<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Security Consultants Saudi Arabia, UAE, Lebanon, Kuwait</title>
	<atom:link href="https://www.ciatec.com/category/info-sec/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/category/info-sec/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Sat, 21 Dec 2019 12:34:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>Information Security Consultants Saudi Arabia, UAE, Lebanon, Kuwait</title>
	<link>https://www.ciatec.com/category/info-sec/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Device Security</title>
		<link>https://www.ciatec.com/2019/12/mobile-device-security/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 21 Dec 2019 11:33:25 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mobile Device Security]]></category>
		<category><![CDATA[Mobile Device Security Tips]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=3277</guid>

					<description><![CDATA[<p>Mobile Device Security Importance of mobile device security &#8211; In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Mobile Device Security<span style="color: #31aaa2;"><br />
</span></h2>
<p><strong>Importance of mobile device security &#8211;</strong> In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile devices.</p>
<p>It is estimated that the number of mobile phone users by 2019 will surpass five billion people around the globe. In addition to the social and economical effects of this massive increase, there is a definite increase in the number of cyber crimes. Cyber criminals have taken advantage of this massive growth and developed methods to take advantage of the increased number of possible targets.</p>
<p>There are many opportunities for cyber-criminals to access their targets: through apps, operating systems and software, and by identifying and taking advantages of defects in security before the programmers do and a patch a released.</p>
<h2><span style="color: #31aaa2;">Threats to Mobile Device Security</span></h2>
<p>An outdated view of hacking, malware or viruses would limit this activity to desktop computers or laptops. The reality is that mobiles are just as <strong>at risk</strong>. In fact, reported incidents are in the range of 16 million attacks. A mobile device can be at risk from several different methods, some of which include:</p>
<h3><span style="color: #31aaa2;"><strong>Malicious, or Insecure Apps</strong> </span></h3>
<p>Malicious or insecure apps contain cyber security flaws in data storage, communication, or authentication practices, meaning they contain at least one common security vulnerability that can be exploited.</p>
<h3><span style="color: #31aaa2;"><strong>Data Sniffing</strong></span></h3>
<p>Data sniffing by capturing, monitoring and scanning traffic moving across a network. Active sniffingwill monitor traffic and it can also alter it in some way to the like of the attacking party.</p>
<h3><span style="color: #31aaa2;"><strong>Fake WiFi Networks</strong> </span></h3>
<p>Fake WiFi networks poses as a legitimate wireless service provider to intercept information that users transmit.</p>
<h3><span style="color: #31aaa2;"><strong>Vulnerabilities</strong></span></h3>
<p>Vulnerabilities within operating systems can be used to gain control of mobile devices, and depending on the operating system and its software, some mobile devices can be easily patched. However, others may be more difficult to patch, which could leave them vulnerable.</p>
<h3><span style="color: #31aaa2;"><strong>Inactive Apps</strong></span></h3>
<p>Inactive apps that are installed on mobile devices but unused and have unsecured access to personal and corporate information pose a significant danger to devices if they are not uninstalled properly.</p>
<p>In addition to the above threats, mobile devices are also susceptible to physical attacks due to their portability.</p>
<p>But all is not lost. Here are some practical steps that will help you minimize the exposure of your mobile device to digital and physical threats.</p>
<h2>Mobile Device Security Tips</h2>
<p>&nbsp;</p>
<figure id="attachment_6250" aria-describedby="caption-attachment-6250" style="width: 1585px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-6250 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg" alt="Mobile Device Security tips" width="1585" height="1585" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg 1585w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-768x768.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-1024x1024.jpg 1024w" sizes="(max-width: 1585px) 100vw, 1585px" /><figcaption id="caption-attachment-6250" class="wp-caption-text">Mobile Device Security tips</figcaption></figure>
<h3><span style="color: #31aaa2;"><b>Use strong passwords and/or Bio-metrics</b></span></h3>
<p>Passwords are always important, but even more so when you consider that the device could be stolen and in the possession of someone who has unlimited access and time to try various values.</p>
<h3><span style="color: #31aaa2;"><strong>Screen Lock</strong></span></h3>
<p>The display should be configured to time out after a short period of inactivity and the screen locked with a password.</p>
<h3><span style="color: #31aaa2;"><strong>Remote Wipe/Sanitation</strong></span></h3>
<p>Many programs, such as <strong>Find my iPhone</strong> or <strong>Google Play Protect</strong>, even Microsoft Exchange Server (if an exchange email is configured on mobile device) allow you to send a command to the mobile device that will remotely clear the data on that device.</p>
<h3><span style="color: #31aaa2;"><strong>Physical Security</strong></span></h3>
<p>Mobile devices, such as tablets, mobile phones, and smartphones, must be properly stored and secured in a cabinet or safe when not in use.</p>
<h3><span style="color: #31aaa2;"><strong>Utilize VPN</strong></span></h3>
<p>Enforce the use of virtual private network (VPN) connections with a strong protocol like IPSec between the mobile device and enterprise servers, especially if connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Encrypt your device</strong></span></h3>
<p>Data should be encrypted on the device so that if it does fall into the wrong hands, it cannot be accessed in a usable form without the correct passwords.</p>
<h3><span style="color: #31aaa2;"><strong>Disable Unused Features</strong></span></h3>
<p>Every feature has the potential to be another point of vulnerability in a mobile system, so it&#8217;s good practice to disable any features that don&#8217;t serve a purpose in your organization.</p>
<h3><span style="color: #31aaa2;"><strong>Install an Antivirus Application</strong></span></h3>
<p>A mobile antivirus solution will protect devices against malicious code (such as xCodeGhost and iBackDoor) embedded in apps. Here is a quick list of the most popular mobile antivirus application:</p>
<ul>
<li>Kaspersky lab (<a href="https://itunes.apple.com/sa/app/kaspersky-safe-browser/id723879672?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.kms.free" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>McAfee (<a href="https://itunes.apple.com/gb/app/mobile-security-wifi-scan/id724596345?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.wsandroid.suite" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>ESET (<a href="https://play.google.com/store/apps/details?id=com.eset.ems2.gp" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>AVAST (<a href="https://itunes.apple.com/us/app/avast-security-photo-vault/id1276551855?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
</ul>
<h3><span style="color: #31aaa2;"><strong> Disable Wi-Fi and Bluetooth When Not Needed</strong></span></h3>
<p>Disable Wi-Fi and the discovery setting on Bluetooth connections to prevent bluejacking and bluesnarfing attacks and avoid connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Software Updates</strong></span></h3>
<p>Keep the mobile operating system and its apps up to date. Everything from the mobile operating system to the games and miscellaneous apps are potential gateways for hackers to compromise the mobile device. Updating mobile devices and apps on a regular basis ensures the best protection against most mobile security threats.</p>
<h2>Other mobile device security tips</h2>
<h3><span style="color: #31aaa2;"><strong>Perform Regular Mobile Device Security Audits</strong></span></h3>
<p>At least once a year, conducting mobile security audit helps companies keep their compliance programs up to date, effective and aimed in the right direction.</p>
<h3><span style="color: #31aaa2;"><strong>Perform User Education</strong></span></h3>
<p>Implement a continuous information security awareness and training program that teaches employees about mobile device threats and enterprise mobile device management and security policies.</p>
<h2><span style="color: #333333;"><strong>The Bottom Line in mobile device security<br />
</strong></span></h2>
<p>Mobile device security should be a primary concern. It isn’t simple to accomplish, and new attacks occur every day through new vulnerabilities. You need to always be aware of and notice anything unusual that happens on your device.</p>
<p>We hope that the tips mentioned in these article will help to enhance your mobile device security. If you like this article please subscribe to our newsletter and share with your friends.</p>
<p>Also check out how can you raise awareness among employees enhanced mobile devices usage and various other information security domain <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is SSL Certificate?</title>
		<link>https://www.ciatec.com/2019/07/what-is-ssl-certificate/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 16:38:17 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL Certificate]]></category>
		<category><![CDATA[Website Security]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6343</guid>

