{"id":14724,"date":"2019-10-08T13:55:05","date_gmt":"2019-10-08T11:55:05","guid":{"rendered":"https:\/\/proacomunicacion.es\/?p=14724"},"modified":"2019-10-08T13:55:05","modified_gmt":"2019-10-08T11:55:05","slug":"security-and-cyber-security","status":"publish","type":"post","link":"https:\/\/proacomunicacion.es\/en\/security-and-cyber-security\/","title":{"rendered":"Security and Cyber Security"},"content":{"rendered":"<p>Nobody nowadays understands how our homes could lack doors with locks, considering all of the kinds available, armoured and protected in many cases by an alarm that can be connected to an alarm centre; and if necessary, motion detectors and a thousand other devices that I could go on enumerating.<strong> Cybersecurity deals with other types of areas such as mobile phones, notebooks, laptops, computers, cars and all kinds of devices that connect to a network<\/strong> (Internet). With the launch in mid-September of the European Payment Directive, better known as PSD2, which requires having a \"strong authentication\" (which involves using two of the following three: something that the person knows, PIN, password, etc. Something that the person owns, credential, magnetic card... etc. Something that the person is, facial recognition, retina ... etc.) in these types of transactions, economic ones specifically, we are forced to review what we do from our devices as safe or not.<\/p>\n<p>How can we protect them? Beyond the physical protection that prevents scratches or deterioration while carrying them, but nobody carries their cellphone or laptop completely bundled up, what kind of protection are we giving these devices? As always, logical protection is an option to consider with non-obvious passwords and changing them from time to time seems simple, but it requires discipline. If we use our cellphones like computers, and sensitive data is stored on them, we have to ask ourselves if we need to increase the security levels using payment programs to protect them, antivirus, or biometric measures, which have their limitations, even if we apply them all at once.<\/p>\n<p>There are facts in cybersecurity that can go unnoticed, such as having private data and files on the same computer that we connect to the internet, however, we do not know if those files are safe. Our computers can be infected with viruses and even cause us to lose the information we have saved. Does it make sense to use two computers, one with sensitive data and the other for connecting to the internet, hobbies and leisure? In the hyperconnected world we live in, <strong>how can we be sure that nobody has connected to our car's computer, and accessed and compromised the information?<\/strong><\/p>\n<p>There are issues that cybersecurity is already offering solutions for, like the solutions of older times against theft, abuse and invasion on your own land such as locks and windows with bars. The topic is diverse, exciting and complex, but in the meantime it would not hurt to use common sense and some basic rules that help to safeguard the privacy of the information such as avoiding negligence when exchanging files, not connecting to an unreliable network, changing passwords more often, and ultimately being reasonably distrustful and, if possible, informing a cybersecurity expert in advance.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><a class=\"lightbox-added alignleft\" href=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2019\/10\/foto-manuel-garcia-1.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-14717 size-thumbnail\" src=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2019\/10\/foto-manuel-garcia-1-80x80.jpg\" alt=\"\" width=\"80\" height=\"80\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><strong>Manuel Garc\u00eda Ram\u00edrez<\/strong><br \/>\nDirector at MGR Consultants IT and Security<\/p>","protected":false},"excerpt":{"rendered":"<p>Nobody nowadays understands how our homes could lack doors with locks, considering all of the kinds available, armoured and protected in many cases by an alarm that can be connected to an alarm centre; and if necessary, motion detectors and a thousand other devices that I could go on enumerating. Cybersecurity deals with other types [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":14719,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176],"tags":[1374,1375,1376,1377,1378],"class_list":["post-14724","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-security","tag-data-protection","tag-european-payment-directive","tag-personal-data","tag-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security and Cyber Security: How to Protect our Devices<\/title>\n<meta name=\"description\" content=\"Manuel Garc\u00eda Ram\u00edrez discusses how we can have a better handle on the security of our personal devices when everything we do is online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proacomunicacion.es\/en\/security-and-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and Cyber Security: How to Protect our Devices\" \/>\n<meta property=\"og:description\" content=\"Manuel Garc\u00eda Ram\u00edrez discusses how we can have a better handle on the security of our personal devices when everything we do is online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proacomunicacion.es\/en\/security-and-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PROA Comunicaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-08T11:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2025\/08\/Firefly_radio-de-barco-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PROA Comunicaci\u00f3n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@proacomunica\" \/>\n<meta name=\"twitter:site\" content=\"@proacomunica\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PROA Comunicaci\u00f3n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/\"},\"author\":{\"name\":\"PROA Comunicaci\u00f3n\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60\"},\"headline\":\"Security and Cyber Security\",\"datePublished\":\"2019-10-08T11:55:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/\"},\"wordCount\":478,\"publisher\":{\"@id\":\"https:\/\/proacomunicacion.