<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CIATEC</title>
	<atom:link href="https://www.ciatec.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Sat, 21 Dec 2019 12:34:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>CIATEC</title>
	<link>https://www.ciatec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Device Security</title>
		<link>https://www.ciatec.com/2019/12/mobile-device-security/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 21 Dec 2019 11:33:25 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Mobile Device Security]]></category>
		<category><![CDATA[Mobile Device Security Tips]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=3277</guid>

					<description><![CDATA[<p>Mobile Device Security Importance of mobile device security &#8211; In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Mobile Device Security<span style="color: #31aaa2;"><br />
</span></h2>
<p><strong>Importance of mobile device security &#8211;</strong> In the today&#8217;s world, it is very unusual to find anyone who doesn’t own some kind of mobile device. Mobile phones or tablets are manufactured by numerous number of companies and there are many different service providers that equip the majority of world’s population with mobile devices.</p>
<p>It is estimated that the number of mobile phone users by 2019 will surpass five billion people around the globe. In addition to the social and economical effects of this massive increase, there is a definite increase in the number of cyber crimes. Cyber criminals have taken advantage of this massive growth and developed methods to take advantage of the increased number of possible targets.</p>
<p>There are many opportunities for cyber-criminals to access their targets: through apps, operating systems and software, and by identifying and taking advantages of defects in security before the programmers do and a patch a released.</p>
<h2><span style="color: #31aaa2;">Threats to Mobile Device Security</span></h2>
<p>An outdated view of hacking, malware or viruses would limit this activity to desktop computers or laptops. The reality is that mobiles are just as <strong>at risk</strong>. In fact, reported incidents are in the range of 16 million attacks. A mobile device can be at risk from several different methods, some of which include:</p>
<h3><span style="color: #31aaa2;"><strong>Malicious, or Insecure Apps</strong> </span></h3>
<p>Malicious or insecure apps contain cyber security flaws in data storage, communication, or authentication practices, meaning they contain at least one common security vulnerability that can be exploited.</p>
<h3><span style="color: #31aaa2;"><strong>Data Sniffing</strong></span></h3>
<p>Data sniffing by capturing, monitoring and scanning traffic moving across a network. Active sniffingwill monitor traffic and it can also alter it in some way to the like of the attacking party.</p>
<h3><span style="color: #31aaa2;"><strong>Fake WiFi Networks</strong> </span></h3>
<p>Fake WiFi networks poses as a legitimate wireless service provider to intercept information that users transmit.</p>
<h3><span style="color: #31aaa2;"><strong>Vulnerabilities</strong></span></h3>
<p>Vulnerabilities within operating systems can be used to gain control of mobile devices, and depending on the operating system and its software, some mobile devices can be easily patched. However, others may be more difficult to patch, which could leave them vulnerable.</p>
<h3><span style="color: #31aaa2;"><strong>Inactive Apps</strong></span></h3>
<p>Inactive apps that are installed on mobile devices but unused and have unsecured access to personal and corporate information pose a significant danger to devices if they are not uninstalled properly.</p>
<p>In addition to the above threats, mobile devices are also susceptible to physical attacks due to their portability.</p>
<p>But all is not lost. Here are some practical steps that will help you minimize the exposure of your mobile device to digital and physical threats.</p>
<h2>Mobile Device Security Tips</h2>
<p>&nbsp;</p>
<figure id="attachment_6250" aria-describedby="caption-attachment-6250" style="width: 1585px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-6250 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg" alt="Mobile Device Security tips" width="1585" height="1585" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips.jpg 1585w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-768x768.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Mobile-Device-Security-tips-1024x1024.jpg 1024w" sizes="(max-width: 1585px) 100vw, 1585px" /><figcaption id="caption-attachment-6250" class="wp-caption-text">Mobile Device Security tips</figcaption></figure>
<h3><span style="color: #31aaa2;"><b>Use strong passwords and/or Bio-metrics</b></span></h3>
<p>Passwords are always important, but even more so when you consider that the device could be stolen and in the possession of someone who has unlimited access and time to try various values.</p>
<h3><span style="color: #31aaa2;"><strong>Screen Lock</strong></span></h3>
<p>The display should be configured to time out after a short period of inactivity and the screen locked with a password.</p>
<h3><span style="color: #31aaa2;"><strong>Remote Wipe/Sanitation</strong></span></h3>
<p>Many programs, such as <strong>Find my iPhone</strong> or <strong>Google Play Protect</strong>, even Microsoft Exchange Server (if an exchange email is configured on mobile device) allow you to send a command to the mobile device that will remotely clear the data on that device.</p>
<h3><span style="color: #31aaa2;"><strong>Physical Security</strong></span></h3>
<p>Mobile devices, such as tablets, mobile phones, and smartphones, must be properly stored and secured in a cabinet or safe when not in use.</p>
<h3><span style="color: #31aaa2;"><strong>Utilize VPN</strong></span></h3>
<p>Enforce the use of virtual private network (VPN) connections with a strong protocol like IPSec between the mobile device and enterprise servers, especially if connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Encrypt your device</strong></span></h3>
<p>Data should be encrypted on the device so that if it does fall into the wrong hands, it cannot be accessed in a usable form without the correct passwords.</p>
<h3><span style="color: #31aaa2;"><strong>Disable Unused Features</strong></span></h3>
<p>Every feature has the potential to be another point of vulnerability in a mobile system, so it&#8217;s good practice to disable any features that don&#8217;t serve a purpose in your organization.</p>
<h3><span style="color: #31aaa2;"><strong>Install an Antivirus Application</strong></span></h3>
<p>A mobile antivirus solution will protect devices against malicious code (such as xCodeGhost and iBackDoor) embedded in apps. Here is a quick list of the most popular mobile antivirus application:</p>
<ul>
<li>Kaspersky lab (<a href="https://itunes.apple.com/sa/app/kaspersky-safe-browser/id723879672?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.kms.free" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>McAfee (<a href="https://itunes.apple.com/gb/app/mobile-security-wifi-scan/id724596345?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.wsandroid.suite" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>ESET (<a href="https://play.google.com/store/apps/details?id=com.eset.ems2.gp" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
<li>AVAST (<a href="https://itunes.apple.com/us/app/avast-security-photo-vault/id1276551855?mt=8" target="_blank" rel="noopener noreferrer">AppStore</a>, <a href="https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity" target="_blank" rel="noopener noreferrer">Google Play</a>).</li>
</ul>
<h3><span style="color: #31aaa2;"><strong> Disable Wi-Fi and Bluetooth When Not Needed</strong></span></h3>
<p>Disable Wi-Fi and the discovery setting on Bluetooth connections to prevent bluejacking and bluesnarfing attacks and avoid connecting to an insecure open wireless network.</p>
<h3><span style="color: #31aaa2;"><strong>Software Updates</strong></span></h3>
<p>Keep the mobile operating system and its apps up to date. Everything from the mobile operating system to the games and miscellaneous apps are potential gateways for hackers to compromise the mobile device. Updating mobile devices and apps on a regular basis ensures the best protection against most mobile security threats.</p>
<h2>Other mobile device security tips</h2>
<h3><span style="color: #31aaa2;"><strong>Perform Regular Mobile Device Security Audits</strong></span></h3>
<p>At least once a year, conducting mobile security audit helps companies keep their compliance programs up to date, effective and aimed in the right direction.</p>
<h3><span style="color: #31aaa2;"><strong>Perform User Education</strong></span></h3>
<p>Implement a continuous information security awareness and training program that teaches employees about mobile device threats and enterprise mobile device management and security policies.</p>
<h2><span style="color: #333333;"><strong>The Bottom Line in mobile device security<br />
</strong></span></h2>
<p>Mobile device security should be a primary concern. It isn’t simple to accomplish, and new attacks occur every day through new vulnerabilities. You need to always be aware of and notice anything unusual that happens on your device.</p>
<p>We hope that the tips mentioned in these article will help to enhance your mobile device security. If you like this article please subscribe to our newsletter and share with your friends.</p>
<p>Also check out how can you raise awareness among employees enhanced mobile devices usage and various other information security domain <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/12/mobile-device-security/">Mobile Device Security</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is SSL Certificate?</title>
		<link>https://www.ciatec.com/2019/07/what-is-ssl-certificate/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 16:38:17 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL Certificate]]></category>
		<category><![CDATA[Website Security]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6343</guid>

