Friday, June 29, 2018

A concert, sports, hamburgers and social networks

The day you have been waiting for so long has finally arrived. Your favorite singer comes to town and you could not miss it. You bought your ticket months ago and now it is time to set everything up. New trainers to resist a few hours of non-stop jumping, sharing a picture on the social networks to inform about the hours remaining and eating some fast-food in the way before getting in line to be on the first row. 

But, maybe other groups, that are not the ones attending the concert, have access to all the personal data thanks to simple things such as buying new trainers of a specific brand, or getting a ticket through the internet.


Wednesday, June 27, 2018

The invisible enemy

It is very common in young children to cover their eyes or hide when facing situations that scare them. They believe that if they do not see the problem through their own eyes, it will just disappear. Something similar happens with web filtering. Web filtering software takes two principal kinds of clients into account: parents that want to avoid their kids’ access to unappropriated content and companies that wish to avoid their employees’ access to websites that are not related to their work activities. 

Making the malicious content invisible is a really common practice in companies in order to prevent their employees from visiting unreliable sites, so they can keep their information safe.


Monday, June 25, 2018

Excel table

Who has never found an Excel file with thousands of datum that he has not been able to face? Formulas, numbers, cells... And everything is there to facilitate the work and access and store datum in a more organized way. Of course, more organized in case the person knows how to work on these datum the right way. If that’s not the case, you can find yourself overwhelmed by digits, letters, and a disorganization that can put your work in danger.

According to Christopher Ott, a former senior counterintelligence and cyber counsel at the Department of Justice’s (DOJ) National Security Division, getting lost between metrics, datum and tools whose functions are unknown, entails a threat as big as not having them.


Friday, June 22, 2018

Ghosts of the past and the future

As in the famous "A Christmas Carol" by Charles Dickens, ghosts always come back. In this case, we are referring to the ghosts of cybersecurity. In this world, technological progress do not stop and with them, new vulnerabilities that put our information in danger show up.
Being updated about everything and an education applied to the workers of the organizations is essential in order to avoid falling into the same past mistakes and future troubles. 

Every day, new problems and vulnerabilities come up, which the cyber attackers use to get their objectives, but in other occasions ‘’old ghosts from the past’’ take advantage of those vulnerabilities that were not solved in time again.


Wednesday, June 20, 2018

The employee of the month

Many organizations count on monthly award programs with the goal of recognizing the achievements and efforts of their members. The employee of the month turns to be the reference worker of the companies thanks to his/hers good work. Companies show bigger compromises towards their contributors day by day and develop endless activities with the goal of encouraging motivation and strengthen the commitment ties. But, what happens with the rest of the employees?


According to the poll made by Ipsos, 1 out of every 3 workers in the USA admits a potentially risky behavior at work. A really worrying fact that brings up important security problems for American companies.