Cybersecurity for SMEs and Public Administration

Cybercrime is causing problems and damage worth tens of billions of dollars every year, and awareness of the need to protect oneself is growing. This workshop addresses issues related to new security challenges in the digital age.

Program

  • Our identity on the WEB and the identity of the interlocutor
  • Nobody knows you are a dog
  • Websites know much more about us than we know about them.
  • Differences between the various types of phishing
  • Spear Phishing: techniques used
  • OSINT: how our information can be collected and used to deceive
  • Exposure of personal information: cookies and third-party cookies
  • Tracking information
  • Mobile security: security in official stores
  • Mobile security: use of alternative markets
  • Mobile security: infection/compromise techniques used
  • Advice on the approach to mobile device security: the less, the better
  • Epic fails: some cases of compromised security

Course

Cybersecurity for SMEs and Public Administration

Aimed at: Everyone
Recommended prerequisites: Basic use of the Internet
Duration: 10 hours

Course

Cybersecurity for SMEs and Public Administration

Aimed at: Everyone
Recommended prerequisites: Basic use of the Internet
Duration: 10 hours

Cybersecurity for SMEs and Public Administration

Cybercrime is causing problems and damage worth tens of billions of dollars every year, and awareness of the need to protect oneself is growing. This workshop addresses issues related to new security challenges in the digital age.

Program

  • Our identity on the WEB and the identity of the interlocutor
  • Nobody knows you are a dog
  • Websites know much more about us than we know about them.
  • Differences between the various types of phishing
  • Spear Phishing: techniques used
  • OSINT: how our information can be collected and used to deceive
  • Exposure of personal information: cookies and third-party cookies
  • Tracking information
  • Mobile security: security in official stores
  • Mobile security: use of alternative markets
  • Mobile security: infection/compromise techniques used
  • Advice on the approach to mobile device security: the less, the better
  • Epic fails: some cases of compromised security