					<description><![CDATA[<p>What is SSL Certificate? SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website. In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>What is SSL Certificate?</h2>
<p>SSL certificate stands for Secure Socket Layer, and it is used to create an encrypted connection between website visitors devices (clients) and the server hosting the website.</p>
<p>In a nutshell, an SSL certificate is used to secure personal information that is being entered into a website such as usernames, passwords, address and credit card information.</p>
<p><img decoding="async" class="alignnone size-full wp-image-6349" src="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png" alt="Ciatec SSL Certificate" width="403" height="200" srcset="https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate.png 403w, https://www.ciatec.com/wp-content/uploads/2019/07/CIATEC-HTTPS-SSL-Certificate-300x149.png 300w" sizes="(max-width: 403px) 100vw, 403px" /></p>
<h2>SSL Certificate components</h2>
<p>The certificate is composed of the following components:</p>
<ul>
<li>Digital signature of the issuing authority or the verifier</li>
<li>The certificate key or serial</li>
<li>Certificate expiry date</li>
<li>Certificate owner</li>
</ul>
<h2>Do you need SSL certificate for your website?</h2>
<p>If your website collects any sort of user information it will require an SSL certificate to keep the transfer of this information to-and-from the web server secure. Moreover, <a href="https://www.blog.google/products/chrome/milestone-chrome-security-marking-http-not-secure/" target="_blank" rel="noopener noreferrer">google chrome started in July, 2018</a> marking website without SSL certificate as “Not Secure”. So if you care about your <a href="/seo" target="_blank" rel="noopener noreferrer">search engine ranking</a>, you definitely need to setup a certificate.</p>
<p>In the <a href="https://letsencrypt.org" target="_blank" rel="noopener noreferrer">Let’s Encrypt</a> era, where SSL certificates are given for free, the question is not whether you need a certificate for your website or not, because you most probably do. The question is whether you should go for a free or paid one.</p>
<h2>When should you start paying for your SSL Certificate?</h2>
<p>To answer this question first we need to look at the difference between free and paid certificates.</p>
<p><strong>Verification Level</strong><br />
Free certificates provides domain validation (DV) only, whereas paid versions provide organization validation (OV) and extended validation (EV), meaning that they provide validation for the site owner organization and not just the domain name.</p>
<p><strong>Duration</strong><br />
Free certificates usually have a validity period of three months while paid certificate can be renewed once every three years.</p>
<p><strong>Support and Warranty</strong><br />
All paid certificate comes with backend warranty several support packages to purchase and tech support are only a chat window or email message away. Obviously, free SSL comes with no warranties and if something goes wrong on the verifier’s side, you’re on your own.</p>
<p>So both choices provide a website with the famous green https lock. But the bottom line is that free certificates are great for a blog or an informative website that does not have much more than a simple contact form and a newsletter subscription. However, if trust a major issue for online business- and in most cases it is- especially in e-commerce websites, then paid certificate is the only option.</p>
<h2>Where to buy?</h2>
<p>When it comes to paid service providers there are many choices, where budget and service levels are the most deciding factors. To name a few service providers:</p>
<ul>
<li>DigiCert &#8211; <a href="https://www.digicert.com/" target="_blank" rel="noopener noreferrer">digicert.com</a></li>
<li>Symantec websecurity &#8211; acquired by Digicert in 2017</li>
<li>VeriSign &#8211; <a href="https://www.verisign.com/">verisign.com</a> acquired by Symantec in 2010</li>
<li>Sectigo &#8211; Formerly Comodo &#8211; <a href="https://sectigo.com" target="_blank" rel="noopener noreferrer">sectigo.com</a></li>
<li>GoDaddy &#8211; <a href="https://www.godaddy.com/web-security/ssl-certificate" target="_blank" rel="noopener noreferrer">godaddy.com</a></li>
<li>Network Solutions &#8211; <a href="https://www.networksolutions.com/SSL-certificates/index.jsp" target="_blank" rel="noopener noreferrer">networksolutions.com</a></li>
<li>Cheap SSL Security &#8211; <a href="https://cheapsslsecurity.com/" target="_blank" rel="noopener noreferrer">cheapsslsecurity.com</a></li>
<li>RapidSSL &#8211; <a href="https://www.rapidsslonline.com/ssl-brands/rapidssl/rapidssl-certificates.aspx" target="_blank" rel="noopener noreferrer">rapidsslonline.com</a></li>
</ul>
<h2>Need help?</h2>
<p>Hope that this article was helpful, if you require any help with setting up <strong>SSL certificate</strong> for your website let us know <a href="/contact">here</a>. We&#8217;ll be more than happy to help.</p>
<p>The post <a href="https://www.ciatec.com/2019/07/what-is-ssl-certificate/">What is SSL Certificate?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</title>
		<link>https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 29 Jun 2019 07:15:54 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Fraud Warning]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Information Security in Banking]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6323</guid>

					<description><![CDATA[<p>Dubai&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching #SecureYourAccount campaign to raise awareness on banking fraud. The video released Thursday on social media channels of both Dubai Police and Emirates NBD bank uses Shaggy&#8217;s year 2000 hit &#8220;It wasn&#8217;t me&#8221; tune but with changed lyrics &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Dubai</strong>&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching <a href="https://www.linkedin.com/feed/hashtag/?keywords=%23SecureYourAccount" target="_blank" rel="noopener noreferrer"><strong>#SecureYourAccount</strong></a> campaign to raise awareness on banking fraud.</p>
<p>The video released Thursday on social media channels of both <a href="https://www.facebook.com/dubaipolicehq.en/videos/323008325289946/" target="_blank" rel="noopener noreferrer">Dubai Police</a> and <a href="https://twitter.com/EmiratesNBD_AE/status/1144866167040991232" target="_blank" rel="noopener noreferrer">Emirates NBD</a> bank uses Shaggy&#8217;s year 2000 hit &#8220;<em>It wasn&#8217;t me</em>&#8221; tune but with changed lyrics to warn users about banking fraud through social engineering techniques.</p>
<p>As Information security awareness professionals at <a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong></a>, we loved the video that got all the elements of a successful <a href="https://www.ciatec.com/services/information-security-awareness-program/#samples" target="_blank" rel="noopener noreferrer">information security awareness material</a>. It is a job well done conveying the message of keeping personal banking information safe using a 20 years well known rap song. This type of awareness material has proven to have a high penetration rate among audience.</p>
<p>Enjoy the video, and always remember to #SecureYourAccount.</p>
<hr />
<p><em><strong>Many organizations struggle to convey information security awareness material to users and customers. If that sound like your organization, <a href="https://www.ciatec.com/services/information-security-awareness-program/#quote" target="_blank" rel="noopener noreferrer">contact us</a> today to start your <a href="https://www.ciatec.com/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</strong></em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security Awareness Assessment Quiz for Employees</title>
		<link>https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Thu, 16 May 2019 19:40:34 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Employees security assessment]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Inofmration security training for employees]]></category>
		<category><![CDATA[Quiz]]></category>
		<category><![CDATA[security awareness assessment]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6292</guid>

