CATEGORIES

Sin Categoria

¿Es la Intranet de tu empresa segura?

Intranets offer more than just avenues for communication within your company. They also present employees with a treasure trove of content and services, enabling them to perform better and become more effective. On the contrary, when employers are forced to deal with...

GDPR y seguridad de la información

The General Data Protection Regulation (GDPR) is the most significant overhaul of European Union (EU) data protection legislation in over 20 years. Amongst other things, it is intended to provide better protection to individuals and to give greater certainty to...

Vulnerabilidades de seguridad más comunes

Cybercriminals are constantly seeking to take advantage of your computer security vulnerabilities. The move to remote-first has underlined the increasing reliance on cloud and web technologies while also confirming what the software development world has known for at...

Porque una Política de Control de Acceso de Usuarios es crucial para su organización

Organisations spend a lot of time and effort protecting their networks from external attacks. However, it is insider threats that are viewed as one of the biggest risks to corporate data according to IT decision makers surveyed in the Cyber-Ark 2012 Trust, Security...
¿Qué es la Autenticación?

¿Qué es la Autenticación?

Autenticación es el proceso que debe seguir un usuario para tener acceso a los recursos de un sistema o de una red de computadores. Este proceso implica identificación (decirle al sistema quién es)...

leer más
¿Es la Intranet de tu empresa segura?

¿Es la Intranet de tu empresa segura?

Intranets offer more than just avenues for communication within your company. They also present employees with a treasure trove of content and services, enabling them to perform better and become more effective. On the contrary, when employers are forced to deal with...

GDPR y seguridad de la información

GDPR y seguridad de la información

The General Data Protection Regulation (GDPR) is the most significant overhaul of European Union (EU) data protection legislation in over 20 years. Amongst other things, it is intended to provide better protection to individuals and to give greater certainty to...

Vulnerabilidades de seguridad más comunes

Vulnerabilidades de seguridad más comunes

Cybercriminals are constantly seeking to take advantage of your computer security vulnerabilities. The move to remote-first has underlined the increasing reliance on cloud and web technologies while also confirming what the software development world has known for at...