Tag: risk management

Quando ocorreu o ataque do WannaCry, tive interesse em iniciar uma investigação  para saber a sua origem e como o ataque foi desenvolvido. O que encontrei foi que a exploração usada remonta os vazamentos de informações de um grupo hacker que aconteceram no ano passado e neste ano. Foram cinco vazamentos realizados por hackers e ...
Read Blog
Cuando tuvo lugar el ataque de WannaCry, me interesé en iniciar una investigación acerca de su origen y de cómo se desarrolló el ataque. Encontré que la explotación usada remonta a las fugas de información de un grupo hacker que sucedieron el año pasado y este año. Los hackers llevaron a cabo cinco fugas; una ...
Read Blog
El mercado de seguridad de la información cambia con velocidad asustadora, constantemente son desarrolladas nuevas amenazas y, consecuentemente, nuevos productos son creados para combatirlas. Muchas veces las empresas hacen inversiones en nuevas herramientas de seguridad sin entender si es realmente aquello que necesitan para estar protegidas. En busca de más seguridad las empresas compran e ...
Read Blog
O mercado de segurança da informação muda com velocidade assustadora, constantemente são desenvolvidas novas ameaças e, consequentemente, novos produtos são criados para combatê-las. Muitas vezes as empresas fazem investimentos em novas ferramentas de segurança sem entender se é realmente aquilo que precisam para estarem protegidas. Em busca de mais segurança as empresas compram e instalam ...
Read Blog
How do you manage your Facebook friends? Do you keep your list really tight and only include 'active' pals? Or do you accept everyone you've ever laid eyes on? I'm probably somewhere in between. But... if I have never had a personal conversation with them and 'eyeballed' them in the flesh, then they don't get ...
Read Blog
[caption id="attachment_68785" align="alignleft" width="357"] Fighting a grass fire in high winds[/caption] Those who have experienced them know how scary their world becomes when a grass fire or forest fire gets out of control. As these fires become more intense, they create their own weather, generating their own winds, making them more difficult to fight and ...
Read Blog
It feels like the last song of the concert—this is the final blog in our cybersecurity benchmark series! As every good detective starts with information, we’ve been digging into the classic six “w” questions: who, what, when, where, why, and how. To find those answers for security professionals, data was combined from Ponemon Institute’s global ...
Read Blog
This blog was written by Victor Vásquez Cruz. Sabemos que en ocasiones es difícil entender por qué el área responsable de las tecnologías de la información (TI) insiste tanto a los usuarios de computadoras y dispositivos que deben respetar las reglas y cuidar la seguridad digital, por eso explicaremos los riesgos por amenazas informáticas que ...
Read Blog
Data breaches are commonplace. Every organization that handles sensitive or private data should have a proper capability to respond to an incident. Many companies have a basic set of procedures, while others maintain a mature set of people and processes. A small percentage of organizations over the years have refined their capabilities to a professional level. ...
Read Blog
Do you know that insiders, whether through accident or intent, account for more than 40% of data exfiltration? These incidents often happen when Office documents are copied to a removable drive, USB storage, or cloud file sharing application. One way to significantly reduce these incidents is through the use of a file protection and encryption ...
Read Blog