Preventing Data Breach

Aug 21, 2019

Data breach means a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. It may involve exposure of personal information like social security numbers, credit card numbers or bank details, healthcar

7 basic security tips in IoT

Aug 15, 2019

By 2017, Gartner estimated that there would be 8.4 billion Internet Stuff (IoT) devices in use - a 30 percent jump from 2016. But all of this advanced, integrated technology leaves room for potential security threats such as hackers and malware. If you use a smart device, increase your safety with t

Eight safety tips for those who want to invest in digital currencies

Aug 14, 2019

Anyone investing in or planning to invest in cryptocurrencies needs to keep in mind that one of the essential precautions to avoid problems is to reinforce care about information security. According to Galeno Garbe, Bitcoin Market CSO, just like any other online transaction, trading in virtual curre

Security is central to Edge Computing

Aug 08, 2019

Enter social networks and talk to friends, access that online store, browse the categories and choose the ideal product. Sign in to YouTube or Netflix to watch your favorite channels and series. Interact with the virtual assistant to know the agenda of the day and the weather forecast for the weeken

Tips to Protect Your Digital Privacy

Aug 02, 2019

How do you feel safe? A camera installed at the entrance to the building? Alarm in the car? Walls and fences? We need certain protections to feel safe. In the digital universe, it is no different, to protect our information and maintain our privacy we need certain tools.   A VPN protects our

Security and risk management trends

Jul 29, 2019

Gartner has identified seven emerging security and risk management trends that will affect security, privacy and risk leaders in the long run.   Gartner defines "top" trends as ongoing strategic changes in the security ecosystem that are not yet widely recognized, but are expected to have a b

The importance of user awareness in information security

Jul 25, 2019

IT professionals know that Information Security (IS) is responsible for protecting a data set to preserve the value that an individual or organization holds. Confidentiality, integrity, availability, authenticity and legality are basic properties of SI.   But contrary to popular knowledge, th

Communication with employees is better weapon against cyber attacks

Jul 24, 2019

EY Consulting, which has heard more than 1,400 executives globally, pointed out that for 54% of national organizations, the great vulnerability in the company are malicious and inattentive collaborators, while 45% said they could hardly foresee threats of data theft.   The fact is that the th

Is Bitcoin a safe investment?

Jul 18, 2019

Before answering this question, one must understand the meaning of the word risk in this universe. It is likely that you have already heard that such an investment is risky or that the other is almost without risk, is not it? But what does it mean? We can separate all investments available in the m

Human factor and information security

Jul 18, 2019

In times of digital information systems and online data storage tools, concern for protecting and maintaining the confidentiality of this information is essential for individuals and businesses. Programs, applications and protection systems offer good support for this type of problem. But what not e

6 Data Security Flaws You Should Not Commit

Jul 16, 2019

Any company is likely to fail data security regardless of its size. Want an example? Even major players in the market, such as Amazon, Google and Yahoo, have already been affected by virtual attacks and stealth data leakage.   Not coincidentally, at least eight of the ten most common data sec

US court rules that Qualcomm has violated antitrust laws

May 23, 2019

US courts have ruled that Qualcomm violates the country's antitrust laws by charging a percentage of each smartphone sold with its components. The court's ruling should also compel the company to license its telecommunication technologies to rival manufacturers, which, too, have been a monopolizing

Eset unveils malware that takes control of e-mail communication

May 14, 2019

Eset revealed this week that it has discovered a Microsoft Exchange backdoor called LightNeuron, which can read, modify or block any e-mail that passes through the server, including writing new messages and sending them, under the identity of any legitimate user.   According to the security c

Cyber Security Top Practices

May 13, 2019

Cyber security threats are growing, and that businesses of a kinds are falling victim to cyberattacks. Some industries are more likely to be under attack than others (a shocking 89% of healthcare organizations have had a data breach or theft in the past two years!), but small and large bus

Top ten robberies suffered by criptomoedas exchanges in history

May 10, 2019

Hacker attacks on criptomoedas exchanges are more common than we would like. Robberies can range from a few billion to billions of dollars, hurting not only businesses, but also their customers and investors.   Those responsible for the exchanges should stick to the flaws their systems may ha