Connect with us

Published

on

Within the scope of the Cyber ​​Security training program, many trainings ranging from internet security to copyright, from security settings to privacy are offered free of charge.

Today, children are growing up in an age where online activities are a natural part of their daily routine. While children may seem adept at navigating the digital world, they remain vulnerable to a range of online risks, from viruses and ransomware to fake news and cyberbullying on social media and online.

Trend Micro since 2008 “Internet Safety for Kids and Families” (Internet Safety for Kids and Families) initiative helps children, parents, teachers and young people around the world prevent and address online risks.

Cyber ​​security

Cyber ​​Security training program It is offered completely free of charge

Within the scope of the ISKF initiative, Trend Micro has prepared a completely free special training program to raise cyber awareness among children, parents and teachers around the world and make children more resistant to cyber threats.

The Internet Security Series program for children aged 7-10, prepared within the scope of Trend Micro Cyber ​​Academy, includes 11 trainings in total, including Cyber ​​Security, Healthy Habits, Camera Security, Time Spent Online, Courtesy, Security Settings, Misinformation and Copyright. Trend Micro Cyber ​​Academy, which provides training in a total of 19 languages, including Turkish https://www.trendmicro.com/internet-safety/tr/cyber-academy can be reached at.

ISKF initiative is actively carried out in 19 countries

ISKF, which was launched in 2008, has grown rapidly and spread to 19 countries. Operating in a wide range from face-to-face events to online training, ISKF stands out as an important resource in the field of cyber security for children, parents and teachers. Cyber ​​Academy, created within the scope of ISKF, teaches young digital citizens how to stay safe in the digital world with interactive videos and narratives. Within the scope of the program, it is planned to reach approximately 10 thousand children and their families by the end of 2024.

Figures about ISKF

  • 444 students were reached
  • 356,010 families were reached
  • “What’s Your Story?” There were 4,470 participants from 13 countries in the video and poster competition
  • Hosted 312 events
  • 367 Trend Micro employees volunteered
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Life

Beware of romance scammers

Scammers asking for money or photos are a thing of the past. Romance scam methods have evolved.

Published

on

Scammers asking for money or photos are a thing of the past. Romance scam methods have evolved.

The number of people using messaging applications exceeded 3.3 billion in 2023. WhatsApp, Facebook Messenger and WeChat are among the most used applications.

Scammers look to these platforms for the love of money or data. Messaging apps are becoming a platform for both phishing and online romance scams, among other threats.

From 2019 to 2022, the amount of losses attributed to romance scams reported to the U.S. Federal Trade Commission increased from $493 million to $1.3 billion. Social networks and messaging apps were the first communication platform for 59 percent of those who said they lost money to a romance scam in 2022.

Scammers asking for money or photos are a thing of the past.  Romance scam methods have evolved.

Fraud methods are changing

As general digital security awareness increases, fraudsters’ tactics are also changing.

They send a risky phrase to their contacts: “Let’s go chat somewhere else.” Often the victim is redirected to a new and unknown app offered on third-party app stores or websites.

This allows the user to download spy tools that can read private data on the smartphone. In such cases, the most powerful weapon is to have a reliable cyber security solution that can detect suspicious activities of the application running in the background.

How do romance scams work?

scammers, assumes false identities on dating sites. By befriending lonely people, they establish a close relationship with these people and may even propose marriage to these people.

However, they may soon ask you for money or to open a new bank account that they can use. They use these accounts to further their scams, turning the victim of a romantic relationship into a money mule.

Scammers asking for money or photos are a thing of the past.  Romance scam methods have evolved.

Red flags of romance scams

Making excuses to avoid meeting: The scammer will avoid meeting face to face despite repeatedly stating that he or she is willing to do so.

Things are moving very quickly: Your new “partner” will express deep interest/affection and perhaps a desire for intimacy, even though you have only been chatting for a few days.

Asking for money: Romance scammers often come up with a heartbreaking story about why they need money ASAP. They can also pose as wealthy people who can pay off their debts with interest but “cannot currently access their funds.”

Leaving secure communication: The scammer may ask to leave a dating service or social media site to communicate directly. When you only use reliable app stores with strict app review policies, your chances of getting scammed will decrease rapidly.

Continue Reading

Security

EXPOSED TO RANSOMWARE ATTACKS

According to a recent study, 60% of healthcare organizations will be subject to ransomware attacks by 2023. For this reason, it is important for healthcare organizations to prioritize cyber security measures to detect potential threats and ensure patient safety.

Published

on

According to a recent study, 60% of healthcare organizations will be subject to ransomware attacks by 2023. For this reason, it is important for healthcare organizations to prioritize cyber security measures to detect potential threats and ensure patient safety.

Technology widely used in every sector, health and rose to an important position in the pharmaceutical industry. Advances in medical systems through technology have significantly improved patient care, reducing costs and increasing efficiency.

