www.linkedin.com Open in urlscan Pro
2606:4700:4400::6812:2929  Public Scan

URL: https://www.linkedin.com/posts/p-n-g-department-of-communication-information-technology-and-energy_digitalgovernment-digi...
Submission: On December 22 via api from US — Scanned from FR

Form analysis 2 forms found in the DOM

POST https://www.linkedin.com/uas/login-submit

<form class="google-auth" action="https://www.linkedin.com/uas/login-submit" method="post" aria-hidden="true">
  <input name="loginCsrfParam" value="c45ab84f-0a66-4126-8f79-4e4cf47b499b" type="hidden">
  <!---->
  <input name="trk" value="public_post_google-one-tap-submit" type="hidden">
  <code id="termsAndConditionsRendered" style="display: none"><!--true--></code>
  <div class="google-one-tap__module hidden fixed flex flex-col items-center top-[20px] right-[20px] z-[9999]">
    <div class="relative top-2 bg-color-background-container-tint pl-2 pr-1 pt-2 pb-3 w-[375px] rounded-md shadow-2xl">
      <p class="text-md font-bold text-color-text"> Accepter et s’inscrire sur LinkedIn </p>
      <p class="linkedin-tc__text text-color-text-low-emphasis text-xs pb-2 !text-sm !text-color-text" data-impression-id="public_post_one-tap-skip-tc-text"> En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez les
        <a href="/legal/user-agreement?trk=linkedin-tc_auth-button_user-agreement" target="_blank" data-tracking-control-name="linkedin-tc_auth-button_user-agreement" data-tracking-will-navigate="true">Conditions d’utilisation</a>, la
        <a href="/legal/privacy-policy?trk=linkedin-tc_auth-button_privacy-policy" target="_blank" data-tracking-control-name="linkedin-tc_auth-button_privacy-policy" data-tracking-will-navigate="true">Politique de confidentialité</a> et la
        <a href="/legal/cookie-policy?trk=linkedin-tc_auth-button_cookie-policy" target="_blank" data-tracking-control-name="linkedin-tc_auth-button_cookie-policy" data-tracking-will-navigate="true">Politique relative aux cookies</a> de LinkedIn.
      </p>
    </div>
    <div data-tracking-control-name="public_post_google-one-tap" id="google-one-tap__container"></div>
  </div>
  <div class="loader loader--full-screen">
    <div class="loader__container mb-2 overflow-hidden">
      <icon class="loader__icon inline-block loader__icon--default text-color-progress-loading lazy-loaded" data-svg-class-name="loader__icon-svg--large fill-currentColor h-[60px] min-h-[60px] w-[60px] min-w-[60px]" aria-hidden="true"
        aria-busy="false"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 60 60" width="60" height="60" focusable="false" class="loader__icon-svg--large fill-currentColor h-[60px] min-h-[60px] w-[60px] min-w-[60px] lazy-loaded"
