Actualidad

How to Create an Effective Cyber Security Plan

In order to have an effective cyber security plan, first, you need to know what assets must be protected, whether they are material or immaterial nature (buildings, computers, programs, data …). Once you know this, the possible vulnerabilities must be investigated to determine the risks and how prevent, avoid or eliminate them. Once this is determined, the plan is done.

In the first half of 2017, computer equipment around the world was affected by a harmful program called “WannaCry.” Once executed, it encoded data in such a way that prevented the normal function the programs. Users were forced to pay in bitcoin to some address on the dark web. After the payment was made, they received the key to decode the data and to be able to return to normal, if such a situation of abuse could be called that. When either private individuals or employees received an email simulating a well-known company and executed an attached program, they started the hacking process.

Why were both individuals and businesses affected? Because the path they followed the same simple and easy path of deception. Since in both cases they had received an email that simulated a company known in the market and clicked on an attachment, they started an unstoppable process. Could the previous situation have been avoided?

Intentional Collaboration?

Today we know that in the world there are many people dedicated to understanding the vulnerabilities of operating systems, whether for large corporations or for security services, and some even sponsored by countries. These people could facilitate this group, given their deep knowledge of theme, and allow them to perform intrusive cyber-attacks. But apart from this specialization, it is necessary to add the importance of the collaboration, intentional or not, of people who receive or use emails. Some additional questions arise, do all employees need access to the internet? Can everyone enter or remove data by clicking on an external hard drive (USB) or similar? What employees can have open communications? Which ones are restricted or no restricted at all? Are their passwords safe? If are responsible for our computers, do we apply the security policies that software manufacturers recommend? It has been found that although many companies are aware of the vulnerability, they do not apply the appropriate policies.

All this leads us to think about how much time and money should be devoted to cybersecurity and how strict company policies should be. Questions that everyone has to answer in one way or another. Finally, companies must prevent cybersecurity from being an activity that prevents the daily development of any business and convert it into an ally that allows working safely. Although certain processes and procedures must be followed, we must have an adequate communication policy.

Theresa Zabell —— «Todos debemos cuidar el mar»

Theresa Zabell, presidenta de la Fundación ECOMAR y única mujer española ganadora de dos Oros Olímpicos, detalla los orígenes de la entidad sin ánimo de lucro. También explica cuáles son las principales actividades que desarrollan, que están orientadas a inculcar en los más jóvenes un estilo de vida saludable a...

Lorena Saura —— No hay cultura sin comunicación

“No hay comunicación sin cultura, ni cultura sin comunicación”. Umberto Eco Como acertadamente apuntaba Umberto Eco, “no hay comunicación sin cultura, ni cultura sin comunicación”. La comunicación y la cultura están relacionadas de manera intrínseca desde el primer momento en el que comunicar forma parte de la propia cultura y...

Communication strategy for the epidemic: information by flood

Information crisis management is a compulsory subject with a wealth of literature and many case studies. One of the golden rules of crisis communication is that it must contribute to success and not put sticks in the wheel, not become an additional problem. Like the good referee in a disputed...

How to communicate in a VUCA environment

How do we categorize VUCA environments? They are spaces dominated by four basic characteristics: volatility, uncertainty, complexity and ambiguity. These four terms, originally from the English expression, mark the business communication activites that we have today to develop professional communication. This communicaction is sometimes surprising due the speed of its...

—— COEM supera hasta noviembre las cifras de pacientes atendidos en Camerún durante 2019

La Asociación de Cirujanos Ortopédicos de España para el Mundo (COEM) ha superado en los 11 primeros meses de este año las cifras de pacientes atendidos durante todo 2019, el último año antes de la pandemia de COVID-19, en su centro de actividad, situado en el Hospital Notre Dame de...

Pensar en la pospandemia

Siempre a vueltas con el orden mundial, Henry Kissinger lo tiene bastante claro: de la actual atmósfera surrealista del Covid-19 emergerá un mundo completamente diferente. Como ha explicado el ex secretario de Estado en el Wall Street Journal, el final de la pandemia va a producir un inevitable ajuste de...

Más conversaciones, más ideas, más PROA.
Síguenos en nuestras redes.

Recibe ideas con criterio

Cada semana compartimos reflexiones, tendencias y claves sobre reputación, comunicación estratégica, asuntos públicos e innovación. Contenido pensado para profesionales que valoran la información con rigor y perspectiva.