cybersecuritymonth.eu has an expired TLS certificate and... I don't even have a funny joke.
cybersecuritymonth.eu has an expired TLS certificate and... I don't even have a funny joke.
This #cyberFriday, to conclude the #EuropeanCybersecurityMonth we recommend you the latest report by the European Union Agency for Cybersecurity. This yearโs edition of the ENISA Threat Landscape analysis sketches out current trends, highlights the most frequent and severe threats to the European #cybersecurity and identifies the most targeted sectors.
Find it at https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025.
๐ Long, unique, avoiding common patternsโฆ Do you follow the rules of making a strong password? And do people with similar background do?
๐ On the occasion of the European #CyberSecMonth we would like to remind you of the insightful analysis by Andreanne Bergeron. In her paper โTell Me Where You Live and I Will Tell Your P@Ssw0rd: Understanding the Macrosocial Variables Influencing Passwordโs Strengthโ she explores how factors such as literacy or government accountability correlate with cybersecurity habits of the broad population. Read it online on our website: https://www.acigjournal.com/Tell-Me-Where-You-Live-and-I-Will-Tell-Your-P-Ssw0rd-Understanding-the-Macrosocial,184304,0,2.html
๐Applied Cybersecurity & Internet Governance (#ACIG) is published by #NASK โ National Research Institute
#cybersecurity #passwordStrength #ECSM
๐๐งโโ๏ธNot every treat is sweet!
Phishing is a type of attack where ๐ฆนโโ๏ธcybercriminals try to obtain your personal data by contacting you through ๐งemail, ๐ phone, or ๐ฒdirect message.
๐ญThey pretend to be someone you know, in order to trick you into sharing personal information or even your login credentials.
Here are some key tips:
๐ต๏ธCheck the senderโs email address
๐ต๏ธLook at how the email or message is phrased and if there are any spelling or grammar mistakes.
๐ต๏ธAnalyse the tone of the message: urgent, exciting, anxiety?
๐ต๏ธCheck the list of recipients of the email or message.
More in our post. โคต๏ธ
โ๏ธ There are other cyber-attacks that you might beware.
Since 2012 in October the European Cybersecurity Month campaign takes place. Initiated by the European Union Agency for Cybersecurity and the @EUCommission, #ECSM aims to provide the public with accurate and up-to-date knowledge about online threats and to promote good cybersecurity habits among individuals and organizations both public and private. In Poland ECSM is coordinated by our publisher, #NASK. Over the course of the entire month numerous conferences, webinars and educational events for local communities are organized.
Dear readers from Europe and from all over the world โ care to share what actions are carried out in your countries to promote cybersecurity for everyone?
*** ๐๐๐ฟ๐ผ๐ฝ๐ฒ๐ฎ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ ๐ผ๐ป๐๐ต ***
๐๏ธ TechDispatch Talks โ New Episode Out!
๐๐ค October marks the European Cybersecurity Month 2025, and we are joining the conversation with a brand-new episode of TechDispatch Talks on the topic "Human Oversight of Automated-Decision Making!"
In this episode, Laura Hernรกndez together with Julia Hodder explore both the opportunities and the risks of automated systems, from transparency and accountability to trust and cybersecurity.
