· Secure configuration of iOS devices

Secure configuration of iOS devices


· Secure configuration of Android devices

Secure configuration of Android devices


· Recommendations on Cybersecurity

It can be said that there is no system that guarantees 100% the security of the service it provides and the information it handles due, to a large extent, to the vulnerabilities presented by the technologies and, most importantly, the impossibility of having sufficient resources to deal with them.


· Best Practices in the use of technology

The following guidelines will help you adopt good practices in the use of technology because, who likes to work for someone else?