cybersecuritymonth.eu has an expired TLS certificate and... I don't even have a funny joke.

#ecsm #awareness #thinkb4uclick

This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest report by the European Union Agency for Cybersecurity. This yearโ€™s edition of the ENISA Threat Landscape analysis sketches out current trends, highlights the most frequent and severe threats to the European #cybersecurity and identifies the most targeted sectors.
Find it at https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025.

#ECSM #CyberSecMonth

๐Ÿ” Long, unique, avoiding common patternsโ€ฆ Do you follow the rules of making a strong password? And do people with similar background do?
๐Ÿ“ On the occasion of the European #CyberSecMonth we would like to remind you of the insightful analysis by Andreanne Bergeron. In her paper โ€œTell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Passwordโ€™s Strengthโ€ she explores how factors such as literacy or government accountability correlate with cybersecurity habits of the broad population. Read it online on our website: https://www.acigjournal.com/Tell-Me-Where-You-Live-and-I-Will-Tell-Your-P-Ssw0rd-Understanding-the-Macrosocial,184304,0,2.html

๐ŸŒApplied Cybersecurity & Internet Governance (#ACIG) is published by #NASK โ€“ National Research Institute
#cybersecurity #passwordStrength #ECSM

๐ŸŽ๐Ÿง™โ€โ™€๏ธNot every treat is sweet!

Phishing is a type of attack where ๐Ÿฆนโ€โ™‚๏ธcybercriminals try to obtain your personal data by contacting you through ๐Ÿ“งemail, ๐Ÿ“ž phone, or ๐Ÿ“ฒdirect message.

๐ŸŽญThey pretend to be someone you know, in order to trick you into sharing personal information or even your login credentials.
 
Here are some key tips:
๐Ÿ•ต๏ธCheck the senderโ€™s email address
๐Ÿ•ต๏ธLook at how the email or message is phrased and if there are any spelling or grammar mistakes.
๐Ÿ•ต๏ธAnalyse the tone of the message: urgent, exciting, anxiety?
๐Ÿ•ต๏ธCheck the list of recipients of the email or message.
 
More in our post. โคต๏ธ
 
โ˜๏ธ There are other cyber-attacks that you might beware.

#ECSM #EDPS #CyberSecMonth #CyberAware

Since 2012 in October the European Cybersecurity Month campaign takes place. Initiated by the European Union Agency for Cybersecurity and the @EUCommission, #ECSM aims to provide the public with accurate and up-to-date knowledge about online threats and to promote good cybersecurity habits among individuals and organizations both public and private. In Poland ECSM is coordinated by our publisher, #NASK. Over the course of the entire month numerous conferences, webinars and educational events for local communities are organized.
Dear readers from Europe and from all over the world โ€“ care to share what actions are carried out in your countries to promote cybersecurity for everyone?

#ACIG #CyberFriday #CyberSecMonth

*** ๐—˜๐˜‚๐—ฟ๐—ผ๐—ฝ๐—ฒ๐—ฎ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐— ๐—ผ๐—ป๐˜๐—ต ***

๐ŸŽ™๏ธ TechDispatch Talks โ€“ New Episode Out!

๐Ÿ‚๐Ÿค– October marks the European Cybersecurity Month 2025, and we are joining the conversation with a brand-new episode of TechDispatch Talks on the topic "Human Oversight of Automated-Decision Making!"

In this episode, Laura Hernรกndez together with Julia Hodder explore both the opportunities and the risks of automated systems, from transparency and accountability to trust and cybersecurity.

