<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Training Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/training/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/training/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Tue, 17 Oct 2023 17:12:45 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Training Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/training/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Practical GDPR for Small Business Training</title>
		<link>https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:56:45 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Documentation]]></category>
		<category><![CDATA[GDPR for Small Business]]></category>
		<category><![CDATA[GDPR for SME]]></category>
		<category><![CDATA[GDPR for SMEs]]></category>
		<category><![CDATA[GDPR Policies]]></category>
		<category><![CDATA[GDPR Procedures]]></category>
		<category><![CDATA[GDPR Training]]></category>
		<category><![CDATA[Practical GDPR]]></category>
		<category><![CDATA[Practical GDPR for Small Business]]></category>
		<category><![CDATA[Practical GDPR Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2113</guid>

					<description><![CDATA[<p>Practical GDPR for Small Business/Charity Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Practical Data Protection Training, in an online and in-person format. Title: Practical GDPR for Small Business/Charity Training. Learning objective: The purpose of this programme is to equip the learner with the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/">Practical GDPR for Small Business Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2113 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2113"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Practical GDPR for Small Business/Charity Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Practical-GDPR-for-Small-Business-Charity.pdf" target="_self" class="pp-button" role="button" download="Practical-GDPR-for-Small-Business-Charity.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea854a15d08" data-node="5eea854a15d08">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Practical%20GDPR%20for%20Small%20Business%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20practical%20GDPR%20for%20small%20business%20training,%20please.%0A" target="_self" class="pp-button" role="button" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Practical Data Protection Training, in an online and in-person format.</p>
<h2>Title: Practical GDPR for Small Business/Charity Training.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the practical knowledge to implement policies and procedures in their organisation. They will also understand the requirements for record keeping.</p>
<h2>Content of the Practical GDPR for Small Business/Charity Training:</h2>
<p>There are three separate modules in this training:</p>
<h3>1.   Module 1 – The basic requirements</h3>
<ul>
<li>Quick question – do you need a Data Protection Officer (DPO)?</li>
<li>Interpreting the GDPR’s principles</li>
<li>Creating a simple Data Inventory</li>
<li>Establishing a Data Protection Policy</li>
</ul>
<h3>2.   Module 2 – The crucial documentation</h3>
<ul>
<li>What needs to be included in a right-to-be-informed page</li>
<li>Producing procedures to handle an individual’s rights</li>
<li>Knowing the kind of records you need to keep</li>
</ul>
<h3>3.   Module 3 – The stuff most people forget about</h3>
<ul>
<li>Understanding Data Processing Agreements</li>
<li>When it hits the fan – using a Data Breach handling procedure</li>
<li>Securing the business with an Information Security Policy</li>
</ul>
<h2>Duration:</h2>
<p>Each Module is 60 minutes, including ample time for Questions and Answers</p>
<h2>Audience:</h2>
<p>Small Business Owners or Data Protection Administrators in small businesses and charities who need to put in place policies, procedures and records keeping for the GDPR in their organisation.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/">Practical GDPR for Small Business Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A la carte Data Protection Training</title>
		<link>https://www.l2cybersecurity.com/a-la-carte-data-protection-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:54:36 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Awareness]]></category>
		<category><![CDATA[Data Protection Awareness Training]]></category>
		<category><![CDATA[Data Protection Training]]></category>
		<category><![CDATA[Staff Data Protection Awareness]]></category>
		<category><![CDATA[Staff Data Protection Awareness Training]]></category>
		<category><![CDATA[Staff Data Protection Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2111</guid>

					<description><![CDATA[<p>À la carte Data Protection Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following À la carte Data Protection Training, in an online and in-person format. Title: À la carte Data Protection Training. Learning objective: The purpose of this programme is to equip the learner&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-la-carte-data-protection-training/">A la carte Data Protection Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2111 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2111"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">À la carte Data Protection Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/A-la-carte-Data-Protection-Training.pdf" target="_self" class="pp-button" role="button" download="A-la-carte-Data-Protection-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=À%20la%20carte%20Data%20Protection%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20À%20la%20carte%20data%20protection%20Training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following À la carte Data Protection Training, in an online and in-person format.</p>
