CINXE.COM

CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT

<!DOCTYPE html><html lang="en"><head><link rel="stylesheet" data-href="https://fonts.googleapis.com/css?family=Open+Sans&amp;display=swap" data-optimized-fonts="true"/><title>CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT</title><link rel="icon" href="https://cdn.magloft.com/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png"/><link rel="shortcut icon" type="image/x-icon" href="https://cdn.magloft.com/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png?optimizer=image&amp;format=webp&amp;width=180&amp;aspectRatio=1"/><link rel="apple-touch-icon" sizes="180x180" href="https://cdn.magloft.com/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png?optimizer=image&amp;format=webp&amp;width=180&amp;aspectRatio=1"/><link rel="canonical" href="/domains/pwa.magloft.com/articles/cyber-safety-its-relevance-and-what-21657764849"/><meta name="application-name" content="CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT"/><meta name="apple-mobile-web-app-capable" content="yes"/><meta name="apple-mobile-web-app-status-bar-style" content="default"/><meta name="apple-mobile-web-app-title" content="CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT"/><meta name="format-detection" content="telephone=no"/><meta name="mobile-web-app-capable" content="yes"/><meta name="msapplication-TileColor" content="#1A78D6"/><meta name="msapplication-tap-highlight" content="no"/><link rel="manifest" href="/manifest.json"/><meta name="twitter:url" content="https://pwa.magloft.com"/><meta name="theme-color" content="#1A78D6"/><meta name="viewport" content="width=device-width, initial-scale=1"/><meta charSet="utf-8"/><meta itemProp="name" content="CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT"/><meta name="keywords" content="cyber safety its relevance and what"/><meta itemProp="description" content="Converted using MagLoft&#x27;s Professional PDF to HTML Content Conversion Service"/><meta name="description" content="Converted using MagLoft&#x27;s Professional PDF to HTML Content Conversion Service"/><meta itemProp="image" content="https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg"/><meta property="og:description" content="Converted using MagLoft&#x27;s Professional PDF to HTML Content Conversion Service"/><meta property="og:title" content="CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT"/><meta property="og:site_name" content="CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT"/><meta property="og:image" content="https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:title" content="CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT"/><meta name="twitter:description" content="Converted using MagLoft&#x27;s Professional PDF to HTML Content Conversion Service"/><meta name="twitter:image" content="https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg"/><meta name="author" content="Universal App by MagLoft"/><meta property="article:author" content="Universal App by MagLoft"/><meta property="article:published_time" content="2022-08-24T00:00:00.000Z"/><meta name="twitter:site" content="@MagLoft"/><meta name="twitter:creator" content="@MagLoft"/><style>html{--heading-font: &quot;Open Sans&quot;;--body-font: &quot;Open Sans&quot;;--ui-font: &quot;Open Sans&quot;;--top-menu-title-font: &quot;Open Sans&quot;;--top-menu-subtitle-font: &quot;Open Sans&quot;;--top-menu-items-font: &quot;Open Sans&quot;;--footer-menu-title-font: &quot;Open Sans&quot;;--footer-menu-items-font: &quot;Open Sans&quot;;--background-color: #FFFFFF;--background-color-dark: #808080;--primary-color: #1A78D6;--primary-color-dark: #0D3C6B;--secondary-color: #F08123;--secondary-color-dark: #814009;--accent-color: #00D26A;--accent-color-dark: #006935;--info-color: #7C51E1;--info-color-dark: #371783;--warning-color: #EF9338;--warning-color-dark: #89490B;--success-color: #1FAD26;--success-color-dark: #105713;--danger-color: #DF4241;--danger-color-dark: #7B1515;--navbar-height: 64px; }</style><meta name="next-head-count" content="39"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com"/><link rel="preload" href="/_next/static/css/b1dcce53b81730b3.css" as="style"/><link rel="stylesheet" href="/_next/static/css/b1dcce53b81730b3.css" data-n-g=""/><link rel="preload" href="/_next/static/css/f55b13f5723aaa37.css" as="style"/><link rel="stylesheet" href="/_next/static/css/f55b13f5723aaa37.css" data-n-p=""/><link rel="preload" href="/_next/static/css/b8b2c08e66691c64.css" as="style"/><link rel="stylesheet" href="/_next/static/css/b8b2c08e66691c64.css" data-n-p=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script defer="" src="https://fonts.googleapis.com/css?family=Open+Sans&amp;display=swap" data-nscript="beforeInteractive"></script><script src="/_next/static/chunks/webpack-8c0406b9161964c2.js" defer=""></script><script src="/_next/static/chunks/framework-73b8966a3c579ab0.js" defer=""></script><script src="/_next/static/chunks/main-34cb81d5753e1fc4.js" defer=""></script><script src="/_next/static/chunks/pages/_app-8fa6eb38aaba2acc.js" defer=""></script><script src="/_next/static/chunks/ad273671-3092333ffa02af02.js" defer=""></script><script src="/_next/static/chunks/876-c944523f292a2885.js" defer=""></script><script src="/_next/static/chunks/223-fe6833f316a5a95f.js" defer=""></script><script src="/_next/static/chunks/702-907e0a115a4d5f32.js" defer=""></script><script src="/_next/static/chunks/174-170bbdbd822e7a4f.js" defer=""></script><script src="/_next/static/chunks/651-580f7aec9fa2a9c7.js" defer=""></script><script src="/_next/static/chunks/998-4c6a5fcdba301010.js" defer=""></script><script src="/_next/static/chunks/pages/domains/%5Bdomain%5D/articles/%5Bslug%5D-8d929c887d4161d3.js" defer=""></script><script src="/_next/static/Kev2Q3R5ZPSsq42hjt5aX/_buildManifest.js" defer=""></script><script src="/_next/static/Kev2Q3R5ZPSsq42hjt5aX/_ssgManifest.js" defer=""></script><style data-styled="" data-styled-version="5.3.9"></style><link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Open+Sans&display=swap"/></head><body><div id="__next"><div class="Layout_container__gktH6"><div class="Layout_navbar-container__gCfDZ" style="height:64px"><nav class="_wrapper_jbnbd_1"><div class="_container_jbnbd_15"><div class="_navbar-prefix_jbnbd_108"><div class="Layout_prefix__7W2Vq"><button><div class="_nav-arrow-left_1lm7t_183 _icon_1lm7t_1 icon"></div></button></div></div><a class="_navbar-brand_jbnbd_29" aria-label="Your Logo Goes Here" href="/"><div class="_navbar-image_jbnbd_40"><img alt="Logo" loading="lazy" decoding="async" data-nimg="fill" class="_image_jbnbd_43" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 54w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 70w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 82w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 96w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 110w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 128w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 138w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 192w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 200w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 252w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 260w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 298w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 378w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 384w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 520w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 640w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 756w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 828w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 1080w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 1200w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 1920w, https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png 2048w" src="https://media.magloft.app/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png"/></div><div class="_navbar-title_jbnbd_58 _navbar-title-hide_jbnbd_101"><h1>Your Logo Goes Here</h1></div></a><div id="navbar-children-container" class="_navbar-children_jbnbd_116"><div class="_menu_1jhrl_1"><div class="_menu-wrapper_1jhrl_22"><div class="_menu-items_1jhrl_38"><a class="_menu-item_1jhrl_38" href="/"><div class="_menu-home_1lm7t_255 _menu-item-icon_1jhrl_97 _icon_1lm7t_1 icon"></div><div class="_menu-item-title_1jhrl_88">Home</div><div class="_indicator_1jhrl_63"></div></a><a class="_menu-item_1jhrl_38 _active_1jhrl_70" href="/articles"><div class="_menu-articles_1lm7t_259 _menu-item-icon_1jhrl_97 _icon_1lm7t_1 icon"></div><div class="_menu-item-title_1jhrl_88">Articles</div><div class="_indicator_1jhrl_63 _active_1jhrl_70"></div></a><a class="_menu-item_1jhrl_38" href="/collections"><div class="_menu-issues_1lm7t_263 _menu-item-icon_1jhrl_97 _icon_1lm7t_1 icon"></div><div class="_menu-item-title_1jhrl_88">Issues</div><div class="_indicator_1jhrl_63"></div></a><a class="_menu-item_1jhrl_38" href="/account/login"><div class="_menu-account_1lm7t_411 _menu-item-icon_1jhrl_97 _icon_1lm7t_1 icon"></div><div class="_menu-item-title_1jhrl_88">Log in</div><div class="_indicator_1jhrl_63"></div></a></div></div></div></div><div id="navbar-suffix" class="_navbar-suffix_jbnbd_108"><div class="Layout_menu-actions__vsDbI"><div class="Layout_install-button__FBfSr"><div class="Tooltip_tooltip__98Sw9"></div><button class="_button_19h3g_1 _text_19h3g_12 _medium_19h3g_38 _secondary_19h3g_22" type="button" style="color:var(--top-menu-item-icon-color, var(--background-color))" role="button" aria-label="Search" aria-labelledby="labeldiv" title="Search"><div class="_action-search_1lm7t_15 _icon-button_19h3g_19 _icon_1lm7t_1 icon" style="background-color:var(--top-menu-item-icon-color, var(--background-color))"></div></button></div></div></div></div></nav></div><div class="Layout_main__evUHx"><div class="Layout_spacer__qTBD3" style="height:64px"></div><div class="_slug__container__7sxKh"><div class=""></div><div class=""><div id="print-article" class="_slug__article__BPEHu"><div class="Article-module_article__kO4b9"><div id="outer" data-widget="page-widget" style="background-color:#FFFFFF;padding:0px 0px 24px 0px;color:#000000;text-align:left;font-family:&quot;Crimson Text&quot;" class="Widget-module_outer__PBh8P Page-module_outer__g0XXH"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><div id="outer" data-widget="image-widget" style="background-color:transparent;padding:0px 0px 0px 0px;display:flex;flex:1;align-items:center;justify-content:center;min-height:auto" class="Widget-module_outer__PBh8P"><div id="inner" class="Image-module_container__8raIv" style="border-radius:0px 0px 0px 0px;width:100%;display:flex;flex:1;align-items:center;justify-content:center;min-height:auto"><picture class="Image-module_picture__gw1zY Image-module_loading__FfyPr"><source type="image/jpeg" srcSet="https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=192 192w,https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=384 384w,https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=768 