Home Tags Posts tagged with "ciberseguridad"
Tag:

ciberseguridad

Noticias | Empresas aumentan inversión de ciberseguridad en Chile

Cybersecurity Companies in Chile

Companies increase cybersecurity investment in Chile

Computer security is increasing every day in chilean companies due to dangers they are facing from constant cyberattacks that put their infrastructure and computer security at risk.

In 2018, different companies in Chile invested a total of 156 million dollars in cybersecurity, which implies a growth of 10% compared to 2017, when the investment budget was less than 145 million dollars, while in 2016 it stood at 125 million dollars.

A recent study indicated that 45% of the companies in Chile consider it opportune and a priority to invest in security and IT technology.

In 2019 cyberattacks intensified by 20% compared to other years, on the other hand, growth in investment by Chilean companies in cybersecurity also grew by 18%, this due to the increase exponential number of attacks on these companies”, commented José Domingo Abogabir, CEO  Managing Director of Measured Security.

The deficit of professionals in the area of ​​computer security reaches up to 90% and many of these companies find it difficult to hire specialists in cybersecurity. Only between 6 and 8% of people are prepared to work in this area.

Another of the biggest challenges Chile faces in terms of cybersecurity issues is that there are not enough educational institutions that offer this career as an attraction to meet the requirements of many companies in this area. Currently, work is being done in educational institutions to create new curricula on computer security, on the other hand, educational spaces are being created where courses and diplomas are offered to guarantee constant learning in professionals.

If your company needs to invest in cybersecurity, do not hesitate to contact us. You can write to us through Whatsapp by clicking on the following image:

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Noticias | El FORO ECONÓMICO MUNDIAL asegura que este 2020 los ataques cibernéticos se intensificarán

The WORLD ECONOMIC FORUM ensures that in 2020 cyber attacks will intensify

Globally, cyberattacks have increased by almost 76% and it is expected that by 2020 they will intensify even more, this, according to a report from The Global Risks Report 2020 released by the World Economic Forum.

This has not been the first wake-up call made by this prestigious institution, there are already several IT Security Agencies worldwide that are concerned about the risk that an increase in these attacks against companies and individuals implies. According to this study, it would have a negative impact in a period of no more than 10 years.

The investigations about this report had the participation of more than 750 experts on this subject, and for them, cyberattacks against large, medium and small companies will increase by 76%; on the other hand, 75% indicated that this increase is intended to search for data and money.

Consequently, these cybercriminals will take advantage by stealing information from other companies and people, and the industrial sectors that will be most affected would be: the health sector, the energy sector, the transport sector and of course, the technology sector.

What technologies will be affected by cyberattacks?

  • Artificial intelligence: This technology is increasingly used by companies around the world, having its immense participation in the telephone attention systems and also in the complex production systems of many companies. Artificial intelligence is likely to be affected in the future if precautions are not taken in time.
    • 5G technology in phones: Several companies around the globe are already working to bring this technology to their users, as well as Huawei of China and the Swedish company Ericsson. This technology had already been launched in test mode in 2019, but it is expected that by 2020 it will spread throughout the world. Being one of the most promising networks for this 2020, the 5G network does not escape on issues related to cybersecurity, since different studies indicate that this network will increase cyber attacks due to its high speed. If previously the 4G network could send 100,000 spam emails in just seconds, then the 5G network will send around 10 million in a few seconds.

 

  • Cloud Computing: Although it is not a system that can be as damaged as other technologies, this method can also be prone to cyberattacks, since every day more companies accumulate information in these spaces.

 

  • The internet: Being one of the main pollutants in terms of malicious malware, the internet does not escape these cyberattacks.
  • Facebook, Instagram, Gmail, WhatsApp: There are different companies that have access to our personal data, and it is there where the most expert cybercriminals attack these large companies to steal personal data, such as what happened in Yahoo in 2013, when the company was the victim of a cyber attack that affected more than 1000 user accounts.
  • Mobile applications: We must be careful what type of mobile applications we download on our phones, since the specialized company ESET recently revealed that a computer virus designed to display ads on the screen of phones, infected millions of cell phones through the operating system Android. According to the study, this virus has the ability to display malicious ads on phones in a pop-up manner during the process of installing an app.

