Cybersecurity Theme's
Privacy by design
You collect data for your research or for your work. A name here, an address there. But do you really need all that data? And does everyone know what you...
Read articleData breaches
You clicked on the wrong button by accident, and inadvertently sent a file with payment details to all of your clients. A colleague lost his USB stick. Someone came across...
Read articleStrong passwords
Half a millisecond. That's the average time it takes a hacker to crack a weak password like '123456' or 'password'. And passwords that consist of actual words or birth dates...
Read articleUnencrypted data
You fire off a quick email to confirm an appointment or to share a file. But how do you know your data won’t be looted? Are you sure it is...
Read articleData confiscation abroad
When you go on holiday, you take all your valuables with you. These days, everything you need to run your day-to-day life, your memories and expertise are stored on your...
Read articleInternet of things
Your coffee is ready when you wake up, there’s a message on your phone to say the washing is done and the thermostat knows when and how much to heat...
Read articleCyberbullying
It’s so easy to circulate an embarrassing photo or post a hurtful comment from behind a desk. Worse still, malicious words may be sent directly to the intended victim to keep...
Read articleRecognize fake websites
You’re looking for information about a product. You click and read and then click again. The next day, you find you can't log in. Pre-occupied with your search, you didn't...
Read articlePrivacy and mobile apps
An app which shares your photos with friends, orders your dinner and measures your sporting achievements. And then there’s one with funny sounds. The game that you've already finished. And...
Read article