However, considering the abundance of data in the sector, healthcare institutions need to strengthen their cyber security measures, as they are vulnerable to external threats. A recent study shows that 60% of healthcare organizations will be subject to ransomware attacks by 2023. For this reason, it is important for the healthcare sector to adopt a comprehensive security approach. Especially when it comes to ransomware.

ransomware

3 advantages of cyber security against ransomware threat to healthcare organizations

  1. Ensures compliance with legislation: Firewalls are critical for compliance with regulations such as HIPAA (Health Insurance Portability and Accountability Act). But to be truly effective, they need to be structured correctly. For this purpose, certain rules are needed that allow only necessary data traffic from authorized network addresses. Blanket “permission” rules should be avoided because they may allow unauthorized access to PHI data.
  1. Protects medical devices: Due to the rise of Internet of Medical Things (IoMT) devices, a multitude of medical devices are now connected to each other, facilitating real-time monitoring and seamless data sharing. The most important disadvantage of this situation is that it poses critical security risks. Risks can be prevented with a firewall that divides the network into segments, creates independent subnets and controls the traffic between them, reducing the likelihood of threats spreading since they will not affect the entire network. Well-executed access control policies combined with active traffic monitoring provide increased security by providing greater control over the network.
  1. Improves network performance: In addition to improving security, firewalls also optimize network performance. By managing traffic flow, it can prevent unnecessary bandwidth usage while ensuring the smooth functioning of critical medical applications. This helps optimize overall network efficiency by reducing latency and improving response times.
Continue Reading

Security

Global data traffic will reach 59 exabytes in 2023

Global data traffic on DE-CIX Internet Exchanges has increased significantly once again in 2023. A total of almost 59 exabytes of data were exchanged across DE-CIX-operated locations across over 3,100 connected networks worldwide.

Published

on

Global data traffic on DE-CIX Internet Exchanges has increased significantly once again in 2023. A total of almost 59 exabytes of data were exchanged across DE-CIX-operated locations across over 3,100 connected networks worldwide.

This corresponds to an increase of approximately 23 percent compared to the previous year: in 2022 this value was at 48 exabytes. Global data traffic reached the highest traffic of the year, reaching a record level of 22.36 terabits per second (Tbit/s) on the evening of November 8, 2023, in parallel with the fourth match day of the UEFA Champions League.

This peak in traffic experienced DE-CIX FrankfurtIt coincided with the latest record high in: Traffic transmitted by nearly 1,100 local, regional and global connected networks reached a peak level of 16.62 Tbit/s on 8 November, also at DE-CIX Frankfurt. DE-CIX Frankfurt remains the largest Internet Exchange Point in Europe, with 40 exabytes of data exchanged in 2023.

Google data center global data traffic

Internet-based applications encourage development

The growing use of Internet-based applications has been driving global data traffic development in DE-CIX for years. While it was 32 exabytes in 2020 and 38 exabytes in 2021, this value reached a total of 59 exabytes in 2023. For example, this value corresponds to approximately 9.8 billion two-hour long video streams.

This amount of data is equivalent to the number of bits and bytes produced if every man, woman and child on the planet streamed more than two hours of video. This value also corresponds to the total capacity of more than 460 million smartphones, each with 128 GB of storage.

Goblin mode is the global data traffic of the year

DE-CIX Internet Exchanges connect the world

There was significant variation in usage throughout the year, from video conferencing and streaming services to gaming: Gaming services were in particularly high demand in early and mid-2023. The same goes for video conferences, which find regular use in late spring and summer, except for the holiday months. In parallel with this seasonal activity, it was observed that video streaming services peaked in summer and winter months.

Developments in all DE-CIX locations worldwide confirm this. For example, Global data traffic at DE-CIX New York during peak times increased by approximately 22 percent compared to the beginning of 2023, to 1.61 Tbit/s. This trend includes DE-CIX Dallas (traffic peak 1.01 Tbit/s; more than 61 percent increase compared to January 2023), DE-CIX Madrid (traffic peak 1.54 Tbit/s; more than 44 percent increase compared to January 2023). (Global data traffic peak 1.48 Tbit/s; more than 32 percent increase compared to January 2023). This positive trend is also reflected in the wider regions where the company operates. For example, in 2023, data traffic amounted to around 3.1 exabytes in Southern Europe, 5.7 exabytes in India, and 6.4 exabytes in North America. As of today, DE-CIX offers peering, cloud connectivity and other interconnection services in more than 50 metro markets worldwide.

Information: What does 59 exabytes of data equal?

  • Data flow is specified in terabits per second (Tbit/s).
  • 1 terabit per second, 10³ Gbit/s, 106 Mbit/s, 109 kbit/s or 1012 bit/s or 1,000,000,000,000 bit/s.
  • 8 Terabits = 1 Terabyte (TB) and 1,000,000 TB = 1 Exabyte (EB)
  • 59 exabytes (EB) is equal to the storage capacity of 460,625,000 smartphones with 128 GB of storage each.
Continue Reading

Trending

Copyright © 2023 RAZORU NEWS. Project by V