This 2020 is loaded with a lot of uncertainty in issues related to cybersecurity, but don’t worry, you shouldn’t be alarmed, large companies work every day to mitigate these cyberattacks and strengthen technological infrastructures to make them less prone to these attacks.

If your company is unprotected, write us FREE to WhatsApp by clicking on the image and our panel of experts will answer all your questions.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Hackeado el hombre más rico del mundo

Billionaire Jeff Bezos has been hacked through a suspicious video sent via WhatsApp

 

Billionaire Jeff Bezos, founder of the Amazon virtual store, was hacked through his iPhone in May 2018, after receiving a message via WhatsApp from the Saudi Crown Prince, Mohammed bin Salman.

According to official sources and various cybersecurity experts, the suspicious message contained a video, shortly after the video was delivered, the device transferred hundreds of megabytes of data from the phone, apparently without Bezos‘ knowledge.

Investigations suggest that the theft was 6 gigabytes of confidential information. On the other hand, a full study was done on Bezos‘ phone and according to experts, they found nothing wrong with the video, however, the rest of the message included additional indecipherable code, which apparently contained malicious software written by hackers.

Furthermore, the government of Saudi Arabia denied that it was part of hacking Bezos‘ phone.

We must be careful with suspicious messages or videos sent to us through WhatsApp and not open them, thus avoiding these incidents.

For more information about our Cybersecurity service, CONTACT US

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
¡ALERTA! No abras mensajes relacionados al CORONAVIRUS en TU CORREO

¡WARNING! If you receive an e-mail with information about coronavirus ¡DO NOT OPEN IT!

 

Phising attacks become each day more effective and undermine business effort to counter these attacks.

Again, the Cybersecurity company Kapersky, referred to this new attack that is putting in check many companies and people around the world, since these cybercriminals use this malicious software to steal personal data and user’s money.

This e-mail is sent to the user with the initials “CDC” that stands for Centers for Disease Control and Prevention in the USA. The report reveals that these attacks are runned using the domain “cdc-gov.org” that is very similar to the real one; “cdc.gov

The message comes along with a hyperlink that redirects to a similiar Microsoft Outlook web page, so that deceived users can share their passwords and personal data.

¡Take precautions about these malicious e-mails and do not open them!

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Seguridad informática para instituciones públicas y empresas

Informatic Security for business and public institutions

 

Computing Security Agency for business in Chile

Each day, cybersecurity threats are increasing, which is why computing security is an important issue that we should address in this technological-changing times. For many companies adapting these changes usually brings more productivity, giving quicker and more efficient solutions when managing these new technologies, but also it usually brings big informatic threats that can put in danger information and data confidentiality for public institutions.

Every organization should count with a security baseline for their productive teams, taking them to a minimum level of security satisfaction though Hardening. A vulnerability analysis on its part, has a goal of identify safety holes and measure the impact over the assets, and use the findings to visualize the next actions for improvement and be able to resist to exposed attacks” (Sánchez, 2013)

The purpose of this goal is to get that all this business and institution conglomerate have an Informatic Security System in their facilities, for it, they must have a solid and strengthened infrastructure that can counter any existing cybersecurity threat on the web.

On the other hand, it exists network systems connected worldwide where they transmit daily millions and millions of data through internet, allowing information transfer through desktops and other devices, but at the same time, there are risks that can increase informatic threats from anywhere, therefore, it’s extremely important to implement an Computing security for business and institution System to avoid compromising valuable information.

What can we do in front of these threats?

If you are a small, medium or big company, the ideal is to hire an Computing Security agency that offers protection to the entire company’s informatic infrastructure, and that’s where Measured Security can offer you this option with different kinds of services that adapt to your needs; either for hiring a protection service for your devices and home network or if you are a business or public institution, you can choose our Executive, business or government services.