          aria-busy="false">
          <g>
            <path opacity="1" d="M30.1,16.1L30.1,16.1c-0.6,0-1-0.5-1-1V1c0-0.6,0.5-1,1-1l0,0c0.6,0,1,0.5,1,1v14.1C31.1,15.7,30.6,16.1,30.1,16.1z"></path>
            <path opacity="0.85" d="M23.1,18.1L23.1,18.1c-0.5,0.3-1.1,0.1-1.4-0.4L14.5,5.6c-0.3-0.5-0.2-1.1,0.4-1.4l0,0C15.4,3.9,16,4,16.3,4.6l7.2,12.1C23.8,17.2,23.6,17.8,23.1,18.1z"></path>
            <path opacity="0.77" d="M17.9,23.1L17.9,23.1c-0.3,0.5-0.9,0.7-1.4,0.4l-12.2-7c-0.5-0.3-0.7-0.9-0.4-1.4l0,0c0.3-0.5,0.9-0.7,1.4-0.4l12.2,7C18,22,18.2,22.7,17.9,23.1z"></path>
            <path opacity="0.69" d="M16.1,30.1L16.1,30.1c0,0.6-0.5,1-1,1L1,31.2c-0.6,0-1-0.5-1-1l0,0c0-0.6,0.5-1,1-1l14.1-0.1C15.7,29.1,16.1,29.5,16.1,30.1z"></path>
            <path opacity="0.61" d="M18,36.9L18,36.9c0.3,0.5,0.2,1.1-0.4,1.4L5.5,45.6c-0.5,0.3-1.1,0.2-1.4-0.4l0,0c-0.3-0.5-0.2-1.1,0.4-1.4l12.1-7.3C17.1,36.2,17.7,36.4,18,36.9z"></path>
            <path opacity="0.53" d="M23.3,42.1L23.3,42.1c0.5,0.3,0.6,0.9,0.4,1.4l-7.3,12.1c-0.3,0.5-0.9,0.6-1.4,0.4l0,0c-0.5-0.3-0.6-0.9-0.4-1.4l7.3-12.1C22.1,41.9,22.8,41.8,23.3,42.1z"></path>
            <path opacity="0.45" d="M30.1,43.9L30.1,43.9c0.6,0,1,0.5,1,1V59c0,0.6-0.5,1-1,1l0,0c-0.6,0-1-0.5-1-1V44.9C29,44.4,29.5,43.9,30.1,43.9z"></path>
            <path opacity="0.37" d="M37,41.9L37,41.9c0.5-0.3,1.1-0.2,1.4,0.4l7.2,12.1c0.3,0.5,0.2,1.1-0.4,1.4l0,0c-0.5,0.3-1.1,0.2-1.4-0.4l-7.2-12.1C36.4,42.8,36.6,42.2,37,41.9z"></path>
            <path opacity="0.29" d="M42.2,36.8L42.2,36.8c0.3-0.5,0.9-0.7,1.4-0.4l12.2,7c0.5,0.3,0.7,0.9,0.4,1.4l0,0c-0.3,0.5-0.9,0.7-1.4,0.4l-12.2-7C42.1,38,41.9,37.4,42.2,36.8z"></path>
            <path opacity="0.21 " d="M44,29.9L44,29.9c0-0.6,0.5-1,1-1h14.1c0.6,0,1,0.5,1,1l0,0c0,0.6-0.5,1-1,1L45,31C44.4,31,44,30.5,44,29.9z"></path>
            <path opacity="0.13" d="M42.1,23.1L42.1,23.1c-0.3-0.5-0.2-1.1,0.4-1.4l12.1-7.3c0.5-0.3,1.1-0.2,1.4,0.4l0,0c0.3,0.4,0.1,1.1-0.4,1.3l-12.1,7.3C43.1,23.7,42.4,23.6,42.1,23.1z"></path>
            <path opacity="0.05" d="M36.9,17.9L36.9,17.9c-0.5-0.3-0.6-0.9-0.4-1.4l7.3-12.1c0.3-0.5,0.9-0.6,1.4-0.4l0,0c0.5,0.3,0.6,0.9,0.4,1.4l-7.4,12.2C38,18.1,37.3,18.2,36.9,17.9z"></path>
            <animateTransform attributeName="transform" attributeType="XML" type="rotate" begin="0s" dur="1s" repeatCount="indefinite" calcMode="discrete" keyTimes="0;.0833;.166;.25;.3333;.4166;.5;.5833;.6666;.75;.8333;.9166;1"
              values="0,30,30;30,30,30;60,30,30;90,30,30;120,30,30;150,30,30;180,30,30;210,30,30;240,30,30;270,30,30;300,30,30;330,30,30;360,30,30"></animateTransform>
          </g>
        </svg></icon>
    </div>
  </div>
</form>

