Magazine</h4>
<p>Educational magazines, whether as e-magazine, email newsletter or a paperback. When published and distributed on regular basis it will keep users informed of the latest security trends and how to avoid breaches.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-users " ></i></span> Information Security Courses, Workshops, and Quizzes</h4>
<p>Old fashion class room training courses, and online courses are always a good channel to reach out to employees. In training, it is advised to group employees based on trades or departments. This way the trainer can address specific security topic that may be associated with the audience trade.</p>
<p>Training should also be followed by a quiz to measure cyber security awareness and training effectiveness.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-anchor " ></i></span> Phishing Simulations</h4>
<p>Proven to be one of the most effective ways to identify points of weakness against phishing attacks. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing simulations awareness campaigns</a>, as part of overall cyber security awareness program, use hundreds of templates and provides accurate reports identifying:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Users who opened the simulation email.</li>
<li>Users who clicked on links.</li>
<li>Users who submitted sensitive data.</li>
</ul>

		</div>
	
<p>This way, information security team can identify and educate employees accordingly. <em>Contact us <a href="/services/phishing-awareness/#quote" target="_blank" rel="noopener noreferrer">here</a> to start a phishing awareness campaign.</em></p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-globe " ></i> </span>Dedicated Information Security Portal and Mobile App</h4>
<p>A dedicated information security web portal will serve as a reference for all users in all information security matters within the organization and will help keeping users well informed. It may contain the below elements:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Information security policies.</li>
<li>Latest news about cyber security threats.</li>
<li>Educational posts.</li>
<li>Interactive educational videos with questions and answers.</li>
<li>Educational games and quizzes.</li>
<li>Information security courses.</li>
</ul>

		</div>
	
<p>A dedicated cyber security awareness mobile app is even better. It will allow information security units to reach users on the go.</p>
<p><strong>Hint</strong>: <em>By combining our <a href="/services/web-mobile-apps-ecommerce-consulting/" target="_blank" rel="noopener noreferrer">web and mobile enablement</a> skills along with <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">security awareness services</a>, CIATEC can build your information security web portal and mobile app in no time!</em></p>

		<div class="clearfix"></div>
		<hr style="margin-top:20px; margin-bottom:10px;" class="divider divider-solid">
	
<h3><span style="color: #800000;">Conclusion</span></h3>
<p>Cyber security awareness is no longer an option. It is a significant layer of security that every IT-enabled organization must have.</p>
<p><em><strong>CIATEC</strong>&#8216;s cyber security <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness program</a> is designed to help organizations of various sizes and industries to minimize the risk of data breaches. <a href="/contact" target="_blank" rel="noopener noreferrer">Contact us</a> today to start building your own program.</em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</title>
		<link>https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 30 Jan 2019 10:33:23 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5687</guid>

					<description><![CDATA[<p>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221; If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime. Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221;</strong></p>
<p>If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime.</p>
<p>Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the phone!</p>
<p>The bug was reported in January 21st by <a href="https://twitter.com/MGT7500" target="_blank" rel="noopener">@MFT7500</a></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to <a href="https://twitter.com/AppleSupport?ref_src=twsrc%5Etfw">@AppleSupport</a>&#8230;waiting to hear back to provide details. Scary stuff! <a href="https://twitter.com/hashtag/apple?src=hash&amp;ref_src=twsrc%5Etfw">#apple</a> <a href="https://twitter.com/hashtag/bugreport?src=hash&amp;ref_src=twsrc%5Etfw">#bugreport</a> <a href="https://twitter.com/FoxNews?ref_src=twsrc%5Etfw">@foxnews</a></p>
<p>&mdash; MGT7 (@MGT7500) <a href="https://twitter.com/MGT7500/status/1087171594756083713?ref_src=twsrc%5Etfw">January 21, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>It is worth mentioning that this major privacy issue was reported days before the world celebrated <a href="https://twitter.com/hashtag/dataprivacyday" target="_blank" rel="noopener">#DataPrivacyDay</a> on January 28th.</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Search Engines Market Share [August 2018]</title>
		<link>https://www.ciatec.com/2018/08/search-engines-market-share-august-2018/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 11 Aug 2018 12:53:05 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Search Engines]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[Statistics]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4817</guid>

