News

How to Create an Effective Cyber Security Plan

In order to have an effective cyber security plan, first, you need to know what assets must be protected, whether they are material or immaterial nature (buildings, computers, programs, data ...). Once you know this, the possible vulnerabilities must be investigated to determine the risks and how to prevent, avoid or eliminate them. Once this is determined, the plan is done.

In the first half of 2017, computer equipment around the world was affected by a harmful program called "WannaCry." Once executed, it encoded data in such a way that prevented the normal function the programs. Users were forced to pay in bitcoin to some address on the dark web. After the payment was made, they received the key to decode the data and to be able to return to normal, if such a situation of abuse could be called that. When either private individuals or employees received an email simulating a well-known company and executed an attached program, they started the hacking process.

Why were both individuals and businesses affected? Because the path they followed the same simple and easy path of deception. Since in both cases they had received an email that simulated a company known in the market and clicked on an attachment, they started an unstoppable process. Could the previous situation have been avoided?

Intentional Collaboration?

Today we know that in the world there are many people dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, and some even sponsored by countries. These people could facilitate this group, given their deep knowledge of theme, and allow them to perform intrusive cyber-attacks. But apart from this specialisation, it is necessary to add the importance of the collaboration, intentional or not, of people who receive or use emails. Some additional questions arise, do all employees need access to the internet? Can everyone enter or remove data by clicking on an external hard drive (USB) or similar? What employees can have open communications? Which ones are restricted or not restricted at all? Are their passwords safe? If they are responsible for our computers, do we apply the security policies that software manufacturers recommend? It has been found that although many companies are aware of the vulnerability, they do not apply the appropriate policies.

All this leads us to think about how much time and money should be devoted to cybersecurity and how strict company policies should be. Questions that everyone has to answer in one way or another. Finally, companies must prevent cybersecurity from being an activity that prevents the daily development of any business and convert it into an ally that allows working safely. Although certain processes and procedures must be followed, we must have an adequate communication policy.

Fernando Matesanz: "Communication is a fundamental aspect of the Madrid VAT Forum".

Fernando Matesanz, Managing Director of Spanish VAT Services, evaluates in this video the results of the Madrid VAT Forum 2020, the second edition of the VAT congress promoted by his office and organised, on this occasion, together with Thomson Reuters. Matesanz, very satisfied with the response of the speakers and...

Time of doubt, savings and simplification

The knowledge is born of curiosity, curiosity being the daughter of doubt, the awareness that we know nothing (or little) about the world around us or that could surround us. It is for all this that we continue to be amazed and to search around us for these elements. There...

Paper governments

I don't know about you, but I have the feeling of being trapped inside the series "La casa de papel", where the objective is to buy time to keep printing banknotes. Our paper governments dizzy us mercilessly to keep manufacturing votes. We should have known that the day the US elected president...

Litigation Communication

Rocío Hidalgo, PROA Comunicación Manager in the Valencian Community, details the litigation communication service. Proa Comunicación acts before economic crimes, violation of competition rules or data protection, labor or environmental conflicts, accidents, human rights and other situations that may affect the reputation and good name of people and companies. <span...

The Spanish Armed Forces' key contribution to the all-out war against COVID-19

The Spanish Armed Forces are directly engaged in the total biological warfare against the COVID-19 coronavirus pandemic from the very beginning. The military contribution to defeating the lethal viral infection comes for a very simple reason. When the health and social services, the medical supply chain and the...

Dr. José Antonio Rodríguez Piedrabuena -- Interview with Rodrigo Julián Fuentes, forestry engineer

Dr. Rodríguez Piedrabuena interviews Rodrigo Julián Fuentes, forestry engineer and manager of Fomecam, to find out about the problems caused by fires. Through an analysis of their causes, Fuentes explains the consequences of their origination, what preventive measures should be adopted to keep forests undamaged, and the...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.