POST https://www.linkedin.com/uas/login-submit

<form data-id="sign-in-form" action="https://www.linkedin.com/uas/login-submit" method="post" novalidate="" class="mt-1.5 mb-2">
  <input name="loginCsrfParam" value="c45ab84f-0a66-4126-8f79-4e4cf47b499b" type="hidden">
  <div class="flex flex-col">
    <div class="mt-1.5" data-js-module-id="guest-input">
      <div class="flex flex-col">
        <label class="input-label mb-1" for="public_post_contextual-sign-in_sign-in-modal_session_key"> E-mail ou téléphone </label>
        <div class="text-input flex">
          <input class="text-color-text font-sans text-md outline-0 bg-color-transparent grow" autocomplete="username" id="public_post_contextual-sign-in_sign-in-modal_session_key" name="session_key" required=""
            data-tracking-control-name="public_post_contextual-sign-in-modal_sign-in-modal_sign-in-session-key" data-tracking-client-ingraph="" type="text">
        </div>
      </div>
      <p class="input-helper mt-1.5" for="public_post_contextual-sign-in_sign-in-modal_session_key" role="alert" data-js-module-id="guest-input__message"></p>
    </div>
    <div class="mt-1.5" data-js-module-id="guest-input">
      <div class="flex flex-col">
        <label class="input-label mb-1" for="public_post_contextual-sign-in_sign-in-modal_session_password"> Mot de passe </label>
        <div class="text-input flex">
          <input class="text-color-text font-sans text-md outline-0 bg-color-transparent grow" autocomplete="current-password" id="public_post_contextual-sign-in_sign-in-modal_session_password" name="session_password" required=""
            data-tracking-control-name="public_post_contextual-sign-in-modal_sign-in-modal_sign-in-password" data-tracking-client-ingraph="" type="password">
          <button aria-live="assertive" aria-relevant="text" data-id="sign-in-form__password-visibility-toggle" class="font-sans text-md font-bold text-color-action z-10 ml-[12px] hover:cursor-pointer"
            aria-label="Affichez votre mot de passe LinkedIn" data-tracking-control-name="public_post_contextual-sign-in-modal_sign-in-modal_sign-in-password-visibility-toggle-btn" type="button">Afficher</button>
        </div>
      </div>
      <p class="input-helper mt-1.5" for="public_post_contextual-sign-in_sign-in-modal_session_password" role="alert" data-js-module-id="guest-input__message"></p>
    </div>
    <input name="session_redirect" value="https://www.linkedin.com/posts/p-n-g-department-of-communication-information-technology-and-energy_digitalgovernment-digitaltransformation-activity-7181102853845921793-KQdz" type="hidden">
    <!---->
  </div>
  <div data-id="sign-in-form__footer" class="flex justify-between
          sign-in-form__footer--full-width">
    <a data-id="sign-in-form__forgot-password" class="font-sans text-md font-bold link leading-regular
            sign-in-form__forgot-password--full-width" href="https://www.linkedin.com/uas/request-password-reset?trk=public_post_contextual-sign-in-modal_sign-in-modal_forgot_password" data-tracking-control-name="public_post_contextual-sign-in-modal_sign-in-modal_forgot_password" data-tracking-will-navigate="">Mot de passe oublié&nbsp;?</a>
    <!---->
    <input name="trk" value="public_post_contextual-sign-in-modal_sign-in-modal_sign-in-submit" type="hidden">
    <button class="btn-md btn-primary flex-shrink-0 cursor-pointer
            sign-in-form__submit-btn--full-width" data-id="sign-in-form__submit-btn" data-tracking-control-name="public_post_contextual-sign-in-modal_sign-in-modal_sign-in-submit-btn" data-tracking-client-ingraph="" data-tracking-litms=""
      type="submit"> S’identifier </button>
  </div>
  <div class="sign-in-form__divider left-right-divider pt-2 pb-3">
    <p class="sign-in-form__divider-text font-sans text-sm text-color-text px-2"> ou </p>
  </div>
  <input type="hidden" name="controlId" value="d_public_post-public_post_contextual-sign-in-modal_sign-in-modal_sign-in-submit-btn"><input type="hidden" name="pageInstance" value="urn:li:page:d_public_post_jsbeacon;eB/PBufRTcCH7k6/YYxYSg==">
</form>

Text Content

LinkedIn et des tiers utilisent des cookies essentiels et non essentiels pour
fournir, sécuriser, analyser et améliorer nos Services, et pour vous montrer des
publicités pertinentes (notamment des professionnels et des offres d’emploi) sur
et en dehors de LinkedIn. En savoir plus dans notre Politique relative aux
cookies.

Sélectionnez Accepter pour approuver ou Refuser pour décliner les cookies non
essentiels pour cette utilisation. Vous pouvez mettre à jour vos préférences à
tout moment dans vos préférences.

Accepter Refuser


Accepter et s’inscrire sur LinkedIn

En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez
les Conditions d’utilisation, la Politique de confidentialité et la Politique
relative aux cookies de LinkedIn.



