Uncategorized

    PERSONAL DEVICES (BYOD): According to recent statistics, it is estimated that 9 out of 10 people also use personal devices at work. Whether by using USB sticks at home, checking business email on a cell phone, tablet or personal computer, or even connecting the device via cable to the work computer to transfer […]

SECURE&TIP: PERSONAL DEVICES (BYOD) Read More »

  SECURITY BREACH: We refer to a security breach when there is an unauthorized access, manipulation, deletion or communication in relation to the information of our company or entity, its physical facilities (offices, factories, stores, etc.) or its computer systems. So security breaches can be caused by cyber-attacks or also by human error, whether intentional

SECURE&TIP: SECURITY BREACH Read More »

      Depending on the country, the sector of activity and the people targeted, social engineering accounts for between 70% and 90% of cyber-attacks. Therefore, we would like to remind you once again what exactly it is, so that you can be prepared and recognize any fraudulent communication in time. What is social engineering?

SECURE&TIP: SOCIAL ENGINEERING Read More »

After the evaluation TEST (December 2023/January 2024) of previous subscribers, we are starting the 2024 Security Tips (TIPS). As you know, these weekly communications are part of your organization’s Cybersecurity and Privacy Training Plan. So, throughout this year you will receive training pills, related in 2024, with the different types of cyber-attacks that we can

SECURITY TIPS 2024: Differences between “Cybercriminal” and “Hacker”. Read More »

Sometimes, when typing the address of a web page quickly, we can make a mistake. Cybercriminals are aware of this and use it to their advantage. Typosquatting refers to the fact that someone ends up on the wrong (fraudulent) website because he or she mistyped a url. This happens because cybercriminals reserve domains similar to

TYPOSQUATTING: WHAT IT IS AND HOW IT IS USED BY CYBERCRIMINALS Read More »

Types of personal data: Basic or ordinary data (Name, Surname, Telephone, Address, etc.) and special or sensitive data (health, religion, sexual orientation, ideology, trade union membership and similar). Unambiguous consent and grounds for legitimacy: The person to whom the data to be processed belongs, must give prior, express and informed consent and it must be

THE 10 BASICS OF DATA PROTECTION Read More »

On Friday 27th, a month after its publication, our TEST was officially closed. The results will be processed during the month of February in order to be able to issue a report with the global level of awareness in Cybersecurity and Privacy acquired by your organization. The people who have made a full answer, or

SECURE&TRIVIAL: ANSWERS Read More »

Every day, more than 100,000 attacks targeting mobile devices are registered worldwide, either through fraudulent application downloads, connections to unsecured websites or compromised communications (email, voice and messaging). Therefore, it is essential to have security solutions that allow protection of these devices, including BYOD or personal devices, which may be used for professional use. However,

SECURITY RECOMMENDATIONS FOR MOBILE DEVICES. ENDPOINT PROTECTION (EPP) Read More »

Regardless of the fact that 77.6% of computer and social engineering cyber-attacks are mainly aimed at companies and their employees, phishing, vishing and smishing techniques are the most commonly used in both areas (personal and work), especially in relation to banking transactions. The objective of these three frauds is the theft of information through corporate

PHISHING, VISHING, SMISHING: WHAT ARE THEY AND HOW TO AVOID SCAMS? Read More »