768w,https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw"/><img src="https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=768" srcSet="https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=192 192w,https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=384 384w,https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=768 768w,https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw" class="Image-module_image__w4slc" width="100%" height="287" decoding="async" alt="Image" style="height:auto;width:100%"/></picture><div class="Image-module_inner__IlN2Y" style="display:flex;flex:1;flex-direction:column;align-items:center;justify-content:center"><div id="outer" data-widget="heading-widget" style="background-color:transparent;padding:0px 24px 16px 24px;text-align:center;font-size:60%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Heading-module_container__uHf-4"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><h2><span style="font-family:&quot;Roboto Mono&quot;;color:rgb(255, 254, 254)">CYBER SAFETY: <br/></span><span style="font-family:&quot;Roboto Mono&quot;;color:rgb(255, 254, 254)">ITS RELEVANCE<br/>AND WHAT TO<br/>DO ABOUT IT</span></h2></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:transparent;padding:0px 24px 8px 24px;text-align:center;font-size:60%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:&quot;Roboto Mono&quot;"><span style="color:rgb(255, 254, 254)">// Leena Nyman, Mikko Vieltojärvi </span><br/><span style="color:rgb(255, 254, 254)">// Rainer Saks, Kari-Pekka Rannikko and Lucie Kadlecová (CybExer Technologies)1</span></span></p></div></div></div></div></div><div id="outer" data-widget="container-widget" style="background-color:transparent;padding:0px 0px 0px 0px;background-image:url(https://mms.magloft.com/ibdUfcEp5dRfaxZy/tje1cKx9T63mfUie);background-size:cover;background-position-x:center;background-position-y:center;min-height:auto" class="Widget-module_outer__PBh8P Container-module_outer__Ae8eB"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><div id="outer" data-widget="container-widget" style="background-color:rgba(0,0,0,0.53);padding:48px 24px 32px 24px;min-height:auto" class="Widget-module_outer__PBh8P Container-module_outer__Ae8eB"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(255,254,254,1);padding:24px 24px 24px 24px;text-align:left;font-size:90%;line-height:1.5;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p>It is undisputable that cyber security is to remain among the top global challenges for the decades to come. Different IT networks have become a core component of the critical infrastructure globally while their interconnectedness has grown exponentially. Despite the improvements in the quality of life stemming from this technological advancement, this also brings along serious cyber threats and risks. Cyber crime is the fastest growing branch of criminal activities worldwide. Different state-supported actors permanently enlarge their activities in cyber space. <br/><br/>Remote work, forced upon us by the global pandemics, is to stay with us even in the future increasing the number of potential targets and challenges for cyber security systems of public institutions and enterprises. And the list goes on.<br/><br/>Although the general awareness about these cyber threats has improved recently, especially among decision makers, it is still relatively poor. Many decision makers keep leaving the responsibility for cyber issues mainly to their IT departments while they omit rising cyber awareness among their employees and miss a chance to implement a complex top-down solution. This is the moment when cyber safety enters the picture.<br/><br/></p></div></div><div id="outer" data-widget="space-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Space-module_outer__L5OzP"><div id="inner" style="border-radius:0px 0px 0px 0px;width:40px"></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(255,254,254,1);padding:24px 24px 24px 24px;text-align:left;font-size:90%;line-height:1.5;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:&quot;Roboto Mono&quot;" class="__bold">CYBER SAFETY VS. CYBER SECURITY</span><br/>Cyber security is generally understood as the practice and application of technologies, processes and controls to protect systems and data from cyber attacks. In other words, it is group’s efforts and measures to protect its members from harm in cyber space. On the other hand, cyber safety can be described as part of social security of our society. <br/><br/>Safety relates to a personal feeling of being free from danger and harm. Applied in cyber space, cyber safety is the feeling of citizens to operate safely in any sphere of activities using internet-based services. While cyber security is defined as measures and efforts in cyber space that are outside of an individual, cyber safety relates to individual’s inner feelings in respect to the online activities.<br/><br/>The individual’s feeling of cyber safety is influenced in two directions – from top-down and bottom-up. The top-down influence can be defined through external factors originating in authorities present in the individual’s life. For example, the feeling of cyber safety is in this case influenced by the cyber security regulations of an employer, national cyber-related policies and legislations, media’s reporting on cyber incidents, insurance policies for organizations or the maturity of service providers’ market.<br/><br/>In contrast, the bottom-up influence on an individual’s cyber safety feeling is based on the society and its general approach to cyber domain. This can, for instance, include the perception (or lack thereof) that cyber security is a citizen’s own responsibility, limited training and educational opportunities, lack of opportunities for insurance cover or understanding cyber threats as one of the security risks in a person’s life.<br/></p></div></div><div id="outer" data-widget="space-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Space-module_outer__L5OzP"><div id="inner" style="border-radius:0px 0px 0px 0px;width:40px"></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(255,254,254,1);padding:24px 24px 24px 24px;text-align:left;font-size:90%;line-height:1.5;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span class="__bold" style="font-family:&quot;Roboto Mono&quot;">EDUCATION AS THE FUNDAMENTAL CORNERSTONE OF CYBER SAFETY</span><br/><br/>Successful cyber safety can only be achieved when the whole society is engaged, and comprehensive security thinking is employed. The bottom line for efficient cyber safety is professional and responsible security authorities, resistant critical infrastructure solutions and service providers and educated decision makers. Nevertheless, this all will not achieve a well-developed cyber safety if, first of all, a key factor is not addressed immediately and comprehensively – education of individuals, the centrepiece of cyber safety concept, on the topic of cyber security throughout all levels of society.<br/><br/>There is currently a need for cyber security skills across a wide swath of the educational and professional areas and each has different needs and require tailored approaches. Each category should have a pathway resulting in a Cyber Educational Development Plan. This plan is much like a Professional Development Plan; however, it describes a training and education pathway from the earliest years until professional roles. It provides information and develops skills how to be cyber safe not only at school and workplace but also at home and when on-the-go with a mobile device. We have identified and proposed the following four primary audience types.<br/><br/><span class="__bold" style="font-family:&quot;Roboto Mono&quot;">FOUR PRIMARY CYBER EDUCATION AUDIENCE GROUPS</span><br/>Firstly, our attention has to be focused on the youth at primary (age of 6-10) and secondary (age of 11-18) education. If we want to achieve the point at which the whole society is educated on cyber issues, it does not suffice to start with cyber education only at university level. Already the education of students at primary level should be centred around basic cyber hygiene principles and progress to a level of knowledge preparing them for the higher classes. By the time students reach the senior classes of secondary education, they should be steeped in basic cyber security concepts and understand how those concepts interrelate with their courses (e.g., software development, biology, physics, etc.). Overall, the development plan should prepare them for university or any other type of post-secondary education.<br/><br/>Secondly, university students should focus their attention at how cyber security, data analysis, and advanced topics such as machine learning or artificial intelligence might affect their current studies and what impact it might have upon their studies and profession as well as personal life later on in the future.<br/><br/>While incorporating the cyber element into the school and university curricula, two more fundamental topics must also be kept in mind. It is absolutely essential that students are familiarized with ethical principles of their behaviour in cyber space from the very beginning.<br/><br/>To adopt the ethical way of acting in IT networks is core so that the students do not use their preciously acquired knowledge for malicious purposes later on. The other topic is to go beyond a theory of cyber security in the curricula and actually adopt an experiential learning, loosely defined as learning through reflection on doing.<br/><br/>In other words, students should not learn only theory, but schools must provide them with opportunities to train real skills. A hands-on experience is fundamental in cyber security. Our practical experience with trainings and exercises in our cyber range proves this point.<br/><br/>The third audience group for cyber security education is front-line professionals who are generally classified as information technology workers in that they are system/network administrators, database administrators, storage administrators, etc. Although their roles have a cyber security component, they are focused on administration, provisioning and other back-office support functions. However, because they are generally the experts on the systems and the first to notice anomalous activities, it is paramount that they not only understand the basics of cyber security but also specifics related to their devises and when to escalate to a Security Operations Centre, Incident Response Team, or other cyber security teams.<br/><br/>Finally, the last audience group are cyber security professionals themselves. This group is the most in need globally. Training and education should begin with establishing a baseline of common knowledge. This baseline ensures that all participants have a common understanding of core concepts. From the baseline, participants then move into specialized knowledge required for their respective roles and still provide a pathway for advancement.