Actualidad

Security and Cyber Security

Nobody nowadays understands how our homes could lack doors with locks, considering all of the kinds available, armoured and protected in many cases by an alarm that can be connected to an alarm centre; and if necessary, motion detectors and a thousand other devices that I could go on enumerating. Cybersecurity deals with other types of areas such as mobile phones, notebooks, laptops, computers, cars and all kinds of devices that connect to a network (Internet). With the launch in mid-September of the European Payment Directive, better known as PSD2, which requires having a “strong authentication” (which involves using two of the following three: something that the person knows, PIN, password, etc. Something that the person owns, credential, magnetic card … etc. Something that the person is, facial recognition, retina … etc.) in these types of transactions, economic ones specifically, we are forced to review what we do from our devices as safe or not.

How can we protect them? Beyond the physical protection that prevents scratches or deterioration while carrying them, but nobody carries their cellphone or laptop completely bundled up, what kind of protection are we giving these devices? As always, logical protection is an option to consider with non-obvious passwords and changing them from time to time seems simple, but it requires discipline. If we use our cellphones like computers, and sensitive data is stored on them, we have to ask ourselves if we need to increase the security levels using payment programs to protect them, antivirus, or biometric measures, which have their limitations, even if we apply them all at once.

There are facts in cybersecurity that can go unnoticed, such as having private data and files on the same computer that we connect to the internet, however, we do not know if those files are safe. Our computers can be infected with viruses and even cause us to lose the information we have saved. Does it make sense to use two computers, one with sensitive data and the other for connecting to the internet, hobbies and leisure? In the hyperconnected world we live in, how can we be sure that nobody has connected to our car’s computer, and accessed and compromised the information?

There are issues that cybersecurity is already offering solutions for, like the solutions of older times against theft, abuse and invasion on your own land such as locks and windows with bars. The topic is diverse, exciting and complex, but in the meantime it would not hurt to use common sense and some basic rules that help to safeguard the privacy of the information such as avoiding negligence when exchanging files, not connecting to an unreliable network, changing passwords more often, and ultimately being reasonably distrustful and, if possible, informing a cybersecurity expert in advance.


Manuel García Ramírez
Director at MGR Consultants IT y Security

José Antonio R. Piedrabuena —— Entrevista a Marisa López Redondo, doctora en Bioquímica del IBV-CSIC

El Dr. Piedrabuena entrevista en formato vídeo a Marisa López Redondo, doctora en Bioquímica y responsable del área de microscopia electrónica en la Unidad de Regulación de la Síntesis de Proteínas IBV-CSIC, sobre futuras investigaciones en proteínas relacionadas con el COVID-19. Cabe la reproducción de este VÍDEO siempre que se...

José Ramón Barros Cabalar —— La nueva Guerra Fría: China, rival sistémico de Occidente

“Por razón de esta conexión general de la libertad política con la libertad de pensamiento, la filosofía sólo aparece en la Historia allí donde y en la medida en que se crean Constituciones libres”. “Tien (el Cielo) no gobierna la naturaleza, sino que el emperador gobierna todo y solamente él...

Carlos Uriarte y José Ribeiro —— 35 años desde que España y Portugal se unieron a la CEE

El 12 de junio de 1985, España y Portugal firmaron el Tratado de Adhesión a las Comunidades Europeas, celebrándose sendas ceremonias en la mañana en el monasterio de los Jerónimos de Lisboa y por la tarde en el Palacio Real de Madrid. Se convirtieron en parte del proyecto político más...

Carmen Gómez Menor y Carlos Magro —— Proyecto PROA, identidad y posicionamiento para la relevancia 

“¡Es la comunicación, estúpido!”, diría hoy el estratega Carville que en 1992 contribuyó a llevar a Bill Clinton a la presidencia de los Estados Unidos. La misma premisa sirve para las empresas, los dirigentes o cualquiera que aspire a ocupar un liderazgo en un mundo cambiante. La volatilidad, la incertidumbre...

Iván Martén —— «Hay que lograr una transición justa e inteligente»

Iván Martén, presidente de Orkestra – Instituto Vasco de Competitividad, analiza en un nuevo vídeo de PROA la situación energética presente y futura y las energías que se verán reforzadas en los próximos años. A su vez, describe el papel que la economía verde y las políticas de descarbonización jugarán...

Artificial and red meat

We are being manipulated by companies interested in denigrating a product in order to sell theirs. It’s happening with milk, to sell the so-called vegetable milks, and with meat. Eating meat is providing our health with protein, with most of the nutrients that are essential for our body to function,...

Más conversaciones, más ideas, más PROA.
Síguenos en nuestras redes.

Recibe ideas con criterio

Cada semana compartimos reflexiones, tendencias y claves sobre reputación, comunicación estratégica, asuntos públicos e innovación. Contenido pensado para profesionales que valoran la información con rigor y perspectiva.