{"id":15246,"date":"2019-12-23T10:00:13","date_gmt":"2019-12-23T09:00:13","guid":{"rendered":"https:\/\/proacomunicacion.es\/?p=15246"},"modified":"2019-12-23T10:00:13","modified_gmt":"2019-12-23T09:00:13","slug":"how-to-create-an-effective-cyber-security-plan-2","status":"publish","type":"post","link":"https:\/\/proacomunicacion.es\/en\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/","title":{"rendered":"How to create an effective cyber security plan"},"content":{"rendered":"<p>In order to have an effective cybersecurity plan, it is first necessary to know what assets need to be protected, whether tangible or intangible (buildings, computers, software, data, etc.), and then to investigate possible vulnerabilities in order to determine the risks. What is the purpose of the plan? To prevent, avoid or eliminate these risks.<\/p>\n<p>In the first half of last year 2017, many computers around the world were affected by a malware programme called <strong>\"WannaCry<\/strong>Once executed on the computers, it encrypted the data in such a way that it prevented the normal execution of the programs. And the users were forced to pay in <strong>bitcoin<\/strong> The payment was made and they received the key to decrypt the data and return to normality, if such a situation of abuse could be called that when both individuals and employees received an email pretending to be from a known company and executed an attached programme.<\/p>\n<p>Why were both individuals and companies affected? Because the path they followed until they fell for the scam was easy and simple, since in both cases they had received an email simulating a well-known company in the market and executed an attached programme initiating the process, becoming unstoppable. Could the above situation have been avoided?<\/p>\n<p><strong>Intentional collaboration?<\/strong><\/p>\n<p>Today, we know that there are many people in the world dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, even sponsored by countries, which could make it easier for this group to carry out intrusive cyber-attacks on computers. But to this specialisation we have just discussed, we must add the importance of the collaboration, intentional or not, of people who receive or use the <em>email<\/em>. Some additional questions arise: do all employees need to have access to the internet? can everyone enter or retrieve data by tapping an external hard drive, flash drive or similar? which employees can have open communications? are the passwords that are used secure? If we have computers in our care, do we apply the security policies recommended by software manufacturers? It has been noted and is well known that, even when vulnerabilities are known, many companies do not apply the appropriate policies.<\/p>\n<p>All this leads us to think about how much resources, in time and money, to devote to cyber security and how far to go. These are questions that everyone needs to answer in one way or another. Finally, to prevent cybersecurity from being seen as an activity that impedes the daily development of any business and to see it as an ally that allows us to work safely, even if we have to follow certain processes and procedures, we must have an appropriate communication policy.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><a class=\"lightbox-added alignleft\" href=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2019\/10\/foto-manuel-garcia-1.jpg\"><img decoding=\"async\" class=\"alignnone wp-image-14717 size-thumbnail\" src=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2019\/10\/foto-manuel-garcia-1-80x80.jpg\" alt=\"\" width=\"80\" height=\"80\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><strong>Manuel Garc\u00eda Ram\u00edrez<\/strong><br \/>\nDirector at MGR IT and Security Consultants<\/p>","protected":false},"excerpt":{"rendered":"<p>Para poder disponer de un plan de ciberseguridad eficaz, primero hay que saber que bienes hay que proteger, sean de car\u00e1cter material o inmaterial (edificios, ordenadores, programas, datos\u2026), una vez conocido, hay que investigar las posibles vulnerabilidades para determinar los riesgos. \u00bfPara qu\u00e9 se hace el plan? Para prevenir, evitar o eliminar esos riesgos. En [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":15247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176],"tags":[1581,672,61,1582],"class_list":["post-15246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ciberataques","tag-ciberseguridad","tag-internet","tag-plan-de-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>As\u00ed se crea un plan de ciberseguridad eficaz - PROA Comunicaci\u00f3n<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"As\u00ed se crea un plan de ciberseguridad eficaz - PROA Comunicaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Para poder disponer de un plan de ciberseguridad eficaz, primero hay que saber que bienes hay que proteger, sean de car\u00e1cter material o inmaterial (edificios, ordenadores, programas, datos\u2026), una vez conocido, hay que investigar las posibles vulnerabilidades para determinar los riesgos. \u00bfPara qu\u00e9 se hace el plan? Para prevenir, evitar o eliminar esos riesgos. En [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan-2\/\" \/>\n<meta property=\"og:site_name\" content=\"PROA Comunicaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-23T09:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2025\/08\/Firefly_radio-de-barco-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PROA Comunicaci\u00f3n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@proacomunica\" \/>\n<meta name=\"twitter:site\" content=\"@proacomunica\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PROA Comunicaci\u00f3n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/\"},\"author\":{\"name\":\"PROA Comunicaci\u00f3n\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60\"},\"headline\":\"As\u00ed se crea un plan de ciberseguridad eficaz\",\"datePublished\":\"2019-12-23T09:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/\"},\"wordCount\":513,\"publisher\":{\"@id\":\"https:\/\/proacomunicacion.