This is a Multi-language test
Uncategorized
The most innovative and secure measure in user identification is facial recognition. In fact, we have normalized it so much, especially due to the pandemic and with the use in several countries of the Covid passport, that we are no longer surprised that, in order to physically access certain facilities, verify our identity on online
SECURITY TIP: SECURE&TRIVIAL (3/10) – FACIAL BIOMETRICS ALREADY VULNERABLE Read More »
As we always remember, cybercriminals are constantly adapting to new social, political, economic and technological circumstances. Telecommuting, or 100% remote work, has become an increasingly frequent work reality, both in the private and public sectors. Especially in those companies or entities, in which office attendance is not an indispensable condition (e.g. digital companies, call center,
THE RELATIONSHIP BETWEEN TELEWORK AND CYBERCRIME Read More »
Are you tired of receiving advertising communications from companies to which you have never requested information, nor have you been a client? As consumers and users, can we do something to stop it? The answer is yes. Thanks to the entry into force in 2018 of more restrictive regulations on data protection and privacy (such
ROBINSON LIST: WHAT IS IT AND HOW DOES IT WORK? Read More »
We all use WhatsApp to a greater or lesser extent as the main instant messaging application. In fact, today, this app has approximately 900 million active users and more than 100 million calls are exchanged per day (not counting short messages or chats). But do we really use it safely to guarantee our privacy? In
RECOMMENDATIONS FOR SAFE USE OF WHATSAPP Read More »
Industrial cybersabotage, manipulation of control systems, interruption of activity… In recent years, attacks on factories, critical infrastructures and industrial companies, both public and private, have increased considerably. The automation of productive activity creates an important competitive advantage, but we must also be aware of the need to detect the risks and threats associated with industry
INDUSTRIAL CYBERSECURITY CHALLENGES Read More »
Continuing with our Secure & Trivial of Secure & IT, and as we already told you in TIP 358 of March 21, today’s question is related to fraudulent software and false applications. We remind you again of the rules of this game, so that you can get an additional cyber gift at the end of
SECURITY TIP: SECURE&TRIVIAL (2/10) Read More »
Digital certificates are computer files that allow the identity of a natural or legal person to be proven, electronically sign digital documents with the same validity as the paper originals, and even encrypt files and certain communications. In fact, in the case of personal digital certificates, the evolution and substitution of the electronic signature for
PRIVACY GUARANTEES IN THE USE OF DIGITAL CERTIFICATES AND ELECTRONIC SIGNATURES Read More »
Regardless of the different types of cyberattacks that can be suffered, practically all cybercriminals use malware. Malware are computer programs (software), most of which are free and appear to be legal or harmless: music software and applications, games, videos, document and QR scanners, file readers and editors, etc. But nevertheless, through these programs cybercriminals try
DOWNLOADING UNAUTHORIZED SOFTWARE CAN PUT OUR ORGANIZATION AT SERIOUS RISK Read More »
Facebook, Instagram, LinkedIn, Twitter… Social networks have become indispensable platforms in our professional environment, personal life and, especially, in that of our sons and daughters. Its use allows us greater communication and interconnection between people, as well as between professionals and companies. In fact, it is increasingly common to have a digital CV and find
WATCH OUT! PROTECT YOUR SOCIAL NETWORKS Read More »
