Wednesday, June 20, 2018

The employee of the month

Many organizations count on monthly award programs with the goal of recognizing the achievements and efforts of their members. The employee of the month turns to be the reference worker of the companies thanks to his/hers good work. Companies show bigger compromises towards their contributors day by day and develop endless activities with the goal of encouraging motivation and strengthen the commitment ties. But, what happens with the rest of the employees?

According to the poll made by Ipsos, 1 out of every 3 workers in the USA admits a potentially risky behavior at work. A really worrying fact that brings up important security problems for American companies.

Monday, June 18, 2018

Anticipate the threats

We live in a time where jewelry theft is forgotten and we can only see it in 90’s movies. Nowadays, data stealing is the trend. Thieves are not going into museums looking for the biggest diamonds, but into digital ecosystems.  These threats are way more difficult to manage. From a terrorist attack to a natural disaster, are the consequences that these stealing can lead to. We are all in danger in one way or another. The diamonds stealing in an American way is no longer remembered and now, a new kind of thieve is the thief of the XXI century.

Everbridge, the company is charge of these critical events helps governments and companies not only to react but to get ready and to anticipate to possible threats. Javier Colado, SVP of International Sales at Everbridge, shows us how the company works with companies when attacks happen or when they have not happened yet.

Friday, June 15, 2018

3 of the big ones

Russia, the United States and North Korea, three of the countries which are on our screens every day. They are currently three of the world powers that occupy the front pages in all the newspapers of the world in economic, social and political topics, and not precisely because of their good relationship. Tension is felt on the air and it would not be less in cybersecurity terms. ¿Are we going to abandon traditional war in order to initiate a cyberwar? The first steps are already taking place...

The relationships between Russia, The United States and North Korea regarding cybersecurity, are hidden. Invisible and suspicious attacks, and not a clear attacker, these are the characteristics that set this week’s actuality.

Wednesday, June 13, 2018

An express kidnapping

In most cop thriller movies, bank robbers’ modus operandi consists on getting into a bank with guns so that, within the shortest possible time,  the employees have to get bundles of bills into bags, and then running away from the crime scene as soon as possible. Each one might be different, but it always pursues the same goal: to get the loot in a few minutes and get away without raising suspicions and with the minimum consequences. 

This is the situation that many businesses face at some point if their systems are not properly protected. They might find the message ‘’all the files in your computer have been blocked. Pay for their ransom within 24 hours in order to get the key, otherwise…’’

Monday, June 11, 2018

Guess who?

I am sure that when you were a kid, you must have played the famous ‘Guess Who’ over a million times, the game in which you had to try and guess the character your rival was hiding. Through some questions you had to eliminate options till you hit the nail on the head. In the world of cybersecurity, games do not exist. Every single attack has an origin and a cyber attacker behind, which in this case, cannot be found through some simple questions. Behind every cyber attack there is an executor, but what if the origins came from a State?

Every important cyberattack is followed by the question of ‘who is behind this? ‘what they want to achieve?’, and most importantly, whether the attack is sponsored by any state or nation. This states, such as Russia, China, or North Korea, are usually the principal suspects of these attacks. But, is the idea of cyber attacks being sponsored by the states too exaggerated?

Friday, June 8, 2018

One goal for the squad

A few days are left before the 2018 Football World Cup takes place in Russia and more people can be seen with their football team t-shirt supporting their team and their country. A lot of tourists are going to spend their holidays in Russia as real football fans, but in this event there’s a team you didn’t know about. When players are focused on winning the games, a lot of hackers are waiting for the perfect moment to score. 

When connecting to a public network, when you don’t know the signal is coming or by trusting the apps you use every day, you’re risking your information.

Wednesday, June 6, 2018

The leader of the battle against cybersecurity

In the movie 300, Spartan King Leonidas and his 300 warriors fight to the death against the “god-king” Jerjes I and his army of more than 100.000 soldiers. A battle in inequality in which Leonidas is the thinking mind that must think of tactics to win the war. You can’t win the battle without a plan, knowing the opponent, establishing a strategy and choosing a leader. In cybersecurity world it happens the same, the number of enemies is much more than 100.000 and it’s were battles are fight every day. As a company, you have the chance to create a team manager and fight the enemy. 

Because of a lack of talent in cybersecurity, it can paralyze companies, but, what if we teach a person to lead a team?

Monday, June 4, 2018

Everyone to his own taste

As in every aspect in our lives, a good advice in time or knowing other’s points of view about how they think of you can help you make decisions. In cybersecurity world, points of view and opinions are also necessary. In most occasions, it’s a teamwork that can have its pros and cons, but it always should focus on the problem and that problem in security. 

Increasing the diversity in cybersecurity equipment can increase their capacity to solve cybersecurity challenges by thinking diversity. This is explained by Grant Bourzikas. CISO in McAfee.

Friday, June 1, 2018

A new game in the video game

It’s the 80s, where Space Invaders appeared for the first time, a video game whose goal was to eliminate alien spaceships with a laser canyon in order to obtain the highest score possible.  Alien spaceships that want to invade a planet. Classic. In cybersecurity, it happens just the same. It’s not about attacking; it’s about defending your privacy and data so that the dangerous aliens won’t get them. 

This week has been decisive in the cybersecurity world, after the implementation of the GDPR (General Data Protection Regulation) and news that have affected the sector.