{"id":402,"date":"2017-01-04T18:57:52","date_gmt":"2017-01-04T18:57:52","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/security-education-and-social-responsibility\/"},"modified":"2019-05-29T11:59:43","modified_gmt":"2019-05-29T11:59:43","slug":"security-education-and-social-responsibility","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/","title":{"rendered":"Security education and social responsibility"},"content":{"rendered":"<p class=\"wls-paragraph\">There is a scam that has dwelt amongst us for many years and 2016 marked the second decade of its spread via email. Millions upon millions of online users have encountered it, but despite many being able to recognize it, the reality is that there are still people who are deceived by it. For some it\u2019s down to naivety and ignorance; for others simple curiosity. In the end, they all end up as victims.<\/p>\n<p class=\"wls-paragraph\">In case it\u2019s not clear what I\u2019m referring to, it is the infamous \u201c<a href=\"http:\/\/www.welivesecurity.com\/2014\/07\/10\/nigerian-scams-expand-to-malaysia\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nigerian scam<\/a>\u201d or \u201c419 scam\u201d. This type of fraud can be traced back to the aftermath of the French Revolution and probably goes back even earlier than that, with anonymous letters being sent through the post with vivid descriptions of lucrative treasure on offer for nothing in return.<\/p>\n<p class=\"wls-paragraph\">However, this century-old scam, far from disappearing, has only gained strength with the advance of technology and, over time, has spawned many variants which eventually migrated to email. Scams that offer something for nothing, but turn out to require some form of advance payment \u2013 in return for empty promises of a reward \u2013 are often referred to as Advance Fee Fraud.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91166\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_202818121.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_202818121.jpg 640w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_202818121-300x192.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_202818121-65x42.jpg 65w\" alt=\"\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Still, after so many years, we still see messages on social networks and websites with the same type of ploy: \u201cYou are visitor number 1,000,000!\u201d; \u201cYou won the lottery!\u201d; \u201cYou have been selected for a dream holiday trip!\u201d, etc. These are just a few examples of the fraudulent rewards wafted under people\u2019s noses.<\/p>\n<p><span class=\"block_quote_right\">\u201cPeople still remain vulnerable to psychological manipulation and social engineering.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">As computer threats have continuously evolved to reach the level of sophistication we see nowadays \u2013 targeted attacks, cyberwarfare and APTs \u2013 it\u2019s unclear why these types of scams have remained so successful. The simple answer is that people still remain vulnerable to psychological manipulation and social engineering.<\/p>\n<p class=\"wls-paragraph\">The simple answer is that people still remain vulnerable to psychological manipulation and social engineering.<\/p>\n<p class=\"wls-paragraph\">Just five years ago, in our <u><a href=\"http:\/\/eset.si\/us\/presscenter\/press-releases\/article\/eset-2013-threat-trends-report-mobile-malware-botnets-attacks-on-the-cloud-and-data-breaches-expected-to-grow\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trends for 2012 report<\/a><\/u>, we talked about the growing trend of malware in mobile devices, spearheaded by threats such as botnets. In more recent years, these risks have continued to spread. We are seeing increases in cyber espionage, targeted attacks and privacy threats.<\/p>\n<p class=\"wls-paragraph\">Previous concerns about the vulnerability of many poorly-secured IoT devices have been realized with them falling victim to attacks. Furthermore, we believe that throughout this year, the number of annual victims of ransomware will continue to rise.<\/p>\n<p class=\"wls-paragraph\">All of these types of threats, which have developed over time, have one thing in common: the point of entry is often the user. Attackers continue to entice victims with deceptive emails and messages on social media, encouraging na\u00efve \u2013 and in many cases, irresponsible (albeit unknowingly) \u2013 behavior. These threats, including booby-trapped USB devices left in car parks, are all designed to trick victims into compromising the safety of their own systems.<\/p>\n<p class=\"wls-paragraph\">Unfortunately, this reality is set to continue throughout the rest of 2017 and beyond, and attackers will continue to take advantage of it. Despite the potential vulnerabilities in hardware and software that could allow an attacker to take control of a system, the simplest way for cyberattackers to do this is by tricking users.<\/p>\n<p><span class=\"block_quote_right\">\u201cWe are seeing increases in cyberespionage, targeted attacks and privacy threats.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">Why invest hours in exposing a flaw in a device when a simple email can provide the same type of access to such systems? Similarly, why would thieves make the effort to dig a tunnel to break into a house when they could just ring the doorbell?<\/p>\n<h2><strong>Cybercrime: Ruthless and efficient<\/strong><\/h2>\n<p class=\"wls-paragraph\">It seems likely that for the remainder of 2o17, we will see different types of malicious code continue to emerge; that ransomware will continue its infamous reign as the fastest growing threat, and that more IoT devices will be targeted for a broader range of cybercriminal activity. <u><a href=\"http:\/\/www.welivesecurity.com\/2016\/07\/07\/ruthless-cybercriminals-pose-major-threat-organizations\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybercriminals are becoming increasingly ruthless<\/a><\/u>, to the point that even industries such as healthcare are being attacked, and infrastructural components such as ATMs (cash dispensers) are continually targeted by attackers.