{"id":15314,"date":"2019-11-18T14:49:32","date_gmt":"2019-11-18T13:49:32","guid":{"rendered":"https:\/\/proacomunicacion.es\/?p=15314"},"modified":"2019-11-18T14:49:32","modified_gmt":"2019-11-18T13:49:32","slug":"how-to-create-an-effective-cyber-security-plan","status":"publish","type":"post","link":"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan\/","title":{"rendered":"How to Create an Effective Cyber Security Plan"},"content":{"rendered":"<p>In order to have an effective cyber security plan, first, you need to know what assets must be protected, whether they are material or immaterial nature (buildings, computers, programs, data ...). Once you know this, the possible vulnerabilities must be investigated to determine the risks and how to prevent, avoid or eliminate them. Once this is determined, the plan is done.<\/p>\n<p>In the first half of 2017, computer equipment around the world was affected by a harmful program called \"<strong>WannaCry<\/strong>.\" Once executed, it encoded data in such a way that prevented the normal function the programs. Users were forced to pay in <strong>bitcoin<\/strong> to some address on the dark web. After the payment was made, they received the key to decode the data and to be able to return to normal, if such a situation of abuse could be called that. When either private individuals or employees received an email simulating a well-known company and executed an attached program, they started the hacking process.<\/p>\n<p>Why were both individuals and businesses affected? Because the path they followed the same simple and easy path of deception. Since in both cases they had received an email that simulated a company known in the market and clicked on an attachment, they started an unstoppable process. Could the previous situation have been avoided?<\/p>\n<p><strong>Intentional Collaboration?<\/strong><\/p>\n<p>Today we know that in the world there are many people dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, and some even sponsored by countries. These people could facilitate this group, given their deep knowledge of theme, and allow them to perform intrusive cyber-attacks. But apart from this specialisation, it is necessary to add the importance of the collaboration, intentional or not, of people who receive or use emails. Some additional questions arise, do all employees need access to the internet? Can everyone enter or remove data by clicking on an external hard drive (USB) or similar? What employees can have open communications? Which ones are restricted or not restricted at all? Are their passwords safe? If they are responsible for our computers, do we apply the security policies that software manufacturers recommend? It has been found that although many companies are aware of the vulnerability, they do not apply the appropriate policies.<\/p>\n<p>All this leads us to think about how much time and money should be devoted to cybersecurity and how strict company policies should be. Questions that everyone has to answer in one way or another. Finally, companies must prevent cybersecurity from being an activity that prevents the daily development of any business and convert it into an ally that allows working safely. Although certain processes and procedures must be followed, we must have an adequate communication policy.<\/p>","protected":false},"excerpt":{"rendered":"<p>In order to have an effective cyber security plan, first, you need to know what assets must be protected, whether they are material or immaterial nature (buildings, computers, programs, data &#8230;). Once you know this, the possible vulnerabilities must be investigated to determine the risks and how prevent, avoid or eliminate them. Once this is [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":15247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176],"tags":[1482,1374,1483,1484],"class_list":["post-15314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-attacks","tag-cyber-security","tag-cyber-security-plan","tag-internet-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Create an Effective Cyber Security Plan for Your Company<\/title>\n<meta name=\"description\" content=\"As hackers get more efficient at stealing data and hacking our computers, it is important for companies to have strong cybersecruity plans.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Create an Effective Cyber Security Plan for Your Company\" \/>\n<meta property=\"og:description\" content=\"As hackers get more efficient at stealing data and hacking our computers, it is important for companies to have strong cybersecruity plans.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"PROA Comunicaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-18T13:49:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2025\/08\/Firefly_radio-de-barco-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PROA Comunicaci\u00f3n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@proacomunica\" \/>\n<meta name=\"twitter:site\" content=\"@proacomunica\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PROA Comunicaci\u00f3n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/\"},\"author\":{\"name\":\"PROA Comunicaci\u00f3n\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60\"},\"headline\":\"How to Create an Effective Cyber Security Plan\",\"datePublished\":\"2019-11-18T13:49:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\/\/proacomunicacion.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"cyber attacks\",\"cyber security\",\"cyber security plan\",\"internet\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/\",\"url\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/\",\"name\":\"How to Create an Effective Cyber Security Plan for Your Company\",\"isPartOf\":{\"@id\":\"https:\/\/proacomunicacion.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-11-18T13:49:32+00:00\",\"description\":\"As hackers get more efficient at stealing data and hacking our computers, it is important for companies to have strong cybersecruity plans.\",\"breadcrumb\":{\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/proacomunicacion.