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"ciberataques\",\"ciberseguridad\",\"internet\",\"plan de ciberseguridad\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/\",\"url\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/\",\"name\":\"As\u00ed se crea un plan de ciberseguridad eficaz - PROA Comunicaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/proacomunicacion.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-12-23T09:00:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/proacomunicacion.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"As\u00ed se crea un plan de ciberseguridad eficaz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proacomunicacion.es\/#website\",\"url\":\"https:\/\/proacomunicacion.es\/\",\"name\":\"PROA Comunicaci\u00f3n\",\"description\":\"Agencia de Comunicaci\u00f3n Corporativa en Madrid, Barcelona y Galicia.\",\"publisher\":{\"@id\":\"https:\/\/proacomunicacion.es\/#organization\"},\"alternateName\":\"PROA Comunicaci\u00f3n\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proacomunicacion.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proacomunicacion.es\/#organization\",\"name\":\"PROA Comunicaci\u00f3n\",\"alternateName\":\"PROA Comunicaci\u00f3n\",\"url\":\"https:\/\/proacomunicacion.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg\",\"contentUrl\":\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg\",\"width\":136,\"height\":33,\"caption\":\"PROA Comunicaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/proacomunica\",\"https:\/\/es.linkedin.com\/company\/proa-comunicacion_2\",\"https:\/\/www.instagram.com\/proacomunica\/\",\"https:\/\/www.youtube.com\/@proacomunicacion\",\"https:\/\/es.wikipedia.org\/wiki\/PROA_Comunicacin\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60\",\"name\":\"PROA Comunicaci\u00f3n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g\",\"caption\":\"PROA Comunicaci\u00f3n\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to create an effective cybersecurity plan - PROA Comunicaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan-2\/","og_locale":"en_GB","og_type":"article","og_title":"As\u00ed se crea un plan de ciberseguridad eficaz - PROA Comunicaci\u00f3n","og_description":"Para poder disponer de un plan de ciberseguridad eficaz, primero hay que saber que bienes hay que proteger, sean de car\u00e1cter material o inmaterial (edificios, ordenadores, programas, datos\u2026), una vez conocido, hay que investigar las posibles vulnerabilidades para determinar los riesgos. \u00bfPara qu\u00e9 se hace el plan? Para prevenir, evitar o eliminar esos riesgos. En [&hellip;]","og_url":"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan-2\/","og_site_name":"PROA Comunicaci\u00f3n","article_published_time":"2019-12-23T09:00:13+00:00","og_image":[{"width":2560,"height":1414,"url":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2025\/08\/Firefly_radio-de-barco-scaled.jpg","type":"image\/jpeg"}],"author":"PROA Comunicaci\u00f3n","twitter_card":"summary_large_image","twitter_creator":"@proacomunica","twitter_site":"@proacomunica","twitter_misc":{"Written by":"PROA Comunicaci\u00f3n","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#article","isPartOf":{"@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/"},"author":{"name":"PROA Comunicaci\u00f3n","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60"},"headline":"As\u00ed se crea un plan de ciberseguridad eficaz","datePublished":"2019-12-23T09:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/"},"wordCount":513,"publisher":{"@id":"https:\/\/proacomunicacion.es\/#organization"},"image":{"@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage"},"thumbnailUrl":"","keywords":["ciberataques","ciberseguridad","internet","plan de ciberseguridad"],"articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/","url":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/","name":"How to create an effective cybersecurity plan - PROA Comunicaci\u00f3n","isPartOf":{"@id":"https:\/\/proacomunicacion.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage"},"image":{"@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-12-23T09:00:13+00:00","breadcrumb":{"@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/proacomunicacion.es\/asi-se-crea-un-plan-de-ciberseguridad-eficaz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/proacomunicacion.es\/"},{"@type":"ListItem","position":2,"name":"As\u00ed se crea un plan de ciberseguridad eficaz"}]},{"@type":"WebSite","@id":"https:\/\/proacomunicacion.es\/#website","url":"https:\/\/proacomunicacion.es\/","name":"PROA Communication","description":"Corporate Communications Agency in Madrid, Barcelona and Galicia.","publisher":{"@id":"https:\/\/proacomunicacion.es\/#organization"},"alternateName":"PROA Comunicaci\u00f3n","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proacomunicacion.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proacomunicacion.es\/#organization","name":"PROA Communication","alternateName":"PROA Comunicaci\u00f3n","url":"https:\/\/proacomunicacion.es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/","url":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg","contentUrl":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg","width":136,"height":33,"caption":"PROA Comunicaci\u00f3n"},"image":{"@id":"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/proacomunica","https:\/\/es.linkedin.com\/company\/proa-comunicacion_2","https:\/\/www.instagram.com\/proacomunica\/","https:\/\/www.youtube.com\/@proacomunicacion","https:\/\/es.wikipedia.org\/wiki\/PROA_Comunicacin"]},{"@type":"Person","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60","name":"PROA Communication","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g","caption":"PROA Comunicaci\u00f3n"}}]}},"_links":{"self":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts\/15246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/comments?post=15246"}],"version-history":[{"count":0,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts\/15246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/media?parent=15246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/categories?post=15246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/tags?post=15246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}