					<description><![CDATA[<p>What is SSL Certificate? SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website. In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>What is SSL Certificate?</h2>
<p>SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website.</p>
<p>In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address and credit card information.</p>
<p><img decoding="async" class="alignnone size-full wp-image-6349" src="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png" alt="Ciatec SSL Certificate" width="403" height="200" srcset="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png 403w, https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate-300x149.png 300w" sizes="(max-width: 403px) 100vw, 403px" /></p>
<h2>SSL Certificate components</h2>
<p>The certificate is composed of the following components:</p>
<ul>
<li>Digital signature of the issuing authority or the verifier</li>
<li>The certificate key or serial</li>
<li>Certificate expiry date</li>
<li>Certificate owner</li>
</ul>
<h2>Do you need SSL certificate for your website?</h2>
<p>If your website collects any sort of user information it will require an SSL certificate to keep the transfer of this information to-and-from the web server secure. Moreover, <a href="https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure/" target="_blank" rel="noopener noreferrer">google chrome started in July, 2018</a> marking website without SSL certificate as “Not Secure”. So if you care about your <a href="/seo" target="_blank" rel="noopener noreferrer">search engine ranking</a>, you definitely need to setup a certificate.</p>
<p>In the <a href="https://letsencrypt.org" target="_blank" rel="noopener noreferrer">Let’s Encrypt</a> era, where SSL certificates are given for free, the question is not whether you need a certificate for your website or not, because you most probably do. The question is whether you should go for a free or paid one.</p>
<h2>When should you start paying for your SSL Certificate?</h2>
<p>To answer this question first we need to look at the difference between free and paid certificates.</p>
<p><strong>Verification Level</strong><br />
Free certificates provides domain validation (DV) only, whereas paid versions provide organization validation (OV) and extended validation (EV), meaning that they provide validation for the site owner organization and not just the domain name.</p>
<p><strong>Duration</strong><br />
Free certificates usually have a validity period of three months while paid certificate can be renewed once every three years.</p>
<p><strong>Support and Warranty</strong><br />
All paid certificate comes with backend warranty several support packages to purchase and tech support are only a chat window or email message away. Obviously, free SSL comes with no warranties and if something goes wrong on the verifier’s side, you’re on your own.</p>
<p>So both choices provide a website with the famous green https lock. But the bottom line is that free certificates are great for a blog or an informative website that does not have much more than a simple contact form and a newsletter subscription. However, if trust a major issue for online business- and in most cases it is- especially in e-commerce websites, then paid certificate is the only option.</p>
<h2>Where to buy?</h2>
<p>When it comes to paid service providers there are many choices, where budget and service levels are the most deciding factors. To name a few service providers:</p>
<ul>
<li>DigiCert &#8211; <a href="https://www.digicert.com/" target="_blank" rel="noopener noreferrer">digicert.com</a></li>
<li>Symantec websecurity &#8211; acquired by Digicert in 2017</li>
<li>VeriSign &#8211; <a href="https://www.verisign.com/">verisign.com</a> acquired by Symantec in 2010</li>
<li>Sectigo &#8211; Formerly Comodo &#8211; <a href="https://sectigo.com" target="_blank" rel="noopener noreferrer">sectigo.com</a></li>
<li>GoDaddy &#8211; <a href="https://www.godaddy.com/web-security/ssl-certificate" target="_blank" rel="noopener noreferrer">godaddy.com</a></li>
<li>Network Solutions &#8211; <a href="https://www.networksolutions.com/SSL-certificates/index.jsp" target="_blank" rel="noopener noreferrer">networksolutions.com</a></li>
<li>Cheap SSL Security &#8211; <a href="https://cheapsslsecurity.com/" target="_blank" rel="noopener noreferrer">cheapsslsecurity.com</a></li>
<li>RapidSSL &#8211; <a href="https://www.rapidsslonline.com/ssl-brands/rapidssl/rapidssl-certificates.aspx" target="_blank" rel="noopener noreferrer">rapidsslonline.com</a></li>
</ul>
<h2>Need help?</h2>
<p>Hope that this article was helpful, if you require any help with setting up <strong>SSL certificate</strong> for your website let us know <a href="/contact">here</a>. We&#8217;ll be more than happy to help.</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</title>
		<link>https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 29 Jun 2019 07:15:54 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Fraud Warning]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Information Security in Banking]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6323</guid>

					<description><![CDATA[<p>Dubai&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching #SecureYourAccount campaign to raise awareness on banking fraud. The video released Thursday on social media channels of both Dubai Police and Emirates NBD bank uses Shaggy&#8217;s year 2000 hit &#8220;It wasn&#8217;t me&#8221; tune but with changed lyrics &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Dubai</strong>&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching <a href="https://www.linkedin.com/feed/hashtag/?keywords=%23SecureYourAccount" target="_blank" rel="noopener noreferrer"><strong>#SecureYourAccount</strong></a> campaign to raise awareness on banking fraud.</p>
<p>The video released Thursday on social media channels of both <a href="https://www.facebook.com/dubaipolicehq.en/videos/323008325289946/" target="_blank" rel="noopener noreferrer">Dubai Police</a> and <a href="https://twitter.com/EmiratesNBD_AE/status/1144866167040991232" target="_blank" rel="noopener noreferrer">Emirates NBD</a> bank uses Shaggy&#8217;s year 2000 hit &#8220;<em>It wasn&#8217;t me</em>&#8221; tune but with changed lyrics to warn users about banking fraud through social engineering techniques.</p>
<p>As Information security awareness professionals at <a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong></a>, we loved the video that got all the elements of a successful <a href="https://www.ciatec.com/services/information-security-awareness-program/#samples" target="_blank" rel="noopener noreferrer">information security awareness material</a>. It is a job well done conveying the message of keeping personal banking information safe using a 20 years well known rap song. This type of awareness material has proven to have a high penetration rate among audience.</p>
<p>Enjoy the video, and always remember to #SecureYourAccount.</p>
<hr />
<p><em><strong>Many organizations struggle to convey information security awareness material to users and customers. If that sound like your organization, <a href="https://www.ciatec.com/services/information-security-awareness-program/#quote" target="_blank" rel="noopener noreferrer">contact us</a> today to start your <a href="https://www.ciatec.com/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</strong></em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security Awareness Assessment Quiz for Employees</title>
		<link>https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Thu, 16 May 2019 19:40:34 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Employees security assessment]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Inofmration security training for employees]]></category>
		<category><![CDATA[Quiz]]></category>
		<category><![CDATA[security awareness assessment]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6292</guid>