This discussion builds on the last #TechDispatch publication: if you missed it, you can read it here: https://www.edps.europa.eu/data-protection/our-work/publications/techdispatch/2025-09-23-techdispatch-22025-human-oversight-automated-making_en

๐ŸŽง Tune in to the podcast and join the conversation

๐Ÿ“ฝ๏ธ Video: https://www.edps.europa.eu/press-publications/press-news/videos/techdispatch-talks-human-oversight-automated-making_en

๐Ÿ”Š Podcast: https://www.edps.europa.eu/press-publications/publications/podcasts/techdispatch-talks-human-oversight-automated-making_en

#ECSM #ECSM25

*** ๐„๐‚๐’๐Œ 2025 - ๐’๐ญ๐ซ๐š๐ญ๐ž๐ ๐ข๐œ ๐ข๐ฆ๐ฉ๐จ๐ซ๐ญ๐š๐ง๐œ๐ž ๐จ๐Ÿ ๐ž๐ฌ๐ญ๐š๐›๐ฅ๐ข๐ฌ๐ก๐ข๐ง๐  ๐š ๐œ๐จ๐ฆ๐ฆ๐จ๐ง ๐ฅ๐ž๐ฏ๐ž๐ฅ ๐จ๐Ÿ ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฆ๐š๐ญ๐ฎ๐ซ๐ข๐ญ๐ฒ ***

Marking the 1๏ธโƒฃ3๏ธโƒฃth anniversary of the European Cybersecurity Month, this year's edition gives a spotlight to the human element in cybersecurity. Besides addressing pressing challenges related to the shortage of skilled cybersecurity professionals or the crucial role of behavioural change in fostering a safe online environment, the high-level panel also looked into the achievements, challenges and opportunities for the years ahead across EUIs.

#EDPS, as a data protection authority, supervises not only how the EU institutions ๐Ÿ‡ช๐Ÿ‡บimplement data protection rules, but also cybersecurity measures and how they handle personal data breaches. Recent statistics show that many breaches stem from cyber-attacks and this creates an overlap between obligations under #EUDPR and Cybersecurity Regulations where notification under โฑ๏ธ 72 hours to the EDPS plays a key role. Cybersecurity implements one of the seven core principles of data protection: integrity and confidentiality of personal data.

@Supervisor Wojciech Wiewiรณrowski highlighted the importance of a robust cybersecurity that is the essential foundation for effective data protection: โ€œ๐˜Œ๐˜ท๐˜ฆ๐˜ณ๐˜บ ๐˜ค๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ช๐˜ฏ๐˜ค๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต ๐˜ช๐˜ด ๐˜ข ๐˜ฑ๐˜ฐ๐˜ต๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ฑ๐˜ฆ๐˜ณ๐˜ด๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ฃ๐˜ณ๐˜ฆ๐˜ข๐˜ค๐˜ฉ. ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜™๐˜ฆ๐˜จ๐˜ถ๐˜ญ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ๐˜ฆ๐˜ง๐˜ฐ๐˜ณ๐˜ฆ, ๐˜ช๐˜ด ๐˜ฏ๐˜ฐ๐˜ต ๐˜ซ๐˜ถ๐˜ด๐˜ต ๐˜ข๐˜ฏ ๐˜๐˜› ๐˜ฆ๐˜น๐˜ฆ๐˜ณ๐˜ค๐˜ช๐˜ด๐˜ฆ. ๐˜๐˜ต ๐˜ช๐˜ด ๐˜ข ๐˜ค๐˜ฐ๐˜ณ๐˜ฏ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ฐ๐˜ฏ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ฐ๐˜ถ๐˜ณ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ช๐˜ต๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜ต๐˜ฐ ๐˜ด๐˜ข๐˜ง๐˜ฆ๐˜จ๐˜ถ๐˜ข๐˜ณ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ง๐˜ถ๐˜ฏ๐˜ฅ๐˜ข๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ข๐˜ญ ๐˜ณ๐˜ช๐˜จ๐˜ฉ๐˜ต๐˜ด ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฅ๐˜ช๐˜จ๐˜ช๐˜ต๐˜ข๐˜ญ ๐˜ข๐˜จ๐˜ฆ. ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ช๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ฐ๐˜ฏ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ฆ๐˜ท๐˜ฆ๐˜ฏ ๐˜ค๐˜ฐ๐˜ณ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ช๐˜ฏ๐˜ค๐˜ช๐˜ฑ๐˜ญ๐˜ฆ๐˜ด ๐˜ฐ๐˜ง ๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ฑ๐˜ณ๐˜ฐ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ: ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜จ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ฐ๐˜ง ๐˜ฑ๐˜ฆ๐˜ณ๐˜ด๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ฅ๐˜ข๐˜ต๐˜ข.โ€