This discussion builds on the last #TechDispatch publication: if you missed it, you can read it here: https://www.edps.europa.eu/data-protection/our-work/publications/techdispatch/2025-09-23-techdispatch-22025-human-oversight-automated-making_en
๐ง Tune in to the podcast and join the conversation
๐ฝ๏ธ Video: https://www.edps.europa.eu/press-publications/press-news/videos/techdispatch-talks-human-oversight-automated-making_en
๐ Podcast: https://www.edps.europa.eu/press-publications/publications/podcasts/techdispatch-talks-human-oversight-automated-making_en
*** ๐๐๐๐ 2025 - ๐๐ญ๐ซ๐๐ญ๐๐ ๐ข๐ ๐ข๐ฆ๐ฉ๐จ๐ซ๐ญ๐๐ง๐๐ ๐จ๐ ๐๐ฌ๐ญ๐๐๐ฅ๐ข๐ฌ๐ก๐ข๐ง๐ ๐ ๐๐จ๐ฆ๐ฆ๐จ๐ง ๐ฅ๐๐ฏ๐๐ฅ ๐จ๐ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ฆ๐๐ญ๐ฎ๐ซ๐ข๐ญ๐ฒ ***
Marking the 1๏ธโฃ3๏ธโฃth anniversary of the European Cybersecurity Month, this year's edition gives a spotlight to the human element in cybersecurity. Besides addressing pressing challenges related to the shortage of skilled cybersecurity professionals or the crucial role of behavioural change in fostering a safe online environment, the high-level panel also looked into the achievements, challenges and opportunities for the years ahead across EUIs.
#EDPS, as a data protection authority, supervises not only how the EU institutions ๐ช๐บimplement data protection rules, but also cybersecurity measures and how they handle personal data breaches. Recent statistics show that many breaches stem from cyber-attacks and this creates an overlap between obligations under #EUDPR and Cybersecurity Regulations where notification under โฑ๏ธ 72 hours to the EDPS plays a key role. Cybersecurity implements one of the seven core principles of data protection: integrity and confidentiality of personal data.
@Supervisor Wojciech Wiewiรณrowski highlighted the importance of a robust cybersecurity that is the essential foundation for effective data protection: โ๐๐ท๐ฆ๐ณ๐บ ๐ค๐บ๐ฃ๐ฆ๐ณ๐ด๐ฆ๐ค๐ถ๐ณ๐ช๐ต๐บ ๐ช๐ฏ๐ค๐ช๐ฅ๐ฆ๐ฏ๐ต ๐ช๐ด ๐ข ๐ฑ๐ฐ๐ต๐ฆ๐ฏ๐ต๐ช๐ข๐ญ ๐ฑ๐ฆ๐ณ๐ด๐ฐ๐ฏ๐ข๐ญ ๐ฅ๐ข๐ต๐ข ๐ฃ๐ณ๐ฆ๐ข๐ค๐ฉ. ๐๐บ๐ฃ๐ฆ๐ณ๐ด๐ฆ๐ค๐ถ๐ณ๐ช๐ต๐บ ๐๐ฆ๐จ๐ถ๐ญ๐ข๐ต๐ช๐ฐ๐ฏ, ๐ต๐ฉ๐ฆ๐ณ๐ฆ๐ง๐ฐ๐ณ๐ฆ, ๐ช๐ด ๐ฏ๐ฐ๐ต ๐ซ๐ถ๐ด๐ต ๐ข๐ฏ ๐๐ ๐ฆ๐น๐ฆ๐ณ๐ค๐ช๐ด๐ฆ. ๐๐ต ๐ช๐ด ๐ข ๐ค๐ฐ๐ณ๐ฏ๐ฆ๐ณ๐ด๐ต๐ฐ๐ฏ๐ฆ ๐ฐ๐ง ๐ฐ๐ถ๐ณ ๐ค๐ฐ๐ฎ๐ฎ๐ช๐ต๐ฎ๐ฆ๐ฏ๐ต ๐ต๐ฐ ๐ด๐ข๐ง๐ฆ๐จ๐ถ๐ข๐ณ๐ฅ๐ช๐ฏ๐จ ๐ง๐ถ๐ฏ๐ฅ๐ข๐ฎ๐ฆ๐ฏ๐ต๐ข๐ญ ๐ณ๐ช๐จ๐ฉ๐ต๐ด ๐ช๐ฏ ๐ต๐ฉ๐ฆ ๐ฅ๐ช๐จ๐ช๐ต๐ข๐ญ ๐ข๐จ๐ฆ. ๐๐บ๐ฃ๐ฆ๐ณ๐ด๐ฆ๐ค๐ถ๐ณ๐ช๐ต๐บ ๐ช๐ฎ๐ฑ๐ญ๐ฆ๐ฎ๐ฆ๐ฏ๐ต๐ด ๐ฐ๐ฏ๐ฆ ๐ฐ๐ง ๐ต๐ฉ๐ฆ ๐ด๐ฆ๐ท๐ฆ๐ฏ ๐ค๐ฐ๐ณ๐ฆ ๐ฑ๐ณ๐ช๐ฏ๐ค๐ช๐ฑ๐ญ๐ฆ๐ด ๐ฐ๐ง ๐ฅ๐ข๐ต๐ข ๐ฑ๐ณ๐ฐ๐ต๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ: ๐ช๐ฏ๐ต๐ฆ๐จ๐ณ๐ช๐ต๐บ ๐ข๐ฏ๐ฅ ๐ค๐ฐ๐ฏ๐ง๐ช๐ฅ๐ฆ๐ฏ๐ต๐ช๐ข๐ญ๐ช๐ต๐บ ๐ฐ๐ง ๐ฑ๐ฆ๐ณ๐ด๐ฐ๐ฏ๐ข๐ญ ๐ฅ๐ข๐ต๐ข.โ
๐ฃ๏ธWe heard inspiring insights from distinguished guests and now ๐ฅ re-watch it: https://lnkd.in/eEUKsPbD