<h2>Title: À la carte Data Protection Training.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify their organisation’s obligations to protect the personal data of the individuals that they work for and with.</p>
<h2>Our range of topics to choose from include:</h2>
<p><strong>The basics:</strong></p>
<ul>
<li>What is Personal Data and what do we mean by processing</li>
<li>Comprehending the terminology of the GDPR</li>
<li>Do you need a Data Protection Officer (DPO)?</li>
</ul>
<p><strong>The important items:</strong></p>
<ul>
<li>Interpreting the GDPR’s principles</li>
<li>Knowing the rights of the individual</li>
<li>Understanding the appropriate legal basis for processing (incl. consent)</li>
<li>Data Protection by design</li>
<li>How to identify and handle International Transfers</li>
<li>Establish what other documentation is required</li>
</ul>
<p><strong>Documentation and Procedures:</strong></p>
<ul>
<li>Handling Sensitive Personal Data appropriately</li>
<li>Creating a simple Data Inventory</li>
<li>Establishing a Data Protection Policy</li>
<li>What needs to be included in a right-to-be-informed document</li>
<li>Producing procedures to handle an individual’s rights</li>
<li>Knowing the kind of records you need to keep</li>
<li>Understanding Data Processing Agreements</li>
<li>When it hits the fan – using a Data Breach handling procedure</li>
<li>Securing the business with an Information Security Policy</li>
<li>When and How to conduct a Data Protection Impact Assessment</li>
<li>What is a Legitimate Interest Assessment and how should you carry it out</li>
<li>What if it all goes wrong – what can the Data Protection Commission do</li>
</ul>
<h2>Duration:</h2>
<p>Each topic is approximately 20 minutes each, including time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Staff, contractors or volunteers who have no or limited knowledge of data protection and specifically the GDPR legislation. Also organisations who need to put in place policies, procedures and records keeping for the GDPR in their business.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/a-la-carte-data-protection-training/">A la carte Data Protection Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Staff Data Protection Awareness Training</title>
		<link>https://www.l2cybersecurity.com/staff-data-protection-awareness-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:52:57 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Awareness]]></category>
		<category><![CDATA[Data Protection Awareness Training]]></category>
		<category><![CDATA[Staff Data Protection Awareness]]></category>
		<category><![CDATA[Staff Data Protection Awareness Training]]></category>
		<category><![CDATA[Staff Data Protection Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2112</guid>

					<description><![CDATA[<p>Staff Data Protection Awareness Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Staff Data Protection Training, in an online and in-person format. Title: Data Protection Awareness Training for staff. Learning objective: The purpose of this programme is to equip the learner with the knowledge&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/staff-data-protection-awareness-training/">Staff Data Protection Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2112 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2112"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Staff Data Protection Awareness Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Staff-Data-Protection-Awareness-Training.pdf" target="_self" class="pp-button" role="button" download="Staff-Data-Protection-Awareness-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Staff%20Data%20Protection%20awareness%20training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20staff%20data%20protection%20awarenesss%20training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Staff Data Protection Training, in an online and in-person format.</p>
<h2>Title: Data Protection Awareness Training for staff.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify their organisation’s obligations to protect the personal data of the individuals that they work for and with.</p>
<h2>Content of the Staff Data Protection Awareness Training:</h2>
<p>There are three separate modules in this training.</p>
<h3>1.   Module 1 – The basics</h3>
<ul>
<li>What is Personal Data and what do we mean by processing</li>
<li>Comprehending the terminology of the GDPR</li>
<li>Interpreting the GDPR’s principles</li>
</ul>
<h3>2.   Module 2 – The important stuff</h3>
<ul>
<li>Knowing the rights of the individual</li>
<li>Understanding the appropriate legal basis for processing (incl. consent)</li>
<li>Data Protection by design</li>
</ul>
<h3>3.   Module 3 – What do you need to put in place</h3>
<ul>
<li>Creating a simple Data Inventory</li>
<li>Establish what other documentation is required</li>
<li>What if it all goes wrong – what can the Data Protection Commission do</li>
</ul>
<h2>Duration:</h2>
<p>Each module is 60 minutes, including ample time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Staff, contractors or volunteers who have no or limited knowledge of data protection and specifically the GDPR legislation.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/staff-data-protection-awareness-training/">Staff Data Protection Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Board Management Data Protection Briefing</title>
		<link>https://www.l2cybersecurity.com/board-management-data-protection-briefing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:50:22 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Board Data Protection]]></category>
