What is a DNS attack and how to prevent it

What is a DNS attack and how to prevent it

In recent years we have experienced the incessant growth of attacks on all kinds of companies, but especially on large and well-known companies, which a priori seemed unbreakable. According to the International Security Council (NISC) 72% of these organizations have...
Rule 3 2 1 part Backup

Rule 3 2 1 part Backup

When we talk about enterprise data backup and security, the 3-2-1 backup rule is a best practice. But what is it really? And what does it mean for companies? What is the 3-2-1 Backup rule? Backup rule 3-2-1 is a data backup and security strategy in which three copies...
What to do to fight Ransomware

What to do to fight Ransomware

It goes without saying that increasing and maintaining cyber security solutions is a must for all organisations and entities. But perhaps on which of them are the most appropriate. That’s why we’re going to tell you what to do to fight ransomware. Backing...
Ransomware as the enemy of business

Ransomware as the enemy of business

Recent data estimate that cyber-attacks have grown by 125% in Spain since 2020, approximately 40,000 per day. Among the targets of cybercriminals, the main focus is on businesses, governments and institutions. Their goal is to attack servers, applications and...
5 essential tools for pentesting:

5 essential tools for pentesting:

As we have seen in previous posts, pentesting is one of the most effective cybersecurity auditing methods. This method is capable of uncovering potential vulnerabilities both internally and externally within an organization. All tests performed through this...
Audit your security with pentesting

Audit your security with pentesting

Technology and digitization is fundamental to the evolution of the economy and in general society. This also involves prior training to maintain security in corporate infrastructures. Just as we protect our homes with advanced security systems, we must protect the...