<br/><br/></p></div></div><div id="outer" data-widget="space-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Space-module_outer__L5OzP"><div id="inner" style="border-radius:0px 0px 0px 0px;width:40px"></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(255,254,254,1);padding:24px 24px 24px 24px;text-align:left;font-size:90%;line-height:1.5;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span class="__bold" style="font-family:&quot;Roboto Mono&quot;">TWO MORE AUDIENCE GROUPS WITH A NEED FOR A SPECIFIC APPROACH</span><br/>Besides the identified audience, there are two more groups to which a particular attention should be paid, and a specific approach adopted. The first group is the older generation which grew up at the times when internet was still a research project of DARPA. This is a particularly vulnerable audience which quickly needs to acquire the basic knowledge of cyber hygiene and elementary IT protection. Special educative programmes in that regards can be developed in cooperation with universities or NGOs while important role could be played by young people who might help to educate their grandparents and parents in cyber matters.<br/><br/>The other vulnerable group are girls and women in general. Overall, cyber security and IT is still misperceived as a primarily man-dominated industry throughout the society. This perception must start to get eroded already in the heads of the youngest generation. There is no objective reason to think that men are necessarily better than women in IT or cyber security. There is an urgent need for more IT and cyber security specialists and bringing more girls and women into the industry can significantly help to fill in this gap.<br/><br/></p></div></div><div id="outer" data-widget="space-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Space-module_outer__L5OzP"><div id="inner" style="border-radius:0px 0px 0px 0px;width:40px"></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(255,254,254,1);padding:24px 24px 24px 24px;text-align:left;font-size:90%;line-height:1.5;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:&quot;Roboto Mono&quot;" class="__bold">MULTISTAKEHOLDER APPROACH TO EDUCATION AS THE WAY FORWARD FOR CYBER SAFETY</span><br/>To make this complex educational structure successfully work, there is an urgent need for private and public sectors to cooperate closely. Private sector owns the resources necessary for cyber education, be it funding, knowhow, infrastructure or experts while public sector has the power to make the policies effective. We also must not forget about the role of academia. Lack of scientists, teachers and employees is massive but universities, in collaboration with private and public sectors, have the potential to help create functioning educative programmes and training courses for schools and general public.<br/><br/>The starting point for this multistakeholder cooperation could be briefer events like boot camps, corporate and government scholarships and internships which would serve as a basis for further, more complex initiatives and programmes.<br/><br/>In conclusion, this article introduced many different ways how to support and enhance education on cyber matters throughout the whole spectrum of society. All of them have, however, one thing in common – only through the education of individuals on all the societal levels, we can strengthen the cyber safety of our citizens and ultimately empower the whole society in its feeling of being truly safe online. Cyber security, its principles and processes must be widely understood as a collective responsibility, but that will not be achieved unless every citizen is educated in at least basic cyber security principles, understands the importance thereof and sees the relevance of feeling cyber safe.<br/></p></div></div><div id="outer" data-widget="space-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Space-module_outer__L5OzP"><div id="inner" style="border-radius:0px 0px 0px 0px;width:40px"></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:transparent;padding:0px 24px 8px 24px;text-align:left;font-size:90%;line-height:1.5;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="color:rgb(255, 254, 254)">1 We would like to thank Mr. Kevin Estis for his original thoughts on the complex approach to cyber education in the society.</span></p></div></div></div></div></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:transparent;padding:40px 24px 40px 24px;text-align:center;font-size:80%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:Arimo">CybExer Technologies is a NATO-awarded Estonian cyber security company. CybExer&#x27;s flagship solution is its proprietary cyber range and highly realistic cyber security exercises conducted on the range. Its capabilities and solutions have been used to conduct some of the world&#x27;s largest cyber exercises.<br/><br/><span class="__bold">Rainer Saks:</span><br/>Board Member (CybExer Technologies)<br/><br/><span class="__bold">Kari-Pekka Rannikko:</span><br/>Senior Advisor (CybExer Technologies)<br/><br/><span class="__bold">Lucie Kadlecová:</span><br/>Senior Associate (CybExer Technologies)<br/></span></p></div></div><div id="outer" data-widget="columns-widget" style="background-color:transparent;padding:0px 32px 0px 32px" class="Widget-module_outer__PBh8P"><div id="inner" class="Columns-module_inner__KeVpm Columns-module_collapse-phone__abOHb" style="border-radius:0px 0px 0px 0px;width:100%"><div class="Columns-module_column__hw-5a" style="margin:0px 8px;flex:1"><div id="outer" data-widget="column-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Column-module_outer__vEJ6X"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><div id="outer" data-widget="image-widget" style="background-color:transparent;padding:8px 0px 8px 0px;min-height:auto" class="Widget-module_outer__PBh8P"><div id="inner" class="Image-module_container__8raIv Image-module_container-noflex__-J1PG" style="border-radius:0px 0px 0px 0px;width:100%;min-height:auto"><picture class="Image-module_picture__gw1zY Image-module_loading__FfyPr"><source type="image/png" srcSet="https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=192 192w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=384 384w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=768 768w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw"/><img src="https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=768" srcSet="https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=192 192w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=384 384w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=768 768w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw" class="Image-module_image__w4slc" width="100%" height="1024" decoding="async" alt="Image" style="height:auto;width:100%"/></picture></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(56,92,219,1);padding:8px 16px 8px 16px;text-align:center;font-size:90%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="color:rgb(255, 254, 254)">RAINER SAKS</span></p></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:transparent;padding:16px 0px 8px 0px;text-align:left;font-size:80%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:Arimo">Rainer Saks joined Cybexer Technologies OÜ as member of Management Board in late 2020. </span><span style="font-family:Arimo">He is responsible for government relations and some of the research and development projects in the company. He worked as a civil servant for Estonian Republic between 1999- 2020. Rainer Saks worked as a Government Security Coordinator, Director of the Office of the President of Estonian Republic, Director-General for Foreign Intelligence Service and finally as a Secretary General for Ministry of Foreign Affairs. He has a long experience in dealing with foreign and security policy issues and strategic planning.<br/></span><br/></p></div></div></div></div></div><div class="Columns-module_column__hw-5a" style="margin:0px 8px;flex:1"><div id="outer" data-widget="column-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Column-module_outer__vEJ6X"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><div id="outer" data-widget="image-widget" style="background-color:transparent;padding:8px 0px 8px 0px;min-height:auto" class="Widget-module_outer__PBh8P"><div id="inner" class="Image-module_container__8raIv Image-module_container-noflex__-J1PG" style="border-radius:0px 0px 0px 0px;width:100%;min-height:auto"><picture class="Image-module_picture__gw1zY Image-module_loading__FfyPr"><source type="image/png" srcSet="https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=192 192w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=384 384w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=768 768w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw"/><img src="https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=768" srcSet="https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=192 192w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=384 384w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=768 768w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw" class="Image-module_image__w4slc" width="100%" height="1024" decoding="async" alt="Image" style="height:auto;width:100%"/></picture></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(56,92,219,1);padding:8px 16px 8px 16px;text-align:center;font-size:90%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="color:rgb(255, 254, 254)">LUCIE KADLECOVÁ</span></p></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:transparent;padding:16px 0px 8px 0px;text-align:left;font-size:80%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:Arimo">Lucie Kadlecová works as a Senior Associate (Strategy and Threat Intelligence) and the company’s representative in the Czech Republic in CybExer Technologies. Previously, Lucie served as a cyber security and policy specialist in National Cyber Security Centre of the Czech Republic and as a trainee in Cyber Defence Section, Emerging Security Challenges Division at NATO HQ in Brussels.<br/></span><br/><span style="font-family:Arimo">She was also a visiting scholar on Fulbright scholarship at Massachusetts Institute of Technology (MIT), Cambridge, USA. Besides her professional career, Lucie works as a postdoctoral researcher in Peace Research Centre Prague focusing on the study of states’ behaviour in cyber space. She holds a PhD from Charles University in Prague and an MA degree with distinction from War Studies Department, King’s College London.