News

Security and cybersecurity

No one nowadays can imagine that our homes do not have doors with all kinds of locks, armoured and protected in many cases by an alarm that can be connected to an alarm system.
an alarm centre; and if necessary, presence detectors and a thousand other devices that I could go on and on. The cybersecurity deals with other areas such as mobile phones, mobile phones, mobile
tablets, laptops, computers, cars and all kinds of devices that connect to a network. (Internet). With the implementation in mid-September of the European Payments Directive, better known as PSD2, which makes it mandatory to have "strong authentication" (which means using two of the following three: something the person knows, PIN, password, etc.). Something the person possesses, credential, swipe card...etc. Something that the person is, facial recognition, retina...etc.) in this type of transactions, we are forced to review how secure or not, are the economic ones, which we do from our devices.

How can we protect them? Beyond the physical protection that prevents scratches or damage in transport, no one carries their mobile or laptop tethered. What kind of protection are we dedicating to these devices? As always, logical protection is an option to consider with non-obvious passwords, changing them from time to time, which seems simple, but requires discipline. If we use the mobile as if it were a computer and sensitive data is stored, we have to consider whether we need to increase the levels of security by using paid software to protect them, antivirus or biometric measures, which have their limitations, even applying them all at the same time.

There are facts in cybersecurity that can go unnoticed, such as having private data and files on the same computer, with which we connect to the network, of which we do not have access.
If we do not know if they are secure, this can infect us with viruses and even cause us to lose the information we have stored, does it make sense to use two computers, one with sensitive data and another for connections, hobbies and leisure? In the hyper-connected world in which we live, does it make sense to use two computers, one for sensitive data and the other for connections, hobbies and leisure? How can we be sure that no one has connected to our car's computer, accessed it and compromised the information?

These are issues for which cybersecurity is already offering solutions, just as it once offered solutions to theft, abuse and encroachment on one's own land, locks and
barred windows. The subject is diverse, exciting and complex, but in the meantime it would not hurt to use common sense and use some basic rules that help to safeguard the privacy of the information we possess, such as being cautious when exchanging files, not connecting to any place that is not sufficiently trustworthy, changing passwords more often and, in short, being reasonably suspicious and, if possible, informing ourselves beforehand with a cybersecurity expert.


Manuel García Ramírez
Director at MGR IT and Security Consultants

"Media companies have to facilitate dialogue".

Casimiro García Abadillo, director of El Independiente, discusses the current situation of journalism and the journalistic profession, and reviews the evolution of the press as a mechanism of power. He also offers his views on the paywall as the future of the digital press and the future of...

10 Management Skills Required by Companies

Carlos Recarte, founding partner of Recarte & Fontenla, explains in Proa Comunicación's video when companies should call a headhunter. Also, he describes to what extent it is important to consider the professional environment and highlights the 10 management skills that companies currently require: The courage and determination to take risks...

Spanish Media Still Lacking in Transparency

Spanish media groups are still not aware of the risks that affect their credibility and editorial independence today. This is the main conclusion of the report "Front Page: Report on Transparency and Good Governance on the Credibility and Independence of Media Groups", prepared by the Commitment and Transparency Foundation. Moreover,...

Millennials vs. Baby Boomers

When the children of your first classmates start arriving at the company, you may feel some contradictory sentiments. After remeniscing in your pleasant memories of the first professional steps you took, a bell goes off when you realize that those very children you saw years ago cuddled up in cradles,...

BCG Report - It's time to Reimagine Diversity, Equity & Inclusion

Companies must address the multiplicity of identities of diversity, equity and inclusion by redefining and understanding the needs of each individual, looking for patterns of difference, and devising solutions that address differences holistically, according to a new report from Boston Consulting Group (BCG). With more than 25,000 responses from 12...

José Antonio Rodríguez Piedrabuena -- Upcoming mental health plans

While we thought we were masters of our memory and our impulses, we see that the bacteria in our gut significantly modulate how our brains function Mental health plans target humans, an indivisible composite of environment, body, brain and the microbes that live within and in our bodies....

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.