Uncategorized

    INTERNET LAYERS: In today’s TIP we want to explain to you how vast and deep the Internet is, so that you understand why we are not aware of how dangerous cybercriminals are, simply because we never see them physically and they are hidden behind a computer screen that allows them total anonymity. SURFACE […]

SECURE&TIP: INTERNET LAYERS Read More »

What is a“deepfake” cyberattack? We already explained it as a risk of the use of AI in CEO Fraud cyberattacks. But in general, e n the Internet, it is increasingly difficult to distinguish what is real from what is not. Videos deepfake have become one of the most sophisticated techniques in the creation of fake

SECURE&TIP: DEEPFAKE Read More »

    We are in the middle of the vacation period, starting to plan or enjoy personal and professional rest. Now, this does not imply that we should lower our guard. At the enterprise level is an ideal time to perform all kinds of installations, upgrades, migrations and any other changes or revisions in the

SECURE&TIP: CYBER-SAFE VACATIONS Read More »

    Regardless of the different types of cyber-attacks that can be suffered, cybercriminals make use of malware in practically all of them. Malware are computer programs (software), most of which are free and appear to be legal or harmless: music software and applications, games, videos, document and QR scanners, file readers and editors, etc.

SECURE&TIP: UNAUTHORIZED SOFTWARE Read More »

    Both professional and personal passwords are to be considered as our “entry keys” to certain devices and digital platforms. These may even contain strictly confidential personal or professional information. As we safeguard the physical building access keys, we should apply the same protection criteria to the passwords that we usually use, in the

SECURE&TIP: INSECURE PASSWORDS Read More »

    Cybercriminals contact us either by e-mail, phone call, SMS or applications such as Whatsapp, Line, Telegram and similar, to inform us that we have been selected for a job. Following this and in the same conversation, they will ask us to confirm that we agree to continue in the selection process and that

SECURE&TIP: FAKE JOB OFFER Read More »

    In this type of cyber-attacks cybercriminals pose as a person known or close to us and try to convince us either by mail, phone, SMS, Whatsapp or social networks, that they are in a complicated economic situation or emergency and need us to make them an urgent and immediate money transfer. The excuses

SECURE&TIP: ACQUAINTANCES IN TROUBLE Read More »

    What risks are minors exposed to when using new technologies? After the vacation and family break, and with the return to school, we all adopt a greater routine in terms of the use of new technologies. Not only on a personal level, but also on an educational level. According to recent studies, the

SECURE&TIP: PARENTAL CONTROL Read More »

    It is becoming more and more common to receive all types of financial information (requests, invoices, receipts or vouchers) by e-mail instead of by post. Within this digital activity, the risk of receiving false payment documents has become a reality. In this case, cybercriminals impersonate the identity of a legitimate supplier (telephony, supplies,

SECURE&TIP: FALSE ECONOMIC INFORMATION Read More »

        Everyone, to a greater or lesser extent, uses Whatsapp as the main instant messaging application. In fact, as of today, this app has approximately 2,780 million active users and an exchange of more than 100,000 million messages per day. But do we really use it securely to ensure our personal and

SECURE&TIP: SECURE USE OF WHATSAPP Read More »