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Create an Effective Cyber Security Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proacomunicacion.es\/#website\",\"url\":\"https:\/\/proacomunicacion.es\/\",\"name\":\"PROA Comunicaci\u00f3n\",\"description\":\"Agencia de Comunicaci\u00f3n Corporativa en Madrid, Barcelona y Galicia.\",\"publisher\":{\"@id\":\"https:\/\/proacomunicacion.es\/#organization\"},\"alternateName\":\"PROA Comunicaci\u00f3n\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proacomunicacion.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proacomunicacion.es\/#organization\",\"name\":\"PROA Comunicaci\u00f3n\",\"alternateName\":\"PROA Comunicaci\u00f3n\",\"url\":\"https:\/\/proacomunicacion.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg\",\"contentUrl\":\"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg\",\"width\":136,\"height\":33,\"caption\":\"PROA Comunicaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/proacomunica\",\"https:\/\/es.linkedin.com\/company\/proa-comunicacion_2\",\"https:\/\/www.instagram.com\/proacomunica\/\",\"https:\/\/www.youtube.com\/@proacomunicacion\",\"https:\/\/es.wikipedia.org\/wiki\/PROA_Comunicacin\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60\",\"name\":\"PROA Comunicaci\u00f3n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/proacomunicacion.es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g\",\"caption\":\"PROA Comunicaci\u00f3n\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Create an Effective Cyber Security Plan for Your Company","description":"As hackers get more efficient at stealing data and hacking our computers, it is important for companies to have strong cybersecruity plans.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan\/","og_locale":"en_GB","og_type":"article","og_title":"How to Create an Effective Cyber Security Plan for Your Company","og_description":"As hackers get more efficient at stealing data and hacking our computers, it is important for companies to have strong cybersecruity plans.","og_url":"https:\/\/proacomunicacion.es\/en\/how-to-create-an-effective-cyber-security-plan\/","og_site_name":"PROA Comunicaci\u00f3n","article_published_time":"2019-11-18T13:49:32+00:00","og_image":[{"width":2560,"height":1414,"url":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2025\/08\/Firefly_radio-de-barco-scaled.jpg","type":"image\/jpeg"}],"author":"PROA Comunicaci\u00f3n","twitter_card":"summary_large_image","twitter_creator":"@proacomunica","twitter_site":"@proacomunica","twitter_misc":{"Written by":"PROA Comunicaci\u00f3n","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#article","isPartOf":{"@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/"},"author":{"name":"PROA Comunicaci\u00f3n","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60"},"headline":"How to Create an Effective Cyber Security Plan","datePublished":"2019-11-18T13:49:32+00:00","mainEntityOfPage":{"@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/"},"wordCount":462,"publisher":{"@id":"https:\/\/proacomunicacion.es\/#organization"},"image":{"@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage"},"thumbnailUrl":"","keywords":["cyber attacks","cyber security","cyber security plan","internet"],"articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/","url":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/","name":"How to Create an Effective Cyber Security Plan for Your Company","isPartOf":{"@id":"https:\/\/proacomunicacion.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage"},"image":{"@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-11-18T13:49:32+00:00","description":"As hackers get more efficient at stealing data and hacking our computers, it is important for companies to have strong cybersecruity plans.","breadcrumb":{"@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/proacomunicacion.es\/how-to-create-an-effective-cyber-security-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/proacomunicacion.es\/"},{"@type":"ListItem","position":2,"name":"How to Create an Effective Cyber Security Plan"}]},{"@type":"WebSite","@id":"https:\/\/proacomunicacion.es\/#website","url":"https:\/\/proacomunicacion.es\/","name":"PROA Communication","description":"Corporate Communications Agency in Madrid, Barcelona and Galicia.","publisher":{"@id":"https:\/\/proacomunicacion.es\/#organization"},"alternateName":"PROA Comunicaci\u00f3n","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proacomunicacion.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proacomunicacion.es\/#organization","name":"PROA Communication","alternateName":"PROA Comunicaci\u00f3n","url":"https:\/\/proacomunicacion.es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/","url":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg","contentUrl":"https:\/\/proacomunicacion.es\/wp-content\/uploads\/2024\/01\/Logo_Light.svg","width":136,"height":33,"caption":"PROA Comunicaci\u00f3n"},"image":{"@id":"https:\/\/proacomunicacion.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/proacomunica","https:\/\/es.linkedin.com\/company\/proa-comunicacion_2","https:\/\/www.instagram.com\/proacomunica\/","https:\/\/www.youtube.com\/@proacomunicacion","https:\/\/es.wikipedia.org\/wiki\/PROA_Comunicacin"]},{"@type":"Person","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/f80dc8938ea94e7f8aa1e8dc716d5a60","name":"PROA Communication","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proacomunicacion.es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/394c93c195ff19b00e79d66a42971657a01de9f2740b97148d0f14a1e1a359b7?s=96&r=g","caption":"PROA Comunicaci\u00f3n"}}]}},"_links":{"self":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts\/15314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/comments?post=15314"}],"version-history":[{"count":0,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/posts\/15314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/media?parent=15314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/categories?post=15314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proacomunicacion.es\/en\/wp-json\/wp\/v2\/tags?post=15314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}