					<description><![CDATA[<p>Search Engines Market Share It is no secret that google has been dominating the search engines market share for the last couple of decades. Google was founded in 1997, although the very first search engine was called &#8220;Archie&#8221;, but let&#8217;s keep history for another post. We are here to show some numbers on how the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/08/search-engines-market-share-august-2018/">Search Engines Market Share [August 2018]</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">Search Engines Market Share<br />
</span></h2>
<p>It is no secret that google has been dominating the search engines market share for the last couple of decades. Google was founded in 1997, although the very first search engine was called &#8220;Archie&#8221;, but let&#8217;s keep history for <a href="/2018/07/internet-timeline-history/" target="_blank" rel="noopener">another post.</a> We are here to show some numbers on how the search engines market share is actually shared between google, bing, yahoo, yandex, baidu and others.</p>
<p>According to the below graph from StatCounter, <a href="http://google.com" target="_blank" rel="noopener">Google</a> still holds 90% of market share <strong>worldwide</strong>, with slight insignificant loss for <a href="http://bing.com" target="_blank" rel="noopener">bing</a> in the past couple of months.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4821" src="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807.png" alt="Search Engine Market share" width="1280" height="720" srcset="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807.png 1280w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-300x169.png 300w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-768x432.png 768w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-1024x576.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-390x220.png 390w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<h2><span style="color: #31aaa2;">Search Engines Market Share By Country<br />
</span></h2>
<ul>
<li>Google&#8217;s market share is around 90% in <strong>US, Canda, Australia, South America</strong> and<strong> Europe</strong>.</li>
<li>China <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/cn.png' alt= 'China' /> is considered to be the &#8220;No-Google-land&#8221; where local search engines Baidu and Alibaba&#8217;s Shenma dominates the Chinese search engines market.<a href="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4829" src="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807.png" alt="Search Engine Market Share China" width="1280" height="720" srcset="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807.png 1280w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-300x169.png 300w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-768x432.png 768w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-1024x576.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-390x220.png 390w" sizes="(max-width: 1280px) 100vw, 1280px" /></a></li>
</ul>
<p>&nbsp;</p>
<ul>
<li>In Russia <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/ru.png' alt= 'Russia' />, Google has almost a 50-50 market share with Yandex.</li>
</ul>
<ul>
<li><a href="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4831" src="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807.png" alt="Search Engine Market Share Russia" width="1280" height="720" srcset="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807.png 1280w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-300x169.png 300w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-768x432.png 768w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-1024x576.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-390x220.png 390w" sizes="(max-width: 1280px) 100vw, 1280px" /></a></li>
</ul>
<p>&nbsp;</p>
<ul>
<li>As far as our region (Middle East) is concerned, Google dominates the search engines market share with even a higher percentage to reach around <strong>97%</strong> in <strong>Saudi Arabia <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/sa.png' alt= 'Saudi Arabia' /></strong>, <strong>United Arab Emirates <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/ae.png' alt= 'United Arab Emirates' /></strong>,<strong> Kuwait <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/kw.png' alt= 'Kuwait' />, Egypt</strong> <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/eg.png' alt= 'Egypt' /> and <strong>Lebanon </strong><img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/lb.png' alt= 'Lebanon' />.</li>
</ul>
<h2><span style="color: #31aaa2;">Why Google is by far the leading search engine?</span></h2>
<p>Bing is trying, with the beautiful images and all. In fact, Google couldn&#8217;t find things that are not found by bing or yahoo. Search results are in most cases similar on all search engines. Yet, google has always been holding the largest market share, and this doesn&#8217;t seem to be changing any time soon.</p>
<p>So, what makes Google so special? Here are some reasons that makes Google the primary holder of search engines market share:</p>
<p>1- <strong>Simplicity</strong>: Google kept it simple, a factor which positively contributes to user experience.</p>
<p>2- <strong>Core business</strong>: search is Google&#8217;s core business right from the beginnings in the 1990s.</p>
<p>3- <strong>CSI factor</strong>: continual service improvement in google products and services is a key factor for staying on top of the list.</p>
<p>4- <strong>Chrome</strong>: Google chrome is the most popular internet browser. It gained that title because it belongs to Google&#8217;s family. But on the other hand, with address bar search feature and google being the default search engine, chrome definitely plays a vital role in 4 billion search queries happening every day.</p>
<p>5- <strong>Products integration</strong>: Integrating all google products together such as gmail, YouTube, maps, analytics, ads, adsense and other is a major player in moving google way ahead of the competition.</p>
<hr />
<p>Google dominates the search engines market with 4 billion query a day. Which is an enough reason to use Ciatec&#8217;s <strong>Search Engine Optimization (SEO) service</strong> to rank higher on search engines results page, <a href="/contact">contact us</a> today for a free site assessment.</p>
<p>The post <a href="https://www.ciatec.com/2018/08/search-engines-market-share-august-2018/">Search Engines Market Share [August 2018]</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Internet Timeline</title>
		<link>https://www.ciatec.com/2018/07/internet-timeline-history/</link>
					<comments>https://www.ciatec.com/2018/07/internet-timeline-history/#comments</comments>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 17 Jul 2018 07:57:37 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Internet History]]></category>
		<category><![CDATA[Tech History]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4092</guid>

