{"id":3761,"date":"2021-11-08T11:37:04","date_gmt":"2021-11-08T16:37:04","guid":{"rendered":"https:\/\/knowledgeflow.org\/the-knowledgeflow-newsletter-volume-4-2\/"},"modified":"2024-07-22T23:39:39","modified_gmt":"2024-07-23T03:39:39","slug":"the-knowledgeflow-newsletter-4th-edition","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/the-knowledgeflow-newsletter-4th-edition\/","title":{"rendered":"La lettre d'information de KnowledgeFlow : Edition 4 Perspectives et mises \u00e0 jour"},"content":{"rendered":"<style>.wp-block-kadence-advancedheading.kt-adv-heading3761_25b24c-7c, .wp-block-kadence-advancedheading.kt-adv-heading3761_25b24c-7c[data-kb-block=\"kb-adv-heading3761_25b24c-7c\"]{text-align:center;font-size:var(--global-kb-font-size-lg, 2rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3761_25b24c-7c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3761_25b24c-7c[data-kb-block=\"kb-adv-heading3761_25b24c-7c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3761_25b24c-7c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3761_25b24c-7c[data-kb-block=\"kb-adv-heading3761_25b24c-7c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3761_25b24c-7c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3761_25b24c-7c\"><em>Newsletter: Hand-picked headlines from KnowledgeFlow&#8217;s cybersafety curators. Vol. 4<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Claudiu&#8217;s Top Story<\/strong> on Our Newsletter<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">CBC NEWS: Private Proof-of-Vaccine App Portpass Continues to Expose Personal Data Even After Relaunch and Updates<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cbc.ca\/news\/canada\/calgary\/portpass-app-proof-of-vaccination-unsecured-data-update-1.6229034\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-36.png\" alt=\"\" class=\"wp-image-3704\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-36.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-36-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-36-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">Personal information belonging to more than 17,000 users of the private proof-of-vaccination app Portpass is still&nbsp;unsecured and visible online \u2014 including, in some cases, photos of&nbsp;drivers&#8217;&nbsp;licences and passports \u2014 despite assurances from the company that its data-security problems have been fixed.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cbc.ca\/news\/canada\/calgary\/portpass-app-proof-of-vaccination-unsecured-data-update-1.6229034\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>In the News<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">CBC NEWS: N.L. Healthcare Cyber Attack is Worst in Canadian History, Says Cybersecurity Expert<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cbc.ca\/news\/canada\/newfoundland-labrador\/nl-cyber-attack-worst-canada-1.6236210\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-25.png\" alt=\"\" class=\"wp-image-3689\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-25.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-25-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-25-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">Newfoundland suffered a possible ransomware attack this past week that resulted in IT outages and disrupted the province&#8217;s healthcare system, causing thousands of cancelled medical procedures. Experts believe this may be the biggest and most severe cyberattack in Canadian history. Details are still scarce, as to avoid interfering with the investigation, but the government is working on remedying the situation. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cbc.ca\/news\/canada\/newfoundland-labrador\/nl-cyber-attack-worst-canada-1.6236210\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Cybersecurity Awareness Month<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">FORBES: Cybersecurity Awareness Must Extend Beyond the &#8220;Month&#8221;<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/www.forbes.com\/sites\/emilsayegh\/2021\/11\/02\/cybersecurity-awareness-must-extend-beyond-the-month\/?sh=1727d6c275c3\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-33.png\" alt=\"\" class=\"wp-image-3692\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-33.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-33-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-33-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">Each October, Cybersecurity Awareness Month provides an opportunity to discuss the various facets of security and privacy awareness. But it&#8217;s important to continue to take stock of all the advice given and received during the month and apply it to everyday practices, as cybersecurity is a never-ending mission, not a one-time event.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/emilsayegh\/2021\/11\/02\/cybersecurity-awareness-must-extend-beyond-the-month\/?sh=1727d6c275c3\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Opinion<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">LA TIMES: Op-Ed: What a House Cat Can Teach Us About Cybersecurity<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.latimes.com\/opinion\/story\/2021-11-07\/op-ed-what-a-house-cat-can-teach-us-about-cybersecurity\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-32.png\" alt=\"\" class=\"wp-image-3691\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-32.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-32-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-32-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>Cybersecurity research scholar Herbert Lin reflects on the difficulty of protecting our computers and systems, comparing the abundance of resources at everyone&#8217;s disposal to humans&#8217; available resources in containing a cat. Why is catching a cat so hard? And by extent, why is maintaining good cybersecurity so difficult?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.latimes.com\/opinion\/story\/2021-11-07\/op-ed-what-a-house-cat-can-teach-us-about-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Security<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">HELPNET SECURITY: Younger Generations Care Little About Cybersecurity<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.helpnetsecurity.com\/2021\/11\/08\/younger-generations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-34.png\" alt=\"\" class=\"wp-image-3693\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-34.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-34-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-34-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>SailPoint recently released a survey which analyzed activities which blur the line between work and personal lives, leading to security pitfalls. According to the survey, there is a surprising gap between security postures from different generations: for example, 46% of Gen Z respondents said they would open the link or attachment in a suspicious looking email, versus 29% of Millenials, 4% of Gen X, and only 1% of Boomers.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2021\/11\/08\/younger-generations-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Technology<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">FORBES: iOS 15.2: Brilliant New Feature Will Transform iPhone Privacy<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2021\/11\/06\/ios-152-update-app-privacy-reports-new-iphone-feature\/?sh=1d5a84e02bc5\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-35.png\" alt=\"\" class=\"wp-image-3694\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-35.