<br/></span><br/></p></div></div></div></div></div><div class="Columns-module_column__hw-5a" style="margin:0px 8px;flex:1"><div id="outer" data-widget="column-widget" style="background-color:transparent;padding:0px 0px 0px 0px" class="Widget-module_outer__PBh8P Column-module_outer__vEJ6X"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%"><div id="outer" data-widget="image-widget" style="background-color:transparent;padding:8px 0px 8px 0px;min-height:auto" class="Widget-module_outer__PBh8P"><div id="inner" class="Image-module_container__8raIv Image-module_container-noflex__-J1PG" style="border-radius:0px 0px 0px 0px;width:100%;min-height:auto"><picture class="Image-module_picture__gw1zY Image-module_loading__FfyPr"><source type="image/png" srcSet="https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=192 192w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=384 384w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=768 768w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw"/><img src="https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=768" srcSet="https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=192 192w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=384 384w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=768 768w,https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq?optimizer=image&amp;width=1536 1536w" sizes="(min-width: 768px) 768px, 100vw" class="Image-module_image__w4slc" width="100%" height="1024" decoding="async" alt="Image" style="height:auto;width:100%"/></picture></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:rgba(56,92,219,1);padding:8px 16px 8px 16px;text-align:center;font-size:90%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="color:rgb(255, 254, 254)">KARI-PEKKA RANNIKKO</span></p></div></div><div id="outer" data-widget="paragraph-widget" style="background-color:transparent;padding:16px 0px 8px 0px;text-align:left;font-size:80%;line-height:1.3;letter-spacing:0" class="Widget-module_outer__PBh8P Paragraph-module_container__-DJUN"><div id="inner" style="border-radius:0px 0px 0px 0px;width:100%;column-count:1"><p><span style="font-family:Arimo">Col (Ret.) Kari Rannikko joined CybExer Technologies OÜ strategy team 2020 as Senior Advisor focusing on hybrid threats and strategic decisionmaking. His academic interests are focused on EU’s Integrated Approach to Crisis Management, which he is realizing as a senior instructor in Finnish Defence Forces International Centre. In 2019 Kari-Pekka served as the Project Manager in Prime Minister’s office of Finland during country’s EU Presidency.<br/></span><br/><span style="font-family:Arimo">He was responsible for Scenario Based Policy Discussions on Countering Hybrid Threats. Kari-Pekka has a long experience in dealing defence policy issues on the strategic level.<br/></span><br/></p></div></div></div></div></div></div></div></div></div></div><div class="_slug__share-button__ettip"><hr/></div></div></div><div id="ControlBar" class="_slug__control-bar__Jj4LE"><div class="WrapAutoHide-module_navigation__9sdQy WrapAutoHide-module_visible__UN7GD"><div class="ControlBar-module_toc-wrapper__AF5eD"><div class="ControlBar-module_toc__mKXnp"><div class="ControlBar-module_white-blur__TGapK"><div class="ControlBar-module_toc-slider__i9fv1"></div></div><div class="ControlBar-module_control-bar__9Zqak"><button class=""><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none"><path d="M13.8287 19C13.5367 19 13.2467 18.873 13.0487 18.627L8.22066 12.627C7.92266 12.256 7.92666 11.726 8.23166 11.36L13.2317 5.35998C13.5847 4.93598 14.2157 4.87898 14.6407 5.23198C15.0647 5.58498 15.1217 6.21598 14.7677 6.63998L10.2927 12.011L14.6077 17.373C14.9537 17.803 14.8857 18.433 14.4547 18.779C14.2707 18.928 14.0487 19 13.8287 19Z" fill="white"></path></svg></button><button class=""><svg width="14" height="18" viewBox="0 0 14 18" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M0.507488 17.8699C0.660488 17.9569 0.830488 17.9999 1.00049 17.9999C1.17849 17.9999 1.35649 17.9519 1.51449 17.8579L6.83649 14.6629L12.5085 17.8709C12.8185 18.0469 13.1965 18.0439 13.5045 17.8639C13.8115 17.6849 14.0005 17.3559 14.0005 16.9999V2.33388C14.0005 1.04688 13.0135 -0.00012207 11.8005 -0.00012207H2.20049C0.987488 -0.00012207 0.000488281 1.04688 0.000488281 2.33388V16.9999C0.000488281 17.3599 0.194488 17.6929 0.507488 17.8699ZM7.31349 12.6349C7.16049 12.5489 6.99049 12.5059 6.82149 12.5059C6.64349 12.5059 6.46549 12.5539 6.30649 12.6489L2.00049 15.2339V2.33388C2.00049 2.13288 2.12049 1.99988 2.20049 1.99988H11.8005C11.8795 1.99988 12.0005 2.13288 12.0005 2.33388V15.2859L7.31349 12.6349Z" fill="white"></path></svg></button><button class=""><svg width="20" height="20" viewBox="0 0 20 20" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M5 8C4.80222 8 4.60888 8.05865 4.44443 8.16853C4.27998 8.27841 4.15181 8.43459 4.07612 8.61732C4.00043 8.80004 3.98063 9.00111 4.01921 9.19509C4.0578 9.38907 4.15304 9.56725 4.29289 9.70711C4.43275 9.84696 4.61093 9.9422 4.80491 9.98079C4.99889 10.0194 5.19996 9.99957 5.38268 9.92388C5.56541 9.84819 5.72159 9.72002 5.83147 9.55557C5.94135 9.39112 6 9.19778 6 9C6 8.73478 5.89464 8.48043 5.70711 8.29289C5.51957 8.10536 5.26522 8 5 8ZM17 4H16V1C16 0.734784 15.8946 0.48043 15.7071 0.292893C15.5196 0.105357 15.2652 0 15 0H5C4.73478 0 4.48043 0.105357 4.29289 0.292893C4.10536 0.48043 4 0.734784 4 1V4H3C2.20435 4 1.44129 4.31607 0.87868 4.87868C0.316071 5.44129 0 6.20435 0 7V13C0 13.7956 0.316071 14.5587 0.87868 15.1213C1.44129 15.6839 2.20435 16 3 16H4V19C4 19.2652 4.10536 19.5196 4.29289 19.7071C4.48043 19.8946 4.73478 20 5 20H15C15.2652 20 15.5196 19.8946 15.7071 19.7071C15.8946 19.5196 16 19.2652 16 19V16H17C17.7956 16 18.5587 15.6839 19.1213 15.1213C19.6839 14.5587 20 13.7956 20 13V7C20 6.20435 19.6839 5.44129 19.1213 4.87868C18.5587 4.31607 17.7956 4 17 4ZM6 2H14V4H6V2ZM14 18H6V14H14V18ZM18 13C18 13.2652 17.8946 13.5196 17.7071 13.7071C17.5196 13.8946 17.2652 14 17 14H16V13C16 12.7348 15.8946 12.4804 15.7071 12.2929C15.5196 12.1054 15.2652 12 15 12H5C4.73478 12 4.48043 12.1054 4.29289 12.2929C4.10536 12.4804 4 12.7348 4 13V14H3C2.73478 14 2.48043 13.8946 2.29289 13.7071C2.10536 13.5196 2 13.2652 2 13V7C2 6.73478 2.10536 6.48043 2.29289 6.29289C2.48043 6.10536 2.73478 6 3 6H17C17.2652 6 17.5196 6.10536 17.7071 6.29289C17.8946 6.48043 18 6.73478 18 7V13Z" fill="white"></path></svg></button><button class=""><svg xmlns="http://www.w3.org/2000/svg" width="18" height="14" viewBox="0 0 18 14" fill="none"><path d="M6.75 0H1.125C0.503719 0 0 0.503719 0 1.125V4.5C0 5.12128 0.503719 5.625 1.125 5.625C1.74628 5.625 2.25 5.12128 2.25 4.5V2.25H6.75C7.37128 2.25 7.875 1.74628 7.875 1.125C7.875 0.503719 7.37128 0 6.75 0Z" fill="white"></path><path d="M16.875 0H11.25C10.6287 0 10.125 0.503719 10.125 1.125C10.125 1.74628 10.6287 2.25 11.25 2.25H15.75V4.5C15.75 5.12128 16.2537 5.625 16.875 5.625C17.4963 5.625 18 5.12128 18 4.5V1.125C18 0.503719 17.4963 0 16.875 0Z" fill="white"></path><path d="M16.875 7.875C16.2537 7.875 15.75 8.37872 15.75 9V11.25H11.25C10.6287 11.25 10.125 11.7537 10.125 12.375C10.125 12.9963 10.6287 13.5 11.25 13.5H16.875C17.4963 13.5 18 12.9963 18 12.375V9C18 8.37872 17.4963 7.875 16.875 7.875Z" fill="white"></path><path d="M6.75 11.25H2.25V9C2.25 8.37872 1.74628 7.875 1.125 7.875C0.503719 7.875 0 8.37872 0 9V12.375C0 12.9963 0.503719 13.5 1.125 13.5H6.75C7.37128 13.5 7.875 12.9963 7.875 12.375C7.875 11.7537 7.37128 11.25 6.75 11.25Z" fill="white"></path></svg></button><button class="" disabled=""><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none"><g opacity="0.25"><path d="M9.9995 19C9.7735 19 9.5465 18.924 9.3595 18.768C8.9355 18.415 8.8785 17.784 9.2315 17.36L13.7075 11.989L9.3925 6.62701C9.0465 6.19701 9.1145 5.56701 9.5445 5.22101C9.9755 4.87501 10.6045 4.94301 10.9515 5.37301L15.7795 11.373C16.0775 11.744 16.0735 12.274 15.7685 12.64L10.7685 18.64C10.5705 18.877 10.2865 19 9.9995 19Z" fill="white"></path></g></svg></button></div></div></div></div></div><div class="_slug__wrapper__0ZIJf"></div><div></div>0</div></div><div class="_footer_j8nu5_1"><div class="_container_j8nu5_12"><div class="_footer-row_j8nu5_23"><div class="_footer-column_j8nu5_36 _flex-2_j8nu5_117"><div class="_footer-brand_j8nu5_43"><div class=""><img alt="Logo" loading="lazy" width="40" height="40" decoding="async" data-nimg="1" class="_footer-logo_j8nu5_57" style="color:transparent" srcSet="https://media.magloft.app/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png 1x, https://media.magloft.app/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png 2x" src="https://media.magloft.app/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png"/></div><div class="_content_j8nu5_67"><h3>Universal App by MagLoft</h3><p>Welcome to the future of Digital Publishing</p></div></div><div class="_footer-description_j8nu5_76"><p>Convert Your PDFs into Engaging Content that Works on ALL Devices to Generate More Traffic, Readers &amp; Revenue</p></div><div class="_footer-link-list_j8nu5_121"><div class="_block_j8nu5_129"></div><div class="_block_j8nu5_129"><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://www.magloft.com/"><div class="_status-info_1lm7t_87 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span>Visit our website</span></a><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://blueprint.magloft.com/"><div class="_status-info_1lm7t_87 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span>9 Step Digital Publishing Blueprint</span></a></div><a target="_blank" rel="noreferrer" class="_footer-link-item_j8nu5_92" href="https://www.magloft.com/privacy/"><div class="_status-info_1lm7t_87 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span>Privacy Policy</span></a><a target="_blank" rel="noreferrer" class="_footer-link-item_j8nu5_92" href="https://www.magloft.com/terms-of-service/"><div class="_status-info_1lm7t_87 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span>Terms of Service</span></a></div></div><div class="_footer-column_j8nu5_36 _flex-1_j8nu5_39"><div class="_footer-brand_j8nu5_43"><div class="_status-accent_1lm7t_91 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><div class="_content_j8nu5_67"><h3>Categories</h3><p>Explore our inspiring content by topic</p></div></div><div class="_footer-link-list_j8nu5_121"><a class="_footer-link-item_j8nu5_92" href="/categories/c09f2351-6de8-11ee-86ca-42010a800012"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>VIPER (Volatiles Investigating Polar Exploration Rover)</a><a class="_footer-link-item_j8nu5_92" href="/categories/ec89fd51-6f61-11ee-86ca-42010a800012"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Voyager Program</a><a class="_footer-link-item_j8nu5_92" href="/categories/e537f9e2-6259-11ee-86ca-42010a800012"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Water on Earth</a><a class="_footer-link-item_j8nu5_92" href="/categories/ca32292b-7a83-11ee-86ca-42010a800012"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Science Activation</a><a class="_footer-link-item_j8nu5_92" href="/categories/bbf5c28a-5f13-11ee-b305-42010a80000e"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Science &amp; Research</a><a class="_footer-link-item_j8nu5_92" href="/categories/d76ae28a-8da2-11ee-82dc-42010a800013"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Saturn Moons</a><a class="_footer-link-item_j8nu5_92" href="/categories/eaafce95-8e28-11ee-82dc-42010a800013"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Mars Moons</a><a class="_footer-link-item_j8nu5_92" href="/categories/682be25f-825f-11ee-86ca-42010a800012"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Leadership</a><a