News

This is how an effective cybersecurity plan is developed

In order to have an effective cybersecurity plan, first of all one must know what assets need to be protected, whether they are tangible or intangible (buildings, computers, programs, data...). Once known, one must investigate the possible vulnerabilities in order to determine the risks. What is the purpose of the plan? To prevent, avoid or eliminate those risks.

In the first half of 2017, many computers around the world were affected by a harmful program called "WannaCry", which once executed on the computers encrypted the data in such a way that it prevented the normal execution of the programs. And users were forced to pay in bitcoin at a hidden network address. Once the payment was made, they received the key to decode the data, and were able to return to normal, if such an abusive situation could be called that, when both individuals and employees received an email simulating a known company and ran an attachment.

Why were both individuals and companies affected? Because the course they followed until they fell into the trap was easy and simple, since in both cases they had received an email simulating a company known in the market and they executed an attached program starting the process, becoming unstoppable. Could the previous situation have been avoided?

Collaboration, intentional?

Nowadays, we know that there are many people in the world dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, even sponsored by countries, which could make it easier for this group to carry out intrusive cyber-attacks on computers. But to this specialisation we must add how important is the collaboration, intentional or not, of people who receive or use emails. Some additional questions arise: does everyone need to have access to the internet? can everyone enter or extract data by clicking on an external hard drive, (pendrive) or similar? which employees can have open communications? are the access keys used secure? If we have equipment in our charge, do we apply the security policies that software manufacturers recommend? It has been observed, and it is well known, that even though the vulnerability is known, many companies do not apply the appropriate policies.

All this leads us to think about how many resources, in time and money, should be devoted to cybersecurity and how far to go. Questions that everyone has to answer in one way or another. Finally, in order to avoid cyber security being taken as an activity that prevents the daily development of any business and to live it as an ally that allows working in a safe way, even if certain processes and procedures have to be followed, we must have a proper communication policy.


Manuel García Ramírez
MGR Consultants IT and Security Manager

The Job Market requires Workers with New Tech Skills

The Institute of Graduate Studies in Business (IESE) recently presented a report on the expectations regarding the youth employability, based on a survey of 53 large companies operating in Spain. The study compiled employers' opinions on whether the current educational system effectively prepares future workers to build a professional profile...

"Exercise is the best pill".

Dr. Ángel Durántez, expert in Sports Medicine and Age Management, explains the benefits of a healthy lifestyle and the differences between strength training and aerobics. Proa Comunicación recovers these unpublished reflections of Dr. Durántez, recorded in July 2019. "Exercise is the best pill", says Dr. Durántez, who explains that "it...

Human sociability pre and post-COVID-19

Human sociability is a fact of common experience. Since prehistoric times, the social appears as a characteristic of human life that implies union and coexistence in order to survive. There are many evidences of the fact that human beings live and coexist in society, but what is the origin of...

Eduardo Rodríguez Rovira -- Spain fails on coronavirus

After the drastic confinement of more than 100 days, this period of pandemic is over, but we are not closing the door on the way out. This is the moment to be able to criticise the phase that is ending and to express what Spaniards think about what has happened so far. The Eurobarometer...

"We must recover the value of the word in order to get closer to the truth".

Alfonso Armada, president of the Spanish section of Reporters Without Borders, has reviewed the situation of the press and the journalistic profession in the Proa Comunicación videos on the occasion of its tenth anniversary. In reference to the main challenges facing the media and journalists, he considers it necessary to recover the...

How to Manage Reputational Scandals

Alberto Andreu, associate professor of the Faculty of Economic Sciences and Business of the University of Navarra, clarifies what reputational scandals are, what their causes are and how they can be managed. "Companies have to organise their work more by projects than by functions. Reputational risk occurs when there is...

More conversations, more ideas, more PROA.
Follow us on our networks.

Receive ideas with criteria

Every week we share reflections, trends and the key aspects of about reputation, strategic communication, public affairs and innovation. Content designed for professionals who value information with diligence and perspective.