News

How to create an effective cyber security plan

In order to have an effective cybersecurity plan, it is first necessary to know what assets need to be protected, whether tangible or intangible (buildings, computers, software, data, etc.), and then to investigate possible vulnerabilities in order to determine the risks. What is the purpose of the plan? To prevent, avoid or eliminate these risks.

In the first half of last year 2017, many computers around the world were affected by a malware programme called "WannaCryOnce executed on the computers, it encrypted the data in such a way that it prevented the normal execution of the programs. And the users were forced to pay in bitcoin The payment was made and they received the key to decrypt the data and return to normality, if such a situation of abuse could be called that when both individuals and employees received an email pretending to be from a known company and executed an attached programme.

Why were both individuals and companies affected? Because the path they followed until they fell for the scam was easy and simple, since in both cases they had received an email simulating a well-known company in the market and executed an attached programme initiating the process, becoming unstoppable. Could the above situation have been avoided?

Intentional collaboration?

Today, we know that there are many people in the world dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, even sponsored by countries, which could make it easier for this group to carry out intrusive cyber-attacks on computers. But to this specialisation we have just discussed, we must add the importance of the collaboration, intentional or not, of people who receive or use the email. Some additional questions arise: do all employees need to have access to the internet? can everyone enter or retrieve data by tapping an external hard drive, flash drive or similar? which employees can have open communications? are the passwords that are used secure? If we have computers in our care, do we apply the security policies recommended by software manufacturers? It has been noted and is well known that, even when vulnerabilities are known, many companies do not apply the appropriate policies.

All this leads us to think about how much resources, in time and money, to devote to cyber security and how far to go. These are questions that everyone needs to answer in one way or another. Finally, to prevent cybersecurity from being seen as an activity that impedes the daily development of any business and to see it as an ally that allows us to work safely, even if we have to follow certain processes and procedures, we must have an appropriate communication policy.


Manuel García Ramírez
Director at MGR IT and Security Consultants

The Brain and Neural Networks

Dr. José Antonio Rodríguez Piedrabuena, specialist in psychiatry and psychoanalysis, dissects the brain and neural networks in the third video of five made by PROA Comunicación. Currently there is a crisis of creative solutions, repeated formulas of the last century can be found in the political, educational and cultural fields ....

Pilar Trucios: "If you don't see new things you will always do the same".

Pilar Trucios, co-founder of Experience Ahead and Women Angels for STEAM, talks to Lucía Casanueva, managing partner of PROA, about communication and the challenges facing the media. This video may be reproduced provided that PROA is credited as the original source.

...

-- Gamma Health relies on PROA for mask communication to inactivate COVID-19

Gamma Health, a Spanish company of DiggiaGroup, specialized in the supply of health and protection equipment, has trusted PROA to develop the communication and marketing strategy of its new product, GHKill-VID-WiseProtec, the first reusable mask that inactivates the COVID-19. Gamma Health has ensured the exclusive online distribution of this mask....

Challenges of the global economy in the decade 2020-2030

In these days of confinement I have been reading the book Crisis Economics written by Nouriel Roubini and Stephen Mihm in 2010. Roubini analyses in detail the most relevant economic crises experienced in our recent history since the 19th century and the economic policies applied to contain them. Although each...

How does the brain work?

Rafael Yuste, a Spaniard, at Columbia University in New York City from the programme that is studying the brain in the US, has been given ten years. So look at the simplifications that are working out there. "It is a kind of exploratory research, like...

José Antonio R. Piedrabuena -- What is happening to us?

For ten thousand years humanity has always been shepherded by various indoctrinations, with that dogmatic certainty of knowing in which direction we have to walk, with its secrets, its elites..., as it is now. The current shepherding forces a Spanish historian to write a book: "Educar en la mentira" ("Educating in lies"),...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.