Has your company been the victim of a security incident?

Email is the most commonly used method by cybercriminals to try to breach the security of companies. Through phishing and social engineering, they sneak into the office every day hoping that you fall into their trap. These criminals have devised the best way to make these emails look as similar as possible to those you…

Transform your SME with cyber resilience by following ENISA’s advice

The digital transformation of SMEs, so necessary to compete in digital markets, is underway. Digital commercial exchanges require security to be reliable. Therefore, to survive in these markets we must be prepar to overcome possible cyber incidents. On the one hand, we must take the necessary precautions to maintain the availability of the systems that…

True story: SIM swapping, from no coverage to no money in the bank

It was a Tuesday at 5:15, Alberto’s alarm clock rang. He had to go on a business trip because he is responsible for purchasing in a small company. After packing his laptop and cell phone into his backpack, essential work tools when traveling so much, he headed to the airport. In the taxi, his corporate…

The 10 most commonly used attack vectors by cybercriminals

Viruses have been with us since computers began to be found on or under desks. A few decades ago, even before the Internet exist. In the beginning, they were clever demonstrations of program errors and spread via diskettes. Soon they began to be exploit for malicious purposes, causing data deletion, intrusion, system inoperability or service…

Security in times of mobility and wireless networks

Mobility is becoming more and more present in companies. Many businesses and jobs depend on this type of work to be able to carry out their daily activities . In this mobility scenario, two fundamental elements intervene: one of them is mobile devices , such as smartphones or laptops, which are responsible for processing information;…