					<description><![CDATA[<p>Information Security Awareness Assessment Quiz for Employees The first step in building a security awareness program is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly. The following security awareness assessment quiz is a beginner-level, 10 questions quiz &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">Information Security Awareness Assessment Quiz for Employees</span></h2>
<p>The first step in building a <a href="/services/information-security-awareness-program/">security awareness program</a> is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly.</p>
<p>The following security awareness assessment quiz is a <strong>beginner-level</strong>, <strong>10 questions quiz</strong> that can determine, for a certain extent, whether an employee is a security <strong>asset or a vulnerability</strong> that needs to be remediated. However, it is worth mentioning that there is no way to cover all information security domains in such a short quiz.</p>
<p>Similar information security trainings and <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulations</a>, along with comprehensive information security awareness material are all part of CIATEC&#8217;s information security awareness program. You can check program packages <a href="/services/information-security-awareness-program/#packages" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2><span style="color: #31aaa2;">Ready? Let&#8217;s go</span></h2>
<style type="text/css" id="wq-trivia-custom-css">.wq-quiz-6263 {
--wq-question-width: 100%;
--wq-question-color: #009cff;
--wq-question-height: auto;
--wq-bar-color: #31aaa2;
--wq-font-color: #444;
--wq-background-color: #f2f2f2;
}
</style><!-- wp quiz -->
<div id="wp-quiz-6263" class="wq_quizCtr single trivia_quiz wq-quiz wq-quiz-6263 wq-quiz-trivia wq-layout-single wq-skin-traditional" data-quiz-id="6263">
<div class="wq-questions wq_questionsCtr">
	<div class="wq-question wq_singleQuestionWrapper" data-index="0">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Your passwords should be easy to remember and hard to guess, which of the following is an example of strong password?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="856" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-300x201.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-768x514.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-1024x685.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="kmawp">
			<label class="wq_answerTxtCtr">Passw0rd</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1esrj">
			<label class="wq_answerTxtCtr">29Feb1980</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="nmba7">
			<label class="wq_answerTxtCtr">MyPetName</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="d4cit">
			<label class="wq_answerTxtCtr">$ayN02#ackers</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A password should be at least 8 characters long and includes special characters, numbers, a mix of uppercase and lowercase letters and doesn't not contain a dictionary word or phrase. This will make it hard to guess by hacking scripts.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="1">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Personal Identifiable Information (PII) is used to verify your identity and distinguish one person from another. Which of the following is an example of PII?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="864" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - PII" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-300x203.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-768x518.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-1024x691.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-220x150.jpg 220w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/TheDigitalWay-3008341/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">TheDigitalWay</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="8w1xi">
			<label class="wq_answerTxtCtr">ID Number</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4q279">
			<label class="wq_answerTxtCtr">Date of Birth</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="bstu9">
			<label class="wq_answerTxtCtr">Home Address</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="5f4g8">
			<label class="wq_answerTxtCtr">All of the answers are correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Personal identifiable information are "Personal" and should only be shared on need-to-know basis. Keep all your personal identifiable information (PII) to yourself and do NOT share it with any untrusted party.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="2">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? A phishing attack can harm your personal computer only, but not your company’s network.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="832" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-300x195.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-768x499.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-1024x666.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/Tumisu-148124/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Tumisu</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="n7qud">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="gr0io">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A phishing attack may download a worm or other form of malware that can easily spread over the network and cause harm to all computers, servers and network peripherals. </p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="3">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Information security is the responsibility of:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="745" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - NOC" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-300x175.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-768x447.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-1024x596.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="utjqb">
			<label class="wq_answerTxtCtr">Everyone in the company</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4j5vd">
			<label class="wq_answerTxtCtr">IT Security Department</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ubvl9">
			<label class="wq_answerTxtCtr">Security Guard</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="60lz5">
			<label class="wq_answerTxtCtr">Top Management</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Information security is everyone's responsibility.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="4">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? It is OK to use the same password for all your online accounts as long as you keep it a secret.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="918" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-300x215.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-768x551.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-1024x734.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="mlweo">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1ufy1">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Don't put all your eggs in one basket. You don't want all your accounts to be comprised just because one account is hacked. Use a separate password for each account. To remember your passwords, you can fix a part of the password and make the second part variable and linked some how to the service used.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="5">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Spear Phishing is:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="768" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg" class="attachment-full size-full" alt="Information-Security-Awareness-Assessment-Quiz-for-Employees Spear" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-300x225.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-768x576.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
			<span><a href="https://www.freepik.com/free-photos-vectors/character">Character vector created by freepik </a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="viyvh">
			<label class="wq_answerTxtCtr">An attack on your company’s email server</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vj4vp">
			<label class="wq_answerTxtCtr">A phishing attempt targeting you personally</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="xb0vj">
			<label class="wq_answerTxtCtr">A random attempt to hack any point of weakness</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="qzrx7">
			<label class="wq_answerTxtCtr">A massive spam email attack on all employees</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Spear phishing is a unique form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.
Spear phishing works better than phishing because it uses information that it can find about you from email databases, friends’ lists, and the like. You can learn about the different types of phishing <a href="/2018/02/phishing-techniques/">here</a></p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="6">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Hackers can crack your passwords by repeatedly trying to guess it. This password cracking method is called:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="854" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password Hack" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-1024x683.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span> Photo by Soumil Kumar from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="k3gy1">
			<label class="wq_answerTxtCtr">The “G” attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vv26h">
			<label class="wq_answerTxtCtr">Brute-Force attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="sif2m">
			<label class="wq_answerTxtCtr">Phishing attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="wxdt9">
			<label class="wq_answerTxtCtr">None of the answers is correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A brute-force attack works by repeatedly trying to guess your password until it is cracked. That is why you should always use long and complex passwords that will take ages to guess.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="7">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False: Physical security is NOT related to information security.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="853" src="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-1024x682.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/PublicDomainPictures-14/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">PublicDomainPictures</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="hiu9q">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="a7sbm">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Physical security controls are at the heart of any information security program. At the end of the day, information assets are stored on physical media such as hard disks, flash drives or simply papers.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="8">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>The FIRST objective of a "Security Aware Employee" is to be able to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1279" height="838" src="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg 1279w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-300x197.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-768x503.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-1024x671.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" />	
			<span> Photo by Miguel Á. Padriñán from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="i48j9">
			<label class="wq_answerTxtCtr">Avoid a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="8jfnq">
			<label class="wq_answerTxtCtr">Manage a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="7ydt1">
			<label class="wq_answerTxtCtr">Report a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ix6gb">
			<label class="wq_answerTxtCtr">Recognize a security threat</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">The first step in the information security awareness ladder is to make sure that the average employee is able to identify threats and then report it to the right party. Threat avoidance and management are not the main responsibility of an average employee.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="9">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Tailgating is a form of social engineering that allows hackers to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-768x768.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="uv321">
			<label class="wq_answerTxtCtr">Watch company’s main gate 24/7</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="fruct">
			<label class="wq_answerTxtCtr">Get unauthorized access to restricted areas</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="9vd90">
			<label class="wq_answerTxtCtr">Watch employees as they leave the gate</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vaw5z">
			<label class="wq_answerTxtCtr">Following an employee after leaving work</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">In information security, tailgating is a social engineering technique used by hackers to deceive organization's officials through direct speech or actions in order to gain access into restricted areas. An example of tailgating is when one person tags along with an authorized employee to access a building or pass a certain checkpoint.</p>
		</div>
	</div>