					<description><![CDATA[<p>Information Security Awareness Assessment Quiz for Employees The first step in building a security awareness program is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly. The following security awareness assessment quiz is a beginner-level, 10 questions quiz &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">Information Security Awareness Assessment Quiz for Employees</span></h2>
<p>The first step in building a <a href="/services/information-security-awareness-program/">security awareness program</a> is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly.</p>
<p>The following security awareness assessment quiz is a <strong>beginner-level</strong>, <strong>10 questions quiz</strong> that can determine, for a certain extent, whether an employee is a security <strong>asset or a vulnerability</strong> that needs to be remediated. However, it is worth mentioning that there is no way to cover all information security domains in such a short quiz.</p>
<p>Similar information security trainings and <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulations</a>, along with comprehensive information security awareness material are all part of CIATEC&#8217;s information security awareness program. You can check program packages <a href="/services/information-security-awareness-program/#packages" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2><span style="color: #31aaa2;">Ready? Let&#8217;s go</span></h2>
<style type="text/css" id="wq-trivia-custom-css">.wq-quiz-6263 {
--wq-question-width: 100%;
--wq-question-color: #009cff;
--wq-question-height: auto;
--wq-bar-color: #31aaa2;
--wq-font-color: #444;
--wq-background-color: #f2f2f2;
}
</style><!-- wp quiz -->
<div id="wp-quiz-6263" class="wq_quizCtr single trivia_quiz wq-quiz wq-quiz-6263 wq-quiz-trivia wq-layout-single wq-skin-traditional" data-quiz-id="6263">
<div class="wq-questions wq_questionsCtr">
	<div class="wq-question wq_singleQuestionWrapper" data-index="0">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Your passwords should be easy to remember and hard to guess, which of the following is an example of strong password?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="856" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-300x201.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-768x514.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-1024x685.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="kmawp">
			<label class="wq_answerTxtCtr">Passw0rd</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1esrj">
			<label class="wq_answerTxtCtr">29Feb1980</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="nmba7">
			<label class="wq_answerTxtCtr">MyPetName</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="d4cit">
			<label class="wq_answerTxtCtr">$ayN02#ackers</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A password should be at least 8 characters long and includes special characters, numbers, a mix of uppercase and lowercase letters and doesn't not contain a dictionary word or phrase. This will make it hard to guess by hacking scripts.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="1">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Personal Identifiable Information (PII) is used to verify your identity and distinguish one person from another. Which of the following is an example of PII?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="864" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - PII" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-300x203.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-768x518.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-1024x691.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-220x150.jpg 220w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/TheDigitalWay-3008341/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">TheDigitalWay</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="8w1xi">
			<label class="wq_answerTxtCtr">ID Number</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4q279">
			<label class="wq_answerTxtCtr">Date of Birth</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="bstu9">
			<label class="wq_answerTxtCtr">Home Address</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="5f4g8">
			<label class="wq_answerTxtCtr">All of the answers are correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Personal identifiable information are "Personal" and should only be shared on need-to-know basis. Keep all your personal identifiable information (PII) to yourself and do NOT share it with any untrusted party.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="2">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? A phishing attack can harm your personal computer only, but not your company’s network.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="832" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-300x195.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-768x499.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-1024x666.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/Tumisu-148124/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Tumisu</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="n7qud">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="gr0io">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A phishing attack may download a worm or other form of malware that can easily spread over the network and cause harm to all computers, servers and network peripherals. </p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="3">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Information security is the responsibility of:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="745" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - NOC" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-300x175.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-768x447.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-1024x596.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="utjqb">
			<label class="wq_answerTxtCtr">Everyone in the company</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4j5vd">
			<label class="wq_answerTxtCtr">IT Security Department</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ubvl9">
			<label class="wq_answerTxtCtr">Security Guard</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="60lz5">
			<label class="wq_answerTxtCtr">Top Management</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Information security is everyone's responsibility.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="4">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? It is OK to use the same password for all your online accounts as long as you keep it a secret.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="918" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-300x215.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-768x551.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-1024x734.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="mlweo">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1ufy1">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Don't put all your eggs in one basket. You don't want all your accounts to be comprised just because one account is hacked. Use a separate password for each account. To remember your passwords, you can fix a part of the password and make the second part variable and linked some how to the service used.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="5">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Spear Phishing is:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="768" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg" class="attachment-full size-full" alt="Information-Security-Awareness-Assessment-Quiz-for-Employees Spear" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-300x225.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-768x576.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
			<span><a href="https://www.freepik.com/free-photos-vectors/character">Character vector created by freepik </a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="viyvh">
			<label class="wq_answerTxtCtr">An attack on your company’s email server</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vj4vp">
			<label class="wq_answerTxtCtr">A phishing attempt targeting you personally</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="xb0vj">
			<label class="wq_answerTxtCtr">A random attempt to hack any point of weakness</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="qzrx7">
			<label class="wq_answerTxtCtr">A massive spam email attack on all employees</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Spear phishing is a unique form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.
Spear phishing works better than phishing because it uses information that it can find about you from email databases, friends’ lists, and the like. You can learn about the different types of phishing <a href="/2018/02/phishing-techniques/">here</a></p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="6">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Hackers can crack your passwords by repeatedly trying to guess it. This password cracking method is called:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="854" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password Hack" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-1024x683.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span> Photo by Soumil Kumar from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="k3gy1">
			<label class="wq_answerTxtCtr">The “G” attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vv26h">
			<label class="wq_answerTxtCtr">Brute-Force attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="sif2m">
			<label class="wq_answerTxtCtr">Phishing attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="wxdt9">
			<label class="wq_answerTxtCtr">None of the answers is correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A brute-force attack works by repeatedly trying to guess your password until it is cracked. That is why you should always use long and complex passwords that will take ages to guess.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="7">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False: Physical security is NOT related to information security.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="853" src="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-1024x682.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/PublicDomainPictures-14/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">PublicDomainPictures</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="hiu9q">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="a7sbm">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Physical security controls are at the heart of any information security program. At the end of the day, information assets are stored on physical media such as hard disks, flash drives or simply papers.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="8">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>The FIRST objective of a "Security Aware Employee" is to be able to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1279" height="838" src="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg 1279w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-300x197.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-768x503.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-1024x671.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" />	
			<span> Photo by Miguel Á. Padriñán from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="i48j9">
			<label class="wq_answerTxtCtr">Avoid a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="8jfnq">
			<label class="wq_answerTxtCtr">Manage a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="7ydt1">
			<label class="wq_answerTxtCtr">Report a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ix6gb">
			<label class="wq_answerTxtCtr">Recognize a security threat</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">The first step in the information security awareness ladder is to make sure that the average employee is able to identify threats and then report it to the right party. Threat avoidance and management are not the main responsibility of an average employee.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="9">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Tailgating is a form of social engineering that allows hackers to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-768x768.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="uv321">
			<label class="wq_answerTxtCtr">Watch company’s main gate 24/7</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="fruct">
			<label class="wq_answerTxtCtr">Get unauthorized access to restricted areas</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="9vd90">
			<label class="wq_answerTxtCtr">Watch employees as they leave the gate</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vaw5z">
			<label class="wq_answerTxtCtr">Following an employee after leaving work</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">In information security, tailgating is a social engineering technique used by hackers to deceive organization's officials through direct speech or actions in order to gain access into restricted areas. An example of tailgating is when one person tags along with an authorized employee to access a building or pass a certain checkpoint.</p>
		</div>
	</div>

	
</div>
</div>
<div class="wq-results wq_resultsCtr">
	<span class="wq-result-quiz-title wq_quizTitle">Information Security Awareness Assessment Quiz for Employees</span>
<div class="wq-result wq_singleResultWrapper" data-id="ffvm7">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">Your score is low. Security awareness is urgently needed. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/0-4-Score.jpg" alt="Awareness Quiz low score"></div>

	
	<div class="wq_resultDesc">We highly recommend that you get involved in an information security awareness program that will help you recognize cyber security threat when you see one. The good news is that we are here to help. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a></div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="497nf">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">There is a room for improvement. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/5-7-score.jpg" alt="Awareness Quiz score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a sense of security when it comes to cyber threats, but there room for some improvement. We can help you with that. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="38y5z">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">You have a good sense of security, you are an asset! <br>
<img decoding="async" src="/wp-content/uploads/2019/05/8-10-score.jpg" alt="Awareness Quiz high score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a very good sense of security when it comes to cyber threats in the subject domains. But what about your colleagues? Do they all have the same security awareness level? <br>
A well implemented security awareness program will harden the human layer of security of security.<a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<!-- social share -->
<div class="wq-share wq_shareCtr">
			<p style="font-size: 14px;">Share your Results:</p>
	