class="_footer-link-item_j8nu5_92" href="/categories/50833af3-6e0a-11ee-86ca-42010a800012"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Johnson Space Center</a><a class="_footer-link-item_j8nu5_92" href="/categories/e93a7e7d-84ba-11ee-82dc-42010a800013"><div class="_nav-arrow-right_1lm7t_175 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div>Gateway Space Station</a></div></div><div class="_footer-column_j8nu5_36 _flex-1_j8nu5_39"><div class="_footer-brand_j8nu5_43"><div class="_share-action_1lm7t_463 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><div class="_content_j8nu5_67"><h3>Social Footprints</h3><p>Follow us on our Social Media Channels</p></div></div><div class="_footer-link-list_j8nu5_121"><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://www.facebook.com/magloft.digital.publishing/"><div class="_share-facebook_1lm7t_479 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span class="_footer-text_j8nu5_125">facebook</span></a><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://twitter.com/MagLoft"><div class="_share-twitter_1lm7t_487 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span class="_footer-text_j8nu5_125">X</span></a><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://sg.linkedin.com/company/magloft"><div class="_share-linkedin_1lm7t_483 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span class="_footer-text_j8nu5_125">linkedin</span></a><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://www.youtube.com/channel/UCCZw_kwGa_kMtlo8iyOdlqQ"><div class="_share-youtube_1lm7t_491 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span class="_footer-text_j8nu5_125">youtube</span></a><a class="_footer-link-item_j8nu5_92" target="_blank" rel="noreferrer" href="https://www.instagram.com/magloft/"><div class="_share-instagram_1lm7t_495 _footer-icon_j8nu5_58 _icon_1lm7t_1 icon"></div><span class="_footer-text_j8nu5_125">instagram</span></a></div></div></div></div></div></div><div class="Toastify"></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"domain":"pwa.magloft.com","pwa":{"id":1,"publicationId":102,"pwaOptinId":1,"domain":"pwa.magloft.com","config":{"access":{"concurrentLimit":1,"restrictAnonymous":null,"disableSignup":null,"disableLogin":null,"disableLoginMessage":null,"disableSearchIndexing":true,"signupUrl":null,"resetPasswordUrl":null,"isUsernameLogin":null,"disableEditProfile":null,"formUrl":null,"customMarginResetPassword":null},"push":{"google":{"serverPublicKey":"BJ2Q3__t1MGDGIby5QTW3AEVMYC8WI2ZQIBRiF2I7HxBp8oeuMGwOrL1nC4UsOK8A43jjjOaetpRHBjA5ZbpLT0"}},"tracking":{"facebook":{"appId":"334997407549786","pixelId":"939102587223972"},"google":{"measurementId":"G-YHFLWEXLMF"},"gtm":null,"sentry":null},"payment":{"stripe":{"publishableKey":"pk_test_FLfPRexbJ6Z9D1jCnLtCHsPT"},"bypassPayment":null,"mode":"stripe","external":{"externalUrl":"https://blueprint.magloft.com/"},"currency":null},"email":{"readerOptin":false},"firebase":{"projectId":"magloft-pwa","senderId":"477702089434","pairKey":null,"webAppConfig":{"apiKey":"AIzaSyCRKpYQJGVTUxDV-hD0IRdHlYwaSxW5yj0","appId":"1:477702089434:web:cb32d9968a34e415cbd3e3","authDomain":"magloft-pwa.firebaseapp.com","databaseURL":null,"locationId":null,"messagingSenderId":"477702089434","projectId":"magloft-pwa","storageBucket":"magloft-pwa.appspot.com"}},"customHtml":{"head":null,"body":null},"account":{"emailEditable":false,"customSubscriptionText":"hey how are you. contact us to manage your subscription","customSubscriptionURL":"https://magloft.com","enableSubscriptionTitle":null},"checkout":{"enableSubscriptionCheckout":true,"enableIssueCheckout":true},"tts":{"enabled":true,"voice":"ash","color":"#F7F7F7","backgroundColor":"#DE002F"},"customFields":null},"design":{"colors":{"backgroundColor":"#FFFFFF","primaryColor":"#1A78D6","secondaryColor":"#F08123","accentColor":"#00D26A","infoColor":"#7C51E1","warningColor":"#EF9338","successColor":"#1FAD26","dangerColor":"#DF4241","topMenuBackgroundColor":null,"topMenuHeadingTitleColor":null,"topMenuHeadingIconColor":null,"topMenuItemTextColor":null,"topMenuItemIconColor":null,"footerMenuBackgroundColor":null,"footerMenuHeadingTitleColor":null,"footerMenuHeadingTextColor":null,"footerMenuHeadingIconColor":null,"footerMenuItemTextColor":null,"footerMenuItemIconColor":null},"images":{"icon":"https://cdn.magloft.com/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png","feature":"https://cdn.magloft.com/secure/102/properties.app_icon/c80d3c76-1c77-4340-94b8-c47eb2051009/properties.app_icon.png","topMenuIcon":"https://cdn.magloft.com/pwa-1/pwa/top-menu-icon/4b9ab790-e497-447b-8b14-edff1498aa59.png","footerMenuIcon":null,"alphaChannelIcon":"https://cdn.magloft.com/pwa-1/pwa/alpha-channel-icon/49234343-4627-4a4b-ba8d-76bafa364c8a.png"},"fonts":{"heading":"open-sans","body":"open-sans","ui":"open-sans","topMenuTitle":"open-sans","topMenuItems":"open-sans","topMenuSubtitle":"open-sans","footerMenuTitle":null,"footerMenuItems":null},"menuItems":{"collections":{"title":"Issues"},"articles":{"title":null},"account":{"title":null},"icons":{"enabled":true}},"footerShape":"flat","issueCoverAspectRatio":0.75,"fullscreenCollectionView":"auto","customOverlayToggleView":false,"defaultViewMode":"html","categories":"group","purchaseList":false,"libraryList":true,"enablePrint":true,"noteList":false,"textToSpeech":true,"issue":{"dateHidden":true,"categoryHidden":true},"filter":{"enableSearch":null}},"layout":{"banners":[{"image":"https://cdn.magloft.com/pwa-1/pwa/banner/ac4a0d97-57db-4497-93db-7843f6d214cb.gif","title":"Start trial now","isHidden":false,"action":{"type":"url","href":"https://www.magloft.com/","target":"_blank","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}}],"bottomBanners":[{"image":"https://cdn.magloft.com/pwa-1/pwa/banner/151ade5e-d658-420c-850a-6df31dcfebd2.png","title":"Digital Publishing Blueprint","isHidden":false,"action":{"type":"url","href":"https://blueprint.magloft.com/articles/the-ultimate-digital-publishing-guide-for-pdf-publishers","target":"_blank","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}}],"columnSeparator":"shadow","tabs":[{"route":"","title":"Home","icon":"menu-home","visible":true},{"route":"/articles","title":"Articles","icon":"menu-articles","visible":true},{"route":"/collections","title":"Collections","icon":"menu-issues","visible":true},{"route":"/account","title":"Account","icon":"menu-account","visible":true}],"topMenu":{"showLogo":true,"showSubtitle":false,"showTitle":true,"height":"64px"},"navbar":{"animation":false,"style":"logo-left"},"sections":[{"fullWidth":true,"backgroundColor":"transparent","columnSeparator":"none","columns":[{"size":5,"blocks":[{"type":"banner","image":"https://cdn.magloft.com/pwa-1/pwa/banner/ac4a0d97-57db-4497-93db-7843f6d214cb.gif","isHidden":false,"title":"Start trial now","action":{"type":"url","href":"https://www.magloft.com/","target":"_blank","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}}]}]},{"fullWidth":false,"backgroundColor":null,"columnSeparator":"shadow","columns":[{"size":8,"blocks":[{"type":"issue-slider","condition":null,"color":"#2873B0","title":"Collection Slider: Text Overlay w/Medium Image","issueIds":[44367,30697,45660,45734],"thumbnail":{"style":"overlay","size":"medium"},"borderRadius":null,"zoomOnHover":true,"issues":null},{"type":"article-list","condition":null,"color":"#000000","title":"Custom Article List Block","variant":"variant-c","articleIds":[202689,165028,158659,157858,141138],"articles":null},{"type":"cta","condition":null,"icon":"symbol-gift","color":"#44C3C3","title":"CTA Block: Subscribe Today","description":"Use the customiseable CTA Block to invite visitors to sign up for a subscription Today. You could offer a free trial first then only charge subscribers after the trial expires!","action":{"type":"url","href":"https://pwa.magloft.com/account?page=signin","target":"_top","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"article-category","condition":null,"color":"#2873B0","title":"6 Block Article Category","variant":"variant-b","categoryId":11614,"backgroundColor":null,"image":null,"articles":null,"category":null},{"type":"article-category","condition":null,"color":"#2873B0","title":"5 Block Article Category w/Category Image \u0026 Background Color ","variant":"variant-a","categoryId":40180,"backgroundColor":"#D4D4D4","image":"https://cdn.magloft.com/pwa-1/category/image/9d74cb7b-7cb5-452e-baa9-19f884c11737.png","articles":null,"category":null},{"type":"ad","title":"Banner Ad","advertisementIds":[1379],"adCampaignId":null,"condition":null},{"type":"issue-slider","condition":null,"color":"#E61E1E","title":"Collection Slider: Full Cover w/Tall Image","issueIds":[42297,46074,46076,46071,46072,46073,46075,46077],"thumbnail":{"style":"full-cover","size":"tall"},"borderRadius":null,"zoomOnHover":true,"issues":null},{"type":"ad","title":"Advertisement","advertisementIds":[1400],"adCampaignId":null,"condition":null},{"type":"cta","condition":"reader.push.permission == \"granted\"","icon":"symbol-bell","color":"#030000","title":"SUBSCRIBE TO PUSH NOTIFICATIONS","description":"Don't miss push any update","action":{"type":"push","href":null,"target":null,"pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"guide-install","color":"#F90909","title":"UA App Installation Block","condition":null}]},{"size":4,"blocks":[{"type":"subscription-plan","color":"#4A4BFF","labelColor":"#000000","subscriptionId":28,"subscription":null,"readerSubscription":null},{"type":"cta","condition":"reader.push.permission == \"granted\"","icon":"symbol-bell","color":"#00D26A","title":"CTA Block: Turn Me On 😉 ","description":"Use the customiseable CTA Block to invite readers to turn on their push notifications.","action":{"type":"push","href":null,"target":null,"pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"article-category","condition":null,"color":"#2873B0","title":"16 Block Article Category","variant":"variant-c","categoryId":11614,"backgroundColor":null,"image":null,"articles":null,"category":null},{"type":"optin","condition":null,"optinId":679,"optin":null},{"type":"cta","condition":null,"icon":"symbol-day","color":"#00D26A","title":"CTA Block: Visit External URL ","description":"Use the customiseable CTA Block to take your readers to an external URL. For example, access back issues here.","action":{"type":"url","href":"http://magazine.magloft.com/#/shelf/view/default","target":"_blank","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"ad","title":"Advertisements","advertisementIds":[],"adCampaignId":1,"condition":null}]}]},{"fullWidth":true,"backgroundColor":"transparent","columnSeparator":"none","columns":[{"size":5,"blocks":[{"type":"banner","image":"https://cdn.magloft.com/pwa-1/pwa/banner/151ade5e-d658-420c-850a-6df31dcfebd2.png","isHidden":false,"title":"Digital Publishing Blueprint","action":{"type":"url","href":"https://blueprint.magloft.com/articles/the-ultimate-digital-publishing-guide-for-pdf-publishers","target":"_blank","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}}]}]}],"columns":[{"size":8,"blocks":[{"type":"issue-slider","condition":null,"color":"#2873B0","title":"Collection