If you are looking a cybersecurity company that brings you reliability and transparency to protect your personal files, contact us for free through the next link:

Click image:

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Soy una startup ¿Qué debo hacer con respecto a la seguridad?

I am a startup, What i must do regarding security?

 

Cybersecurity for business

 Being a startup is hard. Doesn’t have the budget to do everything like a big company, but if it doesn’t seem to be doing things right, then no one will buy from them. This is specially true when it comes about security. To do security properly costs money that few startups have, and clients expect security by default these days. Giving them the idea that their data isn’t safe with you can cost you a sale, and a breach could cost you your business (like what happened with Mt. Gox’s Bitcoin Exchange).

So, How can startups reach the thin line between protecting the client’s data, without sacrificing too much of your cash flow? Well, like everything else, it’s a balance; but you need to know which are important.

“If you are a business that is beginning in the market and tech world, the most important thing to consider to protect your company, is that you need to asign between 15% and 20% of your IT budget to invest in cybersecurity”. Says Waldo Gómez, Cybersecurity Specialist in Measured Security.

Before anything else, understand what does security means to you. If you offer payment services, the confidentiality and integrity of your data and the service availability are equally important. If you are creating an advertising platform, confidentiality and availability are important, but the integrity of your platform (protection against unauthorized changes) will have a higher priority.

For example, imagine that hackers replace your ads with unpleasant content; this would probably come out on the news and, who would buy after that? Understanding your priorities may help you decide where to invest your valuable cash, like anti-malware solutions.

Although anti-malware solutions are often considered the holy grail of security guarantees, keep in mind that it probably won’t work for the whole business infrastructure.

Security is a big deal and in comparison with all the existing information, this article is only a light description. We hope that this article gave you an indication of what paths to follow. If you wish any advice, contact us.

Learn more about how our team of cybersecurity specialists can create a safe space in your business. Connect with our professionals now +56 9 5413 5320 / +56 9 6676 4809 for chat or e-mail us at: contacto@measuredsecurity.cl

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Mejore las prácticas de ciberseguridad para trabajos remotos

Improve your cybersecurity practices for remote work

 

Remote work has to do with risk and reward. It offers many benefits, so much for employers and employees regarding flexible work schedule, bigger staff retainment and an improved productivity, and a general costs saving. Besides, according to the International Workplace Group report, 75% od respondents consider virtual work as a new normality.

At the same time, remote work leads to possible cybersecurity threats. If not detected, they can give place to a series of disastrous consequences for the reputation, incomes and the business relations with the interested parties.

Luckily, it is possible to mitigate such risks through the introduction of guidelines and wise procedures that board every “what if”.

Improve your cybersecurity practices for remote devices: why should it matter?

  • Cybersecurity infractions have increased a 67% in the last five years. The most common dangers includes malware and malicious files, phishing and spear-phishing campaigns, SQL injections and man-in-the-middle attacks (MitM).
  • Recent literacy in data breach investigation, reveals that 64% of the americans have never done any test to verify if it was affected by some data breach, and 56% said that they didn’t know how to face data breaches.
  • One of three companies has faced cybersecurity incidents of different severity due to a non-secure remote employee.
  • Recent studies show that only 27% of the business a using authentication devices from multiple factors (MFA) when accessing to any app.
  • Like any other global crisis, COVID-19 pandemic has brought a lot of space for online attacks. A recent study states that cybersecurity problems have increased 6 times in the last few weeks, with over 2.000 websites obviously malicious with coranavirus-themed configurated daily.
  • According to Open VPN, 93% of the respondant have a determined cybersecurity policy of data, that unfortunately it is implemented in a “configure and forget” fashion

What must i do to improve remote work security?

  • Embed cybersecurity in the risk management framework or update it if you already have one.
  • Inform remote employees about safety risks that may happen.
  • Establish protocols in the whole company to prepare for a risk-free remote work.
  • Allow your remote devices to access safely to corporative IT infrastructure from anywhere and anytime.
  • Protect apps and devices from users regardless of being in or out the network.

