Uncategorized

In today’s advice we want to introduce you and start our Secure &; Trivial of Secure &IT. This is a series of practical security tips that will be issued over the next 10 months (1/month). The objective of these TIPS is to allow you to acquire a level of awareness not only by reading, but […]

SECURITY TIP: SECURE&TRIVIAL (1/10) Read More »

For some time, you have received our “Security Tips” once by shttps: //secureacademy.es/zibersegurtasun-azterketa/emana. This is because your company is concerned about the confidentiality, integrity, availability and legality of the information you use in the performance of your work. With these tips we have tried to increase your awareness of the risks inherent in handling information.

346. CYBERSECURITY TEST Read More »

Phishing cyberattacks, which we have discussed in many of our TIPS, are those that, using fraudulent emails, try to trick users into consciously or unconsciously infecting the device with a malware or providing confidential information to a criminal who impersonate someone else’s identity. Above all, at a business level we can feel protected by security

344. HOW TO RECOGNIZE SUSPICIOUS EMAILS Read More »

The constant download and use of APPs of all kinds on our personal and professional mobiles and tablets, has led us to lower our guard against totally unknown applications that may be fraudulent or contain malicious software . Whether they are QR readers, document scanners and converters, photo filters, wallpapers, virtual stores or games and

342. UNINSTALL THESE SEVEN MALWARE INFECTED APPLICATIONS ASAP Read More »

The first steps in managing a security incident are the most important in order to limit and contain the impact of a cyber-attack and to ensure that the activity of the company won’t get interrupted or seriously affected. From Secure & IT we therefore recommend in the event of a security incident, to taking into

341. QUICK AND COORDINATED RESPONSE TO SECURE INCIDENTS Read More »

Among the methods used by cybercriminals to get easy money, the most widely used is still the cloning of credit and debit cards. There are several techniques that allow these cybercriminals to get hold of our personal data and especially our card information, such as card number, expiration dates, security numbers and user’s PIN, and

CARD CLONING Read More »

The geolocation of users is no longer a key factor to recognize possible authorized and unauthorized connections (cybercriminals). As business digitization evolves, VPN use is suitable for gate surveillance, but not sufficient. An example of this has been the cyberattack on the US Colonial pipeline derived from remote access via VPN. Cybercriminals obtained the username

336. ZERO TRUST SECURITY Read More »

Ibai Llanos, The Grefg, El Rubius, Valkyrae … With the domestication of new technologies and the frequent use of the internet in all aspects of our lives, it is very common for children, adolescents and even adults to spend part of their free time playing video games, watching YouTube videos or following the communicators of

334. CYBERSECURITY FOR GAMERS Read More »

By now, to a greater or lesser extent, we have heard of cryptocurrencies, for example, Bitcoin. Broadly speaking, when we talk about them we refer to electronic money. Currently this not tangible currency is increasingly accepted by some companies as a means of payment equivalent to cash (games and casinos, online stores, specific ATMs, banks,

332. WHAT IS CRYPTOJACKING AND HOW DOES IT WORK? Read More »