News

How to create an effective cyber security plan

In order to have an effective cybersecurity plan, it is first necessary to know what assets need to be protected, whether tangible or intangible (buildings, computers, software, data, etc.), and then to investigate possible vulnerabilities in order to determine the risks. What is the purpose of the plan? To prevent, avoid or eliminate these risks.

In the first half of last year 2017, many computers around the world were affected by a malware programme called "WannaCryOnce executed on the computers, it encrypted the data in such a way that it prevented the normal execution of the programs. And the users were forced to pay in bitcoin The payment was made and they received the key to decrypt the data and return to normality, if such a situation of abuse could be called that when both individuals and employees received an email pretending to be from a known company and executed an attached programme.

Why were both individuals and companies affected? Because the path they followed until they fell for the scam was easy and simple, since in both cases they had received an email simulating a well-known company in the market and executed an attached programme initiating the process, becoming unstoppable. Could the above situation have been avoided?

Intentional collaboration?

Today, we know that there are many people in the world dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, even sponsored by countries, which could make it easier for this group to carry out intrusive cyber-attacks on computers. But to this specialisation we have just discussed, we must add the importance of the collaboration, intentional or not, of people who receive or use the email. Some additional questions arise: do all employees need to have access to the internet? can everyone enter or retrieve data by tapping an external hard drive, flash drive or similar? which employees can have open communications? are the passwords that are used secure? If we have computers in our care, do we apply the security policies recommended by software manufacturers? It has been noted and is well known that, even when vulnerabilities are known, many companies do not apply the appropriate policies.

All this leads us to think about how much resources, in time and money, to devote to cyber security and how far to go. These are questions that everyone needs to answer in one way or another. Finally, to prevent cybersecurity from being seen as an activity that impedes the daily development of any business and to see it as an ally that allows us to work safely, even if we have to follow certain processes and procedures, we must have an appropriate communication policy.


Manuel García Ramírez
Director at MGR IT and Security Consultants

Pilar Trucios: "If you don't see new things you will always do the same".

Pilar Trucios, co-founder of Experience Ahead and Women Angels for STEAM, talks to Lucía Casanueva, managing partner of PROA, about communication and the challenges facing the media. This video may be reproduced provided that PROA is credited as the original source.

...

Roberto Ruiz Ballesteros: "Public opinion has to be fair".

Roberto Ruiz Ballesteros, a journalist specialising in court and investigative reporting, reflects on the conflicts that arise in litigation reporting and the importance it has in resolving sensitive cases: "When someone is immersed in a judicial process, they are at a very sensitive moment. Their prestige...

What We Are

Consider that the moral garbage that we are inundated by (for example, on television) is affecting our genes and we do not defend ourselves from the moment that those who break with their programs, a structure of millennia, with lightness that gives them lack of morals, crammed with rights to...

Political communication in times of incommunication

Information, over-information, but above all disinformation are inexhaustible sources of sudden and uncritical reflections. Moreover, in a time of physical confinement, where disruption is not only social and economic, but also sentimental, opinions flow with the speed of a single thought and with the speed of a...

-- Ofelia Tejerina: "99% of companies are exposed to cyber-attacks".

PROA interviews lawyer and president of the Asociación de Internautas, Ofelia Tejerina, on cybersecurity in companies. This VIDEO may be reproduced provided that PROA is credited as the original source.

...

Communication Challenges for Fund Management Firms

Antonio Salido, marketing and strategy consultant specializing in the financial sector explains the challenges currently faced by fund managers including: the digitalization, the regulatory changes, and the greater demands of clients. The former Global Head of Brand in the European division at Fidelity, one the world's largest financial managers, discusses...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.