· Incident Prevention Measures
Given the malware and disinformation campaigns that are being generated as a result of the coronavirus pandemic, we advise you to follow the following recommendations.
Cryptojacking is the illegitimate use of an electronic device, without the user's consent or knowledge, by criminals to undermine cryptocurrencies.
· Zero Trust in corporate networks
It is an IT security model that requires strict identity verification for each person and device that tries to access the resources of a network.
Phishing attacks use social engineering to fraudulently acquire users' personal information.