Slider: Text Overlay w/Medium Image","issueIds":[44367,30697,45660,45734],"thumbnail":{"style":"overlay","size":"medium"},"borderRadius":null,"zoomOnHover":true,"issues":null},{"type":"article-list","condition":null,"color":"#000000","title":"Custom Article List Block","variant":"variant-c","articleIds":[202689,165028,158659,157858,141138],"articles":null},{"type":"cta","condition":null,"icon":"symbol-gift","color":"#44C3C3","title":"CTA Block: Subscribe Today","description":"Use the customiseable CTA Block to invite visitors to sign up for a subscription Today. You could offer a free trial first then only charge subscribers after the trial expires!","action":{"type":"url","href":"https://pwa.magloft.com/account?page=signin","target":"_top","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"article-category","condition":null,"color":"#2873B0","title":"6 Block Article Category","variant":"variant-b","categoryId":11614,"backgroundColor":null,"image":null,"articles":null,"category":null},{"type":"article-category","condition":null,"color":"#2873B0","title":"5 Block Article Category w/Category Image \u0026 Background Color ","variant":"variant-a","categoryId":40180,"backgroundColor":"#D4D4D4","image":"https://cdn.magloft.com/pwa-1/category/image/9d74cb7b-7cb5-452e-baa9-19f884c11737.png","articles":null,"category":null},{"type":"ad","title":"Banner Ad","advertisementIds":[1379],"adCampaignId":null,"condition":null},{"type":"issue-slider","condition":null,"color":"#E61E1E","title":"Collection Slider: Full Cover w/Tall Image","issueIds":[42297,46074,46076,46071,46072,46073,46075,46077],"thumbnail":{"style":"full-cover","size":"tall"},"borderRadius":null,"zoomOnHover":true,"issues":null},{"type":"ad","title":"Advertisement","advertisementIds":[1400],"adCampaignId":null,"condition":null},{"type":"cta","condition":"reader.push.permission == \"granted\"","icon":"symbol-bell","color":"#030000","title":"SUBSCRIBE TO PUSH NOTIFICATIONS","description":"Don't miss push any update","action":{"type":"push","href":null,"target":null,"pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"guide-install","color":"#F90909","title":"UA App Installation Block","condition":null}]},{"size":4,"blocks":[{"type":"subscription-plan","color":"#4A4BFF","labelColor":"#000000","subscriptionId":28,"subscription":null,"readerSubscription":null},{"type":"cta","condition":"reader.push.permission == \"granted\"","icon":"symbol-bell","color":"#00D26A","title":"CTA Block: Turn Me On 😉 ","description":"Use the customiseable CTA Block to invite readers to turn on their push notifications.","action":{"type":"push","href":null,"target":null,"pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"article-category","condition":null,"color":"#2873B0","title":"16 Block Article Category","variant":"variant-c","categoryId":11614,"backgroundColor":null,"image":null,"articles":null,"category":null},{"type":"optin","condition":null,"optinId":679,"optin":null},{"type":"cta","condition":null,"icon":"symbol-day","color":"#00D26A","title":"CTA Block: Visit External URL ","description":"Use the customiseable CTA Block to take your readers to an external URL. For example, access back issues here.","action":{"type":"url","href":"http://magazine.magloft.com/#/shelf/view/default","target":"_blank","pwaSubscriptionId":null,"pwaSubscription":null,"optinId":null,"optin":null}},{"type":"ad","title":"Advertisements","advertisementIds":[],"adCampaignId":1,"condition":null}]}]},"seo":{"home":{"title":"MagLoft PWA - Home","description":"Mobile app publishing and digital publishing solution. Create your own mobile apps powered by PWAs, for your digital magazine, blogs and more. Start publishing today!","image":"https://cdn.magloft.com/pwa/static/banners/banner-01.jpg","imageAlt":"Creative Publishing"},"articles":{"title":"MagLoft PWA - Articles","description":"Samples of individual articles and articles part of collections. Browse and customize the article feed to your preferences, and explore trending articles.","image":"https://cdn.magloft.com/pwa/static/banners/banner-02.jpg","imageAlt":"MagLoft Articles"},"issues":{"title":"MagLoft PWA - Magazine Issues","description":"Samples of various magazines, journals, and documents converted and created using the MagLoft's Universal App. Start your free trial subscription today!","image":"https://cdn.magloft.com/pwa/static/banners/banner-03.jpg","imageAlt":"MagLoft Magazine"},"account":{"title":"MagLoft PWA - Account","description":"Create your reader's account, manage your account details, subscriptions, login details and much more. ","image":"https://cdn.magloft.com/pwa/static/banners/banner-02.jpg","imageAlt":"MagLoft Reader Account"}},"strings":{"app":{"title":"Universal App by MagLoft","subtitle":"The All-In-One Digital Publishing Platform"},"social":{"facebook":"https://www.facebook.com/magloft.digital.publishing/","twitter":"https://twitter.com/MagLoft","linkedin":"https://sg.linkedin.com/company/magloft","youtube":"https://www.youtube.com/channel/UCCZw_kwGa_kMtlo8iyOdlqQ","instagram":"https://www.instagram.com/magloft/"},"topMenu":{"title":"Your Logo Goes Here","subtitle":"Your Fully Branded Digital Publishing Platform"},"footerMenu":{"title":null,"subtitle":"Welcome to the future of Digital Publishing","description":"Convert Your PDFs into Engaging Content that Works on ALL Devices to Generate More Traffic, Readers \u0026 Revenue","email":[],"privacyUrl":"https://www.magloft.com/privacy/","termsUrl":"https://www.magloft.com/terms-of-service/","links":[{"name":"Visit our website","url":"https://www.magloft.com/"},{"name":"9 Step Digital Publishing Blueprint","url":"https://blueprint.magloft.com/"}]},"pages":null},"customFonts":[],"phrases":{"ISSUE_OFFER_TITLE":"Buy Single Issue","ISSUE_OFFER_DESCRIPTION":"Enjoy full access to this issue across all devices with just one purchase."},"trialEndAt":null,"bypassSubscription":true},"publication":{"id":102,"title":"MagLoft - Digital Magazines","properties":{"subtitle":"How To Run Digital Magazines","appIcon":"secure/102/properties.app_icon/2ff4fc37-eae2-4933-98d9-493696f937f4/properties.app_icon.png","promotionalText":"The MagLoft Digital Magazine Is Always Free And Offers Quality Content And Guides To Teach You How To Create Your Own Digital Magazines.","companyName":"MagLoft Pte Ltd","emailReplyTo":"support@magloft.com","privacyUrl":"https://www.magloft.com/publications/102/privacy","termsUrl":"https://www.magloft.com/publications/102/terms"}},"categories":[{"id":48445,"slug":"c09f2351-6de8-11ee-86ca-42010a800012","title":"VIPER (Volatiles Investigating Polar Exploration Rover)","color":"#444444","issueCount":1,"articleCount":1,"categoryGroupIds":[13]},{"id":48469,"slug":"ec89fd51-6f61-11ee-86ca-42010a800012","title":"Voyager Program","color":"#444444","issueCount":1,"articleCount":0,"categoryGroupIds":[]},{"id":48166,"slug":"e537f9e2-6259-11ee-86ca-42010a800012","title":"Water on Earth","color":"#444444","issueCount":2,"articleCount":0,"categoryGroupIds":[]},{"id":48728,"slug":"ca32292b-7a83-11ee-86ca-42010a800012","title":"Science Activation","color":"#444444","issueCount":1,"articleCount":0,"categoryGroupIds":[]},{"id":48065,"slug":"bbf5c28a-5f13-11ee-b305-42010a80000e","title":"Science \u0026 Research","color":"#444444","issueCount":1,"articleCount":0,"categoryGroupIds":[]},{"id":49219,"slug":"d76ae28a-8da2-11ee-82dc-42010a800013","title":"Saturn Moons","color":"#444444","issueCount":3,"articleCount":1,"categoryGroupIds":[13]},{"id":49236,"slug":"eaafce95-8e28-11ee-82dc-42010a800013","title":"Mars Moons","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":48904,"slug":"682be25f-825f-11ee-86ca-42010a800012","title":"Leadership","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":48452,"slug":"50833af3-6e0a-11ee-86ca-42010a800012","title":"Johnson Space Center","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":48980,"slug":"e93a7e7d-84ba-11ee-82dc-42010a800013","title":"Gateway Space Station","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":11614,"slug":"digital-publishing","title":"Digital Publishing","color":"#444444","issueCount":4,"articleCount":23,"categoryGroupIds":[]},{"id":48388,"slug":"e617b59f-6c77-11ee-86ca-42010a800012","title":"DART (Double Asteroid Redirection Test)","color":"#444444","issueCount":0,"articleCount":12,"categoryGroupIds":[]},{"id":48704,"slug":"91ead1ae-79ba-11ee-86ca-42010a800012","title":"Crab Nebula","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":49987,"slug":"49adbf82-c084-11ee-82dc-42010a800013","title":"Astrobiology","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":49754,"slug":"9b3651da-a990-11ee-82dc-42010a800013","title":"Apophis","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":40123,"slug":"html-only-content","title":"HTML Only","color":"#444444","issueCount":2,"articleCount":1,"categoryGroupIds":[]},{"id":40124,"slug":"basic-pdf-conversion","title":"Basic PDF Conversion","color":"#444444","issueCount":22,"articleCount":0,"categoryGroupIds":[]},{"id":40125,"slug":"professional-pdf-conversion","title":"Professional PDF Conversion","color":"#444444","issueCount":21,"articleCount":15,"categoryGroupIds":[]},{"id":40131,"slug":"theme","title":"Theme","color":"#444444","issueCount":0,"articleCount":2,"categoryGroupIds":[]},{"id":40127,"slug":"author","title":"Author","color":"#444444","issueCount":0,"articleCount":1,"categoryGroupIds":[]},{"id":40157,"slug":"ua-help-resources","title":"UA Help Resources","color":"#444444","issueCount":7,"articleCount":26,"categoryGroupIds":[]},{"id":40180,"slug":"vip-members-only","title":"VIP Members Only","color":"#00D36A","issueCount":2,"articleCount":5,"categoryGroupIds":[]},{"id":40673,"slug":"2af93c5c-3a2e-11ed-97e3-42010a800008","title":"PDF Only","color":"#444444","issueCount":2,"articleCount":0,"categoryGroupIds":[]}],"pwaSubscriptions":[{"id":4,"pwaId":1,"title":"All Access Membership","description":"Get instant access to all our awesome content: back issues, new issues \u0026 EXCLUSIVE video content especially for our VIP All Access Members.","image":"https://cdn.magloft.com/pwa-1/subscription/image/a0f017cc-0cf2-45ae-8d85-fb0a21793bb3.png","plans":[{"amount":4907,"interval":"year","intervalCount":1,"trialPeriodDays":7,"lookupKey":"4-4907-year-1","checkoutUrl":null}]},{"id":28,"pwaId":1,"title":"Premium Access","description":"Pay monthly or quarterly and get access to all opt-in, paid and subscriber content including back issues and new issues for the duration of your subscription. ","image":"https://cdn.magloft.com/pwa-1/subscription/image/3759670d-9891-4414-b72b-8be74de59e34.png","plans":[{"amount":699,"interval":"month","intervalCount":1,"trialPeriodDays":0,"lookupKey":"28-699-month-1","checkoutUrl":null},{"amount":1499,"interval":"month","intervalCount":3,"trialPeriodDays":3,"lookupKey":"28-1499-month-3","checkoutUrl":null}]},{"id":55,"pwaId":1,"title":"New Subscription","description":"This is the