Passer au contenu principal
LinkedIn
 * Articles
 * Personnes
 * LinkedIn Learning
 * Offres d’emploi
 * Jeux

S’inscrire S’identifier


POST DE PNG DEPARTMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

PNG Department of Information and Communications Technology

23 618  abonnés

8 mois Modifié
 * Signaler ce post
   

DICT and NASFUND Staff Trained to Counter Cyber Threats The Department of
Information and Communications Technology (DICT) and National Superannuation
Fund Limited (NASFUND) partnered with Cyber CX, one of the world’s leading
cybersecurity organization, for a one-day intensive training session held at the
Hilton Hotel on March 21st. Over 60 staff members participated in the split
morning and afternoon sessions designed to raise awareness and equip them with
the tools to combat cyber threats. The program focused on the critical
importance of cybersecurity in today’s rapidly evolving digital landscape, where
online safety is paramount from individuals to any organization. Dr David
Halfpenny, Principal Consultant – Cyber Capability, Education and Training and
Ms Manal Saroufim from Cyber CX Australia facilitated the training and
efficiently covered various cyber threats, discussing the characteristics of
cyber criminals and their operational methods, including often overlooked
details that can lead to security breaches. Basic protective measures for both
software and hardware security were also addressed. Dr Halfpenny emphasized that
in today’s technological landscape, taking necessary cyber precautionary
measures is crucial to safeguarding personal information and valuable data,
especially for public servants and trusted experts in fields like
superannuation. Read more: https://lnkd.in/gptffmFu #DigitalGovernment
#DigitalTransformation #cybersecurity #cybersecuritytraining #government
#PapuaNewGuinea [Tags: nasfund, PNG Department of Information and Communications
Technology, CyberCX]

 * 

130 5 commentaires
J’aime Commenter
Partager
 * Copier
 * LinkedIn
 * Facebook
 * Twitter
   

Justin Wohuinangu

IT Risk Professional I Life Long Learner I Dad

8 mois
 * Signaler ce commentaire
   

Securing the human firewall is critical. Over time those human firewalls can
become human intrusion detection systems. It is important that we clarify where
they can report incidents to and action is taken when potential incidents are
reported.

J’aime
Réagir
1 réaction 2 réactions
BURE MATTHEW

Bachelor of Science in Computer Science (Cyber Security ) | Papua New Guinean
University of Goroka

8 mois
 * Signaler ce commentaire
   

Great. Way forward.

J’aime
Réagir
1 réaction
Ezekial D Gipo

Aspiring CCNP Collaboration

8 mois
 * Signaler ce commentaire
   

Samuel Topotol good stuff 👏

J’aime
Réagir
1 réaction
Lesie Gabriel

Strategic Health Planner - Momase Region | Health Financing Strategist | Public
Policy Analyst | PATH-NDoH | ABT Global Australia

8 mois
 * Signaler ce commentaire
   

Seki Wala 👏

J’aime
Réagir
1 réaction 2 réactions
Rhaymoly Alphonse

Community Relations I Stakeholder Engagements I Superannuation Advocate

8 mois
 * Signaler ce commentaire
   

Derrick Laka Ruthy Yongi Serah Gris

J’aime
Réagir
1 réaction
Voir plus de commentaires

Identifiez-vous pour afficher ou ajouter un commentaire


PLUS DE POSTS PERTINENTS

 * Management Magazine
   
   72  abonnés
   
   2 mois
    * Signaler ce post
      
   
   🆕 NEW ISSUE: Read the latest digital issue of NZ Management magazine! It’s
   pretty scary out there in cybersecurity land. New Zealand companies and their
   leaders need to be alert to all manner of phishing and credential harvesting;
   to scams and fraud incidents; to unauthorised access events; malware and
   ransomware; to websites being compromised and to denial of service. 👩💻 In
   this issue of Management we analyse the threats New Zealand companies, both
   large and small, are facing and ask cyber risk experts just what leaders can
   be doing to if not stop, at least heavily mitigate, the risks to their
   organisations. As one expert points out cyber attackers are growing more
   motivated, more sophisticated, and better resourced. It typically takes 72
   minutes from when a cyber attacker gains an initial foothold into a company’s
   systems for them to be able to access critical data. There's also an
   interesting take on gamification from the team at Human Synergistics
   Australia & NZ. 📲 Here a link to our latest digital issue offering practical
   and insightful new thinking on the cyber landscape: https://shorturl.at/THYDo
   #nzmanagement #cybersecurity #onlinerisks #management
   
    * 
   
   2 1 commentaire
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Paul Opara John
   