		<category><![CDATA[Board Data Protection Briefing]]></category>
		<category><![CDATA[Board Management Data Protection Briefing]]></category>
		<category><![CDATA[Board of Directors]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Briefing]]></category>
		<category><![CDATA[Management Data Protection]]></category>
		<category><![CDATA[Management Data Protection Briefing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2110</guid>

					<description><![CDATA[<p>Board/Management Data Protection Briefing Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format. Title: Data Protection Briefing for Boards or Management. Learning objective: The purpose of this programme is to equip the members of the board/management with the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/board-management-data-protection-briefing/">Board Management Data Protection Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2110 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2110"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Board/Management Data Protection Briefing</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Board-Management-Data-Protection-Briefing.pdf" target="_self" class="pp-button" role="button" download="Board-Management-Data-Protection-Briefing.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea83e6d5e64" data-node="5eea83e6d5e64">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Board/Management%20Data%20Protection%20Briefing%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20Board/Management%20Data%20Protection%20Briefing,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format.</p>
<h2>Title: Data Protection Briefing for Boards or Management.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the members of the board/management with the knowledge of their obligations for data protection, under the GDPR and have a strategy for addressing these in their organisation.</p>
<h2>Content of the Board/Management Briefing:</h2>
<ul>
<li>Overview of case studies since GDPR came into force in Ireland</li>
<li>Quick question – do you need a Data Protection Officer (DPO)?</li>
<li>An introduction of the organisation’s obligations</li>
<li>Outline an implementation strategy for the organisation</li>
</ul>
<h2>Duration:</h2>
<p>The briefing will take 45 minutes. There will be plenty of time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Board members or Senior Management of organisations that want to start the journey of implementing a data protection compliance regime.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/board-management-data-protection-briefing/">Board Management Data Protection Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A la carte Security Training</title>
		<link>https://www.l2cybersecurity.com/training-a-la-carte-security/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 20:29:44 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Awareness Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Training]]></category>
		<category><![CDATA[Staff Cyber Security Training]]></category>
		<category><![CDATA[Staff Security Awareness]]></category>
		<category><![CDATA[Staff Security Awareness Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2066</guid>

					<description><![CDATA[<p>À la carte Security Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following À la carte Security Training, in an online and in-person format. Title: À la carte Cyber Security Training. Learning objective: We can offer you tailor made training to make your staff aware&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/training-a-la-carte-security/">A la carte Security Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2066 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2066"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">À la carte Security Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/A-la-carte-Security-Training.pdf" target="_self" class="pp-button" role="button" download="A-la-carte-Security-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=À%20la%20carte%20Security%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20À%20la%20carte%20Security%20Training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following À la carte Security Training, in an online and in-person format.</p>
<h2>Title: À la carte Cyber Security Training.</h2>
<h2>Learning objective:</h2>
<p>We can offer you tailor made training to make your staff aware of the types of threats that exist in your industry sector, and how they manifest themselves. By taking our training, your staff will be skilled to become another layer of protection against threats to your network.</p>
<h2>Our range of topics to choose from include:</h2>
<h3>Scams and Malicious Software:</h3>
<ul>
<li>Catching social engineering tricks – 20 minutes</li>
<li>Spotting phishing, smishing and vishing – 40 mins</li>
<li>Overview of malicious software (AKA malware) – 20 mins</li>
<li>How to handle Ransomware – 30 mins</li>
</ul>
<h3>Protecting your online life:</h3>
<ul>
<li>Keeping young people safe – 20 mins</li>
<li>Staying safe on Social Media – 20 mins</li>
<li>How to handle a cyber incident – 30 mins</li>
</ul>
<h3>Best Practices:</h3>
<ul>
<li>Protecting online accounts (passwords and authentication) – 40 mins</li>
<li>Using mobile devices securely – 20 mins</li>
<li>Securing the office or home (including work-from-home environment) – 20 mins</li>
<li>How to implement a proper backup strategy – 20 mins</li>
<li>Why are updates/patches so important – 20 mins</li>
</ul>
<h2>Duration:</h2>
