Companies increase cybersecurity investment in Chile

Noticias | Empresas aumentan inversión de ciberseguridad en Chile

Cybersecurity Companies in Chile Companies increase cybersecurity investment in Chile Computer security is increasing every day in chilean companies due to dangers they are facing from constant cyberattacks that put their infrastructure and computer security at risk. In 2018, different companies in Chile invested a total of 156 million dollars in cybersecurity, which implies a […]

The WORLD ECONOMIC FORUM ensures that in 2020 cyber attacks will intensify

Noticias | El FORO ECONÓMICO MUNDIAL asegura que este 2020 los ataques cibernéticos se intensificarán

The WORLD ECONOMIC FORUM ensures that in 2020 cyber attacks will intensify Globally, cyberattacks have increased by almost 76% and it is expected that by 2020 they will intensify even more, this, according to a report from The Global Risks Report 2020 released by the World Economic Forum. This has not been the first wake-up […]

Most Common Threats in Computer Systems

Noticias | Amenazas más comunes en los Sistemas Informáticos

Most Common Threats in Computer Systems Nowadays, cyberattacks are gaining momentum in this technological society that is increasingly interested in technology. Although there are countless threats, in this article we will analyze 3 of the most common that exist in Computer Security. Cyberterrorism: This is one of the cyberattacks that has the greatest relevance in […]

Should your company have a monitoring system for its computer security?

Should your company have a monitoring system for its computer security? Many companies today face problems related to cyberattacks that directly affect the infrastructure of computers, networks and Internet connections. Constant monitoring helps to avoid this type of attack and allows to maintain and ensure the continuity of the company, protecting your company with a […]

CIS Critical security controls, What are they and how you should use them?

Controles de seguridad CIS ¿Qué son y como debería utilizarlos?

CIS Critical security controls, What are they and how you should use them? Cybersecurity has an extensive field, and it may seem that many inside the security of the information will never be able to “complete” it, but this no longer has to be the case. Regardless of the Budget, it may seem impossible for […]

How to reduce your attack surface with system hardening

Cómo reducir su superficie de ataque con el endurecimiento del sistema

How to reduce your attack surface with system hardening In most cases, new digital assets such as servers and operative systems, comes in a non configured status. When you install an asset, everything is predetermined. All the app services are activated and all the ports are open. At the same time, mosto f the new […]