Regardless of the different types of cyber-attacks that can be suffered, cybercriminals make use of malware in practically all of them.
Malware are computer programs (software), most of which are free and appear to be legal or harmless: music software and applications, games, videos, document and QR scanners, file readers and editors, etc.
But nevertheless, through these programs cybercriminals try to get:
- Remote access to our device (laptop, phone, console, tablet, etc.).
- Spying and stealing usage data (passwords, photos, documents, contacts).
- Encrypt our access to our own device to blackmail us in exchange for money.
- Damage the device or information if they don’t get what they want.
In most cases, one of these actions is not suffered in isolation. In fact, malware is programmed so that, once downloaded and installed, these actions can be carried out in the same order and practically consecutively in time.
Therefore, we would like to remind you of the importance of downloading and installing only software (programs, applications, etc.) duly authorized by our company or organization (at a professional level). In case of doing it for personal use, we must make sure to do it on official web pages or APP Stores and contracting the corresponding use licenses.
Otherwise, we could be making a mistake that can have very serious consequences for our company or organization and/or for us as users, and especially for our information.
IMPORTANT NOTE: If, even if you comply with all these measures, you encounter situations that do not conform to the level of security required or established in internal policies, do not hesitate to communicate this to your line manager, the CISO Security Manager and the IT department, so that they can advise you appropriately. And on a personal level he reports the cyberattack to the police authority.
*Shipment date: June 16, 2025

