Uncategorized

What passwords do you use? Surely, like most users, you have chosen to use easy-to-remember passwords that are weak and that cybercriminals get without difficulty. According to some studies, 90% of the passwords we use are vulnerable. For this reason, cybercriminals always turn to them as the first option when they want to take control […]

328. THE MOST COMMON MISTAKES WHEN CHOOSING OUR PASSWORDS Read More »

THE INFORMATION SOCIETY SERVICES LAW The Law on Information Society Services and Electronic Commerce regulates the obligations to which information society service providers are subject (in the near future, this law may be affected by the European Union’s e-Privacy Regulation -ePrivacy 2021-, which will come into force in 2023). Its objective is to regulate and

THE LAW ON INFORMATION SOCIETY SERVICES (LSSICE) Read More »

The Data Protection Officer (DPO) is a key element in General Data Protection Regulation (GDPR). Which are the essential qualifications for a DPO? The DPO shall have appropriate knowledge about law and data protection, though he/she doesn’t need to be a jurist. The delegate can be a natural or legal person, internal or external, and

325. THE DATA PROTECTION OFFICER Read More »

Imagine that cybercriminals send an email to your company’s accountant and pose as a senior company manager. In the email, they order him/her to make a transfer (possibly worth millions) to an account. The accountant does it and the company loses a lot of money. Does it seem implausible to you? It’s real, and this

322. ‘CEO FRAUD’, THE E-MAIL THAT CAN COST YOUR COMPANY DEARLY Read More »

Last June 30 was the World Day of Social Networks (Facebook, Instagram, LinkedIn, Twitter, etc.). This date is celebrated annually to reflect the importance of these platforms in our professional environment, personal life and, especially, in that of our sons and daughters. Social networks allow us greater communication and interconnection both between people, and between

321.CAREFUL! PROTECT YOUR SOCIAL NETWORKS Read More »

    When we say that new technologies surround us in our day to day, it really is. We can become the target of the “bad guys” both in professional and personal life, whether they are hackers (with computer skills) or scammers (with personal deception techniques). For this reason, we steered today’s advice towards the

SECURE&TIP: ATMS Read More »

As cyberattack techniques and existing types of viruses are constantly being perfected and evolved, software companies are forced to correct all kinds of malfunctions and implement security improvements, to continue to ensure the privacy of all our information. In the daily use of new technologies, there are updates that depend on the IT department or

UPDATE, UPDATE, UPDATE Read More »

We are writing to notify you that, from now on, you will receive our security tips once a week. Do you know why? We are a company specialized in cybersecurity and IT legal compliance. You are going to receive these emails because your company has signed a contract with us in order to improve the

WELCOME TO SECURITY TIPS Read More »

The terms “Deep Web”, “Dark Web” or “Darknet” are increasingly common in our jargon, especially in news related to cybersecurity. But, many times, they are used in the wrong way. To avoid confusion, we will look at the different terms and their meanings. Clearnet: also known as “Surface Net”. It is the “Clean Net” or

302. DEEP WEB VS. DARK WEB Read More »