<p>The duration for each topic is listed above, which includes time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Staff who have no knowledge of online risks or those who wish to improve their awareness of the ever changing cyber security aspects of the online world.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/training-a-la-carte-security/">A la carte Security Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Staff Security Awareness Training</title>
		<link>https://www.l2cybersecurity.com/training-staff-security-awareness/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 20:07:13 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Awareness Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Training]]></category>
		<category><![CDATA[Staff Cyber Security Training]]></category>
		<category><![CDATA[Staff Security Awareness]]></category>
		<category><![CDATA[Staff Security Awareness Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2062</guid>

					<description><![CDATA[<p>Staff Security Awareness Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Staff Security Training, in an online and in-person format. Title: Cyber Security Awareness Training for staff. Learning objective: The purpose of this programme is to equip the learner with the knowledge and skill&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/training-staff-security-awareness/">Staff Security Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2062 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2062"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Staff Security Awareness Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Staff-Security-Awareness-Training.pdf" target="_self" class="pp-button" role="button" download="Staff-Security-Awareness-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Staff%20security%20awareness%20training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20staff%20security%20awarenesss%20training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Staff Security Training, in an online and in-person format.</p>
<h2>Title: Cyber Security Awareness Training for staff.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify many various threats when using the internet and know what steps to take to protect themselves from these threats.</p>
<h2>Content of the Staff Security Awareness Training:</h2>
<p>There are three separate Modules in this training. Some of the content could also apply to people's home life. If they learn to be safe in the office, they can apply this at home too.</p>
<h3>1.   Module 1 – Social engineering and dodgy emails</h3>
<p style="padding-left: 40px;">An in-depth look at how criminals use social engineering and then perpetrate various email scams. You will find out how to avoid falling victim to these tactics.</p>
<h3>2.   Module 2 – Protecting your online world</h3>
<p style="padding-left: 40px;">Learning simple and effective password and authentication practices, as well as how to stay safe when using Social Media.</p>
<h3>3.   Module 3 – Securing your IT and handling a cyber incident</h3>
<p style="padding-left: 40px;">Good practices for securing your IT assets (Backups, Updates and Wi-Fi setup). How to deal with a cyber security incident.</p>
<p>There will be lots of examples of the different types of scams that will target staff. There are short videos also included to show real world examples of hacking. There will also be plenty of tips and tricks on how to be safer and more secure online, including how to be careful with Social Media.</p>
<h2>Duration:</h2>
<p>Each module takes 60 minutes, including ample time for Questions and Answers.</p>
<p>A standard session covers modules 1 and 2 as a minimum (two hours).</p>
<h2>Audience:</h2>
<p>Staff who have no knowledge of online risks or those who wish to improve their awareness of the ever changing cyber security aspects of the online world.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/training-staff-security-awareness/">Staff Security Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Board Management Security Briefing</title>
		<link>https://www.l2cybersecurity.com/board-management-security-briefing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 19:50:59 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Board Cyber Security Briefing]]></category>
		<category><![CDATA[Board Management Security Briefing]]></category>
		<category><![CDATA[Board of Directors]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Briefing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Management Cyber Security Briefing]]></category>
		<category><![CDATA[Security Briefing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2057</guid>

					<description><![CDATA[<p>Board/Management Security Briefing Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format. Title: Cyber Security Briefing for Boards or Management. Briefing Objective: The purpose of this programme is to equip the members of the board/management with the knowledge&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/board-management-security-briefing/">Board Management Security Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2057 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2057"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Board/Management Security Briefing</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Board-Management-Security-Briefing.pdf" target="_self" class="pp-button" role="button" download="Board-Management-Security-Briefing.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea83e6d5e64" data-node="5eea83e6d5e64">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Board/Management%20Security%20Briefing%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20Board/Management%20Security%20Briefing,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format.</p>