description","image":"https://cdn.magloft.com/pwa-1/subscription/image/07ff5cdf-6599-460a-b2b1-c150d58e641e.png","plans":[{"amount":10,"interval":"month","intervalCount":1,"trialPeriodDays":0,"lookupKey":"55-10-month-1","checkoutUrl":null},{"amount":20,"interval":"month","intervalCount":2,"trialPeriodDays":0,"lookupKey":"55-20-month-2","checkoutUrl":null}]}],"categoryGroups":[{"id":13,"slug":"category-group-13","categorieCount":2,"position":1,"title":"Test","color":"#444444","keywordPhrase":null,"description":"Test","image":null,"seoDescription":null}],"slug":"cyber-safety-its-relevance-and-what-21657764849","article":{"id":157858,"slug":"cyber-safety-its-relevance-and-what-21657764849","issueId":45660,"categoryIds":[40125],"title":"CYBER SAFETY: ITS RELEVANCE AND WHAT TO DO ABOUT IT","description":"Converted using MagLoft's Professional PDF to HTML Content Conversion Service","image":"https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg","cover":"https://cdn.magloft.com/publication-102/screenshots/articles/157858.jpg?ts=1657777619","date":1661356800000,"unlockType":"free","categories":[],"pdfPageId":"Vt9Zt7R1xh27","visible":true,"showOnToc":true,"bookmark":false,"position":3,"mediaResources":[],"publicationId":102,"pwaOptinId":null,"seoDescription":null,"classificationIds":[],"pwaSubscriptionIds":[],"source":"typeloft2","trending":false,"html":"\u003cpage-widget padding=\"0 0 24 0\" font-family=\"Crimson Text\"\u003e\u003cimage-widget aspect-ratio=\"0.374\" magnify-label=\"center\" source=\"https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg#image/jpeg\" flex=\"center center\"\u003e\u003cheading-widget padding=\"0 24 16 24\" align=\"center\" font-size=\"60\" type=\"h2\"\u003e\u003cspan style=\"font-family: \u0026quot;Roboto Mono\u0026quot;; color: rgb(255, 254, 254);\"\u003eCYBER SAFETY:\u0026nbsp;\u003cbr\u003e\u003c/span\u003e\u003cspan style=\"font-family: \u0026quot;Roboto Mono\u0026quot;; color: rgb(255, 254, 254);\"\u003eITS RELEVANCE\u003cbr\u003eAND WHAT TO\u003cbr\u003eDO ABOUT IT\u003c/span\u003e\u003c/heading-widget\u003e\u003cparagraph-widget padding=\"0 24 8 24\" align=\"center\" font-size=\"60\"\u003e\u003cspan style=\"font-family: \u0026quot;Roboto Mono\u0026quot;;\"\u003e\u003cspan style=\"color: rgb(255, 254, 254);\"\u003e// Leena Nyman, Mikko Vieltojärvi \u003c/span\u003e\u003cbr\u003e\u003cspan style=\"color: rgb(255, 254, 254);\"\u003e// Rainer Saks, Kari-Pekka Rannikko and Lucie Kadlecová (CybExer Technologies)1\u003c/span\u003e\u003c/span\u003e\u003c/paragraph-widget\u003e\u003c/image-widget\u003e\u003ccontainer-widget background-image=\"https://mms.magloft.com/ibdUfcEp5dRfaxZy/tje1cKx9T63mfUie#image/jpeg\"\u003e\u003ccontainer-widget padding=\"48 24 32 24\" background-color=\"rgba(0,0,0,0.53)\"\u003e\u003cparagraph-widget padding=\"24 24 24 24\" background-color=\"rgba(255,254,254,1)\" line-height=\"1.5\" font-size=\"90\"\u003eIt is undisputable that cyber security is to remain among the top global challenges for the decades to come. Different IT networks have become a core component of the critical infrastructure globally while their interconnectedness has grown exponentially. Despite the improvements in the quality of life stemming from this technological advancement, this also brings along serious cyber threats and risks. Cyber crime is the fastest growing branch of criminal activities worldwide. Different state-supported actors permanently enlarge their activities in cyber space. \u003cbr\u003e\u003cbr\u003eRemote work, forced upon us by the global pandemics, is to stay with us even in the future increasing the number of potential targets and challenges for cyber security systems of public institutions and enterprises. And the list goes on.\u003cbr\u003e\u003cbr\u003eAlthough the general awareness about these cyber threats has improved recently, especially among decision makers, it is still relatively poor. Many decision makers keep leaving the responsibility for cyber issues mainly to their IT departments while they omit rising cyber awareness among their employees and miss a chance to implement a complex top-down solution. This is the moment when cyber safety enters the picture.\u003cbr\u003e\u003cbr\u003e\u003c/paragraph-widget\u003e\u003cspace-widget\u003e\u003c/space-widget\u003e\u003cparagraph-widget padding=\"24 24 24 24\" background-color=\"rgba(255,254,254,1)\" line-height=\"1.5\" font-size=\"90\"\u003e\u003cspan style=\"font-family: \u0026quot;Roboto Mono\u0026quot;;\" class=\"__bold\"\u003eCYBER SAFETY VS. CYBER SECURITY\u003c/span\u003e\u003cbr\u003eCyber security is generally understood as the practice and application of technologies, processes and controls to protect systems and data from cyber attacks. In other words, it is group’s efforts and measures to protect its members from harm in cyber space. On the other hand, cyber safety can be described as part of social security of our society. \u003cbr\u003e\u003cbr\u003eSafety relates to a personal feeling of being free from danger and harm. Applied in cyber space, cyber safety is the feeling of citizens to operate safely in any sphere of activities using internet-based services. While cyber security is defined as measures and efforts in cyber space that are outside of an individual, cyber safety relates to individual’s inner feelings in respect to the online activities.\u003cbr\u003e\u003cbr\u003eThe individual’s feeling of cyber safety is influenced in two directions – from top-down and bottom-up. The top-down influence can be defined through external factors originating in authorities present in the individual’s life. For example, the feeling of cyber safety is in this case influenced by the cyber security regulations of an employer, national cyber-related policies and legislations, media’s reporting on cyber incidents, insurance policies for organizations or the maturity of service providers’ market.\u003cbr\u003e\u003cbr\u003eIn contrast, the bottom-up influence on an individual’s cyber safety feeling is based on the society and its general approach to cyber domain. This can, for instance, include the perception (or lack thereof) that cyber security is a citizen’s own responsibility, limited training and educational opportunities, lack of opportunities for insurance cover or understanding cyber threats as one of the security risks in a person’s life.\u003cbr\u003e\u003c/paragraph-widget\u003e\u003cspace-widget\u003e\u003c/space-widget\u003e\u003cparagraph-widget padding=\"24 24 24 24\" background-color=\"rgba(255,254,254,1)\" line-height=\"1.5\" font-size=\"90\"\u003e\u003cspan class=\"__bold\" style=\"font-family: \u0026quot;Roboto Mono\u0026quot;;\"\u003eEDUCATION AS THE FUNDAMENTAL CORNERSTONE OF CYBER SAFETY\u003c/span\u003e\u003cbr\u003e\u003cbr\u003eSuccessful cyber safety can only be achieved when the whole society is engaged, and comprehensive security thinking is employed. The bottom line for efficient cyber safety is professional and responsible security authorities, resistant critical infrastructure solutions and service providers and educated decision makers. Nevertheless, this all will not achieve a well-developed cyber safety if, first of all, a key factor is not addressed immediately and comprehensively – education of individuals, the centrepiece of cyber safety concept, on the topic of cyber security throughout all levels of society.\u003cbr\u003e\u003cbr\u003eThere is currently a need for cyber security skills across a wide swath of the educational and professional areas and each has different needs and require tailored approaches. Each category should have a pathway resulting in a Cyber Educational Development Plan. This plan is much like a Professional Development Plan; however, it describes a training and education pathway from the earliest years until professional roles. It provides information and develops skills how to be cyber safe not only at school and workplace but also at home and when on-the-go with a mobile device. We have identified and proposed the following four primary audience types.\u003cbr\u003e\u003cbr\u003e\u003cspan class=\"__bold\" style=\"font-family: \u0026quot;Roboto Mono\u0026quot;;\"\u003eFOUR PRIMARY CYBER EDUCATION AUDIENCE GROUPS\u003c/span\u003e\u003cbr\u003eFirstly, our attention has to be focused on the youth at primary (age of 6-10) and secondary (age of 11-18) education. If we want to achieve the point at which the whole society is educated on cyber issues, it does not suffice to start with cyber education only at university level. Already the education of students at primary level should be centred around basic cyber hygiene principles and progress to a level of knowledge preparing them for the higher classes. By the time students reach the senior classes of secondary education, they should be steeped in basic cyber security concepts and understand how those concepts interrelate with their courses (e.g., software development, biology, physics, etc.). Overall, the development plan should prepare them for university or any other type of post-secondary education.\u003cbr\u003e\u003cbr\u003eSecondly, university students should focus their attention at how cyber security, data analysis, and advanced topics such as machine learning or artificial intelligence might affect their current studies and what impact it might have upon their studies and profession as well as personal life later on in the future.\u003cbr\u003e\u003cbr\u003eWhile incorporating the cyber element into the school and university curricula, two more fundamental topics must also be kept in mind. It is absolutely essential that students are familiarized with ethical principles of their behaviour in cyber space from the very beginning.\u003cbr\u003e\u003cbr\u003eTo adopt the ethical way of acting in IT networks is core so that the students do not use their preciously acquired knowledge for malicious purposes later on. The other topic is to go beyond a theory of cyber security in the curricula and actually adopt an experiential learning, loosely defined as learning through reflection on doing.\u003cbr\u003e\u003cbr\u003eIn other words, students should not learn only theory, but schools must provide them with opportunities to train real skills. A hands-on experience is fundamental in cyber security. Our practical experience with trainings and exercises in our cyber range proves this point.\u003cbr\u003e\u003cbr\u003eThe third audience group for cyber security education is front-line professionals who are generally classified as information technology workers in that they are system/network administrators, database administrators, storage administrators, etc. Although their roles have a cyber security component, they are focused on administration, provisioning and other back-office support functions. However, because they are generally the experts on the systems and the first to notice anomalous activities, it is paramount that they not only understand the basics of cyber security but also specifics related to their devises and when to escalate to a Security Operations Centre, Incident Response Team, or other cyber security teams.