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91167\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_348158087.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_348158087.jpg 640w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_348158087-300x192.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_348158087-65x42.jpg 65w\" alt=\"\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Furthermore, in 2016 it became clear that modern cybercriminals come armed not only with different types of malicious software and social engineering techniques, <u><a href=\"http:\/\/www.welivesecurity.com\/2016\/12\/08\/cybercrime-business-model-value-chain\/\" target=\"_blank\" rel=\"noopener noreferrer\">but also with \u201cbusiness plans\u201d<\/a><\/u> for extortion and extracting some sort of payment from their victims.<\/p>\n<p><span class=\"block_quote_right\">\u201cCybercriminals are becoming increasingly ruthless, to the point that even industries such as healthcare are being attacked.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">We have reached the point at which we need to stop talking about security risks in generic terms. It is critical that users, whether corporate or individual, are aware of the types of attacks that can affect them. From email fraud to information theft, all threats must be taken seriously, and it is important to take the necessary measures both in terms of technology and raising awareness, in order to avoid them.<\/p>\n<h2><strong>Good education is not age-dependent<\/strong><\/h2>\n<p class=\"wls-paragraph\">Two types of players inhabit the digital world and they can be described as \u201cdigital natives\u201d and \u201cdigital immigrants\u201d. The former have incorporated the use of technology into most aspects of their lives from an early age. The latter, on the other hand, use technology to carry out many of their daily activities despite having had to adapt and make adjustments in order to do so.<\/p>\n<p class=\"wls-paragraph\">One would hope that the digital natives would be less susceptible to these types of scams. However, last year <u><a href=\"http:\/\/www.bbb.org\/2016scamriskreport\/\" target=\"_blank\" rel=\"noopener noreferrer\">a study by the BBB Institute<\/a><\/u> showed that young people between age 25 and 34 are more susceptible to scams, whereas other studies show that it\u2019s the&nbsp;youngest users who exhibit the riskiest behavior when it comes to surfing the internet. They might connect to poorly secured Wi-Fi networks, plug in USB devices given to them by others without taking elementary precautions, and make little use of security solutions.<\/p>\n<p><span class=\"block_quote_right\">\u201cFrom email fraud to information theft, all threats must be taken seriously.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">On the other hand, while digital immigrants can often be more cautious when it comes to using technology, we find that they too can often be the victims of attacks or engage in unsafe behavior. Generally, this is due to a lack of knowledge of the security characteristics of devices, or a lack of information regarding the scope of computer threats and the care that they should take to help avoid them.<\/p>\n<p class=\"wls-paragraph\">In short, when it comes to protection, age does not matter. The need for all users to be aware of the many threats, the ways in which they operate, and the best options for protecting their devices, are all issues&nbsp;on which users should be focused in order to stay safe.<\/p>\n<h2><strong>The current paradox: The more we know, the less safe we feel<\/strong><\/h2>\n<p class=\"wls-paragraph\">There is no doubt that today, almost four years after the <u><a href=\"http:\/\/www.welivesecurity.com\/2014\/06\/05\/snowden-nsa-revelations-anniversary-face-impact\/\" target=\"_blank\" rel=\"noopener noreferrer\">Snowden revelations<\/a><\/u>, people continue to feel their personal data is increasingly at risk. The paradox is that in reality, there is more information about what is happening with their data than ever before.<\/p>\n<p><span class=\"block_quote_right\">\u201cA challenge we face is the need to educate ourselves about online protection.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">The feeling of being monitored is a big concern for many users and recognition of the reality of global surveillance is one of the <u><a href=\"http:\/\/www.welivesecurity.com\/2013\/09\/11\/encryption-advice-for-companies-in-the-wake-of-snowden-nsa\/\" target=\"_blank\" rel=\"noopener noreferrer\">most important lessons<\/a><\/u> to be learned from the Snowden revelations. If someone is authorized to act covertly and is given a large enough budget, it cannot be assumed \u2013 regardless of their personality \u2013 that they will do so properly, ethically and without negative repercussions.<\/p>\n<p class=\"wls-paragraph\">Having said that, neither should we give way to out-and-out paranoia or stop connecting to the internet altogether. An important challenge we face is the need to educate ourselves about <u><a href=\"http:\/\/www.welivesecurity.com\/2017\/01\/27\/worrying-data-privacy-isnt-enough-heres-online-presence\/\" target=\"_blank\" rel=\"noopener noreferrer\">online protection<\/a><\/u>, what types of information to publish, and which measures will ensure that information remains safe and private.<\/p>\n<h2><strong>Small changes can make a big difference<\/strong><\/h2>\n<p class=\"wls-paragraph\">At ESET we firmly believe that security is not only a matter of technological solutions, but we also need to help each other when it comes to protection. While ongoing efforts to build awareness around computer security exist in many areas of our modern lives, many computer users still do not have sufficient training on this topic. In addition, while many recognize the threats to their computers, they do not have the same awareness when it comes to their mobile devices and even less with regard to their IoT devices.<\/p>\n<p class=\"wls-paragraph\">In 2013, it was estimated that the ratio between the number of mobile devices with a security solution installed and the <a href=\"http:\/\/www.gsma.com\/mobileeconomy\/archive\/GSMA_ME_2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><u>number of global connections from mobile devices <\/u><\/a>was 4.8%, and by 2018 it is estimated that this ratio could reach 15%. Although this represents a tripling in five years, it means fewer than one in six smartphones and tablets is running security software.<\/p>\n<p><span class=\"block_quote_right\">\u201cIt is vital to be aware of security at all times from personal devices with a Wi-Fi connection, to critical infrastructure.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">In the coming years, we will see threats continue to spread to all types of devices that are connected to the internet, and which handle sensitive data. Therefore, it is vital to be aware of security at all times and in all contexts, from personal devices with a Wi-Fi connection to critical infrastructure that is connected and remotely controlled via the internet.<\/p>\n<p class=\"wls-paragraph\">Technology\u2019s rapid advance equips cybercriminals with increasing number of tools they can use for cyberattacks, and this won\u2019t stop if users are not educated about them. We cannot allow its increasing sophistication to enable&nbsp;it to turn against us.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91169\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_266043962.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_266043962.jpg 640w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_266043962-300x192.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_266043962-65x42.jpg 65w\" alt=\"password\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Going forward, means of protection must keep pace with the realities of cybercrime. This is why education is vital. If users come to recognize that using passwords as the sole means of online access presents a security risk to their personal data, then they can also recognize that using <u><a href=\"http:\/\/www.welivesecurity.com\/2014\/02\/11\/two-factor-authentication-what-is-it-and-why-do-i-need-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">two-factor authentication<\/a><\/u>, which adds a significant extra layer of security, will tilt the odds back in their favor.<\/p>\n<p class=\"wls-paragraph\">The challenge, in addition to enabling them to recognize the threats, is to arm them with security tools that help them keep their information safe and secure. In the absence of such tools, the continued growth of threats and attacks is all but guaranteed.<\/p>\n<p class=\"wls-paragraph\">Likewise, the best way to guarantee the confidentiality of information is to make use of <u><a href=\"http:\/\/www.welivesecurity.com\/videos\/what-is-encryption-and-how-does-it-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">encryption<\/a><\/u> technologies for all forms of communication. As for ransomware, the best way to protect yourself from permanent loss of personal information is ensuring proper \u2013 including offline \u2013 <u><a href=\"http:\/\/www.welivesecurity.com\/2015\/03\/31\/6-ways-to-back-up-your-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">backups<\/a><\/u> are in place for the most sensitive or important data.<\/p>\n<p class=\"wls-paragraph\">However, the adoption of these technologies starts by acknowledging the threats, which can only happen if there is a base of users who are educated and able to determine what they should be protecting themselves from, and thus the best way to protect themselves.<\/p>\n<h2><strong>Education makes a big difference<\/strong><\/h2>\n<p class=\"wls-paragraph\">For all of us working in the world of information security, no maxim has proven truer than that which says <a href=\"http:\/\/www.welivesecurity.com\/2016\/09\/08\/business-security-securing-data-weak-points\/\" target=\"_blank\" rel=\"noopener noreferrer\">the weakest link in the chain is the end user<\/a>.<\/p>\n<p><span class=\"block_quote_right\">\u201cThe focus of the immediate future should be on building awareness among users of basic Internet security measures.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">We have been warned since at least 2015 that there is an increasing volume of information available to defend ourselves, but the number of people who are skilled enough to perform the tasks necessary for that defense is dangerously low.<\/p>\n<p class=\"wls-paragraph\">We must, therefore, see education as the fundamental factor&nbsp;that makes the difference. Given that training new professionals to work in information security will not happen immediately, the focus of the immediate future should be on building awareness* among users of basic internet security measures.<\/p>\n<p class=\"wls-paragraph\">So, the big challenge for those of us who are responsible for security is to turn ourselves into the first line of defense of information.<\/p>\n<p class=\"wls-paragraph\">Educating users about current threats and how they spread can make all the difference in reducing the impact of cybercrime in the future. We should not forget that security is the responsibility of everyone and not exclusive to those of us working in IT.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91146\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_405274327.