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-35-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-35-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>The launch of Apple&#8217;s iOS 15.2 will include a new privacy feature, App Privacy Report, which will give Apple users deeper insights by listing the permissions apps request and detailing the tracking they do on the phone. While the feature is already here, it&#8217;s not useable yet.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2021\/11\/06\/ios-152-update-app-privacy-reports-new-iphone-feature\/?sh=1d5a84e02bc5\" target=\"_blank\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Phone Scams<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">PROOFPOINT: Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/caught-beneath-landline-411-telephone-oriented-attack-delivery\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-28.png\" alt=\"\" class=\"wp-image-3697\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-28.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-28-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-28-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p><meta charset=\"utf-8\">New research suggests that tens of thousands of telephone oriented cyberattacks occur on a daily basis, with some individual victims losing up to $50,000 per attack. Different forms of scams include pushing fake computer security services, selling fake concert tickets, and getting victims to download malware under a number of different pretexts. Overall, Proofpoint has observed a marked increase in the volume of this kind of cyberattack.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/caught-beneath-landline-411-telephone-oriented-attack-delivery\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id3761_55af50-ab{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id3761_55af50-ab > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id3761_55af50-ab > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id3761_55af50-ab > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id3761_55af50-ab > .kt-row-layout-overlay{opacity:0.50;background-color:var(--global-palette9, #ffffff);}@media all and (max-width: 1024px){.kb-row-layout-id3761_55af50-ab > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id3761_55af50-ab > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id3761_55af50-ab alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{display:flex;}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col,.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column3761_d8e9b3-06{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3761_d8e9b3-06{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column3761_d8e9b3-06{text-align:center;}.kadence-column3761_d8e9b3-06{position:relative;}.kadence-column3761_d8e9b3-06, .kt-inside-inner-col > .kadence-column3761_d8e9b3-06:not(.specificity){margin-bottom:0px;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column3761_d8e9b3-06{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3761_d8e9b3-06{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column3761_d8e9b3-06{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3761_d8e9b3-06{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3761_d8e9b3-06 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column3761_d8e9b3-06 kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading3761_9d2057-7e, .wp-block-kadence-advancedheading.kt-adv-heading3761_9d2057-7e[data-kb-block=\"kb-adv-heading3761_9d2057-7e\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading3761_9d2057-7e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3761_9d2057-7e[data-kb-block=\"kb-adv-heading3761_9d2057-7e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3761_9d2057-7e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3761_9d2057-7e[data-kb-block=\"kb-adv-heading3761_9d2057-7e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading3761_9d2057-7e wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3761_9d2057-7e\">rESOURCES<\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3761_5b594b-06, .wp-block-kadence-advancedheading.kt-adv-heading3761_5b594b-06[data-kb-block=\"kb-adv-heading3761_5b594b-06\"]{padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;font-size:var(--global-kb-font-size-xxl, 4rem);line-height:1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3761_5b594b-06 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3761_5b594b-06[data-kb-block=\"kb-adv-heading3761_5b594b-06\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3761_5b594b-06 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3761_5b594b-06[data-kb-block=\"kb-adv-heading3761_5b594b-06\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h1 class=\"kt-adv-heading3761_5b594b-06 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading3761_5b594b-06\">resources for Everyone<\/h1>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3761_a7c56c-06, .wp-block-kadence-advancedheading.kt-adv-heading3761_a7c56c-06[data-kb-block=\"kb-adv-heading3761_a7c56c-06\"]{max-width:896px;margin-right:auto;margin-left:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3761_a7c56c-06 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3761_a7c56c-06[data-kb-block=\"kb-adv-heading3761_a7c56c-06\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3761_a7c56c-06 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3761_a7c56c-06[data-kb-block=\"kb-adv-heading3761_a7c56c-06\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3761_a7c56c-06 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3761_a7c56c-06\">The KnowledgeFlow Cybersafety Foundation provides a wealth of resources tailored for a wide range of audiences. Our resources cover various aspects of online safety, ensuring that each group can navigate the digital environment with confidence. Parents can access guidance to protect their children online, teachers can find tools to educate students about cybersafety, seniors can learn to avoid common online scams, and police can utilize resources to enhance their cybersecurity knowledge. By offering specialized content for these diverse groups, KnowledgeFlow empowers everyone to stay safe and secure in the digital world.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns3761_4f11ac-a6, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns3761_4f11ac-a6, .wp-block-kadence-advancedbtn.kb-btns3761_4f11ac-a6, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns3761_4f11ac-a6{margin-bottom:0px;}.wp-block-kadence-advancedbtn.kb-btns3761_4f11ac-a6{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns3761_4f11ac-a6 .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3761_4f11ac-a6\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn3761_2ead7f-09.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn3761_2ead7f-09.kb-button{margin-top:var(--global-kb-spacing-sm, 1.5rem);}.wp-block-kadence-advancedbtn .kb-btn3761_2ead7f-09.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn3761_2ead7f-09.kb-button:focus{background:var(--global-palette1, #3182CE);}<\/style><a class=\"kb-button kt-button button kb-btn3761_2ead7f-09 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View Resources<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Bulletin d'information : Les titres tri\u00e9s sur le volet par les conservateurs de la cybers\u00e9curit\u00e9 de KnowledgeFlow. Vol. 4 Claudiu's Top Story on Our Newsletter CBC NEWS :...<\/p>","protected":false},"author":8,"featured_media":3782,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-KnowledgeFlow-Newsletter-\u2013-Edition-4-1.png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/3761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=3761"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/3761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/3782"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=3761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=3761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=3761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}