   Weekend CTO ¦ PMP ¦ PMI-ACP¦ PRINCE2 ¦ ISQTB ¦ CCNP ¦ CCDP ¦ AMBCS ¦ SAP ¦
   MCP ¦ MCSE ¦ BA ¦ BI ¦ ITILV3 ¦ HIPAA ¦ AgileCoach ¦ CISSP ¦ ISO 27001
   Implementer ¦ Auditor ¦ GDPR DPO ¦ PECB Trainer
   
   4 mois Modifié
    * Signaler ce post
      
   
   Kudos to the entire GTA team for orchestrating such a stellar event! It was
   impeccably organized, met all the standards in the book, and, most
   importantly, tackled pertinent topics in the cybersecurity realm. Here are
   the three questions I delved into: 1) While threat actors continue to employ
   familiar hacking techniques like ransomware and phishing, their tools have
   become significantly more sophisticated, lowering the barrier to entry. To
   combat this, businesses need a comprehensive Security Management System that
   covers end-to-end protection. 2) International applications and tools can
   address the technical aspects of Nigeria’s cybersecurity challenges, but the
   majority of attacks are driven by social factors. Therefore, relying solely
   on tools won’t suffice. We must integrate policies and controls to create a
   robust defense. 3) Remote work has expanded attack surfaces and introduced
   new complexities. Despite the challenges, remote work offers substantial
   benefits to businesses. It’s essential to assess the impact on the business's
   bottom line and invest accordingly in security appliances and endpoint
   solutions to ensure safety. In conclusion, as the saying goes, "The best
   things in life are free." Similarly, in cybersecurity, it’s more
   cost-effective to invest in awareness and training than to recover from a
   cyber attack. #GTA #GTAConference #Ascend #CloudStrideTechnologies
   #CyberSecurity #pecb #globaltechafrica #TheYDCompany #afrihackbox
   #justunsecure #investor #cybersecurity #cissp #BusinessSweden #NITDA
   
    * 
   
   100 3 commentaires
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Sanjay Kucheria
   
   Entrepreneur | Board Director | Professional and Business Services | Digital
   Transformation | Data Analytics | Supplier Diversity | US-India Corridor
   
   6 mois
    * Signaler ce post
      
   
   Security solutions company Red Canary published a report earlier this year
   that highlighted cyber threats linked to the IT helpdesk as “the most
   noteworthy” trend of the past year. This is a dual threat. First,
   cybercriminals call into the IT Helpdesk and impersonate an employee in need
   of assistance. Once the trust of the helpdesk is secured, the cybercriminal
   resets access credentials and gets into the system to unleash the mayhem they
   had in mind. Last year’s famous attack on the MGM Grand Casino was one among
   a number of attacks that seem to have started this way. Second,
   cybercriminals also target employees by pretending to be calling from the
   helpdesk. They then proceed to get authentication details or access
   credentials in the guise of addressing some IT issue. That’s enough for them
   to take over compromised accounts and set their plans into motion. CIOs and
   CISOs know that cybersecurity is a moving target and there will always be a
   new battlefront being opened by cybercriminals. We manage IT support and
   helpdesks for a range of private and public sector companies, and I can
   confirm that security processes, standards, and response mechanisms are
   now top of the agenda in our discussions. That’s why we are always looking to
   implement extremely robust prevention as well as agile and effective
   mitigation strategies. #Cybersecurity #ITHelpdesk #ITSupport
   
   12
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Jeyasurya VG
   
   Helping Organizations Prevent Threats, Secure Operations, and Enhance IT &
   ICS/OT Security
   
   2 mois Modifié
    * Signaler ce post
      
   
   Cybersecurity Awareness Month 2024 - Day 1 In 2004, the U.S. Department of
   Homeland Security and the National Cyber Security Alliance launched National
   Cyber Security Awareness Month in the United States of America as a broad
   effort to help Americans stay safe and secure online. And it's the "perfect
   time" for EVERYONE OF US to think about how we can protect ourselves in the
   digital world. With so much of our lives online, it's important to stay one
   step ahead of potential threats. One of the best ways to do this is by
   focusing on layers of cybersecurity. Think of it like building walls around a
   castle – each layer adds more protection. 1. Strong Passwords & Multi-Factor
   Authentication (MFA): These are your first lines of defense. Use unique
   passwords and enable MFA to make it harder for attackers to break in. 2.
   Software Updates: Keep your devices and applications up to date. Software
   updates aren't just about new features – they're about fixing security gaps.
   3. Network Security: Secure your Wi-Fi with strong encryption, and use a
   Virtual Private Network (VPN) when connecting to public networks. 4. Backup &
   Recovery: Regularly backup your data so you can recover quickly in case of a
   cyber incident. 5. Awareness & Training: Learn to recognize phishing scams
   and suspicious emails. Being aware of the risks is half the battle. By using
   these layers together, we can make it much harder for cybercriminals to
   succeed. Stay safe, stay vigilant! Thank you for taking the time to read
   through! P.S. What did I miss? #CybersecurityAwarenessMonth2024 #CISA
   #SecureOurWorld #StaySafeOnline #CybersecurityLayers #DigitalSafety #MFA
   #PhishingProtection
   