<h2>Title: Cyber Security Briefing for Boards or Management.</h2>
<h2>Briefing Objective:</h2>
<p>The purpose of this programme is to equip the members of the board/management with the knowledge of the current cyber security threats that target their organisation’s activities and know what strategy they should take to protect the organisation.</p>
<h2>Content of the Board/Management Briefing:</h2>
<ul>
<li>Overview of current global cyber threats</li>
<li>An introduction to the specific risks faced by the organisation</li>
<li>Outline a remediation strategy for the organisation</li>
</ul>
<h2>Duration:</h2>
<p>The briefing will take 40-50 minutes. There will then be plenty of time for Questions and Answers.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/board-management-security-briefing/">Board Management Security Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR fines are starting to come.</title>
		<link>https://www.l2cybersecurity.com/gdpr-fines-starting-to-come/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 28 Nov 2018 12:44:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR fines]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1469</guid>

					<description><![CDATA[<p>Shortly after I posted about the Austrian GDPR fine, another fine was issued by the regulatory authority in Portugal. Late last week the German regulatory authority imposed another fine on an App maker. So the GDPR fines are beginning to come. Let&#8217;s take a quick look at these three cases and then see what you&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-fines-starting-to-come/">GDPR fines are starting to come.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1471" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/GDPR-fines-150x150.jpg" alt="GDPR fines" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/GDPR-fines-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/11/GDPR-fines.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Shortly after I posted about the <a href="https://www.l2cybersecurity.com/gdpr-hasnt-gone-away/" target="_blank" rel="noopener">Austrian GDPR fine</a>, another fine was issued by the regulatory authority in Portugal. Late last week the German regulatory authority imposed another fine on an App maker. So the GDPR fines are beginning to come. Let&#8217;s take a quick look at these three cases and then see what you can do.<span id="more-1469"></span></p>
<h3></h3>
<h3></h3>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3>Austrian surveillance cost €4.8K</h3>
<p>Just to recap, a business owner had <a href="https://digital.freshfields.com/post/102f39w/first-gdpr-fine-issued-by-austrian-data-protection-regulator" target="_blank" rel="noopener">CCTV installed</a> outside their premises. One camera was recording a large portion of the public footpath. This was judged to be too invasive and there was poor signage. The regulatory authority hit them with a modest €4,800 fine. The Austrian data protection authority had 36 other proceedings pending at that time.</p>
<h3>Portuguese hospital with too many doctor&#8217;s accounts hit for €400K</h3>
<p>An unnamed hospital in Portugal had 985 doctor&#8217;s accounts on it&#8217;s IT system and only 296 doctors on staff. It seems that non-Doctor types (e.g. psychologists and dietitians) used doctor accounts to access patient data. What is most troubling is that a doctor account has unrestricted access to every single patient&#8217;s data.</p>
<p>You might not think this is a big deal, but you&#8217;re dealing with sensitive personal data here. There should be some controls on access to it, including audit logs of any and all access made by authorised personnel.</p>
<p><a href="https://www.insideprivacy.com/data-privacy/portuguese-hospital-receives-and-contests-400000-e-fine-for-gdpr-infringement/" target="_blank" rel="noopener">The regulator has imposed</a> a €400,000 fine on the hospital, which is appealing the judgement. The Portuguese Government have not yet fully implemented the GDPR, but the regulator is acting as if it was in place.</p>
<h3>App maker who cooperated, still fined €20K</h3>
<p>A German chat platform, knuddles.de had a breach in which <a href="https://www.baden-wuerttemberg.datenschutz.de/lfdi-baden-wuerttemberg-verhaengt-sein-erstes-bussgeld-in-deutschland-nach-der-ds-gvo/" target="_blank" rel="noopener">330,000 e-mail addresses</a> (in German) and their account passwords were stolen by hackers. The passwords were in plain text (no hashing or encrypting was applied). It was the screw-up with the password that caused the fine. They hadn&#8217;t applied appropriate technical or organisational controls to protect the data.</p>
<p>The regulatory authority acknowledged that Knuddles were very proactive in reporting the breach and the subsequent follow up. They have implemented stronger security controls in a very short time. In consultation with the regulator they have more measures coming in due course.</p>
<p>The regulator also looked at the financial  strength of the company in determining the fine, not wanting to place the business under any financial burden. So the fine was proportionate. I would hate to think what might have been the case if they hadn&#8217;t cooperated.</p>
<h3>To avoid GDPR fines, budget now to prepare early in 2019</h3>
<p>If your business hasn&#8217;t put in place any policies or procedures to address the requirements of the GDPR, you should look at addressing this soon. Most annual budgets will have been exhausted by now, so put in place a sensible sum for GDPR preparation work, early next year.</p>
<ul>
