No one nowadays can imagine that our homes do not have doors with all kinds of locks, armoured and protected in many cases by an alarm that can be connected to an alarm system.
an alarm centre; and if necessary, presence detectors and a thousand other devices that I could go on and on. The cybersecurity deals with other areas such as mobile phones, mobile phones, mobile
tablets, laptops, computers, cars and all kinds of devices that connect to a network. (Internet). With the implementation in mid-September of the European Payments Directive, better known as PSD2, which makes it mandatory to have "strong authentication" (which means using two of the following three: something the person knows, PIN, password, etc.). Something the person possesses, credential, swipe card...etc. Something that the person is, facial recognition, retina...etc.) in this type of transactions, we are forced to review how secure or not, are the economic ones, which we do from our devices.
How can we protect them? Beyond the physical protection that prevents scratches or damage in transport, no one carries their mobile or laptop tethered. What kind of protection are we dedicating to these devices? As always, logical protection is an option to consider with non-obvious passwords, changing them from time to time, which seems simple, but requires discipline. If we use the mobile as if it were a computer and sensitive data is stored, we have to consider whether we need to increase the levels of security by using paid software to protect them, antivirus or biometric measures, which have their limitations, even applying them all at the same time.
There are facts in cybersecurity that can go unnoticed, such as having private data and files on the same computer, with which we connect to the network, of which we do not have access.
If we do not know if they are secure, this can infect us with viruses and even cause us to lose the information we have stored, does it make sense to use two computers, one with sensitive data and another for connections, hobbies and leisure? In the hyper-connected world in which we live, does it make sense to use two computers, one for sensitive data and the other for connections, hobbies and leisure? How can we be sure that no one has connected to our car's computer, accessed it and compromised the information?
These are issues for which cybersecurity is already offering solutions, just as it once offered solutions to theft, abuse and encroachment on one's own land, locks and
barred windows. The subject is diverse, exciting and complex, but in the meantime it would not hurt to use common sense and use some basic rules that help to safeguard the privacy of the information we possess, such as being cautious when exchanging files, not connecting to any place that is not sufficiently trustworthy, changing passwords more often and, in short, being reasonably suspicious and, if possible, informing ourselves beforehand with a cybersecurity expert.
Manuel García Ramírez
Director at MGR IT and Security Consultants