	
</div>
</div>
<div class="wq-results wq_resultsCtr">
	<span class="wq-result-quiz-title wq_quizTitle">Information Security Awareness Assessment Quiz for Employees</span>
<div class="wq-result wq_singleResultWrapper" data-id="ffvm7">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">Your score is low. Security awareness is urgently needed. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/0-4-Score.jpg" alt="Awareness Quiz low score"></div>

	
	<div class="wq_resultDesc">We highly recommend that you get involved in an information security awareness program that will help you recognize cyber security threat when you see one. The good news is that we are here to help. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a></div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="497nf">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">There is a room for improvement. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/5-7-score.jpg" alt="Awareness Quiz score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a sense of security when it comes to cyber threats, but there room for some improvement. We can help you with that. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="38y5z">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">You have a good sense of security, you are an asset! <br>
<img decoding="async" src="/wp-content/uploads/2019/05/8-10-score.jpg" alt="Awareness Quiz high score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a very good sense of security when it comes to cyber threats in the subject domains. But what about your colleagues? Do they all have the same security awareness level? <br>
A well implemented security awareness program will harden the human layer of security of security.<a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<!-- social share -->
<div class="wq-share wq_shareCtr">
			<p style="font-size: 14px;">Share your Results:</p>
	
			<button class="wq-share-fb wq_shareFB" data-url="https://www.ciatec.com/feed"><i class="sprite sprite-facebook"></i><span>Facebook</span></button>
	
			<button class="wq-share-tw wq_shareTwitter" data-url="https://www.ciatec.com/feed"><i class="sprite sprite-twitter"></i><span>Twitter</span></button>
	
	
	</div>
<!--// social share-->
</div><!-- End .wq-results -->
<!-- retake button -->
<div class="wq-retake-quiz wq_retakeQuizCtr">
	<button class="wq-retake-quiz-btn wq_retakeQuizBtn" type="button">
		<i class="wq-icon wq-icon-undo"></i>&nbsp; Play Again!	</button>
</div>
<!-- // retake button -->
</div>
<!-- // wp quiz-->

<h2><span style="color: #31aaa2;">Interested in our information security awareness services?</span></h2>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</title>
		<link>https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 04 May 2019 09:43:31 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Phishing Simulation]]></category>
		<category><![CDATA[Phishing training]]></category>
		<category><![CDATA[Phishing training for employees]]></category>
		<category><![CDATA[Phishmark]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6155</guid>

					<description><![CDATA[<p>PhishMark: Phishing Training and Awareness Solution for Employees Why do companies need phishing training and awareness solution for their employees? &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)! And this year 9 out of &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">PhishMark: Phishing Training and Awareness Solution for Employees</span></h2>
<p><strong>Why do companies need phishing training and awareness solution for their employees?</strong> &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)!<br />
And this year 9 out of 10 phishing attempts are ransomware attacks that encrypts your data and won’t release it unless a ransom is paid.<br />
And no matter how big the investment in high-tech security solutions is, the number of breaches from phishing and complicated social engineering attacks continue to rise bypassing all network security defenses and often making its way into users mailboxes. Luckily, Phishmark is here to reduce this risk, especially when implemented as part of a comprehensive <a href="/cyber-security-awareness/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">What is Phishmark?</span></h2>
<p><a href="http://www.phishmark.com" target="_blank" rel="noopener noreferrer"><strong>PhishMark</strong></a> is an affordable phishing simulation framework that allows information security staff to schedule and launch phishing simulation campaigns utilizing a variety of ready-made email templates. Campaign results will identify, in-real time, the users who took the bait, and provide awareness material on the spot by redirecting them into a pre-designed educational landing page. Statistical reports will provide top management with an overview of the current status and the progress of users in identifying and reporting phishing attacks and adapting safe habits.</p>
<h2><span style="color: #31aaa2;">Phishing Training for Employees &#8211; Life Cycle</span></h2>
<p>Once-a-year security awareness and training session is one way of doing things, yet, it is not enough! You need an on-going solution that meets the trends and can point out the weakest link so you can harden it.<br />
CIATEC’s PhishMark is the solution you need to empower &#8220;<strong>the human firewall</strong>&#8220;!</p>
<figure id="attachment_6177" aria-describedby="caption-attachment-6177" style="width: 300px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-6177" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png" alt="Phishing Training for Employees Life Cycle" width="300" height="297" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-6177" class="wp-caption-text">Phishing Training for Employees Life Cycle</figcaption></figure>
<p>Phishmark is a phishing training and awareness solution for employees that goes around the year running simulations to cover every angle a hacker might use to get into a company&#8217;s network through phishing and social engineering attacks. We follow the below steps:</p>
<ol>
<li><strong>Baseline</strong>: The first step is to establish baseline by running an initial campaign.</li>
<li><strong>Train</strong>: Provide awareness material based on the results of the first campaign.</li>
<li><strong>Phish</strong>: Run new phishing campaign.</li>
<li><strong>Analyze</strong>: Analyze the results and measure the progress.</li>
</ol>
<p>It is important to note that Phishmark is proven to provide better results when integrated with Ciatec&#8217;s <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">PhishMark &#8211; Phishing Training Main Features</span></h2>
<h3>Dashboard</h3>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-6187 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg" alt="PhisMark - Phishing Training for employees" width="1601" height="332" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg 1601w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-300x62.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-768x159.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-1024x212.jpg 1024w" sizes="(max-width: 1601px) 100vw, 1601px" /></p>
<p>PhishMark will show a dashboard for all campaigns as well as separate dashboard for every single campaign. The dashboard will show:</p>
<ol>
<li>Number of phishing simulation emails &#8220;or baits&#8221; successfully delivered.</li>
<li>Number of employees that opened the simulation phishing email.</li>
<li>Percentage of employees that actually took the bait, i.e.; clicked the link.</li>
<li>Number of users who actually submitted data to the pretend hacker.</li>
<li>And finally, the information security specialist running the simulation will be able to count the number of employees that actually reported the threat.</li>
</ol>
<h3>Email Templates</h3>
<p>Administrator will be able to create his own email templates that fits his organization. Or use ready-made email templates covering many domains and season, including: Banking, social media, eCommerce and many more.</p>
<h3>Grouping Users</h3>
<p>The solution allows creation of target groups. Useful for targeting every department with a separate phishing campaign.</p>
<h3>Landing Pages</h3>
<p>Employees who fall victims for phishing campaigns will be redirected to a previously designed landing page similar to the below. Administrator is free to use ready-made phishing awareness landing pages provided by PhishMark, or upload his/her own.</p>
<figure id="attachment_6190" aria-describedby="caption-attachment-6190" style="width: 1024px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6190" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg" alt="Phishmark Phishing Training &amp; Awareness Landing Page" width="1024" height="683" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-768x512.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-6190" class="wp-caption-text">Example Landing Page</figcaption></figure>
<hr />
<h2><span style="font-size: 14pt; color: #31aaa2;">Questions?</span></h2>
<p><span style="font-size: 14pt;">Ask us on ask@ciatec.com or <a href="/contact"><strong>contact us</strong></a> today to start using PhishMark to <strong>Phish</strong> and <strong>Mark</strong> employees that need further training and awareness on phishing and social engineering.</span></p>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CIATEC signs partnership agreement with PECB</title>
		<link>https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 06 Apr 2019 13:23:29 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ISO Audit]]></category>
		<category><![CDATA[ISO Training]]></category>
		<category><![CDATA[Partners]]></category>
		<category><![CDATA[PECB]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6089</guid>

