What are biometrics? Definition and current trends
Cybersecurity in Spanish SMEs
Undoubtedly, cybersecurity must be one of the main aspects companies must look after. It is important in any company, big or small, because the damage caused internally can be huge, especially in companies with limited resources, since malicious attacks could mean the end of the business. Therefore, today we take a look at the situation […]
Can digital signatures be forged?
Signature and document fraud is a problem that has now spread to the digital world, where cyber security is increasingly required. As a result, many digital signature users, or those who are considering their use ask themselves how to avoid forgery. Let us clarify these questions in this article.
Digital identity, how can we protect it?
We are in the midst of a cybersecurity boom, as cyber criminals are increasingly exploiting digital vulnerabilities. These attacks include those aimed at our identity and personal data. Which are the most common ones? What can we do to protect ourselves?
Online trust: current state and how to improve it
Digitization is becoming very common in people’s life habits. The keys to understand this entrenchment is that society trusts technologies that make digitization possible, providing complete security reassurance. To what extent do the Spanish people trust these digital solutions? How can we increase this level of trust?
Management, auditing and signature delegation using cloud certificates
In the digital world, electronic certificates are a must to perform any business or personal operation, protecting the identity of the owner.
5 ways to protect your digital identity
In the era of communication, protecting our physical identity and the one on the Internet are equally important. Especially now that cyber-attacks are on the rise, affecting both individuals and entities. Under this situation we must follow certain Internet safety rules. Here are five tips.
Ethical hacking: identification of services with nmap
In the previous post of ethical hacking we briefly explain various options to get an enumeration of IP addresses and subdomains when performing an ethical hacking process. If you liked that “this is very safe because who is going to know that this subdomain exists” (that although you cannot believe it, it is more common […]
Ethical hacking: scope enumeration and IP detection
Sun Zu said in The Art of War: “Know yourself and know your enemy.” There is no better way to defend a company from possible cyberattacks than to know its real level of security by simulating an attack on its information systems, to detect the weakest parts of its defenses, the points of possible malicious […]
The new Cybersecurity Law of the European Union
The Official Journal of the European Union has published the new Regulation 2019/881, which deals with key aspects related to cybersecurity. Its entry into force will take place on June 27 and aims to make a substantial jump in terms of improving protection against cyber vulnerabilities. We break down its most remarkable aspects.
Spain, in the seventh position of the Global Cybersecurity Index published by ITU
We live in an increasingly connected world, especially through the internet. This gives us a host of advantages, but security is also necessary at the level of threats. This is what is responsible for assessing the Global Cybersecurity Index, whose latest report places Spain in the seventh position among countries around the world. Next, let […]
Status of data protection in Spanish companies
Although the GDPR has been in force for almost a year, according to a study by the Spanish Agency for Data Protection, there are still many companies that do not comply with EU Regulations,. Next, we analyze what is being done wrong in Spain and what to do to solve it.