   20
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Digital and IT Solutions
   
   Information Technology Company. Network, Firewalls, Servers, Backup,
   Antivirus, ERP, SQL/MySQL, Linux, Cisco, Huawei, Fortinet, Sophos, FTD,
   Huawei Enterprise, Network Designing & Deployment and Solar Panels, CCTV
   
   1 mois
    * Signaler ce post
      
   
   Protect Your Digital Fortress with DITS (PVT) LTD In an era where cyber
   threats are ever-evolving, the security of your network is paramount. At DITS
   (PVT) LTD, we specialize in delivering cutting-edge network security
   solutions designed to safeguard your business from every angle. Our
   Comprehensive Services Include: 1. Proactive Threat Detection: Our advanced
   systems identify and neutralize threats in real-time, ensuring your network
   remains uncompromised. 2. Robust Firewall Protection: Strengthen your
   defenses with our state-of-the-art firewall solutions, designed to prevent
   unauthorized access and potential breaches. 3. Regular Security Audits:
   Maintain the integrity of your network with routine audits and vulnerability
   assessments conducted by our expert team. 4. Employee Awareness Training:
   Equip your workforce with the knowledge to identify and respond to cyber
   threats, minimizing the risk of human error. 5. 24/7 Monitoring and Support:
   Our dedicated support team is always on standby, ready to address any
   security concerns at a moment's notice. Why Choose DITS (PVT) LTD? With DITS
   (PVT) LTD,  You gain a trusted partner committed to protecting your digital
   assets. Our tailored solutions and expert guidance ensure your business is
   always one step ahead of cyber threats. Secure your future with DITS (PVT)
   LTD.   Contact u today to learn more about our comprehensive network security
   services. #NetworkSecurity #CyberSecurity #DataProtection #ITSecurity
   #BusinessProtection www.dits.pk info@dits.pk
   
    * Voir les informations sur la C2PA
   
   1
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * André Schoeman
   
   Business Analyst | Cyber Security Risk Manager | Governance, Risk and
   Compliance Specialist | ITIL v4 Expert | Programme Manager | Service Delivery
   Specialist | Information Security Practitioner | Oupa (Grandad)
   
   8 mois
    * Signaler ce post
      
   
   When it comes to cyber security, Australia needs to do a whole lot more than
   merely “playing catch-up” to threats. I absolutely agree with our national
   cyber security coordinator Michelle McGuinness’s view that this will be a
   whole-nation endeavour, though I am concerned about the absence of focus on
   the most vulnerable members of our society when it comes to cyber security -
   the elderly. Security policies will start with the government and will go on
   to be implemented and upheld by organisations and individuals. There’s a long
   road ahead for all sectors, and it can only be walked with expert guidance.
   Solving the problem starts with sourcing the right professionals, so if your
   company needs help, keep an eye out for talent — hopefully, this will become
   less hard to find as the demand for digital skills continues to rise.
   #cybersecurity #digital #technology
   