					<description><![CDATA[<p>CIATEC is thrilled to announce its newly signed partnership agreement with PECB, the well-known ISO certification and training provider. By signing this agreement, CIATEC is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to: Information Security &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong> </a>is thrilled to announce its newly signed partnership agreement with <strong>PECB</strong>, the well-known ISO certification and training provider. By signing this agreement, <strong>CIATEC</strong> is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to:</p>
<ul>
<li><strong>Information Security Management</strong>: ISO/IEC 27001 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Information Security</a>.</li>
<li><strong>IT Security</strong>: ISO/IEC 27032 Cyber Security and ISO/IEC 27035 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Incident Management</a>.</li>
<li><strong>Continuity and Resilience</strong>: ISO 22301 Business Continuity Management System.</li>
<li><strong>Service Management</strong>: ISO/IEC 20000 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">IT Service Management</a> and ISO/IEC 55001 Asset Management.</li>
<li><strong>Quality Management Systems</strong> (example: ISO 9001 Quality Management Systems, ISO 13053 Six Sigma, ISO 21500 Project Management).</li>
<li><strong>Health, Safety and Environment</strong> (example: ISO 14001 Environmental Management, ISO 22000 Food Safety Management, ISO 45001 Occupational Health and Safety Management).</li>
</ul>
<blockquote class="alignleft "><p>together we can build a strong and value-based society <cite>Eric Lachapelle, CEO of PECB</cite></p></blockquote>
<p>PECB issued an official press release announcing this partnership, where Mr. Eric Lachapelle, CEO of PECB, expressed PECB&#8217;s determination to make a renewed and positive contribution towards building a strong value-based society (<em><strong>Read full press release</strong> <strong><a href="https://pecb.com/en/newsDetail?nid=1027&amp;lid=1" target="_blank" rel="noopener noreferrer">here</a></strong></em>).</p>
<p>&nbsp;</p>
<p>At CIATEC, we truly believe that adopting and adapting internationally recognized standards and frameworks can transform organizations and lift them up to a whole new level. And this partnership with PECB will definitely contribute to CIATEC&#8217;s mission to provide our clients with the highest quality of management systems implementation, consulting and training services. We look forward to a successful long-term partnership with PECB.</p>
<h4 class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;size&quot;:10}" data-doc-id="4397000283481219"><span style="color: #31aaa2;">About PECB </span></h4>
<p>PECB is a certification body for persons, management systems, and products on a wide range of international standards. As a global provider of training, examination, audit, and certification services, PECB offers its expertise on multiple fields, including but not limited to Information Security, IT, Business Continuity, Service Management, Quality Management Systems, Risk &amp; Management, Health, Safety, and Environment. For more detailed information regarding PECB principal objectives and activities, visit <a href="https://www.pecb.com" target="_blank" rel="noopener noreferrer">www.pecb.com</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dubai: Using AI to Measure People&#8217;s Happiness</title>
		<link>https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 13 Mar 2019 11:01:38 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Customer Experience]]></category>
		<category><![CDATA[CX]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<category><![CDATA[UX]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5888</guid>

					<description><![CDATA[<p>Dubai is not settling for smiley faces buttons to measure customers satisfaction. Dubai&#8217;s Roads and Transport Authority (RTA), has announced on Monday the use of highly accurate smart cameras powered by artificial intelligence (AI) technology in four &#8220;Customer Happiness Centers&#8221; in Dubai. Not a surprising name or call from a state that has a minister &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/">Dubai: Using AI to Measure People&#8217;s Happiness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dubai is not settling for smiley faces buttons to measure customers satisfaction. <a href="https://www.rta.ae" target="_blank" rel="noopener noreferrer">Dubai&#8217;s Roads and Transport Authority (RTA)</a>, has announced on Monday the use of highly accurate smart cameras powered by artificial intelligence (AI) technology in four &#8220;Customer Happiness Centers&#8221; in Dubai. Not a surprising name or call from a state that has a <a href="https://www.happy.ae/en" target="_blank" rel="noopener noreferrer">minister of state for happiness</a>!</p>
<p>&#8220;The initiative aims to measure customers happiness index through smart cameras that analyze the extent of their happiness,&#8221; <em>Maher Shirah</em>, director of Smart Services at RTA&#8217;s Corporate Technology Support Services Sector. The system was able to produce detailed reports of a customer&#8217;s happiness levels, with instant alerts triggered when a center&#8217;s &#8220;happiness rating&#8221; drops below a predefined level. When this happens, actions can be taken to &#8220;restore customers&#8217; happiness level.&#8221;</p>
<p>As far as privacy is concerned, authorities indicated that the system analyses facial expressions and convert it into numeral value but doesn&#8217;t save the visual information.</p>
<p>This is one of the many uses AI can serve in service management measurement and metrics. And it will definitely contribute to raising the level of users satisfaction, the ultimate goal of successful <a href="/services/itsm/" target="_blank" rel="noopener noreferrer">service management system</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/">Dubai: Using AI to Measure People&#8217;s Happiness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Successful Cyber Security Awareness Program Elements</title>
		<link>https://www.ciatec.com/2019/02/cyber-security-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 13:42:16 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4928</guid>