<li>If you haven&#8217;t attended a GDPR awareness event, then seek one out or give us a call on <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">087-436-2675</span></span>.</li>
<li>We are now offering <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-Practical-Training.pdf" target="_blank" rel="noopener">Practical GDPR Training</a>, which can give you virtually everything you need to be as compliant as possible. Being &#8220;100% GDPR compliant&#8221; is not something that can be stated presently, as there is no certification available to support such a declaration.</li>
<li>Or if you prefer to keep making money for your business and not be distracted, then we can do the work for you. Send us an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we&#8217;ll get in touch.</li>
</ul>
<p>#GDPR</p>
<p>#SimpleGDPR</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-fines-starting-to-come/">GDPR fines are starting to come.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to deal with Ransomware.</title>
		<link>https://www.l2cybersecurity.com/deal-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 14:01:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1407</guid>

					<description><![CDATA[<p>I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. I have previously talked about how Ransomware can infect your machine. It can be by&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1408" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg" alt="Deal with Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dont-pay-the-ransomware.jpg 500w" sizes="(max-width: 150px) 100vw, 150px" />I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either know of somebody or have themselves, suffered a Ransomware incident. <span id="more-1407"></span>I have previously talked about how Ransomware can infect your machine. It can be by <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/" target="_blank" rel="noopener">dodgy looking e-mails</a> or <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/" target="_blank" rel="noopener">legitimate looking e-mails</a>. The variety is endless, but it is generally all down to somebody clicking a link or opening an attachment. I&#8217;ve got an <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/" target="_blank" rel="noopener">entire commandment</a> dealing with e-mails and how you should handle them.</p>
<p>What I&#8217;ve talked about above, is all prevention. However that doesn&#8217;t help you if you are staring at a monitor with a ransom demand on it. Let me give you a couple of examples of recently reported Ransomware incidents and how they were handled.</p>
<h3>Bristol Airport recovers from Ransomware Incident</h3>
<p>On the weekend of the 15th and 16th September, <a href="https://www.theregister.co.uk/2018/09/17/bristol_airport_cyber_attack/" target="_blank" rel="noopener">Bristol Airport suffered a Ransomware incident</a>. This incident took their flight information screens off-line for much of the weekend. Luckily no other safety or flight systems were affected.</p>
<p>How did the authorities at Bristol Airport deal with Ransomware? They re-built the systems and restored backups. They did not pay the Ransom.</p>
<h3>Scottish Brewery suffered a Ransomware incident from a job application.</h3>
<p>In the last couple of weeks, the <a href="https://www.bankinfosecurity.com/scottish-brewery-slammed-by-dharma-ransomware-variant-a-11537" target="_blank" rel="noopener">Arran Brewery in Scotland had all of it&#8217;s systems affected by Ransomware</a>. They had been running a recruitment campaign, advertising for a role via their own website. The evil doers took that ad and posted it to some international recruitment websites. The brewery then started receiving several e-mails a day from interested candidates from all over the world. In among those e-mails the bad guys slipped in one with Ransomware. The CV got opened and their files got scrambled. Not only were their live files affected, but their recent backups were too. These were stored online, attached to their network. Their most recent offline backups were 90 days old.</p>
<p>How did the brewery deal with Ransomware? They also re-built their systems and restored what backups they had. In this case though, they did consider paying the (GBP) £9,600 ransom. They came to the determination that the value of the data they lost (90 days of sales data) was less than the cost of the Ransom demand. They also took into consideration that paying the Ransom does not guarantee they would get back their data.</p>
<p>The brewery then did something really sensible. They have kept a copy of the scrambled data.</p>
<h3>Help may be available from the good guys.</h3>
<p>There is a not-for-profit, freely available service called <strong>No More Ransom</strong> (<a href="https://www.nomoreransom.org" target="_blank" rel="noopener">https://www.nomoreransom.org</a>). This is run by various Law Enforcement and Cyber Security firms around the world. They are constantly working on cracking the codes for the different Ransomware variants and enabling people to recover their data for free.</p>
<p>So the Arran Brewery is holding onto the scrambled data in the hope that someday they will be able to unscramble it.</p>
<h3>So how should you deal with Ransomware?</h3>
<p>Prevention is always better than a cure.</p>
<p>The first thing is to make sure you get your staff some security awareness training. This is something that I deliver. Details of the complete training is <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">available here</a>. We can do customised training to suit your organisation too. Call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail on <span style="color: #ff0000;"><a style="color: #ff0000;" href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a><span style="color: #000000;"> to discuss your requirements.</span></span></p>
