· Incident Prevention Measures


· CiberCOVID19

Given the malware and disinformation campaigns that are being generated as a result of the coronavirus pandemic, we advise you to follow the following recommendations.

Infografía

Infografía

Infografía

Infografía

Infografía

 

 

 


· Cryptojacking

Cryptojacking is the illegitimate use of an electronic device, without the user's consent or knowledge, by criminals to undermine cryptocurrencies.


· Zero Trust in corporate networks

It is an IT security model that requires strict identity verification for each person and device that tries to access the resources of a network.

Infografía

 

· Phishing

Phishing attacks use social engineering to fraudulently acquire users' personal information.