๐Ÿ—ฃ๏ธWe heard inspiring insights from distinguished guests and now ๐ŸŽฅ re-watch it: https://lnkd.in/eEUKsPbD

#ECSM #EDPS #CyberSecMonth #CyberAware

*** European Cybersecurity Month 2025 - Get ready to enhance the human factor in cybersecurity ***

๐Ÿ’ช Join forces with the EU institutions, bodies and agencies in an annual awareness campaign to strengthen cybersecurity among Europeans. We invite you to watch the Inter-institutional kick-off event organised by @EUCommission.

Todayโ€™s agenda of #ECSM2025 shares an exciting line-up of speakers in various panels focusing on:

๐Ÿฆพ Establishing Union-wide cybersecurity maturity
๐Ÿค Bridging resource gaps and fostering collaboration
๐Ÿ’ผ Developing a gender-balanced, skilled workforce
๐Ÿšจ Understanding cybersecurity behaviours and promoting a security-first mindset
๐Ÿ•น๏ธ Innovative use of gamification
๐Ÿ‘ฉ๐Ÿผโ€๐Ÿ’ป The launch of the inter-institutional Women in IT network

Follow us online or visit our #EDPS booth in MADOU building, Brussels.

๐Ÿ”ด Starting on Air now: https://lnkd.in/d_biW4W6

#ECSM #EDPS #CyberSecMonth #CyberAware

As our #CyberSecMonth campaign โ€˜Your brain is the first line of defenceโ€™ comes to a close, Urpo Kaila, Head of Security Policies at CSC, shares his reflections on #InformationSecurity and on what he believes to be also the โ€˜last line of defenceโ€™:

โ€œThe last line of defence is not about listing requirements, regulations and standards, or the latest hype in #cybersecurity tools. It is you!"

๐Ÿ‘‰ https://connect.geant.org/2024/10/29/the-first-and-the-last-line-of-defence

#CSM24 #SecurityAwareness #NRENs #ECSM

The first and the last line of defence | Gร‰ANT CONNECT Online

Words: Urpo Kaila, Head of Security Policies, CSC, Finland After a quarter century of hectic yet fascinating work in hands-on information security, I am transitioning from my operational responsibilities to an advisory role. This change has prompted some reflections that I would like to share with you. Consider them advice, if you will. Resilience needs

Gร‰ANT CONNECT Online | The leading collaboration on e-infrastructure and services for research and education

We often hear that the #HumanFactor is the weakest link in the #security chain, but as cyber attacks continue to evolve, so too do our protective measures and #SecurityAwareness

According to Enrico Venuto, CISO at Politecnico di Torino, humans are beginning to serve as the most acute and sensitive sentinels against cyber attacks: https://connect.geant.org/2024/10/28/the-weakest-link

"The human brain is the most resilient link in the chain and the first line of defence in #cybersecurity"

#CyberSecMonth #CSM24 #ECSM #PoliTo

The weakest link? | Gร‰ANT CONNECT Online

By Enrico Venuto, CISO, Politecnico di Torino In recent years, with the strengthening of telecommunications networks and the widespread diffusion of communication devices, applications, and online services, there has been a boom in the use of digital technologies. These technologies have quickly permeated everyone's life so that today, living "disconnected" seems nearly impossible. This incredible

Gร‰ANT CONNECT Online | The leading collaboration on e-infrastructure and services for research and education