<p>Then ensure that you have your systems <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">updated/patched regularly</a>, have security appliances like <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/" target="_blank" rel="noopener">Firewalls in place</a>, <a href="http://www.l2cybersecurity.com/use-anti-virus/" target="_blank" rel="noopener">Anti-Virus is generally helpful</a> against malicious software and also you <a href="http://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">shouldn&#8217;t insert strange USB devices</a> into your computers.</p>
<p>Finally, you should have a good data backup system in place. This can be a very simple set-up or more complicated depending on your business needs. Again, I offer advice and support on backup strategies and business continuity planning. I also have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">a commandment about backups</a>.</p>
<p>That&#8217;s it! With all of the above in place, <span style="text-decoration: underline;"><strong>in the</strong> <strong>very unlikely event</strong></span> that you do subsequently suffer a Ransomware incident, you will be able to recover from it.</p>
<h3>What if it would cost me less to pay the ransom?</h3>
<p>This is a genuine struggle for a business owner, particularly small businesses. Recovering systems from a ransomware incident takes time, which costs money, and the business may be unable to operate while recovery is ongoing, so is not generating revenue. A good business continuity plan, should reduce such risks.</p>
<p>If you are tempted to pay, I just have two things I want you to consider:</p>
<ol>
<li>There is no guarantee that you will get your data back. Figures vary wildly from <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/" target="_blank" rel="noopener">50%</a> to <a href="https://gbhackers.com/ransomware-attack/" target="_blank" rel="noopener">100%</a> failure to recover data. If you pay and don&#8217;t get your data back, you will then have to pay the full cost of recovery anyway.</li>
<li>You are funding organised crime. You are paying criminals who not only do cyber crime, but human trafficking, drugs, weapons, etc. People think I am being jokey or have my tongue in cheek when I refer to <em><strong>Evil Doers</strong></em>. I&#8217;m not. This is an accurate description of these people. They! Are! <span style="text-decoration: underline;"><strong>Evil!</strong></span></li>
</ol>
<p>If you pay once, then the bad guys reckon you might pay again, so you will be a bigger target. My advice to deal with Ransomware is to implement preventative measures (call me on <span style="color: #ff0000;">087-436-2675</span> or e-mail <a href="mailto:info@L2CyberSecurity.com"><span style="color: #ff0000;">info@L2CyberSecurity.com</span></a> to have a no obligation chat) and never pay these evil doers.</p>
<h3>What else do you need to consider?</h3>
<p>Don&#8217;t forget that if the data that gets scrambled contains personal data, then you have a data breach on your hands, which may be notifiable under the new Data Protection Act 2018 which incorporates the General Data Protection Regulation (GDPR). I&#8217;ve a short video here:</p>
<p><iframe title="What is a data breach - Ransomware" width="500" height="281" src="https://www.youtube.com/embed/PVnq6Bu-GEA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Finally, if you do suffer a Ransomware incident, a crime has been committed, so please report it to local Law Enforcement. They may not be able to do much about it, but it needs to be reported for statistical purposes if nothing else. If it can be shown that Cyber crime is as big a problem, as I know it to be, then the more reports to Law Enforcement will mean they will get more resources to be able to tackle it&#8217;s root cause.</p>
<p>#LetsBeCarefulOutThere and #StaySafe</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/deal-with-ransomware/">How to deal with Ransomware.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of my 2017 predictions.</title>
		<link>https://www.l2cybersecurity.com/review-2017-predictions/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 28 Dec 2017 15:02:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Predictions]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1048</guid>

					<description><![CDATA[<p>I don&#8217;t see many people who make predictions for the coming year actually come back to review what they predicted. I&#8217;m not one of those though, so here is my review. I&#8217;ve included the original text below in blue, but the full article for my 2017 predictions is here. 1. Ransomware levels will plateau, but&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2017-predictions/">Review of my 2017 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1049" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300-150x150.jpg" alt="2017 Predictions" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2017-300x300.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I don&#8217;t see many people who make predictions for the coming year actually come back to review what they predicted. I&#8217;m not one of those though, so here is my review. I&#8217;ve included the original text below in <span style="color: #0000ff;">blue</span>, but the full article for my 2017 predictions is <a href="https://www.l2cybersecurity.com/2017-predictions-cyber-security/">here</a>.<span id="more-1048"></span></p>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">1. Ransomware levels will plateau, but constantly change</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This might be an easy one to get right. Ransomware is already embedded in over 90%+ of all phishing e-mails, so there&#8217;s hardly any further room to keep growing. We&#8217;ve already started to see the way it is changing though. As was reported earlier this month, you could get your files unlocked if <a style="color: #0000ff;" href="http://www.theregister.co.uk/2016/12/11/ransomware_offer_pay_us_a_770_ransom_or_infect_two_friends/">you infected two friends</a> with this Ransomware rather than paying money over to the hackers.</span></p>
