Companies increase cybersecurity investment in Chile
Cybersecurity Companies in Chile Companies increase cybersecurity investment in Chile Computer security is increasing every day in chilean companies due to dangers they are facing from constant cyberattacks that put their infrastructure and computer security at risk. In 2018, different companies in Chile invested a total of 156 million dollars in cybersecurity, which implies a […]
The WORLD ECONOMIC FORUM ensures that in 2020 cyber attacks will intensify
The WORLD ECONOMIC FORUM ensures that in 2020 cyber attacks will intensify Globally, cyberattacks have increased by almost 76% and it is expected that by 2020 they will intensify even more, this, according to a report from The Global Risks Report 2020 released by the World Economic Forum. This has not been the first wake-up […]
Most Common Threats in Computer Systems
Most Common Threats in Computer Systems Nowadays, cyberattacks are gaining momentum in this technological society that is increasingly interested in technology. Although there are countless threats, in this article we will analyze 3 of the most common that exist in Computer Security. Cyberterrorism: This is one of the cyberattacks that has the greatest relevance in […]
Should your company have a monitoring system for its computer security?
Should your company have a monitoring system for its computer security? Many companies today face problems related to cyberattacks that directly affect the infrastructure of computers, networks and Internet connections. Constant monitoring helps to avoid this type of attack and allows to maintain and ensure the continuity of the company, protecting your company with a […]
CIS Critical security controls, What are they and how you should use them?
CIS Critical security controls, What are they and how you should use them? Cybersecurity has an extensive field, and it may seem that many inside the security of the information will never be able to “complete” it, but this no longer has to be the case. Regardless of the Budget, it may seem impossible for […]
How to reduce your attack surface with system hardening
How to reduce your attack surface with system hardening In most cases, new digital assets such as servers and operative systems, comes in a non configured status. When you install an asset, everything is predetermined. All the app services are activated and all the ports are open. At the same time, mosto f the new […]