{"id":14968,"date":"2025-09-12T15:52:58","date_gmt":"2025-09-12T12:52:58","guid":{"rendered":"https:\/\/grow.ee\/?p=14968"},"modified":"2025-09-15T17:15:28","modified_gmt":"2025-09-15T14:15:28","slug":"we-create-a-safer-cyber-environment","status":"publish","type":"post","link":"https:\/\/grow.ee\/en\/loome-turvalisemat-kuberkeskkonda\/","title":{"rendered":"We create a safer cyber environment"},"content":{"rendered":"<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_229773184\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1555\" height=\"1017\" src=\"https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024.png\" class=\"attachment-original size-original\" alt=\"\" srcset=\"https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024.png 1555w, https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024-300x196.png 300w, https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024-720x471.png 720w, https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024-768x502.png 768w, https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024-1536x1005.png 1536w, https:\/\/grow.ee\/wp-content\/uploads\/2025\/09\/Ulvi-GGI-Tallinn-2024-18x12.png 18w\" sizes=\"auto, (max-width: 1555px) 100vw, 1555px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_229773184 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\n\t<div id=\"gap-149801417\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-149801417 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<p>I recently went&nbsp;<strong>At the GGI Nordic-Baltic Meeting&nbsp;<\/strong>In Helsinki, where I spoke on the topic&nbsp;<strong>Shaping a Safer Cyberspace<\/strong>. When I mentioned that I was going to talk about cybersecurity, I initially got a lot of surprised looks \u2013 as if it wasn&#039;t my field. But that confirmed to me that I was on the right track, because cyber hygiene shouldn&#039;t be just the preserve of IT professionals. It&#039;s a topic that everyone should know about and that everyone can share something about.<\/p>\n<p>Cybercrime has changed significantly in recent years. While it used to seem like Estonians were protected by their small and special language and we had almost no phishing emails in proper Estonian, now the picture is different. Big language models have made our language accessible to criminals, and this means that even our small, safe language no longer protects us.<\/p>\n<h2 id=\"h-jagame-lugusid\" class=\"wp-block-heading\">We share stories<\/h2>\n<p>As an entrepreneur, it is crucial for me to understand how cybercriminals operate. Only then can we reduce the risks or avoid them altogether. Cybersecurity is not just about firewalls and complex passwords \u2013 it is above all about human awareness.<\/p>\n<p>Most cyber incidents start with human error or ignorance. The victim can be an employee, manager or owner, or an external partner with access to the company&#039;s systems. Therefore, sharing stories and experiences is one of the most effective ways to learn from each other and put the brakes on the plans of criminals.<\/p>\n<h2 id=\"h-kes-on-sihtmargid\" class=\"wp-block-heading\">Who are the targets?<\/h2>\n<p>Forget the outdated notion that only tech-savvy grandmothers fall victim to cyber fraud. Today&#039;s target groups are much more strategically chosen, including:<\/p>\n<ul class=\"wp-block-list\">\n<li>business leaders,<\/li>\n<li>financial managers,<\/li>\n<li>accountants and<\/li>\n<li>companies providing accounting services.<\/li>\n<\/ul>\n<p>These are people and organizations that have access to major financial assets and valuable data, the latter for which it is possible to demand a hefty ransom.<\/p>\n<h2 id=\"h-kuidas-kasvatada-kuberteadlikkust\" class=\"wp-block-heading\">How to raise cyber awareness?<\/h2>\n<p>If your field of activity is not exactly IT services, start with your IT partner. Together, it is worth reviewing the company&#039;s processes, looking for weaknesses, and doing this regularly.<\/p>\n<ul class=\"wp-block-list\">\n<li>Continuously train your employees so they can use equipment and software safely.<\/li>\n<li>Review your systems and add an extra layer of security if necessary. Sometimes multi-level login is enough, and sometimes just adding one additional acceptor is enough.<\/li>\n<li>Understand that there is no 100% protection \u2013 but by acting consciously and having insurance coverage, the risks can be significantly reduced.