					<description><![CDATA[<p>The Cyber Security Awareness Program Every Organization Needs Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to Gartner, spending on information security products and services reached a value of $114 billion US dollars in 2018, with an increase of 12.4 percent from 2017. On the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #31aaa2;"><span style="color: #800000;">The Cyber Security Awareness Program Every Organization Needs</span><br />
</span></h3>
<p>Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to <a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019" target="_blank" rel="noopener noreferrer">Gartner</a>, spending on information security products and services reached a value of <strong>$114 billion US dollars</strong> in 2018, with an increase of 12.4 percent from 2017. On the other hand, the average total cost of a data breach in 2017 was<strong> $3.62 million </strong>according to<a href="https://www.ibm.com/downloads/cas/ZYKLN2E3" target="_blank" rel="noopener noreferrer"> IBM and Ponemon Institute</a>. And 2019 forecasts are not any better. When you dig deeper in the studies, you realize that a high percentage of data breaches surprisingly took place in organizations of high IT security budget. And while some attacks could be traced back to disgruntled workers, a great deal of other attacks are simply a result of actions done by naive and non-harmful employees that simply weren&#8217;t well informed.</p>
<p>Over the past years, IT became the main enabler of almost every business. And security has always been a major concern. Implementing a security awareness program has become a must for an organization, regardless of it&#8217;s size, industry, or location.</p>
<figure id="attachment_5628" aria-describedby="caption-attachment-5628" style="width: 2415px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5628 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg" alt="Cyber Security Awareness Maturity Model" width="2415" height="1116" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg 2415w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-300x139.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-768x355.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-1024x473.jpg 1024w" sizes="(max-width: 2415px) 100vw, 2415px" /><figcaption id="caption-attachment-5628" class="wp-caption-text">Cyber Security Awareness Maturity Model [Source: SANS Institute]</figcaption></figure>At <strong>CIATEC</strong>, <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer"><strong>information security awareness</strong></a> is one of the main services provided. Our Security awareness program is a continuous cycle that goes around year. A well implemented security awareness program helps preventing a breach or at least mitigate the risks. In this article, we compiled lists of:</p>
<ul>
<li><a href="#main-reasons-of-cyber-security-breaches">Main causes of Cyber Security Breaches</a></li>
<li><a href="#Importance-Cyber-Security-Awareness-Training">Importance of Cyber Security Awareness and Training</a></li>
<li><a href="#Cyber-Security-Awareness-Topics">Cyber Security Awareness Topics</a></li>
<li><a href="#Cyber-Security-Awareness-Channels">Cyber Security Awareness Channels</a></li>
</ul>
<h3><span style="color: #800000;"><a id="main-reasons-of-cyber-security-breaches"></a>Top Reasons of Cyber Security Breaches</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>&nbsp;</p>
<figure id="attachment_5626" aria-describedby="caption-attachment-5626" style="width: 1677px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg"><img loading="lazy" decoding="async" class="wp-image-5626 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg" alt="" width="1677" height="736" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg 1677w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-300x132.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-768x337.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-1024x449.jpg 1024w" sizes="(max-width: 1677px) 100vw, 1677px" /></a><figcaption id="caption-attachment-5626" class="wp-caption-text">Reasons of Cyber Security Breaches</figcaption></figure>
<h4>1- Uninformed Employees</h4>
<p>Uninformed, naive and non-harmful employees lacking information security awareness and training tops the list of causes. Our experience taught us that technology alone cannot completely secure IT environments, there will always be the human factor involved, whether within IT department side or at end users side. Unfortunately, human brain cannot be patched same as a computer! It can only be nourished by knowledge, <a href="/services/training-courses/" target="_blank" rel="noopener noreferrer">training</a> and <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness material</a>.</p>
<p>It only takes one single uninformed employee who takes the bait of a phishing email to compromise organization&#8217;s cyber security.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Deploy <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">Information Security Awareness Program</a> that goes around the year and keep it up-to-date with the latest threat trends, accompanied with <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulation solution</a>.</em></p>
<h4>2- Human Errors</h4>
<p>Human errors of regular IT users are always a threat. However, the bigger threat are the errors done by IT administrators! Lack of knowledge, sometimes lack of focus leads to configuration errors that leaves some doors open for hackers.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Adapt a framework or a standard that organizes change, event, problem and incident management, such as ISO 27001, ISO 20000 or ITIL.</em></p>
<h4>3- Malware</h4>
<p>Successful malware attacks such as ransomware, viruses, worms, and trojans are always a threat to cyber security and a reason behind security breaches.</p>
<p><strong><span style="text-decoration: underline;"><span style="text-decoration: underline;">Hint</span></span></strong>: <em>Train your staff on how to deal with malware attacks and apply <a href="/services/defenses-and-controls/" target="_blank" rel="noopener noreferrer">endpoint security</a> best practices.</em></p>
<h4>4- Stolen Devices</h4>
<p>Laptops and mobile devices that are sometimes stolen during commuting or traveling pose a significant risk that should be handled by risk management.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Raising <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness</a> and applying mobile devices encryption.</em></p>
<h4>5- Disgruntled workers</h4>
<p>Dissatisfied employees and third-party contractors with bad intentions.</p>
<p><em><strong>Hint</strong>: Deploy proper employee termination, segregation of duties, and vendor management processes.</em></p>
<h4>6- Lack of Funds</h4>
<p>Low cyber security budget is a problem on its own for some organizations. While other organizations fall in the trap of &#8220;budget maldistribution&#8221;, where most of the budget goes for sophisticated security software and hardware appliances while employees information security awareness and training are neglected; <strong>Big Mistake!</strong></p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>If there is no way to increase cyber security budget, existing budget should at least be distributed properly.</em><span style="color: #0000ff;"><br />
</span></p>
<h3><span style="color: #800000;"><a id="Importance-Cyber-Security-Awareness-Training"></a>What will Security Awareness and Training add?</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Cyber security awareness and training provides the following benefits:</p>
<figure id="attachment_5622" aria-describedby="caption-attachment-5622" style="width: 1408px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg"><img loading="lazy" decoding="async" class="wp-image-5622 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg" alt="" width="1408" height="390" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg 1408w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-300x83.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-768x213.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-1024x284.jpg 1024w" sizes="(max-width: 1408px) 100vw, 1408px" /></a><figcaption id="caption-attachment-5622" class="wp-caption-text">Benefits of Cyber Security Awareness</figcaption></figure>
<h4>1-  Hardening the Last Layer of Defense</h4>
<p>Employees are the last layer of defense, and in some case they are the first layer, depending on the nature of the attack. Yet, they are the weakest link in the cyber security chain, this has become a universal truth. A well implemented and maintained cyber security awareness program will insure hardening this link and empowering a stronger network.</p>
<h4>2- Compliance Requirement</h4>
<p>All major information security standards and frameworks such as ISO/IEC 27001 requires an <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a> to be in place.</p>
<h4>3- Adapt with the Continuously Changing Threats</h4>
<p>The complexity of threats and attacks is increasing every day. Cyber security units needs to keep up and more importantly, cyber security awareness units needs to keep all users informed about the latest threats and cyber attacks trends.</p>
<h4>4- Increase Engagement</h4>
<p>Does your organization have an information security handbook containing all your information security policies? Is it updated and distributed to users on regular basis? If so, how many of them do actually read it, understand it and become familiar with its content?</p>
<p>With awareness things are different. Running cyber security awareness campaigns all over the year and on various channels will create a culture of security within the organization and engage employees in information security practices.</p>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Topics"></a>Cyber Security Awareness Topics</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Importance of cyber security awareness topics varies from one organization to another. Each organization has its own priorities. Yet, it is always recommended to work holistically on covering all topics when implementing a cyber security awareness program. The major topics that should be covered in an information security awareness program:</p>
<figure id="attachment_5624" aria-describedby="caption-attachment-5624" style="width: 2406px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5624 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg" alt="" width="2406" height="676" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg 2406w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-300x84.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-768x216.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-1024x288.jpg 1024w" sizes="(max-width: 2406px) 100vw, 2406px" /><figcaption id="caption-attachment-5624" class="wp-caption-text">Cyber Security Awareness Topics</figcaption></figure>
<h4>1- Physical Security</h4>
<p>Physical security is a sub-domain of information security that goes beyond IT to address issues related to entrance points, locked doors, drawers, cabinets, desks, as well as desktops, laptops and mobile devices security. Users should be aware and able to deal with physical security threats of all kinds.</p>
<h4>2- Data Security</h4>
<p>Cyber security is all about protecting information assets, right? Educating users on how to handle data security should be a major topic in any cyber security awareness program.</p>
<h4>3- Print Security</h4>
<p>Whether in hard copies or in soft copies, information needs to be secured. Print security is one of the many topics address in information security awareness program.</p>
<p>In addition to making users aware of concepts of secure printing, there are plenty of built-in and third-party printing solution that can be of great use in implementing secure printing policies.</p>
<h4>4- Network and Wireless Security</h4>
<p>Given the insecure nature of wireless networks, enterprises counts on employees awareness to better harden this area. An organization owned laptop or other mobile device, has at least 10 wireless networks SSID stored. SSID&#8217;s of office, home, airport, hotel, coffee shop&#8230;etc. Sniffing can occur on any wireless network jeopardizing the organization information assets. Hence, wireless network security awareness.</p>
<p>On the other hand, with sophisticated wired network security solutions, organizations might reach a significant level of security. Yet, awareness is always needed to harden the weakest link.</p>
<h4>5- Data Destruction</h4>
<p>Security doesn&#8217;t stop when you stop using a certain device. If a device still got your data, security policies will still apply, even if the device is not used any more. And if the device is to be disposed, it must be disposed securely. Cyber security awareness programs should cover topics on how to get rid of old devices in a secure manner.</p>
<h4>6- Password Security</h4>
<p>Password security is one of the most challenging domains in cyber security awareness. A lot of resistance is found here, users hate to be forced to remember new passwords and have a difficulty creating new passwords that meet complexity requirements.</p>
<p>Luckily, there is a solution: <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">CIATEC&#8217;s information security awareness program</a> helps users get over this.</p>
<h4>7- Phishing and Email Security</h4>
<p>Phishing attacks are getting serious. 9 out of 10 phishing attacks are now ransomware, and pseudo ransomware is a new trend. Pseudo ransomware attacks are here to make users pay a ransome for data that is not even encrypted!</p>
<p>Training on how to avoid phishing scams and what to do in the event of an attack is a high priority in cyber security awareness program. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing awareness and training</a> cycle goes through four steps: <strong>Asses</strong>, <strong>Educate</strong>, <strong>Phish</strong>, <strong>Get results</strong>, and <strong>REPEAT</strong>. Phishing awareness, like any other cyber security awareness component, is a continuous cycle.</p>
<p>For more info about phishing awareness: <a href="https://www.ciatec.com/phishing" target="_blank" rel="noopener noreferrer">ciatec.com/phishing</a></p>
<h4>8- Malware</h4>
<p>Users in any business industry, size, or even home users should have the ability to identify a malware attack when they see one. It is also important that users identify the malware type (virus, trojan, worm, adware, spyware, ransomware&#8230;). But what&#8217;s more important is to know how to act in the event of malware infection. A good cyber security awareness program should provide this know how.</p>
<h4>9- Mobile Devices Security</h4>
<p>Mobile devices, whether personal or corporate owned, holds information assets that must be protected. Mobile devices security is a serious topic that should be addressed thoroughly in a corporate cyber security awareness program.</p>
<h4>10- Browser Security</h4>
<p>Training users on how to check URLs and ssl encrypted site (i.e.<em>,</em><em>https</em>), keeping browsers up-to-date, minimal plugin usage, and scan any downloaded files are basic browser security awareness material.</p>
<blockquote><p>Cyber Security is everyone&#8217;s responsibility.</p></blockquote>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Channels"></a>Cyber Security Awareness Channels</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Communicating the information is as important as the information itself. What fits one organization, may not necessarily fit another. Communicating cyber security awareness material to the right audience and using the right channels is what an awareness program is all about. Here is a list of the most commonly used cyber security awareness channels.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-youtube-play " ></i> </span>Educational Videos</h4>
<p>Videos are one of the most effective learning material. CIATEC provides cyber security awareness videos hosted on CIATEC&#8217;s servers or on client&#8217;s portal. Like all cyber security awareness material, videos are continuously updated to keep up with the latest cyber security awareness trends as well as latest animation trends.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-picture-o " ></i> </span>Billboard or Roll-up Banners</h4>
<p>A roll-up banner in a meeting room, in the lobby, or any other public space will help raising cyber security awareness without an effort.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-desktop " ></i> </span>Screen Posters</h4>
<p>Same as roll-up banners, displaying cyber security awareness material on screens if available in public places will help raising cyber security awareness by targeting all staff.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-envelope-o " ></i> </span>Email Posters and Newsletters</h4>
<p>Email posters and newsletter is another channel, that can become handy when trying to address specific topics in cyber security awareness program. Especially, when presented as an element of a bigger campaign.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-gamepad " ></i> </span>Gaming material</h4>
<p>This has also proved to be one of the most effective techniques to pass the awareness message in atmosphere of fun and entertainment. Whether a simple cross-words puzzle or matching gaming, or much more sophisticated information security gaming material, it all helps to easily relay the information to users.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-book " ></i> </span>Educational Magazine</h4>
<p>Educational magazines, whether as e-magazine, email newsletter or a paperback. When published and distributed on regular basis it will keep users informed of the latest security trends and how to avoid breaches.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-users " ></i></span> Information Security Courses, Workshops, and Quizzes</h4>
<p>Old fashion class room training courses, and online courses are always a good channel to reach out to employees. In training, it is advised to group employees based on trades or departments. This way the trainer can address specific security topic that may be associated with the audience trade.</p>
<p>Training should also be followed by a quiz to measure cyber security awareness and training effectiveness.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-anchor " ></i></span> Phishing Simulations</h4>
<p>Proven to be one of the most effective ways to identify points of weakness against phishing attacks. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing simulations awareness campaigns</a>, as part of overall cyber security awareness program, use hundreds of templates and provides accurate reports identifying:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Users who opened the simulation email.</li>
<li>Users who clicked on links.</li>
<li>Users who submitted sensitive data.</li>
</ul>

