News

How to create an effective cyber security plan

In order to have an effective cybersecurity plan, it is first necessary to know what assets need to be protected, whether tangible or intangible (buildings, computers, software, data, etc.), and then to investigate possible vulnerabilities in order to determine the risks. What is the purpose of the plan? To prevent, avoid or eliminate these risks.

In the first half of last year 2017, many computers around the world were affected by a malware programme called "WannaCryOnce executed on the computers, it encrypted the data in such a way that it prevented the normal execution of the programs. And the users were forced to pay in bitcoin The payment was made and they received the key to decrypt the data and return to normality, if such a situation of abuse could be called that when both individuals and employees received an email pretending to be from a known company and executed an attached programme.

Why were both individuals and companies affected? Because the path they followed until they fell for the scam was easy and simple, since in both cases they had received an email simulating a well-known company in the market and executed an attached programme initiating the process, becoming unstoppable. Could the above situation have been avoided?

Intentional collaboration?

Today, we know that there are many people in the world dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, even sponsored by countries, which could make it easier for this group to carry out intrusive cyber-attacks on computers. But to this specialisation we have just discussed, we must add the importance of the collaboration, intentional or not, of people who receive or use the email. Some additional questions arise: do all employees need to have access to the internet? can everyone enter or retrieve data by tapping an external hard drive, flash drive or similar? which employees can have open communications? are the passwords that are used secure? If we have computers in our care, do we apply the security policies recommended by software manufacturers? It has been noted and is well known that, even when vulnerabilities are known, many companies do not apply the appropriate policies.

All this leads us to think about how much resources, in time and money, to devote to cyber security and how far to go. These are questions that everyone needs to answer in one way or another. Finally, to prevent cybersecurity from being seen as an activity that impedes the daily development of any business and to see it as an ally that allows us to work safely, even if we have to follow certain processes and procedures, we must have an appropriate communication policy.


Manuel García Ramírez
Director at MGR IT and Security Consultants

Technology dominates the intangible market

The top seven companies with the largest intangible value in the world belong to the technology sector. They are Amazon, Microsoft, Apple, Alphabet (Google), Alibaba, Facebook and Tencent. This is discussed by the Global Intangible Finance Tracker (GIFT) 2018, which was presented this Tuesday by Corporate Excellence and attended by...

Now more than ever, the SME needs a contingency plan

"We're living this like a movie, a scary movie." This was the beginning of one of the many announcements that have flooded the net these days and which so well reflects the uncertainty that many entrepreneurs are experiencing. And perhaps it is for this very reason, because of the fear...

Managing the coronavirus crisis from a family business perspective

In the face of this serious crisis, I wanted to turn to the top leaders of long-established and successful family businesses. Their lessons are particularly timely now. For days now we have been severely hit by the pandemic of the now sadly famous Covid-2019 coronavirus. My sympathy for the victims and the sick as well as my enormous...

José M. de Areilza Carvajal --"We must rethink the European ideal".

José María de Areilza Carvajal, General Secretary of ASPEN Institute Spain, Professor and holder of the Jean Monnet Chair at ESADE, has participated in a new video by PROA in which he has set out his view on the doubts surrounding the European Union model and the credibility of the...

Tips for coping in times of uncertainty

We are living in exceptional times, the country and the world are at a standstill. Non-primary companies are closing down, making redundancies. Entrepreneurs are terrified, markets are collapsing. We recently experienced another deep crisis and we still haven't recovered from it, that crisis has already left us...

Vulnerable older people

The coronavirus pandemic is fatally affecting the elderly and those of any age who are healthily compromised by major diseases. This happens not only in epidemics but in all natural disasters, situations of war, famine etc. in which the older generation is decimated and sometimes disappears. In these circumstances, priority...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.