HEAnet & ICHEC launch position paper to build a Common Data Space for Ireland

In this position paper, HEAnet and ICHEC (The Irish Centre for High-end Computing) outline the context and recommended framework to build a Common Data Space for Ireland (IRL-DataSpace) to address data-driven global challenges through collaborative Research and innovation (R&I) between academia, industry and the public sector to address grand challenges and inform better public policy-making.

IRL-DataSpace will accelerate and support a structured synergised unification of the national data ecosystem (composed of academic and public research bodies, and enterprise organisations where relevant) which is currently disparate and fragmented. 

HEAnet and ICHEC share the vision to expedite IRL-DataSpace by establishing a national-level Data Space Support Centre for Ireland (IRL-DSSC) through which to engage stakeholders across the community for their participation and co-development.

IRL-DSSC will play a pivotal role in advancing the current national data ecosystem into a federated, FAIR (Findable, Accessible, Interoperable, Reusable), high-SLA and cost-effective ecosystem with robust digital platform resources, services for data sharing and governance, and a national- level professional support team. The IRL-DSSC will engage with and leverage expertise from the EU Data Spaces Support Centre.

Together, IRL-DataSpace and IRL-DSSC will deliver R&I impact across several disciplines in environment, society, economy at national and international levels, by dealing with grand challenges and informing better public policy-making as outlined in the Impact 2030 Strategy.

The 2024-2027 roadmap to build the IRL-DataSpace supported by the IRL-DSSC, its working groups and all relevant stakeholders includes:

  • Briefings and consultations to onboard all stakeholders
  • Focused white papers to establish technical specifications for IRL-DataSpace, requirements for different R&I disciplines, and all-island joint activities
  • The finalisation and support required from policy-makers and funders
  • Development and operationalising IRL-DataSpace as a National Service by 2027

The position paper calls out to policy-makers, R&I activities (institutions, research centres, projects, researchers), data systems operators, data holders and governors to collaboratively mature the federated the national data ecosystem in Ireland.

Read more

Don’t Get Duped: Common Scams Targeting Individuals and Businesses

In the digital age, scammers have become increasingly sophisticated, deploying deceitful tactics to defraud individuals and businesses. Understanding the landscape of these scams is the first line of defense; awareness and vigilance are potent weapons in the battle against fraud. From phishing to a full-blown business email compromise, criminals’ arsenal is varied and insidious. Here’s a dive into the most common ones.

Types of Scams

Both individuals and businesses are vulnerable to many scams, which can result in significant financial losses. While new scams continue to emerge, some have stood the test of time and remain prevalent today.

Business Number Spoofing Scams

Business number spoofing scams involve fraudsters using technology to alter the caller ID to make it appear that the call is coming from a legitimate business number, often recognized and trusted. This scam tactic is not only a problem for the individuals who receive the calls but also for businesses whose numbers are spoofed. Customers may be tricked into giving away personal information or making payments, thinking they are dealing with an actual company representative.

Individuals must independently verify the caller’s identity, such as calling the business back through the official number on their website. A good scam likely fix for businesses should involve informing customers through various channels that they will never ask for sensitive information or immediate payment over the phone. Additionally, companies should monitor for reports of their business number being misused and take steps to alert customers promptly if such incidents occur.

Phishing Scams

Phishing scams are fraudulent attempts to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. These attacks often come in emails but can also occur via text messages or social media platforms.

The scammer will typically use a sense of urgency or fear to prompt the victim into providing personal information. For example, an email may claim that your bank account has been compromised, and immediate action is required to prevent fraud. The sender will then provide a link for you to click on, leading to a fake website that steals your login credentials.

Be cautious of unsolicited emails or messages asking for personal information. Be wary of urgent or threatening language, and never click on links or open attachments from unknown sources. If you receive an email claiming to be from a legitimate company, it’s always best to go directly to their website instead of clicking on any provided links.

Business Email Compromise

Business email compromise (BEC) scams target businesses using social engineering and email spoofing to deceive employees into transferring money or sensitive information to the scammer. These scams often involve a hacker gaining access to a company’s email system and posing as a high-level executive, such as the CEO or CFO, to request urgent wire transfers or confidential data

Businesses should implement strict authentication processes for financial transactions and educate employees on the red flags of a potential scam. Reviewing and regularly updating security protocols, such as multi-factor authentication, is essential to prevent unauthorized access to company emails.

Online Shopping Scams

With the rise of e-commerce, online shopping scams have become increasingly prevalent. These scams often involve fake websites or social media pages advertising popular products at meager prices. Once a customer makes a purchase, they receive a counterfeit or never receive the product.

Always research before purchasing from unfamiliar websites or social media pages. Look for reviews and ratings from previous customers, and be wary of deals that seem too good to be true. Use secure payment methods such as credit cards or PayPal, which protect against fraudulent charges.

Government Impersonation Scams

Government impersonation scams often target the elderly and individuals with limited English proficiency. These scams involve a criminal posing as a government official, such as an IRS agent or immigration officer, and threatening legal action if payment is not made immediately.

It’s important to remember that government agencies will never demand immediate payment over the phone or via email. If you receive a call or email from someone claiming to be from a government agency, hang up and contact the official agency directly to verify the information.

Investment Scams

Investment scams often promise high returns with little to no risk and can take various forms, such as Ponzi schemes or cryptocurrency fraud. These scams prey on individuals’ desire for quick and easy wealth, luring them into investing their hard-earned money into fraudulent ventures.

Always do thorough research before investing in any opportunity. Be wary of promises of high returns with low risk, and never feel pressured to make a quick decision. Seek advice from trusted financial advisors or research before making any investment decisions.

Tech Support Scams

Tech support scams involve fraudsters pretending to be from a reputable tech company, such as Microsoft or Apple, and claiming an issue with your computer or device. They will then ask for remote access to your device, install malware, and charge a fee for their “services.”

Legitimate tech companies won’t contact you out of the blue asking for personal info or remote device access. If you receive a call from someone claiming to be from a tech company, verify with the official company. Always be cautious of unsolicited requests for device access or personal info.

Protect Yourself

In addition to being aware of common scams, there are several steps you can take to protect yourself from becoming a victim:

 

  • Never give out personal information over the phone, email, or social media unless you have verified the recipient’s identity.
  • Keep your devices and software updated to prevent hackers from accessing sensitive information.
  • Be cautious when clicking on links or opening attachments from unknown sources.
  • Use strong and unique passwords for all your accounts, and enable multi-factor authentication whenever possible.
  • Stay informed about the latest scams and be vigilant in detecting fraudulent activity.  

Being aware and vigilant helps prevent scams. If targeted or victimized, resources like the Federal Trade Commission and the Better Business Bureau are available for reporting and recovering from financial loss. Act swiftly if you suspect a scam to minimize potential damage.

Overall, in a world rife with fraudsters, maintaining vigilance is paramount. By staying informed about the common types of scams and their telltale signs, individuals and businesses can take proactive measures to protect themselves from becoming the next victims. Remember, when something seems too good to be true—it probably is. Stay safe, and don’t get duped.