   
   MCGUINNESS OUTLINES AUSTRALIA’S BIGGEST CYBERSECURITY CHALLENGES
   
   
   HTTPS://WWW.THEMANDARIN.COM.AU
   
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Excalibur
   
   876  abonnés
   
   2 mois
    * Signaler ce post
      
   
   🛡It's October - Cyber Security Awareness Month 2024!🛡 #CyberSecMonth is an
   annual reminder to 🔒secure your devices and accounts from cyber threats.
   During this month, we would like to bring deep insight into why and how you
   can easily and effectively protect your company from constantly evolving
   cyber threats. 💡Human Error: The Biggest Cybersecurity Risk and How to Solve
   It with PAM Verizon’s 2024 Data Breach Investigations Report revealed that
   human error frequently contributed to data breaches, accounting for 68% of
   incidents.The same report suggests that internal actors are responsible for a
   breach in 35% of the cases, a significant increase when compared to 20%
   responsibility rate from the previous year. Despite comprehensive training,
   there is always a risk that human oversight can lead to serious breaches. So
   how can organisations take control and minimise these risks? 🔐Privileged
   Access Management (PAM) is one of the most effective ways to mitigate the
   impact of human error. By limiting access to only what is necessary and
   verifying every request through Multi-Factor Authentication (MFA), PAM
   drastically reduces the likelihood of unauthorized access—even in the event
   of a human mistake. 📲With Excalibur’s passwordless, phone-centric MFA and
   PAM solution, businesses can better protect their sensitive data. Our system
   ensures that access is only granted to the right individuals, at the right
   time, and under the most secure conditions. Even in case of phishing or
   accidental misuse, Excalibur’s secure-by-default design prevents most of the
   damage before it can happen. So, while human error may never be fully
   eliminated, Excalibur’s PAM ensures it doesn’t become a major vulnerability.
   👉Get in touch and let us help you eliminate these risks and protect your
   business. #CyberSecurity #Phishing #DataProtection #SecurityAwareness #PAM
   #Excalibur #education #cyber_eccc #cyber_eu #eu #dep #CyberSecMonth
   #ThinkB4UClick 
   
    * 
   
   29
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Bellwether
   
   1 098  abonnés
   
   8 mois
    * Signaler ce post
      
   
   🔒💻 Stay Secure with Bellwether In today's digital age, maintaining optimal
   Cyber Hygiene isn't just a recommendation; it's a necessity. Just as we keep
   our physical environment clean for our health, Cyber Hygiene involves
   practices and steps that users of computers and other devices take to
   maintain system health and improve online security. How Can Bellwether Help? 
   At Bellwether, we understand the complexities of online threats and the
   importance of staying a step ahead. Here's how we can assist: 🛡️ Tailored
   Cybersecurity Strategies: We develop customized plans for your needs and
   vulnerabilities. 🛡️ Regular System Health Checks: Like regular health
   check-ups, we ensure your systems operate securely and efficiently.
   🛡️ Training and Awareness Programs: Empower your team with the knowledge to
   identify and avoid potential threats. Remember, good Cyber Hygiene is a
   continuous process, not a one-time fix. Partner with Bellwether and work
   together to build a safer, more secure digital future. 🔗 Contact us at
   559-354-6755 or email support@bellwetherIT.com #fresno #california
   #fresnocounty #slocounty #bellwether #managedservices #Cybersecurity
   #CyberHygiene 
   
    * 
   
   6
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * CyberChicks Academy
   
   100  abonnés
   
   3 mois
    * Signaler ce post
      
   
   Ready to Master Your Digital Security? In today's connected world, cyber
   resilience is crucial for protecting your business and personal life. Here’s
   your essential guide to building a robust defense in 6 powerful steps: 1️⃣
   Risk Assessment – Identify what you need to protect and where you’re most
   vulnerable. Understanding your risks is the first step toward a stronger
   defense. 2️⃣ Implement Security Controls – Are you equipped with firewalls,
   encryption, and multi-factor authentication? These tools are your frontline
   guardians against cyber threats! 3️⃣ Develop an Incident Response Plan – Have
   a strategy in place for when things go awry. Quick, decisive action is key to
   managing and mitigating cyber incidents. 4️⃣ Backup Your Data Regularly –
   Ensure your important files are backed up and accessible. Don't wait until a
   crisis hits to realize your backups are outdated! 5️⃣ Empower Your Team with
   Knowledge – Train everyone to recognize and respond to cyber threats like
   phishing attacks. Knowledge is your best defense against deception. 6️⃣
   Ongoing Vigilance with Monitoring – Keep a constant watch over your network
   for any unusual activity. Continuous monitoring helps you catch threats early
   before they escalate. Which step will you focus on first? Share your plans in
   the comments! By following these steps, you’re not just preparing to face
   cyber threats—you’re setting yourself up to thrive in a secure digital
   landscape! Follow CyberChicks Academy for more expert tips and insights to
   enhance your digital resilience. Together, we can build a safer, stronger
   online community! #CyberResilience #TechInAfrica #EmpowerWomen #DigitalSafety
   #CyberSecurity #TechForGood #SecureAfrica #CyberSafe #WomenInSTEM
   #TechLeadersAfrica #CyberChicksAfrica
   