*** European Cybersecurity Month 2025 - Get ready to enhance the human factor in cybersecurity ***
๐ช Join forces with the EU institutions, bodies and agencies in an annual awareness campaign to strengthen cybersecurity among Europeans. We invite you to watch the Inter-institutional kick-off event organised by @EUCommission.
Todayโs agenda of #ECSM2025 shares an exciting line-up of speakers in various panels focusing on:
๐ฆพ Establishing Union-wide cybersecurity maturity
๐ค Bridging resource gaps and fostering collaboration
๐ผ Developing a gender-balanced, skilled workforce
๐จ Understanding cybersecurity behaviours and promoting a security-first mindset
๐น๏ธ Innovative use of gamification
๐ฉ๐ผโ๐ป The launch of the inter-institutional Women in IT network
Follow us online or visit our #EDPS booth in MADOU building, Brussels.
๐ด Starting on Air now: https://lnkd.in/d_biW4W6
As our #CyberSecMonth campaign โYour brain is the first line of defenceโ comes to a close, Urpo Kaila, Head of Security Policies at CSC, shares his reflections on #InformationSecurity and on what he believes to be also the โlast line of defenceโ:
โThe last line of defence is not about listing requirements, regulations and standards, or the latest hype in #cybersecurity tools. It is you!"
๐ https://connect.geant.org/2024/10/29/the-first-and-the-last-line-of-defence
Words: Urpo Kaila, Head of Security Policies, CSC, Finland After a quarter century of hectic yet fascinating work in hands-on information security, I am transitioning from my operational responsibilities to an advisory role. This change has prompted some reflections that I would like to share with you. Consider them advice, if you will. Resilience needs
We often hear that the #HumanFactor is the weakest link in the #security chain, but as cyber attacks continue to evolve, so too do our protective measures and #SecurityAwareness
According to Enrico Venuto, CISO at Politecnico di Torino, humans are beginning to serve as the most acute and sensitive sentinels against cyber attacks: https://connect.geant.org/2024/10/28/the-weakest-link
"The human brain is the most resilient link in the chain and the first line of defence in #cybersecurity"
By Enrico Venuto, CISO, Politecnico di Torino In recent years, with the strengthening of telecommunications networks and the widespread diffusion of communication devices, applications, and online services, there has been a boom in the use of digital technologies. These technologies have quickly permeated everyone's life so that today, living "disconnected" seems nearly impossible. This incredible