					<description><![CDATA[<p>Internet Timeline &#8211; Milestones in the Internet history journey The internet timeline, or the internet history, goes back to the 60&#8217;s when J.C.R Licklider and Welden Clark published the paper &#8220;On-Line Man-Computer Communication&#8221;, which set the first building blocks of inter-networking. In this article we go back to the beginnings of the data communication and &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/07/internet-timeline-history/">The Internet Timeline</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="4092" class="elementor elementor-4092 elementor-bc-flex-widget" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-5072d56 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5072d56" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57580003" data-id="57580003" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9f0d23f elementor-widget elementor-widget-spacer" data-id="9f0d23f" data-element_type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-040e74c elementor-widget elementor-widget-heading" data-id="040e74c" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Internet Timeline - Milestones in the Internet history journey</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-437ac07c elementor-widget elementor-widget-text-editor" data-id="437ac07c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>The internet timeline, or the internet history, goes back to the 60&#8217;s when<strong> J.C.R Licklider</strong> and <strong>Welden Clark</strong> published the paper &#8220;On-Line Man-Computer Communication&#8221;, which set the first building blocks of inter-networking.</p><p>In this article we go back to the beginnings of the data communication and explore the internet timeline from the beginnings till our days with an outlook on the future.</p><p><strong>Have you ever wondered why all tech giants like google and facebook are based in California? If you take a look on the below map you&#8217;ll know why, it all started there.</strong></p>								</div>
				</div>
				<div class="elementor-element elementor-element-13dcc4e elementor-widget elementor-widget-image" data-id="13dcc4e" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
											<a href="https://www.ciatec.com/wp-content/uploads/2018/07/The-Internet-Timeline-1969.png" data-elementor-open-lightbox="yes" data-elementor-lightbox-title="The-Internet-Timeline-1969" data-e-action-hash="#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NDEwOCwidXJsIjoiaHR0cHM6XC9cL3d3dy5jaWF0ZWMuY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDE4XC8wN1wvVGhlLUludGVybmV0LVRpbWVsaW5lLTE5NjkucG5nIn0%3D">
							<img loading="lazy" decoding="async" width="1024" height="768" src="https://www.ciatec.com/wp-content/uploads/2018/07/The-Internet-Timeline-1969-1024x768.png" class="attachment-large size-large wp-image-4108" alt="The Internet Timeline Milestones Internet Journey" srcset="https://www.ciatec.com/wp-content/uploads/2018/07/The-Internet-Timeline-1969.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/07/The-Internet-Timeline-1969-300x225.png 300w, https://www.ciatec.com/wp-content/uploads/2018/07/The-Internet-Timeline-1969-768x576.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" />								</a>
											<figcaption class="widget-image-caption wp-caption-text">This was the whole internet in 1969 of four nodes, this same network witnessed the first email sent in internet history in 1971</figcaption>
										</figure>
									</div>
				</div>
				<div class="elementor-element elementor-element-a5e8767 elementor-widget elementor-widget-spacer" data-id="a5e8767" data-element_type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-cfddcdc elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="cfddcdc" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-106c07d" data-id="106c07d" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-55f48bb elementor-widget elementor-widget-price-list" data-id="55f48bb" data-element_type="widget" data-widget_type="price-list.default">
				<div class="elementor-widget-container">
					
