Today, companies and public and private entities in all sectors, no matter how small their use of new technologiesno matter how little use they make of new technologies, must be able to adapt to the constant to the constant evolution of these technologies and, in particular, to reinforce their physical and digital security.. And even more so considering that cybercriminals are not only focused on attacking computer systems, or carrying out fraud by e-mail (phishing), but There are multiple options for accessing restricted areas and proprietary information, such as accessing offices through a production plant or bypassing building entry controls by posing as a maintenance technician.There are multiple options for accessing restricted areas and proprietary information, such as accessing offices through a production plant or bypassing building entry controls by impersonating a maintenance technician.
In order to ensure an adequate level of security and privacy of all data processed, it is necessary to monitor the weaknesses or threats to which our company or organization is exposed, and to implement preventive measures that allow us to improve.
But this cannot be done without order and control. For this purpose, it is very useful to resort to the Deming Cyclewhose four stages (PDCA) The four stages (PDCA) allow you to follow very specific steps to achieve an end, which, in this case, would be to improve information security and privacy.
Since it is a method used in projects of multiple characteristics, we could even apply it at a personal level to achieve any objective we set ourselves.
Continuing with our Secure&Trivia of Secure&ITQuestion 4 of 10, can you tell us what these four stages are?
- Plan, Do, Raise Awareness and Audit
- Plan, Do, Check and Support
- Planning, Doing, Controlling and Acting
LINK TO THE RESPONSE FORM:
https://secureacademy.es/securetrivial-4-10/
HINT: You can use the internet.
PS: If this is the first time you are participating in our Secure&Triviadon’t worry, because we will soon send a reminder with the previous questions.
We remind you again of the rules, so that you can get an additional cybergift at the end of the year:
Secure&Trivia is based on a series of practical safety tips that will be issued until the end of the year (10 TIPS in total). The objective of these TIPS is to allow you to acquire a level of awareness not only by reading, but also by “doing”.
As in the mythical game, we have opted to divide the game into “quesitos” (little cheeses) the different modalities on which we will propose practices and ask questions, by means of an on-line form.
The people who score the most hits by the end of the year will receive a cyber gift from Secure&Academyour Advanced Cybersecurity Training Center at Secure & Academy. Secure&IT.
The themes are those that make up our current 360º Security concept:

