SECURITY TIPS

Child pornography in Greece

Child pornography in Greece In recent years there has been a rapid increase in the number of Internet users downloading videos and photos of child pornography. However, to date, the existence of an organised circuit filming acts of indecency with minors has not been detected, except in isolated cases. How the "predators" (Grooming = seduction) work (Grooming = seduction [...]

read more

How secure is the Cloud: can we trust it with our personal data?

Living in the so-called digital age, it is known that every person interacts with technological devices in their everyday life. From mobile phones to tablets or computers, everyone makes use of these devices and is now fully familiar with their functions. This familiarity has led to the confidence to store a variety of our personal data [...]

read more

How do we spot a fake Facebook profile?

In the world of the Internet, where electronic media have dominated communication and direct contact is becoming more and more indirect, things tend to change radically and fraud is becoming the dominant phenomenon.
People of all ages have personal accounts on social networks (Twitter, Facebook, LinkedIN, Instagram, Pinterest, etc.) and participate in public blogs and forums [...]

read more

Measures to protect the confidentiality of communications

Responsibilities of providers and users/subscribers Ensuring the confidentiality of electronic communications must be a concern and responsibility of both the providers of these services and their subscribers. Providers of electronic communications services are responsible for ensuring the confidentiality of communications on the public telecommunications network (backbone and access network), as well as on the routers [...]

read more

Can businesses deal with cyber fraud and how?

Companies should, in addition to implementing software to protect and secure their information systems, train their staff to acquire a "Culture of Security". It is quite common, when hiring employees, for a company to ask them to sign security terms and policies that should [...]

read more

But are online transactions safe?

How can we be sure that we won't be deceived and how can we suspect fraud so that we can avoid it? What should we be careful about when it comes to our transactions? 1. Do not make transactions using public computers (from Net cafes, cafeterias, libraries, etc.). They may have keyloggers or spywares, without [...]

read more

Tips to avoid nuisance calls or calls with masking

It is common for collection agencies or advertising companies to call by stealth and their employees to become very persistent and annoying. There are of course also the phenomena of hoaxes by stealth or harassment for personal reasons. Read what you can do when you are being harassed by cold calling: - Ask the mobile phone company you are [...]

read more

Online identity theft, what it really means!

What to do and what to avoid Identity theft is a big deal. Personal and financial data is hijacked online, sold in the underground economy and used for illegal purposes by criminal organisations around the world. Protecting your data will not only save you from an unpleasant process of changing passwords [...]

read more

Ten tips for safe BlackBerry use

Ten tips for using your BlackBerry safely! 1. Do not store or process confidential information on a BlackBerry device. 2. Turn off your device and remove the battery before entering a high-security area. 3. Keep the BlackBerry within 3m of another device processing classified information. 4. You are always in control of your device. [...]

read more

Tips for safe iPhone & iPad use

In the following section, you'll find some basic tips for using your iPhone and iPad running the iOS operating system safely. The instructions do not apply to devices that operate in a corporate environment, but only to devices that are under the control of the user. Information about corporate connectivity and issues such as VPN [...]

read more