		</div>
	
<p>This way, information security team can identify and educate employees accordingly. <em>Contact us <a href="/services/phishing-awareness/#quote" target="_blank" rel="noopener noreferrer">here</a> to start a phishing awareness campaign.</em></p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-globe " ></i> </span>Dedicated Information Security Portal and Mobile App</h4>
<p>A dedicated information security web portal will serve as a reference for all users in all information security matters within the organization and will help keeping users well informed. It may contain the below elements:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Information security policies.</li>
<li>Latest news about cyber security threats.</li>
<li>Educational posts.</li>
<li>Interactive educational videos with questions and answers.</li>
<li>Educational games and quizzes.</li>
<li>Information security courses.</li>
</ul>

		</div>
	
<p>A dedicated cyber security awareness mobile app is even better. It will allow information security units to reach users on the go.</p>
<p><strong>Hint</strong>: <em>By combining our <a href="/services/web-mobile-apps-ecommerce-consulting/" target="_blank" rel="noopener noreferrer">web and mobile enablement</a> skills along with <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">security awareness services</a>, CIATEC can build your information security web portal and mobile app in no time!</em></p>

		<div class="clearfix"></div>
		<hr style="margin-top:20px; margin-bottom:10px;" class="divider divider-solid">
	
<h3><span style="color: #800000;">Conclusion</span></h3>
<p>Cyber security awareness is no longer an option. It is a significant layer of security that every IT-enabled organization must have.</p>
<p><em><strong>CIATEC</strong>&#8216;s cyber security <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness program</a> is designed to help organizations of various sizes and industries to minimize the risk of data breaches. <a href="/contact" target="_blank" rel="noopener noreferrer">Contact us</a> today to start building your own program.</em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</title>
		<link>https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 30 Jan 2019 10:33:23 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5687</guid>