Create and communicate remote work safety policy.

Having a business continuity plan with an integral part of IT assets management, is only half of the battle. What’s more important, is that every remote employee must know perfectly all the corporative safety procedures.

Consider to create practice guides for the new software that remote devices will use, and the existing software that will be used differently, although for you, it comes predetermined.

Besides, provide training about cybersecurity and always keep IT staff well equipped. Establish clear communications protocols from IT support so that the remote employees know who to turn to and report any cybersecurity incident and technical problems.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Mejore la seguridad y acelere la resistencia contra los ataques cibernéticos

Improve security and accelerate resistance against cyber attacks

 

Companies must be agile and capable to take advantage of a wide variety of devices and apps connected in all your employees and vendors to improve efficiency, increase incomes and boost better business results. But as our network grow to satisfy those demands, they become more complex, limiting our visibility, reduce our access control and inhibits detection and containment of threats.

Besides, in this current remote work enviroment that is quickly expanding, with VPN connection enlarged and wireless access exploding, vulnerabilities are much more higher, faster and expensive, leading organizations to be more proactive against attacks. But….

How do organizations run security for the whole enterprise when they are already overwhelmed by the real threats that are occurring now?

It’s easy to think that due to being a small company, hackers won’t attack you. The “there is not much to steal” mentality is common among small business owners regarding cybersecurity, which is completely wrong and not synchronized with the current cybersecurity better practices.

Actually, the U.S. Small Business Committee found that 71% of cyberattacks ocurred in companies with less than 100 employees. Even more worrying, the report about the cybersecurity status in small and medium business of 2016 by Ponemon & Keeper found that 50% of small and medium business has had a security breach in the past year.

But, why small business are attacked with more frecuency that the big ones? Almost every cyberattack is for getting personal data so they can use credit cards or identify thefts. While big business usually have more data to steal, small business have networks with less security, facilitating network violation.

How can your business avoid being a cyberattack victim?

  1. Use a firewall

One of the first lines of defense in a cyberattack is a firewall. The Federal Communications Commission (FCC) recommends that all PYMES establish a firewall to provide a barrier between your data and cybercriminals. Besides the standard external firewall, many companies are beginning to install internal firewalls to provide additional protection. It’s also important that employees who work from their homes also install a firewall in their local network. Consider provide a firewall software and local network support to guarantee compliance.

  1. Educate your employees

Employees often wears many hats in PYMES, so it is essential that all employees who access to the network receive training about better practices and security policies in your business network.

Given that the policies are evolving as the cybercriminals become smarter, it’s essential to have periodic updates about new protocols. To hold account employees, make that every one of them sign a document indicading that he has been informed about the policies and understand that actions can be taken if they don’t follow security policies.

  1. Apply safe practices for passwords

Yes, employees have a hard time changing passwords. Nevertheless, the report of Data Breach Investigations Report of 2016 from Verizon, found that 63% of data breaches ocurred due to lost, stolen or weak passwords. According to the Keeper Security and Ponemon Institute Report, 65% of the PYMES with password policies, they don’t enforce it. Today, is essential that all devices that employees access to the company’s network are safe with password.

Security is a goal in motion. Cyber criminals go foward every day. To protect your data as much as possible, it’s very important that every employee makes cybersecurity a top priority. And most important of all, being updated with the latest trends on attacks and the most recent technology prevention.

Learn more about how our team of cybersecurity specialists can create a safe space in your business. Connect with our professionals now +56 9 5413 5320 / +56 9 6676 4809 for chat or e-mail us at: contacto@measuredsecurity.cl

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
4 formas de mejorar la postura de ciberseguridad

4 ways to improve your cybersecurity posture

 

Cybersecurity threats presents a growing and dynamic challenge for companies of all sizes. Unfortunately, this are normal occurencies, since Forbes points out that 60% of the surveyed organizations have suffered a security breach in the last two years and that the 31% have suffered more than once.