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_405274327.jpg 640w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_405274327-300x192.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/03\/shutterstock_405274327-65x42.jpg 65w\" alt=\"\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">These days, information is equally critical whether handled by a reporter or by an executive; and even more sensitive for healthcare professionals and the medical records they handle on a daily basis. Active participation by governments and companies to protect this information is necessary.<\/p>\n<p class=\"wls-paragraph\">We have reached a point where education on security issues must be handled in a formal manner, and companies should not simply relegate these issues to be covered as a one-off when inducting new employees. It must be a continuous and ongoing effort. End users must feel they are a part of the entire security chain and must understand firstly that these threats do exist, and secondly, that the necessary mechanisms to use technology securely also exist.<\/p>\n<p class=\"wls-paragraph\"><i>This article is an adapted version of the corresponding section from ESET\u2019s 2017 trends paper, <\/i><a href=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2016\/12\/ESET-Trends-2017-security-held-ransom.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><i>Security Held Ransom<\/i><\/a><i>.<\/i><\/p>\n<p class=\"wls-paragraph\"><em>*If you are interested in boosting your employees\u2019 skills and understanding, check out ESET\u2019s free <a href=\"https:\/\/www.eset.com\/us\/cybertraining\/?cmp=rfc-esetint-B2B2017-GenIT-textlink-PR\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Awareness Training<\/a>, which covers everything you need to know.<\/em><\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/05\/04\/security-education-social-responsibility\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a scam that has dwelt amongst us for many years and 2016 marked the second decade of its spread via email. Millions upon millions of online users have encountered it, but despite many being able to recognize it, the reality is that there are still people who are deceived by it. For some<\/p>\n","protected":false},"author":5,"featured_media":1812,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[164],"tags":[],"class_list":["post-402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security education and social responsibility - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security education and social responsibility\" \/>\n<meta property=\"og:description\" content=\"There is a scam that has dwelt amongst us for many years and 2016 marked the second decade of its spread via email. Millions upon millions of online users have encountered it, but despite many being able to recognize it, the reality is that there are still people who are deceived by it. For some\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-04T18:57:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:59:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_535428454-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Security education and social responsibility\",\"datePublished\":\"2017-01-04T18:57:52+00:00\",\"dateModified\":\"2019-05-29T11:59:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/\"},\"wordCount\":2146,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_535428454-623x410.jpg\",\"articleSection\":[\"password\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/\",\"name\":\"Security education and social responsibility - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_535428454-623x410.jpg\",\"datePublished\":\"2017-01-04T18:57:52+00:00\",\"dateModified\":\"2019-05-29T11:59:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_535428454-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_535428454-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security education and social responsibility\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/04\\\/security-education-and-social-responsibility\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security education and social responsibility - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/","og_locale":"en_US","og_type":"article","og_title":"Security education and social responsibility","og_description":"There is a scam that has dwelt amongst us for many years and 2016 marked the second decade of its spread via email. Millions upon millions of online users have encountered it, but despite many being able to recognize it, the reality is that there are still people who are deceived by it. For some","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-04T18:57:52+00:00","article_modified_time":"2019-05-29T11:59:43+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_535428454-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Security education and social responsibility","datePublished":"2017-01-04T18:57:52+00:00","dateModified":"2019-05-29T11:59:43+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/"},"wordCount":2146,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_535428454-623x410.jpg","articleSection":["password"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/","name":"Security education and social responsibility - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_535428454-623x410.jpg","datePublished":"2017-01-04T18:57:52+00:00","dateModified":"2019-05-29T11:59:43+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_535428454-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_535428454-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Security education and social responsibility"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/04\/security-education-and-social-responsibility\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1812"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}