top of page
1.jpg

WHAT IS CYBERSECURITY?

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It is also known as information technology security or electronic information security.


The term is applied in different contexts, from business to mobile computing, and can be broken down into a few common categories.

TECHNOLOGICAL SECURITY CATEGORIES

2.jpg
  •  network security  is the practice of protecting a computer network from intruders, whether they are targeted attackers or opportunistic malware.

  • The application security  focuses on keeping software and devices free from threats. An affected application could provide access to data that it is intended to protect.

  • Effective security begins at the design stage, long before a program or device is deployed.

  • The operational security  includes the processes and decisions to manage and protect data resources. The permissions that users have to access a network and the procedures that determine how and where data can be stored or shared fall into this category.

  • The disaster recovery and business continuity  define how an organization responds to a cybersecurity incident or any other event that causes operations to stop or lose data. Disaster recovery policies dictate how the organization restores its operations and information to the same operational capacity as before the event. Business continuity is the plan that the organization falls back on when trying to operate without certain resources.

3.jpg
4.jpg
  • The End-User Training  addresses the most unpredictable factor in cybersecurity: people. If good security practices are not followed, anyone can accidentally introduce a virus into an otherwise secure system. Teaching users to remove suspicious email attachments, not to plug in unidentified USB drives, and other important lessons is critical to the security of any organization.

  • The information security  protects the integrity and privacy of data, both in storage and in transit.

TYPES OF THREATS​​

There are three threats facing cybersecurity:

CYBER CRIME

The cybercrime includes individual agents or groups that attack systems for financial gain or disruption.

CYBER ATTACKS

Cyber attacks cc781905-5cde-3194-bb3b-136bad5cf58d_often involve information gathering for political purposes.

CYBERTERRORISM

The ciberterrorismo aims to weaken electronic systems to cause panic or fear.

5.jpg

WHAT IS MALWARE?

“Malware” refers to malicious software. As one of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user's computer.
Often spread via an unsolicited email attachment or legitimate-looking download, malware can be used by cybercriminals to make money or conduct cyberattacks for political purposes.

There are different types of malware, including the following:

VIRUS

A program capable of reproducing itself, which embeds itself in a clean file and spreads throughout the computer system, infecting files with malicious code.

TROJANS

A type of malware that masquerades as legitimate software. Cybercriminals trick users into uploading Trojans to their computers, where they cause damage or collect data.

SPYWARE

A program that secretly records what a user does so that cybercriminals can make use of this information. For example, spyware could capture credit card details.

Ransomware

Malware that locks down a user's files and data, with the threat of deleting them, unless a ransom is paid.

ADWARE

Advertising software that can be used to spread malware.

BUTTON

Malware infected computer networks that are used by cybercriminals to perform online tasks without user permission.

6.jpg

CYBERSECURITY TIPS! 
STAY PROTECTED AGAINST ANY THREAT

How can companies and individuals protect themselves against cyber threats? Here are our top cybersecurity tips:

  1. Update software and operating system: this means you will take advantage of the latest security patches.

  2. Use antivirus software: security solutions, such as Kaspersky Total Security, will detect and remove threats. Keep your software up to date for the best level of protection.

  3. Use strong passwords: make sure your passwords are not easy to guess.

  4. Do not open email attachments from unknown senders: could be infected with malware.

  5. Do not click on links in emails from unknown senders or websites: is a common way for malware to spread.

  6. Avoid using unsecured Wi-Fi networks in public places: Unsecured networks leave you vulnerable to “Man-in-the-middle” attacks.

bottom of page