			<button class="wq-share-fb wq_shareFB" data-url="https://www.ciatec.com/category/info-sec/feed"><i class="sprite sprite-facebook"></i><span>Facebook</span></button>
	
			<button class="wq-share-tw wq_shareTwitter" data-url="https://www.ciatec.com/category/info-sec/feed"><i class="sprite sprite-twitter"></i><span>Twitter</span></button>
	
	
	</div>
<!--// social share-->
</div><!-- End .wq-results -->
<!-- retake button -->
<div class="wq-retake-quiz wq_retakeQuizCtr">
	<button class="wq-retake-quiz-btn wq_retakeQuizBtn" type="button">
		<i class="wq-icon wq-icon-undo"></i>&nbsp; Play Again!	</button>
</div>
<!-- // retake button -->
</div>
<!-- // wp quiz-->

<h2><span style="color: #31aaa2;">Interested in our information security awareness services?</span></h2>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</title>
		<link>https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 04 May 2019 09:43:31 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Phishing Simulation]]></category>
		<category><![CDATA[Phishing training]]></category>
		<category><![CDATA[Phishing training for employees]]></category>
		<category><![CDATA[Phishmark]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6155</guid>

					<description><![CDATA[<p>PhishMark: Phishing Training and Awareness Solution for Employees Why do companies need phishing training and awareness solution for their employees? &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)! And this year 9 out of &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">PhishMark: Phishing Training and Awareness Solution for Employees</span></h2>
<p><strong>Why do companies need phishing training and awareness solution for their employees?</strong> &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)!<br />
And this year 9 out of 10 phishing attempts are ransomware attacks that encrypts your data and won’t release it unless a ransom is paid.<br />
And no matter how big the investment in high-tech security solutions is, the number of breaches from phishing and complicated social engineering attacks continue to rise bypassing all network security defenses and often making its way into users mailboxes. Luckily, Phishmark is here to reduce this risk, especially when implemented as part of a comprehensive <a href="/cyber-security-awareness/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">What is Phishmark?</span></h2>
<p><a href="http://www.phishmark.com" target="_blank" rel="noopener noreferrer"><strong>PhishMark</strong></a> is an affordable phishing simulation framework that allows information security staff to schedule and launch phishing simulation campaigns utilizing a variety of ready-made email templates. Campaign results will identify, in-real time, the users who took the bait, and provide awareness material on the spot by redirecting them into a pre-designed educational landing page. Statistical reports will provide top management with an overview of the current status and the progress of users in identifying and reporting phishing attacks and adapting safe habits.</p>
<h2><span style="color: #31aaa2;">Phishing Training for Employees &#8211; Life Cycle</span></h2>
<p>Once-a-year security awareness and training session is one way of doing things, yet, it is not enough! You need an on-going solution that meets the trends and can point out the weakest link so you can harden it.<br />
CIATEC’s PhishMark is the solution you need to empower &#8220;<strong>the human firewall</strong>&#8220;!</p>
<figure id="attachment_6177" aria-describedby="caption-attachment-6177" style="width: 300px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6177" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png" alt="Phishing Training for Employees Life Cycle" width="300" height="297" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-6177" class="wp-caption-text">Phishing Training for Employees Life Cycle</figcaption></figure>
<p>Phishmark is a phishing training and awareness solution for employees that goes around the year running simulations to cover every angle a hacker might use to get into a company&#8217;s network through phishing and social engineering attacks. We follow the below steps:</p>
<ol>
<li><strong>Baseline</strong>: The first step is to establish baseline by running an initial campaign.</li>
<li><strong>Train</strong>: Provide awareness material based on the results of the first campaign.</li>
<li><strong>Phish</strong>: Run new phishing campaign.</li>
<li><strong>Analyze</strong>: Analyze the results and measure the progress.</li>
</ol>
<p>It is important to note that Phishmark is proven to provide better results when integrated with Ciatec&#8217;s <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">PhishMark &#8211; Phishing Training Main Features</span></h2>
<h3>Dashboard</h3>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-6187 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg" alt="PhisMark - Phishing Training for employees" width="1601" height="332" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg 1601w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-300x62.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-768x159.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-1024x212.jpg 1024w" sizes="(max-width: 1601px) 100vw, 1601px" /></p>
<p>PhishMark will show a dashboard for all campaigns as well as separate dashboard for every single campaign. The dashboard will show:</p>
<ol>
<li>Number of phishing simulation emails &#8220;or baits&#8221; successfully delivered.</li>
<li>Number of employees that opened the simulation phishing email.</li>
<li>Percentage of employees that actually took the bait, i.e.; clicked the link.</li>
<li>Number of users who actually submitted data to the pretend hacker.</li>
<li>And finally, the information security specialist running the simulation will be able to count the number of employees that actually reported the threat.</li>
</ol>
<h3>Email Templates</h3>
<p>Administrator will be able to create his own email templates that fits his organization. Or use ready-made email templates covering many domains and season, including: Banking, social media, eCommerce and many more.</p>
<h3>Grouping Users</h3>
<p>The solution allows creation of target groups. Useful for targeting every department with a separate phishing campaign.</p>
<h3>Landing Pages</h3>
<p>Employees who fall victims for phishing campaigns will be redirected to a previously designed landing page similar to the below. Administrator is free to use ready-made phishing awareness landing pages provided by PhishMark, or upload his/her own.</p>
<figure id="attachment_6190" aria-describedby="caption-attachment-6190" style="width: 1024px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6190" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg" alt="Phishmark Phishing Training &amp; Awareness Landing Page" width="1024" height="683" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-768x512.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-6190" class="wp-caption-text">Example Landing Page</figcaption></figure>
<hr />
<h2><span style="font-size: 14pt; color: #31aaa2;">Questions?</span></h2>
<p><span style="font-size: 14pt;">Ask us on ask@ciatec.com or <a href="/contact"><strong>contact us</strong></a> today to start using PhishMark to <strong>Phish</strong> and <strong>Mark</strong> employees that need further training and awareness on phishing and social engineering.</span></p>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CIATEC signs partnership agreement with PECB</title>
		<link>https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 06 Apr 2019 13:23:29 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ISO Audit]]></category>
		<category><![CDATA[ISO Training]]></category>
		<category><![CDATA[Partners]]></category>
		<category><![CDATA[PECB]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6089</guid>