					<description><![CDATA[<p>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221; If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime. Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>UPDATE: Apple marked Group Facetime as &#8220;temporarily unavailable.&#8221;</strong></p>
<p>If you are reading this on an iPhone, you might want to stop reading and immediately go into your settings and disable Facetime.</p>
<p>Apple confirmed an unpatched bug in group Facetime app that allows a caller to see and listen to you without even picking up the phone!</p>
<p>The bug was reported in January 21st by <a href="https://twitter.com/MGT7500" target="_blank" rel="noopener">@MFT7500</a></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">My teen found a major security flaw in Apple’s new iOS. He can listen in to your iPhone/iPad without your approval. I have video. Submitted bug report to <a href="https://twitter.com/AppleSupport?ref_src=twsrc%5Etfw">@AppleSupport</a>&#8230;waiting to hear back to provide details. Scary stuff! <a href="https://twitter.com/hashtag/apple?src=hash&amp;ref_src=twsrc%5Etfw">#apple</a> <a href="https://twitter.com/hashtag/bugreport?src=hash&amp;ref_src=twsrc%5Etfw">#bugreport</a> <a href="https://twitter.com/FoxNews?ref_src=twsrc%5Etfw">@foxnews</a></p>
<p>&mdash; MGT7 (@MGT7500) <a href="https://twitter.com/MGT7500/status/1087171594756083713?ref_src=twsrc%5Etfw">January 21, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>It is worth mentioning that this major privacy issue was reported days before the world celebrated <a href="https://twitter.com/hashtag/dataprivacyday" target="_blank" rel="noopener">#DataPrivacyDay</a> on January 28th.</p>
<p>The post <a href="https://www.ciatec.com/2019/01/apple-facetime-eavesdropping-exploit/">[Awareness] Disable Facetime on your Apple Devices till a Patch is Released</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Search Engines Market Share [August 2018]</title>
		<link>https://www.ciatec.com/2018/08/search-engines-market-share-august-2018/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 11 Aug 2018 12:53:05 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Search Engines]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[Statistics]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4817</guid>

					<description><![CDATA[<p>Search Engines Market Share It is no secret that google has been dominating the search engines market share for the last couple of decades. Google was founded in 1997, although the very first search engine was called &#8220;Archie&#8221;, but let&#8217;s keep history for another post. We are here to show some numbers on how the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/08/search-engines-market-share-august-2018/">Search Engines Market Share [August 2018]</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">Search Engines Market Share<br />
</span></h2>
<p>It is no secret that google has been dominating the search engines market share for the last couple of decades. Google was founded in 1997, although the very first search engine was called &#8220;Archie&#8221;, but let&#8217;s keep history for <a href="/2018/07/internet-timeline-history/" target="_blank" rel="noopener">another post.</a> We are here to show some numbers on how the search engines market share is actually shared between google, bing, yahoo, yandex, baidu and others.</p>
<p>According to the below graph from StatCounter, <a href="http://google.com" target="_blank" rel="noopener">Google</a> still holds 90% of market share <strong>worldwide</strong>, with slight insignificant loss for <a href="http://bing.com" target="_blank" rel="noopener">bing</a> in the past couple of months.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4821" src="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807.png" alt="Search Engine Market share" width="1280" height="720" srcset="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807.png 1280w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-300x169.png 300w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-768x432.png 768w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-1024x576.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-ww-monthly-201707-201807-390x220.png 390w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<h2><span style="color: #31aaa2;">Search Engines Market Share By Country<br />
</span></h2>
<ul>
<li>Google&#8217;s market share is around 90% in <strong>US, Canda, Australia, South America</strong> and<strong> Europe</strong>.</li>
<li>China <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/cn.png' alt= 'China' /> is considered to be the &#8220;No-Google-land&#8221; where local search engines Baidu and Alibaba&#8217;s Shenma dominates the Chinese search engines market.<a href="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4829" src="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807.png" alt="Search Engine Market Share China" width="1280" height="720" srcset="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807.png 1280w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-300x169.png 300w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-768x432.png 768w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-1024x576.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-CN-monthly-201707-201807-390x220.png 390w" sizes="(max-width: 1280px) 100vw, 1280px" /></a></li>
</ul>
<p>&nbsp;</p>
<ul>
<li>In Russia <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/ru.png' alt= 'Russia' />, Google has almost a 50-50 market share with Yandex.</li>
</ul>
<ul>
<li><a href="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4831" src="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807.png" alt="Search Engine Market Share Russia" width="1280" height="720" srcset="https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807.png 1280w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-300x169.png 300w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-768x432.png 768w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-1024x576.png 1024w, https://www.ciatec.com/wp-content/uploads/2018/08/StatCounter-search_engine-RU-monthly-201707-201807-390x220.png 390w" sizes="(max-width: 1280px) 100vw, 1280px" /></a></li>
</ul>
<p>&nbsp;</p>
<ul>
<li>As far as our region (Middle East) is concerned, Google dominates the search engines market share with even a higher percentage to reach around <strong>97%</strong> in <strong>Saudi Arabia <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/sa.png' alt= 'Saudi Arabia' /></strong>, <strong>United Arab Emirates <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/ae.png' alt= 'United Arab Emirates' /></strong>,<strong> Kuwait <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/kw.png' alt= 'Kuwait' />, Egypt</strong> <img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/eg.png' alt= 'Egypt' /> and <strong>Lebanon </strong><img class='azc_flags' src='https://www.ciatec.com/wp-content/plugins/azurecurve-flags/images/lb.png' alt= 'Lebanon' />.</li>
</ul>
<h2><span style="color: #31aaa2;">Why Google is by far the leading search engine?</span></h2>
<p>Bing is trying, with the beautiful images and all. In fact, Google couldn&#8217;t find things that are not found by bing or yahoo. Search results are in most cases similar on all search engines. Yet, google has always been holding the largest market share, and this doesn&#8217;t seem to be changing any time soon.</p>
<p>So, what makes Google so special? Here are some reasons that makes Google the primary holder of search engines market share:</p>
<p>1- <strong>Simplicity</strong>: Google kept it simple, a factor which positively contributes to user experience.</p>
<p>2- <strong>Core business</strong>: search is Google&#8217;s core business right from the beginnings in the 1990s.</p>
<p>3- <strong>CSI factor</strong>: continual service improvement in google products and services is a key factor for staying on top of the list.</p>
<p>4- <strong>Chrome</strong>: Google chrome is the most popular internet browser. It gained that title because it belongs to Google&#8217;s family. But on the other hand, with address bar search feature and google being the default search engine, chrome definitely plays a vital role in 4 billion search queries happening every day.</p>
<p>5- <strong>Products integration</strong>: Integrating all google products together such as gmail, YouTube, maps, analytics, ads, adsense and other is a major player in moving google way ahead of the competition.</p>
<hr />
<p>Google dominates the search engines market with 4 billion query a day. Which is an enough reason to use Ciatec&#8217;s <strong>Search Engine Optimization (SEO) service</strong> to rank higher on search engines results page, <a href="/contact">contact us</a> today for a free site assessment.</p>
<p>The post <a href="https://www.ciatec.com/2018/08/search-engines-market-share-august-2018/">Search Engines Market Share [August 2018]</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