		<ul class="elementor-price-list">

									<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/J._C._R._Licklider-150x150.jpg" alt="J. C. R. Licklider proposed a global network" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							J. C. R. Licklider proposed a global network						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1962</span>
										</div>
															<p class="elementor-price-list-description">
							Licklider formulated the earliest ideas of a global computer network in August 1962 at BBN, in a series of memos discussing the "Intergalactic Computer Network" concept. These ideas contained almost everything that the Internet is today, including cloud computing.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/arpanet-logical-map-150x150.png" alt="ARPANET established" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							ARPANET established						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1969</span>
										</div>
															<p class="elementor-price-list-description">
							The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Ray_tomlinson_ap-150x150.jpg" alt="First email message" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							First email message						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1971</span>
										</div>
															<p class="elementor-price-list-description">
							The first email message content is totally forgettable but it was sent by <b>Ray Tomlinson</b> at ARPAnet.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Vint-Cerf-Robert-Khan-150x150.png" alt="TCP was born" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							TCP was born						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1974</span>
										</div>
															<p class="elementor-price-list-description">
							<b>Vinton Cerf</b> and <b>Robert Elliot Kahn</b> designed TCP during 1973 and published it with the help of Carl Sunshine and Yogen Dalal later in 1974.
When you ask who invented the Internet as we know it, the credit will most probably go back to these fellows.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/com-150x150.png" alt="DNS was born" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							DNS was born						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1984</span>
										</div>
															<p class="elementor-price-list-description">
							
<b>Paul Mockapetris</b> and <b>Jon Postel</b> introduced DNS with the familiar suffixes of .com .org .edu .net .gov and others. This was a great contribution to the Internet, without it we would be browsing facebook by typing https://31.13.75.36, not cool.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="http://www.Symbolics.com" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/symbolics-1-150x150.png" alt="First domain name registered" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							First domain name registered						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1985</span>
										</div>
															<p class="elementor-price-list-description">
							