					<description><![CDATA[<p>CIATEC is thrilled to announce its newly signed partnership agreement with PECB, the well-known ISO certification and training provider. By signing this agreement, CIATEC is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to: Information Security &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong> </a>is thrilled to announce its newly signed partnership agreement with <strong>PECB</strong>, the well-known ISO certification and training provider. By signing this agreement, <strong>CIATEC</strong> is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to:</p>
<ul>
<li><strong>Information Security Management</strong>: ISO/IEC 27001 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Information Security</a>.</li>
<li><strong>IT Security</strong>: ISO/IEC 27032 Cyber Security and ISO/IEC 27035 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Incident Management</a>.</li>
<li><strong>Continuity and Resilience</strong>: ISO 22301 Business Continuity Management System.</li>
<li><strong>Service Management</strong>: ISO/IEC 20000 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">IT Service Management</a> and ISO/IEC 55001 Asset Management.</li>
<li><strong>Quality Management Systems</strong> (example: ISO 9001 Quality Management Systems, ISO 13053 Six Sigma, ISO 21500 Project Management).</li>
<li><strong>Health, Safety and Environment</strong> (example: ISO 14001 Environmental Management, ISO 22000 Food Safety Management, ISO 45001 Occupational Health and Safety Management).</li>
</ul>
<blockquote class="alignleft "><p>together we can build a strong and value-based society <cite>Eric Lachapelle, CEO of PECB</cite></p></blockquote>
<p>PECB issued an official press release announcing this partnership, where Mr. Eric Lachapelle, CEO of PECB, expressed PECB&#8217;s determination to make a renewed and positive contribution towards building a strong value-based society (<em><strong>Read full press release</strong> <strong><a href="https://pecb.com/en/newsDetail?nid=1027&amp;lid=1" target="_blank" rel="noopener noreferrer">here</a></strong></em>).</p>
<p>&nbsp;</p>
<p>At CIATEC, we truly believe that adopting and adapting internationally recognized standards and frameworks can transform organizations and lift them up to a whole new level. And this partnership with PECB will definitely contribute to CIATEC&#8217;s mission to provide our clients with the highest quality of management systems implementation, consulting and training services. We look forward to a successful long-term partnership with PECB.</p>
<h4 class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;size&quot;:10}" data-doc-id="4397000283481219"><span style="color: #31aaa2;">About PECB </span></h4>
<p>PECB is a certification body for persons, management systems, and products on a wide range of international standards. As a global provider of training, examination, audit, and certification services, PECB offers its expertise on multiple fields, including but not limited to Information Security, IT, Business Continuity, Service Management, Quality Management Systems, Risk &amp; Management, Health, Safety, and Environment. For more detailed information regarding PECB principal objectives and activities, visit <a href="https://www.pecb.com" target="_blank" rel="noopener noreferrer">www.pecb.com</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Successful Cyber Security Awareness Program Elements</title>
		<link>https://www.ciatec.com/2019/02/cyber-security-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 13:42:16 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4928</guid>

