{"id":57939,"date":"2022-01-24T12:51:12","date_gmt":"2022-01-24T11:51:12","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=57939"},"modified":"2022-01-24T13:06:48","modified_gmt":"2022-01-24T12:06:48","slug":"the-importance-of-cybersecurity-awareness-for-companies","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/the-importance-of-cybersecurity-awareness-for-companies\/","title":{"rendered":"The importance of cybersecurity awareness for companies"},"content":{"rendered":"<p>Today there is no company that does not handle information. We all depend on it to function. In particular, companies depend on customer and supplier data to continue economic activity.<\/p>\n\n\n\n<p>There is no company that does not have a computer, telephone, POS... we are all surrounded by electronic and computer equipment and every day we are more <strong>interconnected<\/strong>. In fact, we are all hooked on mobile phones to a greater or lesser extent. This process has accelerated with the COVID-19 pandemic, we are more dependent on the network every day.<\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-18d080a3 gb-headline-text\">Cybersecurity in the company<\/h2>\n\n\n\n<p>The businessman must ask himself what would happen in his company if he suddenly lost control. <strong>information<\/strong> of your business or may not have the ability to <strong>access it<\/strong>. To do this, the first question is to ask yourself if you have any <strong>cybersecurity level<\/strong> implemented in your company.&nbsp;<\/p>\n\n\n\n<p>The second question would be what to do if the company were faced with the event of being attacked and damaged by issues as dangerous as <em>ransomware<\/em>? Where are they going to ask for a ransom to see business data?&nbsp;<\/p>\n\n\n\n<p>If the <strong>answers<\/strong> to these questions <strong>they are not clear<\/strong>, possibly his <strong>company is exposed to threats that it does not even imagine<\/strong>. You are exposed to the irreparable loss of sensitive customer data, loss of credibility in the public opinion, loss of liquidity and\/or closure due to bankruptcy.<\/p>\n\n\n\n<p>Therefore, the first thing you should do is <strong>examine, quantify and measure the risks to which one may be exposed<\/strong>.&nbsp;<\/p>\n\n\n\n<p>To help companies <strong>assess your cybersecurity status<\/strong> and move towards higher levels of protection, there are <strong>professionals and companies<\/strong> highly technical that will be able to help you evaluate the risks and advise you on the protective measures you should take.<\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-2e3b2d51 gb-headline-text\">And how do you know if you are at risk?&nbsp;<\/h2>\n\n\n\n<p>The first thing is to do <strong>inventory of equipment and services<\/strong> that are used in the operation: computers, telephone, mobile phones, web pages, electronic commerce, electronic signature...<\/p>\n\n\n\n<p>Then see if you have <strong>protections<\/strong>, from the basics of a <strong>antivirus<\/strong> even firewall and other systems <strong>anti-malware.<\/strong><\/p>\n\n\n\n<p>We must not forget physical safety and neither do employees&#039; safety. You have to evaluate who has access because putting a pendrive in a computer with a virus can be catastrophic.&nbsp;<\/p>\n\n\n\n<p>Furthermore, there is the <strong>social engineering<\/strong>, by which people transgress the rules of confidentiality or security, due to mere carelessness or deception. We can continue with a long list of elements likely to be violated.<\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-faff59ca gb-headline-text\">And what measures can we take?<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Raise awareness<\/strong> to the employees.&nbsp;<\/li><li><strong>Detect and correct<\/strong> vulnerabilities.&nbsp;<\/li><li><strong>Protect <\/strong>the data.&nbsp;<\/li><li><strong>Create<\/strong> a recovery plan.&nbsp;<\/li><li>Guarantee the continuity of your business through <strong>outsourcing<\/strong>n.<\/li><li>Implement a system to <strong>manage identities and passwords<\/strong>.<\/li><\/ul>\n\n\n\n<p>As you can see, the risk exists and taking the necessary measures is necessary. It only requires knowledge and experience.<\/p>","protected":false},"excerpt":{"rendered":"<p>The importance of cybersecurity awareness for companies. We explain the reasons that alert you to a cybersecurity failure in a business. Keep reading.<\/p>","protected":false},"author":90,"featured_media":57941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-57939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/57939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=57939"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/57939\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/57941"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=57939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=57939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=57939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}