<b>Symbolics.com</b> is the first domain name to be registered for Symbolics a Massachusetts computer company. <b><i>Visit</b></i>						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://newsroom.cisco.com/dlls/corporate_timeline_2008.pdf" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Cisco-first-logo-1985-150x150.png" alt="Cisco launched its first router" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Cisco launched its first router						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1986</span>
										</div>
															<p class="elementor-price-list-description">
							Cisco launched its first routing innovation, the AGS multi
-protocol router. <b><i>View Source </b></i>
						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="http://info.cern.ch/hypertext/WWW/TheProject.html" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/html-150x150.png" alt="HTML" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							HTML						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1990</span>
										</div>
															<p class="elementor-price-list-description">
							<b>Tim Berners-Lee</b> of CERN introduced HTML						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="http://info.cern.ch/hypertext/WWW/TheProject.html" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Tim-Berners-Lee-150x150.png" alt="World&#039;s first website" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							World's first website						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1991</span>
										</div>
															<p class="elementor-price-list-description">
							<b>Tim Berners-Lee</b> of CERN introduced the world wide web (www) and launched the the world's first website that is still alive till this moment. <b><i>Visit site</b></i>						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="http://info.cern.ch/hypertext/WWW/TheProject.html" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Internet-Society-150x150.png" alt="The Internet Society" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							The Internet Society						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1992</span>
										</div>
															<p class="elementor-price-list-description">
							ISOC was chartered to provide a corporate structure to support the Internet standards development process. 						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://amazon.com" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/first-amazon-logo-150x150.png" alt="Amazon" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Amazon						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1994</span>
										</div>
															<p class="elementor-price-list-description">
							Jeff Bezos founded Amazon.com Inc. in Seattle.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/wifi-150x150.png" alt="802.11 Standard" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							802.11 Standard						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1997</span>
										</div>
															<p class="elementor-price-list-description">
							IEEE community created the 802.11 standard which is the standard that would make Wi-Fi feasible.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/ipv6-150x150.png" alt="IPv6 introduced" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							IPv6 introduced						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1998</span>
										</div>
															<p class="elementor-price-list-description">
							Internet protocol version 6  or IPv6 introduced with 128-bit addresses to allow 3.4 x 1038 unique addresses instead of the saturated 32-bit IPv4.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/3G-150x150.png" alt="3G" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							3G						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1998</span>
										</div>
															<p class="elementor-price-list-description">
							3G networks were introduced to allow data transmission at an acceptable speed to enable video calling and mobile internet. 						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Google-First-Page-150x150.png" alt="Google" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Google						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1998</span>
										</div>
															<p class="elementor-price-list-description">
							<b>Larry Page</b> and <b>Sergey Brin</b> founded google search engine. It started in 1996 as research project in Stanford. However the first Internet search engine ever invented was called "Archie" and it was meant to index FTP archives.  						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="/2018/03/internet-of-things-iot-definition/" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/IoT-150x150.png" alt="Internet of thing (IoT)" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Internet of thing (IoT)						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">1999</span>
										</div>
															<p class="elementor-price-list-description">
							Kevin Ashton introduced IoT concept as a title of a presentation made at Procter & Gamble (P&G) in 1999. Linking the new idea of RFID in P&G’s supply chain. <i><b>Read more</i></b>						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://web.archive.org/web/20040212031928/http://www.thefacebook.com:80/" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/skype-150x150.png" alt="Skype" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Skype						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2003</span>
										</div>
															<p class="elementor-price-list-description">
							Niklas Zennström and Janus Friis founded Skype.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://web.archive.org/web/20040212031928/http://www.thefacebook.com:80/" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/thefacebook-150x150.png" alt="Facebook" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Facebook						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2004</span>
										</div>
															<p class="elementor-price-list-description">
							Mark Zuckerberg launch the facebook at Harvard University, it was first called The Facebook.<b><i>View Source</b></i>						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://www.youtube.com/watch?v=jNQXAC9IVRw" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Youtube-First-Site-2005-150x150.png" alt="First Youtube Video" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							First Youtube Video						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2005</span>
										</div>
															<p class="elementor-price-list-description">
							First Youtube Video published, titled "Me at the zoo". <b>View</b>						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://twitter.com/jack/status/20" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/twttr-150x150.png" alt="Twitter Founded" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Twitter Founded						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2005</span>
										</div>
															<p class="elementor-price-list-description">
							@Jack Jack Dorsey, twitter founder, sends out the very first tweet: "just setting up my twttr." - <b><i>View Tweet</i>						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/4G-150x150.png" alt="4G" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							4G						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2008</span>
										</div>
															<p class="elementor-price-list-description">
							The 4th generation networks was released in 2008 to support faster mobile internet allowing gaming services, HD mobile TV, video conferencing, live streaming and other technologies that required higher network speeds.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/whatsapp-150x150.png" alt="Whatsapp" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Whatsapp						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2009</span>
										</div>
															<p class="elementor-price-list-description">
							Jan Koum and Brian Acton founded whatsapp before it was acquired by Facebook in 2014 in the famous $19 billion deal.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="https://loon.co" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/Google-Project-Loon-150x150.png" alt="Google Loon" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							Google Loon						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2013</span>
										</div>
															<p class="elementor-price-list-description">
							Loon project started in 2008 aiming to provide free internet to the globe. In 2013 google began pilot experiment in New Zealand where 30 balloons were launched in the island.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="#" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/5G-150x150.png" alt="5G" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							5G						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2020</span>
										</div>
															<p class="elementor-price-list-description">
							5G is said to be released in 2020, but speculation says that it will not be available to public before 2024. 5G promises a speed range of 1 to 10 Gbps.						</p>
								</div>
				</a></li>												<li><a class="elementor-price-list-item" href="/2018/03/internet-of-things-iot-definition/" target="_blank">									<div class="elementor-price-list-image">
					<img decoding="async" src="https://www.ciatec.com/wp-content/uploads/2018/07/IoT-150x150.png" alt="IoT Future" loading="lazy" />				</div>
				
				<div class="elementor-price-list-text">
									<div class="elementor-price-list-header">
											<span class="elementor-price-list-title">
							IoT Future						</span>
																		<span class="elementor-price-list-separator"></span>
																			<span class="elementor-price-list-price">2025</span>
										</div>
															<p class="elementor-price-list-description">
							75 billion devices are expected to be connected to the internet by 2025. <i><b>Read more</i></b>						</p>
								</div>
				</a></li>					
		</ul>

						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7d13185 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7d13185" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63cafcd" data-id="63cafcd" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c291fcb elementor-widget elementor-widget-spacer" data-id="c291fcb" data-element_type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-561fd59 elementor-widget elementor-widget-text-editor" data-id="561fd59" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Have we missed any milestones in the<strong> internet timeline</strong>? Share with us in the comments below.</i>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://www.ciatec.com/2018/07/internet-timeline-history/">The Internet Timeline</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ciatec.com/2018/07/internet-timeline-history/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