\u003cbr\u003e\u003cbr\u003eFinally, the last audience group are cyber security professionals themselves. This group is the most in need globally. Training and education should begin with establishing a baseline of common knowledge. This baseline ensures that all participants have a common understanding of core concepts. From the baseline, participants then move into specialized knowledge required for their respective roles and still provide a pathway for advancement.\u003cbr\u003e\u003cbr\u003e\u003c/paragraph-widget\u003e\u003cspace-widget\u003e\u003c/space-widget\u003e\u003cparagraph-widget padding=\"24 24 24 24\" background-color=\"rgba(255,254,254,1)\" line-height=\"1.5\" font-size=\"90\"\u003e\u003cspan class=\"__bold\" style=\"font-family: \u0026quot;Roboto Mono\u0026quot;;\"\u003eTWO MORE AUDIENCE GROUPS WITH A NEED FOR A SPECIFIC APPROACH\u003c/span\u003e\u003cbr\u003eBesides the identified audience, there are two more groups to which a particular attention should be paid, and a specific approach adopted. The first group is the older generation which grew up at the times when internet was still a research project of DARPA. This is a particularly vulnerable audience which quickly needs to acquire the basic knowledge of cyber hygiene and elementary IT protection. Special educative programmes in that regards can be developed in cooperation with universities or NGOs while important role could be played by young people who might help to educate their grandparents and parents in cyber matters.\u003cbr\u003e\u003cbr\u003eThe other vulnerable group are girls and women in general. Overall, cyber security and IT is still misperceived as a primarily man-dominated industry throughout the society. This perception must start to get eroded already in the heads of the youngest generation. There is no objective reason to think that men are necessarily better than women in IT or cyber security. There is an urgent need for more IT and cyber security specialists and bringing more girls and women into the industry can significantly help to fill in this gap.\u003cbr\u003e\u003cbr\u003e\u003c/paragraph-widget\u003e\u003cspace-widget\u003e\u003c/space-widget\u003e\u003cparagraph-widget padding=\"24 24 24 24\" background-color=\"rgba(255,254,254,1)\" line-height=\"1.5\" font-size=\"90\"\u003e\u003cspan style=\"font-family: \u0026quot;Roboto Mono\u0026quot;;\" class=\"__bold\"\u003eMULTISTAKEHOLDER APPROACH TO EDUCATION AS THE WAY FORWARD FOR CYBER SAFETY\u003c/span\u003e\u003cbr\u003eTo make this complex educational structure successfully work, there is an urgent need for private and public sectors to cooperate closely. Private sector owns the resources necessary for cyber education, be it funding, knowhow, infrastructure or experts while public sector has the power to make the policies effective. We also must not forget about the role of academia. Lack of scientists, teachers and employees is massive but universities, in collaboration with private and public sectors, have the potential to help create functioning educative programmes and training courses for schools and general public.\u003cbr\u003e\u003cbr\u003eThe starting point for this multistakeholder cooperation could be briefer events like boot camps, corporate and government scholarships and internships which would serve as a basis for further, more complex initiatives and programmes.\u003cbr\u003e\u003cbr\u003eIn conclusion, this article introduced many different ways how to support and enhance education on cyber matters throughout the whole spectrum of society. All of them have, however, one thing in common – only\u0026nbsp;through the education of individuals on all the societal levels, we can strengthen the cyber safety of our citizens and ultimately empower the whole society in its feeling of being truly safe online. Cyber security, its principles and processes must be widely understood as a collective responsibility, but that will not be achieved unless every citizen is educated in at least basic cyber security principles, understands the importance thereof and sees the relevance of feeling cyber safe.\u003cbr\u003e\u003c/paragraph-widget\u003e\u003cspace-widget\u003e\u003c/space-widget\u003e\u003cparagraph-widget padding=\"0 24 8 24\" line-height=\"1.5\" font-size=\"90\"\u003e\u003cspan style=\"color: rgb(255, 254, 254);\"\u003e1 We would like to thank Mr. Kevin Estis for his original thoughts on the complex approach to cyber education in the society.\u003c/span\u003e\u003c/paragraph-widget\u003e\u003c/container-widget\u003e\u003c/container-widget\u003e\u003cparagraph-widget padding=\"40 24 40 24\" align=\"center\" font-size=\"80\"\u003e\u003cspan style=\"font-family: Arimo;\"\u003eCybExer Technologies is a NATO-awarded Estonian cyber security company. CybExer's flagship solution is its proprietary cyber range and highly realistic cyber security exercises conducted on the range. Its capabilities and solutions have been used to conduct some of the world's largest cyber exercises.\u003cbr\u003e\u003cbr\u003e\u003cspan class=\"__bold\"\u003eRainer Saks:\u003c/span\u003e\u003cbr\u003eBoard Member (CybExer Technologies)\u003cbr\u003e\u003cbr\u003e\u003cspan class=\"__bold\"\u003eKari-Pekka Rannikko:\u003c/span\u003e\u003cbr\u003eSenior Advisor (CybExer Technologies)\u003cbr\u003e\u003cbr\u003e\u003cspan class=\"__bold\"\u003eLucie Kadlecová:\u003c/span\u003e\u003cbr\u003eSenior Associate (CybExer Technologies)\u003cbr\u003e\u003c/span\u003e\u003c/paragraph-widget\u003e\u003ccolumns-widget padding=\"0 32 0 32\" collapse=\"phone\" gutter=\"16\"\u003e\u003ccolumn-widget\u003e\u003cimage-widget padding=\"8 0 8 0\" aspect-ratio=\"1.3333333333333333\" magnify-label=\"center\" source=\"https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx#image/png\"\u003e\u003c/image-widget\u003e\u003cparagraph-widget padding=\"8 16 8 16\" background-color=\"rgba(56,92,219,1)\" align=\"center\" font-size=\"90\"\u003e\u003cspan style=\"color: rgb(255, 254, 254);\"\u003eRAINER SAKS\u003c/span\u003e\u003c/paragraph-widget\u003e\u003cparagraph-widget padding=\"16 0 8 0\" font-size=\"80\"\u003e\u003cspan style=\"font-family: Arimo;\"\u003eRainer Saks joined Cybexer Technologies OÜ as member of Management Board in late 2020.\u0026nbsp;\u003c/span\u003e\u003cspan style=\"font-family: Arimo;\"\u003eHe is responsible for government relations and some of the research and development projects in the company. He worked as a civil servant for Estonian Republic between 1999- 2020. Rainer Saks worked as a Government Security Coordinator, Director of the Office of the President of Estonian Republic, Director-General for Foreign Intelligence Service and finally as a Secretary General for Ministry of Foreign Affairs. He has a long experience in dealing with foreign and security policy issues and strategic planning.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003c/paragraph-widget\u003e\u003c/column-widget\u003e\u003ccolumn-widget\u003e\u003cimage-widget padding=\"8 0 8 0\" aspect-ratio=\"1.3333333333333333\" magnify-label=\"center\" source=\"https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y#image/png\"\u003e\u003c/image-widget\u003e\u003cparagraph-widget padding=\"8 16 8 16\" background-color=\"rgba(56,92,219,1)\" align=\"center\" font-size=\"90\"\u003e\u003cspan style=\"color: rgb(255, 254, 254);\"\u003eLUCIE KADLECOVÁ\u003c/span\u003e\u003c/paragraph-widget\u003e\u003cparagraph-widget padding=\"16 0 8 0\" font-size=\"80\"\u003e\u003cspan style=\"font-family: Arimo;\"\u003eLucie Kadlecová works as a Senior Associate (Strategy and Threat Intelligence) and the company’s representative in the Czech Republic in CybExer Technologies. Previously, Lucie served as a cyber security and policy specialist in National Cyber Security Centre of the Czech Republic and as a trainee in Cyber Defence Section, Emerging Security Challenges Division at NATO HQ in Brussels.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"font-family: Arimo;\"\u003eShe was also a visiting scholar on Fulbright scholarship at Massachusetts Institute of Technology (MIT), Cambridge, USA. Besides her professional career, Lucie works as a postdoctoral researcher in Peace Research Centre Prague focusing on the study of states’ behaviour in cyber space. She holds a PhD from Charles University in Prague and an MA degree with distinction from War Studies Department, King’s College London.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003c/paragraph-widget\u003e\u003c/column-widget\u003e\u003ccolumn-widget\u003e\u003cimage-widget padding=\"8 0 8 0\" aspect-ratio=\"1.3333333333333333\" magnify-label=\"center\" source=\"https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq#image/png\"\u003e\u003c/image-widget\u003e\u003cparagraph-widget padding=\"8 16 8 16\" background-color=\"rgba(56,92,219,1)\" align=\"center\" font-size=\"90\"\u003e\u003cspan style=\"color: rgb(255, 254, 254);\"\u003eKARI-PEKKA RANNIKKO\u003c/span\u003e\u003c/paragraph-widget\u003e\u003cparagraph-widget padding=\"16 0 8 0\" font-size=\"80\"\u003e\u003cspan style=\"font-family: Arimo;\"\u003eCol (Ret.) Kari Rannikko joined CybExer Technologies OÜ strategy team 2020 as Senior Advisor focusing on hybrid threats and strategic decisionmaking. His academic interests are focused on EU’s Integrated Approach to Crisis Management, which he is realizing as a senior instructor in Finnish Defence Forces International Centre. In 2019 Kari-Pekka served as the Project Manager in Prime Minister’s office of Finland during country’s EU Presidency.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\"font-family: Arimo;\"\u003eHe was responsible for Scenario Based Policy Discussions on Countering Hybrid Threats. Kari-Pekka has a long experience in dealing defence policy issues on the strategic level.\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\u003c/paragraph-widget\u003e\u003c/column-widget\u003e\u003c/columns-widget\u003e\u003c/page-widget\u003e","keywordPhrase":"cyber safety its relevance and what","articleAssets":[{"url":"https://mms.magloft.com/ibdUfcEp5dRfaxZy/jaOgdm4BWq2LahCq","extension":"png","contentType":"image/png"},{"url":"https://cdn.magloft.com/reader/fonts/roboto-mono.css","extension":"css","contentType":"text/css"},{"url":"https://mms.magloft.com/ibdUfcEp5dRfaxZy/QZ5ik7LzoTLpUfjx","extension":"png","contentType":"image/png"},{"url":"https://cdn.magloft.com/pdf-import/447/images/img_4-1.jpg","extension":"jpeg","contentType":"image/jpeg"},{"url":"https://mms.magloft.com/ibdUfcEp5dRfaxZy/tje1cKx9T63mfUie","extension":"jpeg","contentType":"image/jpeg"},{"url":"https://cdn.magloft.com/reader/fonts/arimo.css","extension":"css","contentType":"text/css"},{"url":"https://mms.magloft.com/ibdUfcEp5dRfaxZy/pjNmDOLyi7wuqY6Y","extension":"png","contentType":"image/png"},{"url":"https://cdn.magloft.com/reader/fonts/crimson-text.css","extension":"css","contentType":"text/css"}]},"publicationId":102},"__N_SSG":true},"page":"/domains/[domain]/articles/[slug]","query":{"domain":"pwa.magloft.com","slug":"cyber-safety-its-relevance-and-what-21657764849"},"buildId":"Kev2Q3R5ZPSsq42hjt5aX","isFallback":false,"gsp":true,"scriptLoader":[]}</script></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10