Improve your cybersecurity practices for remote work

Improve your cybersecurity practices for remote work Remote work has to do with risk and reward. It offers many benefits, so much for employers and employees regarding flexible work schedule, bigger staff retainment and an improved productivity, and a general costs saving. Besides, according to the International Workplace Group report, 75% od respondents consider […]
Improve security and accelerate your resistance against cyber attacks

Improve security and accelerate resistance against cyber attacks Companies must be agile and capable to take advantage of a wide variety of devices and apps connected in all your employees and vendors to improve efficiency, increase incomes and boost better business results. But as our network grow to satisfy those demands, they become more complex, […]
Cybersecurity: 7 advices for small and medium companies

Cybersecurity: 7 advices for small and medium companies With the news headlines focused on big companies security breaches, it would be easy for small and medium companies (PYME) to suppose that its size keeps them out of a hacker’s radar, since they are not worthy for an attack. Unfortunately, when it’s about cybersecurity, small doesn’t […]
Top 5 network security risks and threats

Top 5 main risks and threats It’s an unpleasant truth that businesses must face: among vulnerabilities and the the ever-changing IT landscape, network security risks continue to evolve and underlining the need for surveillance. With that purpose, proactive network managers know that they must routinely examine its security infrastructure, its best practices and consequently update. […]
CIS Critical security controls, What are they and how you should use them?

CIS Critical security controls, What are they and how you should use them? Cybersecurity has an extensive field, and it may seem that many inside the security of the information will never be able to “complete” it, but this no longer has to be the case. Regardless of the Budget, it may seem impossible for […]
How to reduce your attack surface with system hardening

How to reduce your attack surface with system hardening In most cases, new digital assets such as servers and operative systems, comes in a non configured status. When you install an asset, everything is predetermined. All the app services are activated and all the ports are open. At the same time, mosto f the new […]
4 ways to improve your cybersecurity posture

4 ways to improve your cybersecurity posture Cybersecurity threats presents a growing and dynamic challenge for companies of all sizes. Unfortunately, this are normal occurencies, since Forbes points out that 60% of the surveyed organizations have suffered a security breach in the last two years and that the 31% have suffered more than once. The […]
MESSAGE ABOUT COVID19 FROM MEASURED SECURITY

MESSAGE ABOUT COVID19 FROM MEASURED SECURITY While we are fighting to contain the spread of coronavirus in many countries, its impact is still expanding quickly around the globe, reaching even the most remote places. Most of this countires are closing their borders and imposing lockdowns as their preventive measures in many cities or states; on […]
5G technology and its impact on mobile application development.

5G technology and its impact on mobile app development This modern era is focused mainly on internet connectivity, being the velocity of it a top priority. In this moment, 4G is the dominant network in the world, although soon the expansion of the latest 5G technology will replace it. It’s a fact that the 5G […]
COVID-19 impact in cybersecurity and companies

COVID-19 impact in cybersecurity and companies COVID-19 has become a gold mine for cybercriminals. Months ago, the coronavirus pandemichas grown exponetially around the world and is expected to increase the number of infected in many countries, specially the USA who has more than 190.000 cases. While we are fighting to contain the spreading of […]
