Cybersecurity Material

Journalists are welcome to use quotations and graphs from any ENISA media releases, reports, and studies available, provided the original source is referenced.

The Press office is available to assist journalists covering ENISA and cybersecurity themes within its mandate. 

Any journalist may contact the Press Office for questions or requests by submitting an email at press@enisa.europa.eu. Please keep in mind that an email request will be answered as soon as possible, given the volume of incoming requests and within our capacity of response. Alternatively, journalists may use the media phone line +30 2814 409612.

 

Audiovisual and Multimedia

#CyberSecMonth 2022 - Human Firewall

Ransomware has been identified as the most devastating type of cybersecurity attack over the last decade, impacting organisations of all sizes around the globe.

#CyberSecMonth 2022 - Are you prepared for ransomware?

There are two types of organisations: Those who do something for Ransomware and those who just wait!

#CyberSecMonth 2022 - Scam tracker of the month

If you suspect there is a ransomware attack in progress, report it to your organisation!

CyberSecMonth 2023 - Avoid being manipulated by cybercriminals (2)

Helpful tips to avoid being manipulated by cyber criminals! Download our infographic!

CyberSecMonth 2023 - Urgency

Be aware of  a sense of urgency that pushes you to take immediate action! Be smarter than a hacker!

CyberSecMonth 2023 - Unbelievable offers

If something sounds too good to be true, it probably is! Be smarter than a hacker!

CyberSecMonth 2023 - Unexpected requests

Be aware of unexpected requests - Be smarter than a hacker!

#CyberSecMonth 2023 - Cybercriminal profile

Learn how to recognise a cyber criminal and browse online safely. Protect your info, avoid scams, and click wisely!"

#CyberSecMonth 2023 - Be Smarter than a Hacker

Enjoy the #CyberSecMonth 2023 official song - Be smarter than a hacker!

#CyberSecMonth 2022 - Prevent phishing: always use an official app

Phishing is a type of attack performed in a digital communication. The targeted victim is lured into providing personal information, financial data or access codes by an attacker pretending to be trustworthy.