Training on the topic: “Cybergigien”

On July 6, 2022, a training was held for members of the Public Association “Lawyers of the Fergana Valley without Borders” on the topic: “Cybergigien”.

Speaker Khalil Ibrahim held a training session on cyber hygiene, talked about different ways to protect devices, as well as secure communication, namely, how to protect communications in messengers using VPN.

After the end of the training part, the participants asked the questions they were interested in and received exhaustive answers to them.

_________
Learn more about cybersecurity with us.
Protect yourself from cyber attacks, contact Tech4Society!

Two-factor authentication

Imagine that a fraudster has found out your password and wants to log into your Instagram to ask for money from friends on your behalf. He enters the password, enters the application and starts sending out pitiful messages that supposedly you urgently need help. Your friends are worried and send money. Later you come in and realize that you have been hacked, and the scammers have already received a significant amount from a lot of people.

It’s good that there is a way to protect yourself from hacking — this is two-factor authentication.

If you have enabled two-factor authentication, the situation will develop differently. The fraudster will enter the password, but will not log in to the account, because you need to specify the code from the Application (google authenticator) that will come to your phone or application. If the fraudster does not have access to your phone, then he will not get access to your profile.

If you didn’t have time to connect it or don’t know what it is, it’s worth spending a few minutes on this publication and protecting your profiles.

How do I know if you’ve been hacked?

If not every day, then quite often we can observe in the news headlines that a particular company, organization, firm was hacked and lost the data of its millions of users due to a hacker attack, a zero-day exploit, a software glitch or because of the “straightforwardness” of the hands of its programmers.

It is possible that a social network, applications, an online game or another Internet resource that we regularly use has already been among the hacked ones or may be in the future.

How do I know if you are a victim? Have you been hacked? How do I determine if you have an account (login, email address) that has been compromised in a data breach? Do you have a strong password or is it completely insecure? How to prevent a potential hacking threat?

haveibeenpwned service – will help us with this. Let’s take a closer look at what it is and how it works.

__________________________

Source: http://withsecurity.ru/kak-uznat-byl-li-ya-vzloman-have-i-been-pwned-hibp

TECHNICAL ASSISTANCE CALL CENTER FOR NGOS

❓ If you have become a victim of a cyber incident, then where to turn in this case?

👩🏻‍💻 👨🏻‍💻 In all incidents related to data privacy, computer security and cyber attacks, you can now contact us – the Tech4society technical assistance call center.

Our call center is available in Russian and Kyrgyz, 24 hours, 7 days a week.
And we are committed to processing your requests within 12 hours (maximum).

📞 How to contact us?
1. Via the SIGNAL application at 996 501 551 029;
2. Via email [email protected] .

❗ And also you can contact us by number +996 501 551 029 using traditional methods (calls, WhatsApp, Telegram), but in this case, you should be aware of all the risks associated with data privacy (unencrypted communications, closed application code, etc.).

Cybersecurity training

On June 28, 2022, a Cybersecurity training was held for @poliklinika, the speaker was Khalil Ibrahim Bilgich and Altynai Bakytbekova, members of the Tech4Society team.

The speakers told:
– the importance of cybersecurity
– about what is cyber hygiene and why is it necessary?
– cases of victims of cyber attacks
– about how to protect yourself.

They also shared information about the project and about the opportunities provided for NGOs within the framework of the project.

Together with the staff of politklinika.We tested the Pi guard VPN device.

_____________
Learn more about cybersecurity with us.
Protect yourself from cyber attacks, contact Tech4Society!

Online cybersecurity training

On June 30, 2022, within the framework of the Online Communities Accelerator project, an online Cybersecurity training was held, a guest speaker was a member of the Tech4Society team, Khalil Ibrahim Bilgich. He shared the basics of cybersecurity, Internet hygiene, safe online work and other useful and necessary information for non-governmental organizations. He also spoke about the project and shared contacts for contacting about the organization of training events on cybersecurity and the possibility of obtaining free scanning of web services for NGOs.

The participants of the event were: representatives of non-governmental organizations that work in various fields: the Association of Community Media, OF TB poeple, OF Tekayim, the Institute of Public Analysis, the Center for Civic Development, of Shoola Kol for Early Intervention.

Within the framework of the Online Communities Accelerator program, 11 coaching sessions are planned, as well as mentoring sessions to launch online campaigns. The project participants will pay attention to the topics that took place in the trainings and will use them when conducting online campaigns. From July 11, all participants will launch their online campaigns through various online platforms and social media.

_________________
Learn more about cybersecurity with us.
Protect yourself from cyber attacks, contact Tech4Society!

Get a vulnerability scan of websites absolutely for free!

Let’s explain the vulnerability scanning process using an example of a clear idea: Imagine that you wanted to know the level of security of your home.
Some countries have such services. You have called a specialist, signed a document or an agreement. He will start from the street, check:
– how easy is it to open the gate;
– reliability of locks;
– is it easy to climb over the fence;
– how easy it is to deceive the security system, blind cameras and sensors.
After entering the territory of your site, he tries to enter the house: he will check the door locks, whether it is possible to get through the windows, roof or balcony. If you have a smart home system, then he may be trying to hack it. After entering the house, he will check the security of all rooms, as well as whether you are securely storing your valuables, weapons or other important things.
After all the procedures are completed, a report will be compiled for you, vulnerabilities will be shown, tips and recommendations will be given that it is necessary to fix and strengthen protection.

Similarly, the vulnerability scanner program will break through each level of protection of your website and at the end will make a report with the results.

Our team will give you explanations and explanations on the results of the report in Russian and Kyrgyz.

How to get this service:
Write to us by email: [email protected]
Phone number(can be contacted by Signal): +996501551029

Before sending a scan request, read the terms of the agreement at the link: https://isoc.kg/ru/news/tech4society/scanagreement/