    * 
   
   1
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

 * Simon Moon
   
   Managed IT Services Provider | Supporting Businesses in Hampshire & Across
   the UK
   
   2 mois
    * Signaler ce post
      
   
   Relying on an unqualified, inexperienced staff member for IT needs can be
   risky. Here’s why partnering with PT Solutions is a smarter choice: Certified
   professionals bring a wealth of knowledge and stay updated with the latest
   technologies and best practices. Robust security measures and proactive
   monitoring protect your data and systems from cyber threats. Proactive
   maintenance and support ensure your business operations run smoothly without
   unexpected interruptions. Free up your internal team to concentrate on
   strategic business activities rather than IT issues. Don't suffer, reach out
   to PT Solutions and start getting the Managed IT Services help you're
   business desperately needs. #ITSupport #CyberSecurity #TechSolutions
   #BusinessGrowth #ProactiveIT #ITOutsourcing #ManagedITServices
   #OutsourcedBusinessIT #ITServices
   
   6
   J’aime Commenter
   Partager
    * Copier
    * LinkedIn
    * Facebook
    * Twitter
      
   
   Identifiez-vous pour afficher ou ajouter un commentaire

   

23 618  abonnés

Voir le profil Suivre


PUBLIÉ PAR LE MÊME AUTEUR


 * PUBLIC STATEMENT: THE NATIONAL MEDIA DEVELOPMENT POLICY
   
   PNG Department of Information and Communications Technology 1 ans


EXPLORER LES SUJETS

 * Vente
 * Marketing
 * Services informatiques
 * Administration des affaires
 * Gestion des ressources humaines
 * Ingénierie
 * Compétences générales
 * Tout voir

 * LinkedIn © 2024
 * À propos
 * Accessibilité
 * Conditions générales d’utilisation de LinkedIn
 * Politique de confidentialité
   
 * Politique relative aux cookies
 * Politique de copyright
 * Politique de la marque
 * Réglages invités
 * Directives de la communauté
   
 *  * العربية (Arabe)
    * বাংলা (Bengali)
    * Čeština (Tchèque)
    * Dansk (Danois)
    * Deutsch (Allemand)
    * Ελληνικά (Grec)
    * English (Anglais)
    * Español (Espagnol)
    * فارسی (Perse)
    * Suomi (Finnois)
    * Français (Français)
    * हिंदी (Hindi)
    * Magyar (Hongrois)
    * Bahasa Indonesia (Indonésien)
    * Italiano (Italien)
    * עברית (Hébreu)
    * 日本語 (Japonais)
    * 한국어 (Coréen)
    * मराठी (Marathi)
    * Bahasa Malaysia (Malaisien)
    * Nederlands (Néerlandais)
    * Norsk (Norvégien)
    * ਪੰਜਾਬੀ (Penjabi)
    * Polski (Polonais)
    * Português (Portugais)
    * Română (Roumain)
    * Русский (Russe)
    * Svenska (Suédois)
    * తెలుగు (Télougou)
    * ภาษาไทย (Thaï)
    * Tagalog (Tagalog)
    * Türkçe (Turc)
    * Українська (Ukrainien)
    * Tiạng Viạt (Vietnamien)
    * 简体中文 (Chinois simplifié)
    * 正體中文 (Chinois traditionnel)
      
   
   Langue






IDENTIFIEZ-VOUS POUR VOIR PLUS DE CONTENU

Créez votre compte gratuit ou identifiez-vous pour continuer votre recherche

S’identifier


BON RETOUR PARMI NOUS

E-mail ou téléphone




Mot de passe
Afficher



Mot de passe oublié ? S’identifier

ou

En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez
les Conditions d’utilisation, la Politique de confidentialité et la Politique
relative aux cookies de LinkedIn.



Nouveau sur LinkedIn ? Inscrivez-vous maintenant

ou

Nouveau sur LinkedIn ? Inscrivez-vous maintenant

En cliquant sur Continuer pour vous inscrire ou vous identifier, vous acceptez
les Conditions d’utilisation, la Politique de confidentialité et la Politique
relative aux cookies de LinkedIn.