					<description><![CDATA[<p>The Cyber Security Awareness Program Every Organization Needs Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to Gartner, spending on information security products and services reached a value of $114 billion US dollars in 2018, with an increase of 12.4 percent from 2017. On the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #31aaa2;"><span style="color: #800000;">The Cyber Security Awareness Program Every Organization Needs</span><br />
</span></h3>
<p>Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to <a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019" target="_blank" rel="noopener noreferrer">Gartner</a>, spending on information security products and services reached a value of <strong>$114 billion US dollars</strong> in 2018, with an increase of 12.4 percent from 2017. On the other hand, the average total cost of a data breach in 2017 was<strong> $3.62 million </strong>according to<a href="https://www.ibm.com/downloads/cas/ZYKLN2E3" target="_blank" rel="noopener noreferrer"> IBM and Ponemon Institute</a>. And 2019 forecasts are not any better. When you dig deeper in the studies, you realize that a high percentage of data breaches surprisingly took place in organizations of high IT security budget. And while some attacks could be traced back to disgruntled workers, a great deal of other attacks are simply a result of actions done by naive and non-harmful employees that simply weren&#8217;t well informed.</p>
<p>Over the past years, IT became the main enabler of almost every business. And security has always been a major concern. Implementing a security awareness program has become a must for an organization, regardless of it&#8217;s size, industry, or location.</p>
<figure id="attachment_5628" aria-describedby="caption-attachment-5628" style="width: 2415px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5628 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg" alt="Cyber Security Awareness Maturity Model" width="2415" height="1116" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg 2415w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-300x139.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-768x355.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-1024x473.jpg 1024w" sizes="(max-width: 2415px) 100vw, 2415px" /><figcaption id="caption-attachment-5628" class="wp-caption-text">Cyber Security Awareness Maturity Model [Source: SANS Institute]</figcaption></figure>At <strong>CIATEC</strong>, <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer"><strong>information security awareness</strong></a> is one of the main services provided. Our Security awareness program is a continuous cycle that goes around year. A well implemented security awareness program helps preventing a breach or at least mitigate the risks. In this article, we compiled lists of:</p>
<ul>
<li><a href="#main-reasons-of-cyber-security-breaches">Main causes of Cyber Security Breaches</a></li>
<li><a href="#Importance-Cyber-Security-Awareness-Training">Importance of Cyber Security Awareness and Training</a></li>
<li><a href="#Cyber-Security-Awareness-Topics">Cyber Security Awareness Topics</a></li>
<li><a href="#Cyber-Security-Awareness-Channels">Cyber Security Awareness Channels</a></li>
</ul>
<h3><span style="color: #800000;"><a id="main-reasons-of-cyber-security-breaches"></a>Top Reasons of Cyber Security Breaches</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>&nbsp;</p>
<figure id="attachment_5626" aria-describedby="caption-attachment-5626" style="width: 1677px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg"><img loading="lazy" decoding="async" class="wp-image-5626 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg" alt="" width="1677" height="736" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg 1677w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-300x132.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-768x337.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-1024x449.jpg 1024w" sizes="(max-width: 1677px) 100vw, 1677px" /></a><figcaption id="caption-attachment-5626" class="wp-caption-text">Reasons of Cyber Security Breaches</figcaption></figure>
<h4>1- Uninformed Employees</h4>
<p>Uninformed, naive and non-harmful employees lacking information security awareness and training tops the list of causes. Our experience taught us that technology alone cannot completely secure IT environments, there will always be the human factor involved, whether within IT department side or at end users side. Unfortunately, human brain cannot be patched same as a computer! It can only be nourished by knowledge, <a href="/services/training-courses/" target="_blank" rel="noopener noreferrer">training</a> and <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness material</a>.</p>
<p>It only takes one single uninformed employee who takes the bait of a phishing email to compromise organization&#8217;s cyber security.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Deploy <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">Information Security Awareness Program</a> that goes around the year and keep it up-to-date with the latest threat trends, accompanied with <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulation solution</a>.</em></p>
<h4>2- Human Errors</h4>
<p>Human errors of regular IT users are always a threat. However, the bigger threat are the errors done by IT administrators! Lack of knowledge, sometimes lack of focus leads to configuration errors that leaves some doors open for hackers.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Adapt a framework or a standard that organizes change, event, problem and incident management, such as ISO 27001, ISO 20000 or ITIL.</em></p>
<h4>3- Malware</h4>
<p>Successful malware attacks such as ransomware, viruses, worms, and trojans are always a threat to cyber security and a reason behind security breaches.</p>
<p><strong><span style="text-decoration: underline;"><span style="text-decoration: underline;">Hint</span></span></strong>: <em>Train your staff on how to deal with malware attacks and apply <a href="/services/defenses-and-controls/" target="_blank" rel="noopener noreferrer">endpoint security</a> best practices.</em></p>
<h4>4- Stolen Devices</h4>
<p>Laptops and mobile devices that are sometimes stolen during commuting or traveling pose a significant risk that should be handled by risk management.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Raising <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness</a> and applying mobile devices encryption.</em></p>
<h4>5- Disgruntled workers</h4>
<p>Dissatisfied employees and third-party contractors with bad intentions.</p>
<p><em><strong>Hint</strong>: Deploy proper employee termination, segregation of duties, and vendor management processes.</em></p>
<h4>6- Lack of Funds</h4>
<p>Low cyber security budget is a problem on its own for some organizations. While other organizations fall in the trap of &#8220;budget maldistribution&#8221;, where most of the budget goes for sophisticated security software and hardware appliances while employees information security awareness and training are neglected; <strong>Big Mistake!</strong></p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>If there is no way to increase cyber security budget, existing budget should at least be distributed properly.</em><span style="color: #0000ff;"><br />
</span></p>
<h3><span style="color: #800000;"><a id="Importance-Cyber-Security-Awareness-Training"></a>What will Security Awareness and Training add?</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Cyber security awareness and training provides the following benefits:</p>
<figure id="attachment_5622" aria-describedby="caption-attachment-5622" style="width: 1408px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg"><img loading="lazy" decoding="async" class="wp-image-5622 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg" alt="" width="1408" height="390" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg 1408w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-300x83.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-768x213.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-1024x284.jpg 1024w" sizes="(max-width: 1408px) 100vw, 1408px" /></a><figcaption id="caption-attachment-5622" class="wp-caption-text">Benefits of Cyber Security Awareness</figcaption></figure>
<h4>1-  Hardening the Last Layer of Defense</h4>
<p>Employees are the last layer of defense, and in some case they are the first layer, depending on the nature of the attack. Yet, they are the weakest link in the cyber security chain, this has become a universal truth. A well implemented and maintained cyber security awareness program will insure hardening this link and empowering a stronger network.</p>
<h4>2- Compliance Requirement</h4>
<p>All major information security standards and frameworks such as ISO/IEC 27001 requires an <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a> to be in place.</p>
<h4>3- Adapt with the Continuously Changing Threats</h4>
<p>The complexity of threats and attacks is increasing every day. Cyber security units needs to keep up and more importantly, cyber security awareness units needs to keep all users informed about the latest threats and cyber attacks trends.</p>
<h4>4- Increase Engagement</h4>
<p>Does your organization have an information security handbook containing all your information security policies? Is it updated and distributed to users on regular basis? If so, how many of them do actually read it, understand it and become familiar with its content?</p>
<p>With awareness things are different. Running cyber security awareness campaigns all over the year and on various channels will create a culture of security within the organization and engage employees in information security practices.</p>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Topics"></a>Cyber Security Awareness Topics</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Importance of cyber security awareness topics varies from one organization to another. Each organization has its own priorities. Yet, it is always recommended to work holistically on covering all topics when implementing a cyber security awareness program. The major topics that should be covered in an information security awareness program:</p>
<figure id="attachment_5624" aria-describedby="caption-attachment-5624" style="width: 2406px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5624 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg" alt="" width="2406" height="676" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg 2406w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-300x84.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-768x216.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-1024x288.jpg 1024w" sizes="(max-width: 2406px) 100vw, 2406px" /><figcaption id="caption-attachment-5624" class="wp-caption-text">Cyber Security Awareness Topics</figcaption></figure>
<h4>1- Physical Security</h4>
<p>Physical security is a sub-domain of information security that goes beyond IT to address issues related to entrance points, locked doors, drawers, cabinets, desks, as well as desktops, laptops and mobile devices security. Users should be aware and able to deal with physical security threats of all kinds.</p>
<h4>2- Data Security</h4>
<p>Cyber security is all about protecting information assets, right? Educating users on how to handle data security should be a major topic in any cyber security awareness program.</p>
<h4>3- Print Security</h4>
<p>Whether in hard copies or in soft copies, information needs to be secured. Print security is one of the many topics address in information security awareness program.</p>
<p>In addition to making users aware of concepts of secure printing, there are plenty of built-in and third-party printing solution that can be of great use in implementing secure printing policies.</p>
<h4>4- Network and Wireless Security</h4>
<p>Given the insecure nature of wireless networks, enterprises counts on employees awareness to better harden this area. An organization owned laptop or other mobile device, has at least 10 wireless networks SSID stored. SSID&#8217;s of office, home, airport, hotel, coffee shop&#8230;etc. Sniffing can occur on any wireless network jeopardizing the organization information assets. Hence, wireless network security awareness.</p>
<p>On the other hand, with sophisticated wired network security solutions, organizations might reach a significant level of security. Yet, awareness is always needed to harden the weakest link.</p>
<h4>5- Data Destruction</h4>
<p>Security doesn&#8217;t stop when you stop using a certain device. If a device still got your data, security policies will still apply, even if the device is not used any more. And if the device is to be disposed, it must be disposed securely. Cyber security awareness programs should cover topics on how to get rid of old devices in a secure manner.</p>
<h4>6- Password Security</h4>
<p>Password security is one of the most challenging domains in cyber security awareness. A lot of resistance is found here, users hate to be forced to remember new passwords and have a difficulty creating new passwords that meet complexity requirements.</p>
<p>Luckily, there is a solution: <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">CIATEC&#8217;s information security awareness program</a> helps users get over this.</p>
<h4>7- Phishing and Email Security</h4>
<p>Phishing attacks are getting serious. 9 out of 10 phishing attacks are now ransomware, and pseudo ransomware is a new trend. Pseudo ransomware attacks are here to make users pay a ransome for data that is not even encrypted!</p>
<p>Training on how to avoid phishing scams and what to do in the event of an attack is a high priority in cyber security awareness program. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing awareness and training</a> cycle goes through four steps: <strong>Asses</strong>, <strong>Educate</strong>, <strong>Phish</strong>, <strong>Get results</strong>, and <strong>REPEAT</strong>. Phishing awareness, like any other cyber security awareness component, is a continuous cycle.</p>
<p>For more info about phishing awareness: <a href="https://www.ciatec.com/phishing" target="_blank" rel="noopener noreferrer">ciatec.com/phishing</a></p>
<h4>8- Malware</h4>
<p>Users in any business industry, size, or even home users should have the ability to identify a malware attack when they see one. It is also important that users identify the malware type (virus, trojan, worm, adware, spyware, ransomware&#8230;). But what&#8217;s more important is to know how to act in the event of malware infection. A good cyber security awareness program should provide this know how.</p>
<h4>9- Mobile Devices Security</h4>
<p>Mobile devices, whether personal or corporate owned, holds information assets that must be protected. Mobile devices security is a serious topic that should be addressed thoroughly in a corporate cyber security awareness program.</p>
<h4>10- Browser Security</h4>
<p>Training users on how to check URLs and ssl encrypted site (i.e.<em>,</em><em>https</em>), keeping browsers up-to-date, minimal plugin usage, and scan any downloaded files are basic browser security awareness material.</p>
<blockquote><p>Cyber Security is everyone&#8217;s responsibility.</p></blockquote>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Channels"></a>Cyber Security Awareness Channels</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Communicating the information is as important as the information itself. What fits one organization, may not necessarily fit another. Communicating cyber security awareness material to the right audience and using the right channels is what an awareness program is all about. Here is a list of the most commonly used cyber security awareness channels.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-youtube-play " ></i> </span>Educational Videos</h4>
<p>Videos are one of the most effective learning material. CIATEC provides cyber security awareness videos hosted on CIATEC&#8217;s servers or on client&#8217;s portal. Like all cyber security awareness material, videos are continuously updated to keep up with the latest cyber security awareness trends as well as latest animation trends.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-picture-o " ></i> </span>Billboard or Roll-up Banners</h4>
<p>A roll-up banner in a meeting room, in the lobby, or any other public space will help raising cyber security awareness without an effort.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-desktop " ></i> </span>Screen Posters</h4>
<p>Same as roll-up banners, displaying cyber security awareness material on screens if available in public places will help raising cyber security awareness by targeting all staff.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-envelope-o " ></i> </span>Email Posters and Newsletters</h4>
<p>Email posters and newsletter is another channel, that can become handy when trying to address specific topics in cyber security awareness program. Especially, when presented as an element of a bigger campaign.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-gamepad " ></i> </span>Gaming material</h4>
<p>This has also proved to be one of the most effective techniques to pass the awareness message in atmosphere of fun and entertainment. Whether a simple cross-words puzzle or matching gaming, or much more sophisticated information security gaming material, it all helps to easily relay the information to users.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-book " ></i> </span>Educational Magazine</h4>
<p>Educational magazines, whether as e-magazine, email newsletter or a paperback. When published and distributed on regular basis it will keep users informed of the latest security trends and how to avoid breaches.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-users " ></i></span> Information Security Courses, Workshops, and Quizzes</h4>
<p>Old fashion class room training courses, and online courses are always a good channel to reach out to employees. In training, it is advised to group employees based on trades or departments. This way the trainer can address specific security topic that may be associated with the audience trade.</p>
<p>Training should also be followed by a quiz to measure cyber security awareness and training effectiveness.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-anchor " ></i></span> Phishing Simulations</h4>
<p>Proven to be one of the most effective ways to identify points of weakness against phishing attacks. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing simulations awareness campaigns</a>, as part of overall cyber security awareness program, use hundreds of templates and provides accurate reports identifying:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Users who opened the simulation email.</li>
<li>Users who clicked on links.</li>
<li>Users who submitted sensitive data.</li>
</ul>