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"cyber security\",\"data protection\",\"European payment directive\",\"personal data\",\"privacy\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/\",\"url\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/\",\"name\":\"Security and Cyber Security: How to Protect our Devices\",\"isPartOf\":{\"@id\":\"https:\/\/proacomunicacion.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-10-08T11:55:05+00:00\",\"description\":\"Manuel Garc\u00eda Ram\u00edrez discusses how we can have a better handle on the security of our personal devices when everything we do is online.\",\"breadcrumb\":{\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/proacomunicacion.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proacomunicacion.es\/#website\",\"url\":\"https:\/\/proacomunicacion.es\/\",\"name\":\"PROA Comunicaci\u00f3n\",\"description\":\"Agencia de Comunicaci\u00f3n Corporativa en Madrid, Barcelona y Galicia.\",\"publisher\":{\"@id\":\"https:\/\/proacomunicacion.es\/#organization\"},\"alternateName\":\"PROA Comunicaci\u00f3n\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proacomunicacion.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proacomunicacion.es\/#organization\",\"name\":\"PROA Comunicaci\u00f3n\",\"alternateName\":\"PROA Comunicaci\u00f3n\",\"url\":\"https:\/\/proacomunicacion.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg\",\"contentUrl\":\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg\",\"width\":136,\"height\":33,\"caption\":\"PROA Comunicaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/proacomunica\",\"https:\/\/es.linkedin.com\/company\/proa-comunicacion_2\",\"https:\/\/www.instagram.com\/proacomunica\/\",\"https:\/\/www.youtube.com\/@proacomunicacion\",\"https:\/\/es.wikipedia.org\/wiki\/PROA_Comunicacin\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60\",\"name\":\"PROA Comunicaci\u00f3n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g\",\"caption\":\"PROA Comunicaci\u00f3n\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and Cyber Security: How to Protect our Devices","description":"Manuel Garc\u00eda Ram\u00edrez discusses how we can have a better handle on the security of our personal devices when everything we do is online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proacomunicacion.es\/en\/security-and-cyber-security\/","og_locale":"en_GB","og_type":"article","og_title":"Security and Cyber Security: How to Protect our Devices","og_description":"Manuel Garc\u00eda Ram\u00edrez discusses how we can have a better handle on the security of our personal devices when everything we do is online.","og_url":"https:\/\/proacomunicacion.es\/en\/security-and-cyber-security\/","og_site_name":"PROA Comunicaci\u00f3n","article_published_time":"2019-10-08T11:55:05+00:00","og_image":[{"width":2560,"height":1414,"url":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2025\/08\/Firefly_radio-de-barco-scaled.jpg","type":"image\/jpeg"}],"author":"PROA Comunicaci\u00f3n","twitter_card":"summary_large_image","twitter_creator":"@proacomunica","twitter_site":"@proacomunica","twitter_misc":{"Written by":"PROA Comunicaci\u00f3n","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#article","isPartOf":{"@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/"},"author":{"name":"PROA Comunicaci\u00f3n","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60"},"headline":"Security and Cyber Security","datePublished":"2019-10-08T11:55:05+00:00","mainEntityOfPage":{"@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/"},"wordCount":478,"publisher":{"@id":"https:\/\/proacomunicacion.es\/#organization"},"image":{"@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage"},"thumbnailUrl":"","keywords":["cyber security","data protection","European payment directive","personal data","privacy"],"articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/","url":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/","name":"Security and Cyber Security: How to Protect our Devices","isPartOf":{"@id":"https:\/\/proacomunicacion.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-10-08T11:55:05+00:00","description":"Manuel Garc\u00eda Ram\u00edrez discusses how we can have a better handle on the security of our personal devices when everything we do is online.","breadcrumb":{"@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proacomunicacion.es\/security-and-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/proacomunicacion.es\/security-and-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/proacomunicacion.es\/"},{"@type":"ListItem","position":2,"name":"Security and Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/proacomunicacion.es\/#website","url":"https:\/\/proacomunicacion.es\/","name":"PROA Communication","description":"Corporate Communications Agency in Madrid, Barcelona and Galicia.","publisher":{"@id":"https:\/\/proacomunicacion.es\/#organization"},"alternateName":"PROA Comunicaci\u00f3n","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proacomunicacion.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proacomunicacion.es\/#organization","name":"PROA Communication","alternateName":"PROA Comunicaci\u00f3n","url":"https:\/\/proacomunicacion.es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/","url":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg","contentUrl":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg","width":136,"height":33,"caption":"PROA Comunicaci\u00f3n"},"image":{"@id":"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/proacomunica","https:\/\/es.linkedin.com\/company\/proa-comunicacion_2","https:\/\/www.instagram.com\/proacomunica\/","https:\/\/www.youtube.com\/@proacomunicacion","https:\/\/es.wikipedia.org\/wiki\/PROA_Comunicacin"]},{"@type":"Person","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60","name":"PROA Communication","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g","caption":"PROA Comunicaci\u00f3n"}}]}},"_links":{"self":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts\/14724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/comments?post=14724"}],"version-history":[{"count":0,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts\/14724\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/media?parent=14724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/categories?post=14724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/tags?post=14724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}