<p>I haven&#8217;t seen the stats yet, but I suspect Ransomware is still as big a problem as it was 12 months ago. And as noted, the evil doers have started using new methods to get money out of people by hijacking the victims computer processing power to mine <a href="https://www.engadget.com/2017/12/15/as-online-ads-fail-sites-mine-cryptocurrency/">crypto-currencies</a> (i.e. create new currency for them). We also had the scary prospect of Ransomware worms thanks to <a href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> and <a href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya</a>. So I&#8217;m going to say I got this one right.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">2. Smart Device Botnets will target the big service providers</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="color: #0000ff;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">We&#8217;ve seen <a style="color: #0000ff;" href="http://blog.l2cybersecurity.com/2016/09/have-you-smart-internet-connected-iot.html">record breaking botnets created this year</a> by poorly designed and poorly secured smart devices </span><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">(also referred to as IoT, e.g.- </span><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">internet connected cameras, digital video records, internet routers, etc.). I suspect the evil doers are building a massive army, much bigger than anything we have seen to date. I believe that they will then carry out a coordinated attack on one of the big service providers (e.g.- Google, Amazon or Microsoft). The attack won&#8217;t be fully successful, but will have caused sufficient disruption to make smart device security a focus for all manufacturers of such devices, as insecure devices will be banned from accessing the web.</span></span></p>
<p>This was a miss. While attacks did take place, there was nothing on the scale that we saw in 2016.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">3. There will be an even bigger data leak than 2016&#8217;s revelation of the Yahoo! world record leak</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Yahoo! has really had a bad year, setting a world record, having already had an even <a style="color: #0000ff;" href="http://blog.l2cybersecurity.com/2016/12/yahoo-tries-for-new-world-record-and.html">bigger world record</a>. I believe bigger leaks have already happened and will be revealed next year. I reckon the bad guys are already combing through the data, cracking passwords and will then create tools that will take the IDs and passwords they have and try these against other services (e-mail, social media, etc.) to generate a list of compromised accounts, which are extremely valuable on the dark net.</span></p>
<p>I got this one right. It was Yahoo! that did it again, with over <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/">3 billion records</a> breached.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">4. Russia will be accused of interfering in elections occurring across Europe</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Russia has shown form this year, interfering with the US Presidential Election. With elections happening in the bigger European Countries (Germany, France and The Netherlands) in 2017, I would not be very surprised to discover that the Russian state hackers tried to influence the results of these.</span></p>
<p>While the German and Dutch elections were not outwardly (at least) subject to the same issues as affected the US elections, there was <a href="https://www.nytimes.com/2017/05/05/world/europe/france-macron-hacking.html">an incident</a> during the French elections which looks likely to be an attempt to influence the voters. A dump of campaign documents including emails and accounting records for Emmanuel Macron&#8217;s campaign was released just before a moratorium on communications came into effect. So I&#8217;ll take a partial on this one.</p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">5. More Irish people will be protecting themselves from Cyber Threats</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif; color: #0000ff;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ll be a bit selfish with this one as I will be the one helping these people to protect themselves. People knowing how to stay safe on-line will be the least likely to be affected by a Cyber Threat.</span></p>
<p>While I did protect more Irish people in 2017 by educating them, it wasn&#8217;t as many as I would have liked. So, again I will take a partial on this one. A little something called the GDPR became more important to people so, in conjunction with <a href="http://www.mjonfc.ie/">Molly O&#8217;Neill</a>, we created training and awareness programmes for businesses.</p>
<h3>Results for my 2017 predictions</h3>
<p>2 correct, 2 partials and 1 incorrect. Not too bad. I may give this another go for 2018.</p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/review-2017-predictions/">Review of my 2017 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
