Actualidad

How to Create an Effective Cyber Security Plan

In order to have an effective cyber security plan, first, you need to know what assets must be protected, whether they are material or immaterial nature (buildings, computers, programs, data …). Once you know this, the possible vulnerabilities must be investigated to determine the risks and how prevent, avoid or eliminate them. Once this is determined, the plan is done.

In the first half of 2017, computer equipment around the world was affected by a harmful program called “WannaCry.” Once executed, it encoded data in such a way that prevented the normal function the programs. Users were forced to pay in bitcoin to some address on the dark web. After the payment was made, they received the key to decode the data and to be able to return to normal, if such a situation of abuse could be called that. When either private individuals or employees received an email simulating a well-known company and executed an attached program, they started the hacking process.

Why were both individuals and businesses affected? Because the path they followed the same simple and easy path of deception. Since in both cases they had received an email that simulated a company known in the market and clicked on an attachment, they started an unstoppable process. Could the previous situation have been avoided?

Intentional Collaboration?

Today we know that in the world there are many people dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, and some even sponsored by countries. These people could facilitate this group, given their deep knowledge of theme, and allow them to perform intrusive cyber-attacks. But apart from this specialization, it is necessary to add the importance of the collaboration, intentional or not, of people who receive or use emails. Some additional questions arise, do all employees need access to the internet? Can everyone enter or remove data by clicking on an external hard drive (USB) or similar? What employees can have open communications? Which ones are restricted or no restricted at all? Are their passwords safe? If are responsible for our computers, do we apply the security policies that software manufacturers recommend? It has been found that although many companies are aware of the vulnerability, they do not apply the appropriate policies.

All this leads us to think about how much time and money should be devoted to cybersecurity and how strict company policies should be. Questions that everyone has to answer in one way or another. Finally, companies must prevent cybersecurity from being an activity that prevents the daily development of any business and convert it into an ally that allows working safely. Although certain processes and procedures must be followed, we must have an adequate communication policy.

Mirian Izquierdo —— Por qué es necesario transformar las empresas familiares a través de consejos de administración y la presencia de consejeros independientes

Muchas de las investigaciones que comparan los resultados financieros de empresas familiares con los de empresas no familiares, subrayan que las familiares superan a las demás. Sin embargo, varios estudios desde la investigación: Board Composition, Balancing Family Influence in S&P 500 firms (Anderson, Reeb 2004) concluyen que al eliminar de...

Pablo de Villota —— Monster vs. RedBull vs. Coca-Cola

Cómo comer la tostada a un rival a base de ir un paso más allá en los patrocinios. Durante décadas Coca-Cola se consolidó como la gran marca que es entre otras cosas, por su omnipresencia y creatividad en los patrocinios deportivos. Sin embargo, a mediados de la década de los...

—— San Valentín, una oportunidad para las marcas

Cerrado el periodo de rebajas y dejando atrás las Navidades, ha comenzado la cuenta atrás para San Valentín. De nuevo, el 14 de febrero es un día para celebrar el amor que, aunque para algunos tiene un carácter comercial, se ha convertido en una oportunidad clave para las marcas para...

Triage would have ruled them out!

One of the major causes of distress in people over 70 years of age who are confined to their homes has undoubtedly been the news that patients with coronavirus over 80 years of age would not be admitted to the ICU. In many hospitals this has been applied as it...

—— Conversation with Sergio López-Rivera, Oscar winner

Valvanuz Serna Ruiz, managing partner of PROA, talks with Sergio López-Rivera, Oscar winner, about the importance of giving birth to the creativity of children who do not find their place. Thus, he pays tribute to the eight-year-old Sergio, who has courageously helped him reach the gold of the cinema. Reproduction...

José Antonio Rodríguez Piedrabuena —— Los venideros planes de la salud mental

Aunque pensábamos que éramos dueños de nuestra memoria y de nuestros impulsos, vemos que las bacterias de nuestro intestino modulan de manera considerable cómo funciona nuestro cerebro Los planes de salud mental van dirigidos a los humanos, compuesto indivisible de ambiente, cuerpo, cerebro y los microbios que habitan dentro y...

Más conversaciones, más ideas, más PROA.
Síguenos en nuestras redes.

Recibe ideas con criterio

Cada semana compartimos reflexiones, tendencias y claves sobre reputación, comunicación estratégica, asuntos públicos e innovación. Contenido pensado para profesionales que valoran la información con rigor y perspectiva.