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>If an attack does occur, the most important thing is to respond quickly. Immediately notify the person responsible in your company and take immediate action to minimize the damage.<\/p>\n<h2 id=\"h-ole-julge-ja-jaga-oma-lugu\" class=\"wp-block-heading\">Be brave and share your story.<\/h2>\n<p>Cybercriminals hope that victims will remain silent. When we speak out about our experiences, we help break the pattern of criminals and give others a chance to learn.<\/p>\n<h2 id=\"h-meelespea\" class=\"wp-block-heading\">Reminder<\/h2>\n<p>The most important basics that anyone can follow:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Do not enter PIN codes.<\/strong>&nbsp;or passwords unless you initiated the action yourself \u2013 even if the caller claims to be from the police, tax office, or bank.<\/li>\n<li>Use&nbsp;<strong>unique and strong passwords<\/strong>&nbsp;and, if necessary, a password manager.<\/li>\n<li>Turn on&nbsp;<strong>two-factor authentication (2FA)<\/strong>&nbsp;on all important accounts.<\/li>\n<li>Keep yours&nbsp;<strong>operating system and software up to date<\/strong>, make regular updates.<\/li>\n<li>Use&nbsp;<strong>reliable antivirus<\/strong>&nbsp;and firewall.<\/li>\n<li>Do not open unknown emails, links, or attachments - always check the sender.<\/li>\n<li>Use only&nbsp;<strong>secure Wi-Fi network<\/strong>&nbsp;and avoid performing sensitive actions in public places.<\/li>\n<li>Always lock your computer when you leave your desk.<\/li>\n<li>Do it regularly.&nbsp;<strong>backups<\/strong>&nbsp;important files.<\/li>\n<li>Do not download software from unknown sources.<\/li>\n<li>Regularly check who has&nbsp;<strong>access to your accounts and devices<\/strong>.<\/li>\n<li><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f449.svg\" alt=\"\ud83d\udc49\">&nbsp;Most importantly: be observant and skeptical \u2013 if something seems suspicious, it probably is.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f449.svg\" alt=\"\ud83d\udc49\">&nbsp;The cyber environment will only become safer if each of us contributes. Cybersecurity is not a separate project \u2013 it is part of everyday work and responsibility.<\/p>\n<p>Be mindful, protect yourself and your data \u2013 and help others do the same.<\/p>\n\n<div class=\"row\"  id=\"row-131920957\">\n\n\n\t<div id=\"col-1125706846\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<div class=\"message-box relative dark\" style=\"padding-top:15px;padding-bottom:15px;\"><div class=\"message-box-bg-image bg-fill fill\" ><\/div><div class=\"message-box-bg-overlay bg-fill fill\" style=\"background-color:rgb(27, 26, 70);\"><\/div><div class=\"container relative\"><div class=\"inner last-reset\">\n\n<div class=\"row\"  id=\"row-378329774\">\n\n\n\t<div id=\"col-1623472078\" class=\"col medium-8 small-12 large-8\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n<h2>Talk to our financial expert<\/h2>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1972781877\" class=\"col medium-4 small-12 large-4\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n<a href=\"https:\/\/grow.ee\/en\/contact-us\/\" class=\"button alert\" style=\"border-radius:8px;\">\n\t\t<span>CONTACT US<\/span>\n\t<\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n<\/div><\/div><\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is not just a concern for IT professionals. It is a topic that everyone should be aware of and evaluate their actions.<\/p>","protected":false},"author":3,"featured_media":14969,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-14968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-raamatupidamine"],"_links":{"self":[{"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/posts\/14968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/comments?post=14968"}],"version-history":[{"count":6,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/posts\/14968\/revisions"}],"predecessor-version":[{"id":14977,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/posts\/14968\/revisions\/14977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/media\/14969"}],"wp:attachment":[{"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/media?parent=14968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/categories?post=14968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grow.ee\/en\/wp-json\/wp\/v2\/tags?post=14968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}