Loading...

The value of good design (part 2)

In the project, one of the tasks that we have been assigned related to visualization. No need to say how important this is: with poor visualization every information will be lost or subject to misinterpretation – with a good one, the message finds the recipient timely and in the most effective manner. In CS-AWARE we [...]

2018-03-02T15:06:37+00:00March 2nd, 2018|Blog|

Cyber Security in Public Administration

The rapid and high-speed development of services in the "cyber-space", on the one hand, has innumerable advantages, such as the breaking down of geographical borders, through the interconnection of billions of people, the delivery of new types of services and the global level exchange of knowledge. On the other hand, it is the source of [...]

2018-03-02T14:39:30+00:00March 2nd, 2018|Blog|

Working with municipalities about innovative technology

Our company has more than 20 years of experience of working with with new technologies, at first in educational contexts. There was a period when schools liked new approaches to learning they thought interactive technology would afford. What we, and the school, forgot, was that there was not much interaction in their curriculum, so we [...]

2018-02-22T14:07:51+00:00February 22nd, 2018|Blog|

New Tools for the Establishment of a Stronger Cyber-Security Framework in the EU

The European Commission presented a couple of moths back its proposals on cybercrime in the EU, suggesting at the same time the establishment of an EU Cyber ​​Security Agency, to be incorporated into the existing EU Network and Information Security Agency (ENISA) based in Heraklion, Crete. With digital technologies being the backbone of the European [...]

2018-02-20T14:31:54+00:00February 16th, 2018|Blog|

The Benefits of Cyberthreat Information Exchange

Cyberattacks have attracted interest due to both the frequency that successful attacks occur at, as well as the strong impact they may have on organisations. In response to this, the security industry developed a variety of products and solutions providing security event management and incident response. These products rely on gathering and analysing a broad [...]

2018-02-16T10:04:52+00:00February 16th, 2018|Blog|

Systems and Dependency Analysis of the systems of the cities of Larissa and Rome

We’ve just put the finishing touches to the first iteration of the Systems and Dependency Analysis of the systems of the cities of Larissa and Rome. This is being done in order to establish some Cybersecurity requirements for local public administrations. The report was passed to the internal review team last week and will be [...]

2018-02-14T13:13:58+00:00February 14th, 2018|Blog|

Barriers to achieving higher levels of cybersecurity in Local Government

The 2016 Cybersecurity  survey[1] of local government chief information officers revealed that the general inability in local government to offer competitive salaries, combined with a lack of cybersecurity staff, and a recurring lack of funds  have prevented local governments from achieving higher levels of cybersecurity[2]. Almost a third (32%) of the respondents reported an increase [...]

2018-02-14T13:13:05+00:00February 13th, 2018|Blog|

My general opinion about cybersecurity

In my opinion cyber-security is all the organized actions required to protect information from any risk in all its forms (digital, physical). Ensure the systems and networks which store, retrieve , process and transport the information. Including measures to protect from criminal acts, sabotage, espionage, accidents, and failures. We should also consider as Cyber-Security threats [...]

2018-01-09T19:38:38+00:00January 9th, 2018|Blog|

Introducing the Concept of CS-AWARE to Greek Public Organizations

Dissemination actions are more than essential for the sustainability, scalability and successful course of an ambitious project. In the case of CS-AWARE early dissemination becomes a necessity, considering the pan-European nature and character of the applied research, currently implemented. So, when an opportunity arose to present the concept of CS-AWARE to a large number of [...]

2018-01-08T21:36:28+00:00January 8th, 2018|Blog|

GDPR: the centrality of data security in the digital era

The entrance in force of the GDPR set new challenges and opportunities for Europe-based companies. In particular, the new regulation puts cyber security under the spotlight as a fundamental requirement to guarantee data protection. Indeed, as the digital revolution has paved the way to international businesses and new market ventures, so has also increased [...]

2018-11-14T13:59:37+00:00January 5th, 2018|Blog|
Go to Top