The threats than organizations fase can vary from data leak that takes the front pages to malware, inactivity time or operative efficience los. In this blog, we will analyze 4 ways to help improving an organization cybersecurity posture.

Cybersecurity practices implementation often presents different organizational and resources challenges. These challenges grow with the changing size and complexity of the business. The following steps can help companies to improve their cybersecurity pratcices and reach a new level of security preparation.

  1. Establish a training policy

Although it tends to be the less popular, providing information / training based on knowledge is not the only element to verify an annual list.

Periodic training of all employees about threats and cybersecurity practices in an essential step for security preparation, and this step may require the establishment and difusión of a reference level of cybersecurity knowledge inside your organization. The fact that training content is relevant and updated can only help the employees until a certain point.

  1. Policy definition

Establishing clear steps for every employee when it comes to an extremely important security incident response, although even with the adecuate training, an inevitable security incident can happen. Depending on the nature of your business, the training can cover procedures in case of a security incident. Regardless if these steps are directly covered, every employee must know who to contact and the information that must provide.

  1. Cyber-hygiene automation

Cyber-hygiene is an increasing set of better practices for mantaining your organization cybersecurity general health. Training the employees on cybersecurity is a need, but better practices automation makes even easier to experience better results.

  1. Third party tracking

Unwanted changes prevention through real-time monitoring is the real final goa lof cybersecurity practices and cyber-hygiene. Risk management of providers often skips and must include within those practices. The use of a File integrity and next-gen System software assures the availability and integrity of your critical IT asstes. These are done by detecting instantly every changes in your apps and infrastructure.

Make sure that your systems work as expected and be safe.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
¿Por qué es importante la ciberseguridad?

Why is cybersecurity so important?

 

The importance of digital security

Cybersecurity is important because it encompasses everything related to our personal data protection, information about personal identification, health information, intellectual property, government and industry data and information system against theft and damage from cybercriminals and other entities that try to enter in our private network.

The cybersecurity risk is increasing and its caused by global connectivity and cloud service usage, the place where personal information and classified data are stored. The defficient generalized configuration of cloud services along with increasingly sophisticated cybercriminals, has meant that the risk of succesful cyberattacks or a data breach to your business is increasing.

“Cybersecurity nowadays is more important than ever, due to world population’s mayority connected to the worldwide network and that makes them vulnerable if they don’t have the appropiate tools to protect themselves on the network. In the past few years there has been hacks that caused irreparable damage to the public and private sector. Unfortunately, today we have to be conscious about being a victim of information hijacking, identity theft, banking products cloning, phishing, etc…. Through this simple hacks or digital methodologies to extract information we can lose it all. To have a protected system, it is required the help from every member from said system, since all are protected, the system does not have any vulnerability, it’s like having the flu and stay home to avoid the propagation of it in your office (SYSTEM). Keeping your devices with the proper cybersecurity measures helps the system to not have a security vulnerability”, . Explains José Domingo Abogabir, CEO and General Director of Measured Security.

Cyber threats can come from any level of your organization. You must educate your staff about simple social engineering scams like phishing and more sophisticated cyberattacks like ransomware or another malware designed to steal intellectual property or personal data.

The General Data Protection Regulation or (GDPR) and other laws indicate that cybersecurity is not something that companies of any size can ignore. Security incidents affects regularly to companies of any size and often they appear on the cover causing irreversible damage to the reputation of companies involved.

The importance of cybersecurity is on the rise. Our society is fundamentally more technological-dependat than ever before and there’s no sign that this trend will decrease. Personal data that might provoke an identity fraud, now they are poste don our social network accounts. Classified information such as social security numbers, credit card info and bank account details are now stored in cloud storage services like Dropbox or Google Drive.

If you’re still not worried about cybersecurity, you should and in MSS Vision we’ll be at your service and bring you all the protection you deserve.

If you wish to know more about our services, e-mail us and let us know any question o worries that you have.

¡Free consulting!

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail