Cybersecurity is becoming a key aspect for any company that wants to ensure the continuity of its business operations, as well as safeguard customer trust and brand reputation. Additionally, the techniques and methods for attacking a company are constantly evolving, becoming much more sophisticated, especially with the use of technologies like Artificial Intelligence.
What are logs and why are they important in cybersecurity?
Cybersecurity is becoming a key aspect for any company that wants to ensure the continuity of its business operations, as well as safeguard customer trust and brand reputation. Additionally, the techniques and methods for attacking a company are constantly evolving, becoming much more sophisticated, especially with the use of technologies like Artificial Intelligence.
Cybersecurity protocols that you should activate in your company
There are a series of cybersecurity protocols that every organization should have implemented and activated to protect both the internal and external security of the company. This is a way to safeguard data from the clutches of cybercriminals, thus avoiding both economic damage and harm to the company's image and brand reputation.
Differences between pentesting and red teaming: Which is the best option?
To ensure the proper functioning and protection of cybersecurity systems within a company, periodic monitoring and evaluation are of utmost importance. Evaluating the organization's IT systems and infrastructure is crucial to understanding their level of cybersecurity.
MITRE ATT&CK: What is it and how does it work?
The MITRE ATT&CK matrix, designed by the MITRE Corporation, is used to describe and catalog fraudulent behaviors in cybersecurity. To do this, it relies on tactics and techniques commonly used by cybercriminals to prevent users from such attacks.
DrDoS cyber attack analysis
Distributed Denial of Service (DDoS) attacks are a variant of Denial of Service (DoS) attacks and aim to disable a server, a service, or an infrastructure.
Compromised email account? How to act when your account is hacked
One of the most common cyberattacks is phishing and email account hacking. These attacks, increasingly sophisticated, are becoming harder to detect, resulting in a higher success rate compared to other types of attacks.
Democratization of cyber attacks
In a previous article, we talked about Petam.io, the automatic online scanner we have developed to detect security breaches as a tool to democratize cybersecurity.
Managed Detection and Response (MDR): ¿What is it, how does it work, and why is it recommended?
MDR (Managed Detection and Response) is a managed cybersecurity service, which means it provides real-time monitoring, threat detection, and incident response autonomously. It's a solution that continuously monitors a client's network, identifies potential threats, and takes actions to contain and mitigate them.
Latest trends in cyberattacks
In the realm of cybercrime, new methods of cybercriminals violating our rights and taking advantage of them are constantly being detected.
Cybersecurity in the educational sector
Technology has also made its way into the education sector. Teaching through computers and screens is the most common and widely used method by educational institutions nowadays.
How to recover files encrypted by ransomware
Ransomware is a type of malware that prevents access to our inforamation. In other words, cybercriminals block access to our files and demand an economic ransom in exchange for restoring access. If we don't comply, they threaten to publicly disclose the encrypted information, wich often includes sensitive data sucha as bank accounts and emails.
What is social engineering and how to protect yourself: Complete Guide
What is the main objective of cybercriminals when attacking a company or user? To obtain confidential information that could jeopardize the reputation of an organization or individual, aiming to gain economic benefits in exchange for not making it public.
Complete Guide on Cybersecurity in Biotechs and Laboratories
In 2022, cyberattacks in the healthcare sector surged by 650%, according to Tehtris. These attacks can result not only in the loss of sensitive and confidential data about clients, patients, suppliers, collaborators, etc., but also in the potential theft of formulas or disruption of the organization's activities.
Ethical hacking applied to the pharmaceutical sector
At ESED, as a company specialized in cybersecurity, especially in the healthcare sector, we want to discuss some of the ethical hacking techniques we use in the pharmaceutical sector to ensure the security of their information and prevent data leaks.
Solutions that will help you keep phishing at bay in your company
How to detect computer frauds to prevent access to your data
We refer to cyberfraud as all those crimes or scams that are committed on the internet, whether through a website or the applications we use. Cyberfraud is big business: according to a report from the European Central Bank (ECB), fraudulent transactions amount to 1.8 billion euros annually. In 2019, cybercrimes grew by 36% compared to 2018. According to the Ministry of the Interior, 12 frauds and threats are reported online every hour.
How to protect shared folders to prevent data leakage.
Sharing folders and files is one of the most common practices nowadays, especially now that most of us work in the cloud and spend our days granting and revoking permissions. To you, I say you can only view it, to you, you can view and edit it... and so on all day long. But do we really have control over who has access to the information, who was the last person to modify it, or where it is located?
Utilizing Artificial Intelligence to prevent cyberattacks
Artificial Intelligence (AI) is disrupting various aspects and sectors of our society. This technology, which is here to stay and continues to evolve, initially aimed to make our lives easier and provide support in areas where the execution of certain manual tasks required too much effort, time, and money to accomplish
Cybersecurity in advisory and consulting firms
Advisory and consulting firms handle and collect a large amount of data and confidential information that could be vulnerable in the event of a cyberattack.
How to recover files infected by a virus?
The loss of files and data, whether due to accidental deletion or the entry of a virus into our system or device, is very common. With the years we have spent in the world of cybersecurity and IT solutions, we have realized that data recovery services or Disaster Recovery continue to be in high demand.
11 tips to protect your smartphone against cyber attacks
Currently, 94% of users use mobile phones to connect to the Internet, according to the AIMC. A very relevant but worrying figure at the same time. Those of us who work in computer security are aware that mobile security is not usually the same as computer security.
What are logs and why are they important in cybersecurity?
Jul 23, 2024 1:14:57 PM / by Eduard Bardají
Cybersecurity protocols that you should activate in your company
Jul 23, 2024 11:59:02 AM / by Eduard Bardají posted in cybersecurity
There are a series of cybersecurity protocols that every organization should have implemented and activated to protect both the internal and external security of the company. This is a way to safeguard data from the clutches of cybercriminals, thus avoiding both economic damage and harm to the company's image and brand reputation.
Differences between pentesting and red teaming: Which is the best option?
Jul 15, 2024 2:08:42 PM / by Eduard Bardají posted in cybersecurity
To ensure the proper functioning and protection of cybersecurity systems within a company, periodic monitoring and evaluation are of utmost importance. Evaluating the organization's IT systems and infrastructure is crucial to understanding their level of cybersecurity.
MITRE ATT&CK: What is it and how does it work?
Jul 12, 2024 1:43:41 PM / by Eduard Bardají
The MITRE ATT&CK matrix, designed by the MITRE Corporation, is used to describe and catalog fraudulent behaviors in cybersecurity. To do this, it relies on tactics and techniques commonly used by cybercriminals to prevent users from such attacks.
DrDoS cyber attack analysis
Jul 3, 2024 4:26:08 PM / by Eduard Bardají posted in cybersecurity, cyberattacks
Distributed Denial of Service (DDoS) attacks are a variant of Denial of Service (DoS) attacks and aim to disable a server, a service, or an infrastructure.
Compromised email account? How to act when your account is hacked
Jun 19, 2024 12:48:03 PM / by Eduard Bardají posted in phishing, cybersecurity, cyberattacks
One of the most common cyberattacks is phishing and email account hacking. These attacks, increasingly sophisticated, are becoming harder to detect, resulting in a higher success rate compared to other types of attacks.
Democratization of cyber attacks
Jun 18, 2024 7:56:02 AM / by Eduard Bardají posted in cybersecurity, cyberattacks
In a previous article, we talked about Petam.io, the automatic online scanner we have developed to detect security breaches as a tool to democratize cybersecurity.
Managed Detection and Response (MDR): ¿What is it, how does it work, and why is it recommended?
Jun 10, 2024 2:11:02 PM / by Eduard Bardají posted in cybersecurity, MDR
MDR (Managed Detection and Response) is a managed cybersecurity service, which means it provides real-time monitoring, threat detection, and incident response autonomously. It's a solution that continuously monitors a client's network, identifies potential threats, and takes actions to contain and mitigate them.
Latest trends in cyberattacks
Jun 10, 2024 2:08:56 PM / by Eduard Bardají posted in cybersecurity, cyberattacks
In the realm of cybercrime, new methods of cybercriminals violating our rights and taking advantage of them are constantly being detected.
Cybersecurity in the educational sector
May 17, 2024 12:49:55 PM / by Eduard Bardají posted in cybersecurity, cyberattacks
Technology has also made its way into the education sector. Teaching through computers and screens is the most common and widely used method by educational institutions nowadays.
How to recover files encrypted by ransomware
May 13, 2024 1:56:46 PM / by Eduard Bardají posted in ransomware, cybersecurity, cyberattacks
Ransomware is a type of malware that prevents access to our inforamation. In other words, cybercriminals block access to our files and demand an economic ransom in exchange for restoring access. If we don't comply, they threaten to publicly disclose the encrypted information, wich often includes sensitive data sucha as bank accounts and emails.
What is social engineering and how to protect yourself: Complete Guide
Nov 9, 2023 12:27:20 PM / by Eduard Bardají posted in cybersecurity
What is the main objective of cybercriminals when attacking a company or user? To obtain confidential information that could jeopardize the reputation of an organization or individual, aiming to gain economic benefits in exchange for not making it public.
Complete Guide on Cybersecurity in Biotechs and Laboratories
Nov 9, 2023 11:33:24 AM / by Eduard Bardají posted in cybersecurity, biotech
In 2022, cyberattacks in the healthcare sector surged by 650%, according to Tehtris. These attacks can result not only in the loss of sensitive and confidential data about clients, patients, suppliers, collaborators, etc., but also in the potential theft of formulas or disruption of the organization's activities.
Ethical hacking applied to the pharmaceutical sector
Nov 3, 2023 4:19:08 PM / by Eduard Bardají posted in cybersecurity, ethical hacking
At ESED, as a company specialized in cybersecurity, especially in the healthcare sector, we want to discuss some of the ethical hacking techniques we use in the pharmaceutical sector to ensure the security of their information and prevent data leaks.
Solutions that will help you keep phishing at bay in your company
Nov 3, 2023 3:36:00 PM / by Eduard Bardají posted in phishing, ciberseguridad
In a previous post, we've already discussed phishing, cyberattacks launched through email with the goal of deceiving the user into taking a specific action, such as clicking on a link that includes the download of an infected file.
How to detect computer frauds to prevent access to your data
Nov 3, 2023 3:24:10 PM / by Eduard Bardají posted in cybersecurity
We refer to cyberfraud as all those crimes or scams that are committed on the internet, whether through a website or the applications we use. Cyberfraud is big business: according to a report from the European Central Bank (ECB), fraudulent transactions amount to 1.8 billion euros annually. In 2019, cybercrimes grew by 36% compared to 2018. According to the Ministry of the Interior, 12 frauds and threats are reported online every hour.
How to protect shared folders to prevent data leakage.
Nov 3, 2023 3:09:28 PM / by Eduard Bardají posted in cybersecurity
Sharing folders and files is one of the most common practices nowadays, especially now that most of us work in the cloud and spend our days granting and revoking permissions. To you, I say you can only view it, to you, you can view and edit it... and so on all day long. But do we really have control over who has access to the information, who was the last person to modify it, or where it is located?
Email Security 2024
Sep 18, 2023 11:22:34 AM / by Eduard Bardají posted in phishing, cybersecurity, cyberattacks
Let's put ourselves in a bit of context...
Utilizing Artificial Intelligence to prevent cyberattacks
Sep 18, 2023 10:11:00 AM / by Eduard Bardají posted in cyberattacks, artificial intelligence
Artificial Intelligence (AI) is disrupting various aspects and sectors of our society. This technology, which is here to stay and continues to evolve, initially aimed to make our lives easier and provide support in areas where the execution of certain manual tasks required too much effort, time, and money to accomplish
Importance of cybersecurity in the healthcare sector
Aug 24, 2023 1:49:40 PM / by Eduard Bardají posted in cybersecurity, biotech
Cybersecurity in advisory and consulting firms
Aug 24, 2023 1:49:04 PM / by Eduard Bardají posted in cybersecurity
Advisory and consulting firms handle and collect a large amount of data and confidential information that could be vulnerable in the event of a cyberattack.
How to recover files infected by a virus?
Aug 24, 2023 1:47:43 PM / by Eduard Bardají posted in virus, cybersecurity
The loss of files and data, whether due to accidental deletion or the entry of a virus into our system or device, is very common. With the years we have spent in the world of cybersecurity and IT solutions, we have realized that data recovery services or Disaster Recovery continue to be in high demand.
11 tips to protect your smartphone against cyber attacks
Dec 1, 2022 10:39:00 AM / by Eduard Bardají posted in cybersecurity, cyber
Currently, 94% of users use mobile phones to connect to the Internet, according to the AIMC. A very relevant but worrying figure at the same time. Those of us who work in computer security are aware that mobile security is not usually the same as computer security.