News

How to create an effective cyber security plan

In order to have an effective cybersecurity plan, it is first necessary to know what assets need to be protected, whether tangible or intangible (buildings, computers, software, data, etc.), and then to investigate possible vulnerabilities in order to determine the risks. What is the purpose of the plan? To prevent, avoid or eliminate these risks.

In the first half of last year 2017, many computers around the world were affected by a malware programme called "WannaCryOnce executed on the computers, it encrypted the data in such a way that it prevented the normal execution of the programs. And the users were forced to pay in bitcoin The payment was made and they received the key to decrypt the data and return to normality, if such a situation of abuse could be called that when both individuals and employees received an email pretending to be from a known company and executed an attached programme.

Why were both individuals and companies affected? Because the path they followed until they fell for the scam was easy and simple, since in both cases they had received an email simulating a well-known company in the market and executed an attached programme initiating the process, becoming unstoppable. Could the above situation have been avoided?

Intentional collaboration?

Today, we know that there are many people in the world dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, even sponsored by countries, which could make it easier for this group to carry out intrusive cyber-attacks on computers. But to this specialisation we have just discussed, we must add the importance of the collaboration, intentional or not, of people who receive or use the email. Some additional questions arise: do all employees need to have access to the internet? can everyone enter or retrieve data by tapping an external hard drive, flash drive or similar? which employees can have open communications? are the passwords that are used secure? If we have computers in our care, do we apply the security policies recommended by software manufacturers? It has been noted and is well known that, even when vulnerabilities are known, many companies do not apply the appropriate policies.

All this leads us to think about how much resources, in time and money, to devote to cyber security and how far to go. These are questions that everyone needs to answer in one way or another. Finally, to prevent cybersecurity from being seen as an activity that impedes the daily development of any business and to see it as an ally that allows us to work safely, even if we have to follow certain processes and procedures, we must have an appropriate communication policy.


Manuel García Ramírez
Director at MGR IT and Security Consultants

Ramón Tamames estimates a 13% fall in Spanish GDP (and III)

In the third and final article in the series, Ramón Tamames, Professor of Economic Structure, Jean Monnet Chair of the European Union and member of the Royal Academy of Moral and Political Sciences, estimates the extent of the recession in Spain and analyses the policies being implemented to combat it ....

We are Conservatives

All current neuroscientists, such as the Spanish professor of neuroscience working in the US, Joaquín M. Fuster, one of the world's leading figures in the study of the cerebral cortex, says: "The vast majority of our decisions are unconscious. This means that we are not aware of the reasons for...

Innovation is no longer an option

Just as the industrial economy was marked by the expansion of markets, the incorporation of new spaces and the mass of workers, the 'new situation' post COVID-19 points to digital transformation and innovation. Although there is no predefined plan or magic recipes, communication is a strategic factor...

Coronavirus and security in the European Union

Since a few months ago the coronavirus is a priority due to how it is affected the countries of the European Union (EU) beyond the social alarm that has been created. It is a threat that has become a reality sooner rather than later. From China, where the pandemic outbreak...

Iñigo Sagardoy -- "We need to listen to the business community".

Iñigo Sagardoy, president of Sagardoy Abogados, has participated in a new PROA video on the management of the coronavirus crisis. Asked about how business confidence can be generated in such a complicated context, Sagardoy stressed the need to reach agreements and "cooperate with everyone"....

Do you grow or are you entertained?

One of the biggest problems in the market for management skills training and coaching services is that we easily confuse entertainment with growth. Not only clients, but even the trainers themselves confuse the art of growing as a person and as a leader with the sheer fun of playing the game.

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.