		</div>
	
<p>This way, information security team can identify and educate employees accordingly. <em>Contact us <a href="/services/phishing-awareness/#quote" target="_blank" rel="noopener noreferrer">here</a> to start a phishing awareness campaign.</em></p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-globe " ></i> </span>Dedicated Information Security Portal and Mobile App</h4>
<p>A dedicated information security web portal will serve as a reference for all users in all information security matters within the organization and will help keeping users well informed. It may contain the below elements:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Information security policies.</li>
<li>Latest news about cyber security threats.</li>
<li>Educational posts.</li>
<li>Interactive educational videos with questions and answers.</li>
<li>Educational games and quizzes.</li>
<li>Information security courses.</li>
</ul>

		</div>
	
<p>A dedicated cyber security awareness mobile app is even better. It will allow information security units to reach users on the go.</p>
<p><strong>Hint</strong>: <em>By combining our <a href="/services/web-mobile-apps-ecommerce-consulting/" target="_blank" rel="noopener noreferrer">web and mobile enablement</a> skills along with <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">security awareness services</a>, CIATEC can build your information security web portal and mobile app in no time!</em></p>

		<div class="clearfix"></div>
		<hr style="margin-top:20px; margin-bottom:10px;" class="divider divider-solid">
	
<h3><span style="color: #800000;">Conclusion</span></h3>
<p>Cyber security awareness is no longer an option. It is a significant layer of security that every IT-enabled organization must have.</p>
<p><em><strong>CIATEC</strong>&#8216;s cyber security <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness program</a> is designed to help organizations of various sizes and industries to minimize the risk of data breaches. <a href="/contact" target="_blank" rel="noopener noreferrer">Contact us</a> today to start building your own program.</em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</title>
		<link>https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 30 Jan 2019 10:33:23 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5687</guid>

					<description><![CDATA[<p>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221; If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime. Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221;</strong></p>
<p>If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime.</p>
<p>Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the phone!</p>
<p>The bug was reported in January 21st by <a href="https://twitter.com/MGT7500" target="_blank" rel="noopener">@MFT7500</a></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to <a href="https://twitter.com/AppleSupport?ref_src=twsrc%5Etfw">@AppleSupport</a>&#8230;waiting to hear back to provide details. Scary stuff! <a href="https://twitter.com/hashtag/apple?src=hash&amp;ref_src=twsrc%5Etfw">#apple</a> <a href="https://twitter.com/hashtag/bugreport?src=hash&amp;ref_src=twsrc%5Etfw">#bugreport</a> <a href="https://twitter.com/FoxNews?ref_src=twsrc%5Etfw">@foxnews</a></p>
<p>&mdash; MGT7 (@MGT7500) <a href="https://twitter.com/MGT7500/status/1087171594756083713?ref_src=twsrc%5Etfw">January 21, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>It is worth mentioning that this major privacy issue was reported days before the world celebrated <a href="https://twitter.com/hashtag/dataprivacyday" target="_blank" rel="noopener">#DataPrivacyDay</a> on January 28th.</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR Explained in 2 Minutes (Video Inside)</title>
		<link>https://www.ciatec.com/2018/05/gdpr-explained-2-minutes-video/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 29 May 2018 11:10:41 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[GDPR]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=3066</guid>

					<description><![CDATA[<p>GDPR: the new sheriff in town!  The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy and to reshape the way organizations across the region approach data privacy. What is GDPR? At its core, GDPR is a &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/05/gdpr-explained-2-minutes-video/">GDPR Explained in 2 Minutes (Video Inside)</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #000000;"><strong>GDPR: the new sheriff in town! </strong></span></h2>
<p><span style="color: #000000;">The <a href="https://www.eugdpr.org/" target="_blank" rel="noopener"><strong>EU General Data Protection Regulation</strong></a><strong> (GDPR)</strong> replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy and to reshape the way organizations across the region approach data privacy.</span></p>
<h2><span style="color: #000000;"><strong>What is GDPR?</strong></span></h2>
<p><span style="color: #000000;">At its core, GDPR is a new set of rules designed to give EU citizens more control over their personal data. It aims to simplify the regulatory environment for business so both citizens and businesses in the European Union can fully benefit from the digital economy.</span></p>
<h2><span style="color: #000000;"><strong>The GDPR applies if: </strong></span></h2>
<ol>
<li><span style="color: #000000;">Your company processes personal data and is based in the EU, regardless of where the actual data processing takes place; or</span></li>
<li><span style="color: #000000;">Your company is established outside the EU but offers goods or services to, or monitors the behavior of, individuals within the EU.</span></li>
</ol>
<h2><span style="color: #000000;"><strong>What is personal data under the GDPR?</strong></span></h2>
<p><span style="color: #000000;">Personal data is defined as any information related to a natural person or data subject that can be used to identify the person directly or indirectly.</span></p>
<h2><span style="color: #000000;"><strong>Some key points to note in respect of GDPR:</strong></span></h2>
<p><span style="color: #000000;">Organizations must maintain a Personal Data Breach Register and, based on severity, the regulator and data subject should be informed within 72 hours of identifying the breach.</span></p>
<p><span style="color: #000000;">Fines for breaches of certain important provisions can amount to up to <strong>€20 million or 4% of global annual turnover</strong>, whichever is the greater. </span></p>
<h2>Individuals&#8217; rights under the GDPR</h2>
<p><span style="color: #000000;">All individuals in the EU will have the following rights with regards to their personal data:</span></p>

		<div class="starlist tie-list-shortcode">
<ul>
<li><span style="color: #000000;">Individuals have the right to be informed about the collection and use of their personal data.</span></li>
<li><span style="color: #000000;">Individuals have the right to access their personal data.</span></li>
<li><span style="color: #000000;">Individuals have the right to request the restriction or suppression of their personal data.</span></li>
<li><span style="color: #000000;">Individuals have the right to obtain and reuse their personal data for their own purposes across different services.</span></li>
<li><span style="color: #000000;">Individuals have the right to object to the processing of their personal data in certain circumstances.</span></li>
<li><span style="color: #000000;">The GDPR includes a right for individuals to have inaccurate personal data rectified, or completed if it is incomplete.</span></li>
<li><span style="color: #000000;">The GDPR introduces a right for individuals to have personal data erased. The right to erasure is also known as &#8220;<strong>the right to be forgotten</strong>&#8220;.</span></li>
</ul>

