· Secure configuration of iOS devices

Secure configuration of iOS devices


· Secure configuration of Android devices

Secure configuration of Android devices


· Recommendations on Cybersecurity

It can be said that there is no system that guarantees 100% the security of the service it provides and the information it handles due, to a large extent, to the vulnerabilities presented by the technologies and, most importantly, the impossibility of having sufficient resources to deal with them.


· Best Practices in the use of technology

The following guidelines will help you adopt good practices in the use of technology because, who likes to work for someone else?

Este sitio web utiliza cookies propias y de terceros para el correcto funcionamiento y visualización del sitio web por parte del usuario, así como la recogida de estadísticas. Si continúa navegando, consideramos que acepta su uso. Puede cambiar la configuración u obtener más información consultando nuestra Política de Cookies.