		</div>
	
<h2><span style="color: #000000;"><strong>Do we need to appoint a Data Protection Officer (DPO)?</strong></span></h2>
<p><span style="color: #000000;">Under the GDPR, an organization <strong>must</strong> appoint a DPO if:</span></p>
<ul>
<li><span style="color: #000000;">It is a public authority (except for courts acting in their judicial capacity).</span></li>
<li><span style="color: #000000;">Its core activities require large scale, regular and systematic monitoring of individuals (for example, online behavior tracking).<br />
</span></li>
<li><span style="color: #000000;">Its core activities consist of large scale processing of special categories of data or data relating to criminal convictions and offenses.</span></li>
</ul>
<h2>Ready to comply?</h2>
<p>Obviously, tech giants such as social media networks, google, amazon are the most affected parties. However any other company operating in Europe or providing services to EU citizens must comply. And with fines reaching <strong>€20 million</strong>, the cost of not complying with GDPR is far greater than any investment to be made in order to comply with it.</p>
<p><a href="/contact" target="_blank" rel="noopener">Contact <strong>CIATEC</strong></a> today, to have all your <a href="/category/info-sec/" target="_blank" rel="noopener">information security</a> processes are in complaint with GDPR.</p>
<p>The post <a href="https://www.ciatec.com/2018/05/gdpr-explained-2-minutes-video/">GDPR Explained in 2 Minutes (Video Inside)</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ISO 27001:2013 How will your organization benefit?</title>
		<link>https://www.ciatec.com/2018/04/iso-27001-organization-benefit/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 25 Apr 2018 08:30:37 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Information Security Management System]]></category>
		<category><![CDATA[ISMS]]></category>
		<category><![CDATA[ISO]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=2813</guid>

					<description><![CDATA[<p>What is ISO 27001:2013? ISO/IEC 27001:2013 is the standard for Information Security Management; ISO 27001 is part of the ISO 27000 family of standards which helps organizations keep information assets secure. It is used by thousands of companies worldwide and allows them to establish a clear effective system for maintaining confidential data so that it &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/04/iso-27001-organization-benefit/">ISO 27001:2013 How will your organization benefit?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>What is ISO 27001:2013?</h2>
<p>ISO/IEC 27001:2013 is the standard for Information Security Management; ISO 27001 is part of the ISO 27000 family of standards which helps organizations keep information assets secure. It is used by thousands of companies worldwide and allows them to establish a clear effective system for maintaining confidential data so that it is safe and secure, yet, available. This standard combines requirements for the security of procedures, the workforce, as well as the physical and technical aspects of the company.</p>
<p>As defined by the <a href="https://www.iso.org/standard/54534.html">International Organization for Standardization</a>, ISO/IEC 27001:2013 standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.</p>
<h2>Why ISO 27001:2013?</h2>
<p><a href="https://www.ciatec.com/category/info-sec/" target="_blank" rel="noopener">Information security</a> is not an IT issue, but rather a company-wide problem. Security risk management is a vital component for an effective security plan and there are many options available to companies. Therefore, a reputable, proven standard like ISO 27001 provides a comprehensive guideline to base a security system on and a plan for recovery in the case of a security breach.</p>
<p>The ISO 27001 standard includes requirements for investigating the company’s information security risks and considers the threats, vulnerabilities and impacts that are specific to that company. It consists of a guide for selecting and implementing a set of data security controls, measures and procedures to manage the most dangerous risks to the company. It also highlights the necessity of continuous monitoring so that the security procedures and risk treatments are kept up to date and continue to meet the organization’s individual information security needs on an on-going basis.</p>
<h2>What value does ISO 27001 certification add to a business?</h2>
<p><span style="color: #000000;">There are a number of important business benefits in adopting ISO 27001, whether applying it as a best practice or getting an official certification. </span><span style="color: #000000;">Here is an infograph highlighting the most important ones.  </span></p>
<p><span style="color: #000000;">  <a href="https://www.cia-tec.com/wp-content/uploads/2018/03/ISO27001-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-1836 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/03/ISO27001-1.jpg" alt="ISO 27001 benefits" width="1324" height="1312" srcset="https://www.ciatec.com/wp-content/uploads/2018/03/ISO27001-1.jpg 1324w, https://www.ciatec.com/wp-content/uploads/2018/03/ISO27001-1-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2018/03/ISO27001-1-300x297.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/03/ISO27001-1-768x761.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/03/ISO27001-1-1024x1015.jpg 1024w" sizes="(max-width: 1324px) 100vw, 1324px" /></a></span></p>
<h5><strong>ISO 27001 Benefits include:</strong></h5>
<ul>
<li>Allow doing business globally</li>
<li>Improve planning and control</li>
<li>Achieve better human relations among different departments.</li>
<li>Improves your ability to recover your operations and continue business as usual</li>
<li>Reduces likelihood of facing prosecution and fines</li>
<li>Increase the ability to comply with the GDPR (General Data Protection Regulation) approved by EU.</li>
</ul>
<p>Make no mistake, achieving ISO 27001 is <em><strong>not</strong> </em>a guarantee that information breaches will never occur, however by having a robust system in place, risks will be reduced and disruption and costs kept to a minimum.</p>
<h2><strong>Implementing ISO 27001 Process</strong></h2>
<p>Implementing ISO 27001 can often be seen as quite an administrative and procedural business process. There is a false belief that ISO 27001 implementation is a clerical and bureaucratic business route and that the severity of the standard limits the operations of a company.</p>
<p>An obvious consideration to make when deciding whether to implement ISO 27001 or not is the potential drain on time and resources. The hints below explain how to achieve an effective execution of ISO 27001.</p>
<h3><span style="color: #000000;">Top tips on making ISO/IEC 27001 effective for you</span></h3>
<p><span style="color: #000000;">
		<div class="checklist tie-list-shortcode"></span></p>
<ul style="list-style-type: circle;">
<li><span style="color: #000000;">Define the scope of the Information Security Management System.</span></li>
<li><span style="color: #000000;">Confirm the commitment of top management with respect to the information security management system.</span></li>
<li><span style="color: #000000;">Structure and resource your project, including advice on using consultants and an examination of the tools and resources available to help with your project.</span></li>
<li><span style="color: #000000;">Perform a gap analysis to compare actual performance (or status) with the desired performance.</span></li>
<li><span style="color: #000000;">Assess the potential risks to your business and identify areas that are vulnerable</span></li>
<li><span style="color: #000000;">Perform information security risk assessments at planned intervals or when significant changes are proposed or occur.</span></li>
<li><span style="color: #000000;">Ensure that the information security objectives are consistent with the information security policy.</span></li>
<li><span style="color: #000000;">Define the internal and external communications relevant to the information security management system.</span></li>
<li><span style="color: #000000;">Evaluate the information security performance and the effectiveness of the information security management system, maintaining a continual improvement momentum.</span></li>
<li><span style="color: #000000;">Implement information security training and awareness programs.</span></li>
<li><span style="color: #000000;">Conduct a periodic reassessment audits for the Information Security Management System.</span></li>
<li><span style="color: #000000;">Review the organization’s information security management system at planned intervals to ensure its continuing suitability, adequacy and effectiveness</span></li>
</ul>
<p><span style="color: #000000;">
		</div>
	</span></p>
<h2>Conclusion</h2>
<p>The ISO 27001 method provides a company with the optimum framework on which to base a security strategy. It provides information on how to introduce and update security methods and a guideline to work off for internal compliance or external certification against the standard.</p>
<p>The use of ISO 27001 is the optimum method of guaranteeing information security of a company. This is not a stand-alone method however, and it requires a joint task-force of a culture respecting and valuing information and keeping it secure, through individual ownership and responsibility for information security.</p>
<p><em><strong>Need consult regarding ISO 27001? <a href="/Contact" target="_blank" rel="noopener"><span style="color: #008080;">Contact us here</span></a>, <span style="color: #00ccff;"><a style="color: #00ccff;" href="https://www.twitter.com/AskCiatec" target="_blank" rel="noopener">@AskCiatec on Twitter</a></span> and <a href="https://www.linkedin.com/company/AskCiatec" target="_blank" rel="noopener"><span style="color: #333399;">follow us on Linkedin</span></a> for future updates.</strong></em></p>
<p>The post <a href="https://www.ciatec.com/2018/04/iso-27001-organization-benefit/">ISO 27001:2013 How will your organization benefit?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
