Category: Cybersecurity

28_2

Bring 7 good cybersecurity practices to your company.

Cyber threat and vulnerability management has never faced so many challenges. While there are many digital vulnerability scanning tools to prevent different attacks and detect different types of cyber threats, the effectiveness of these digital tools lies in applying good cybersecurity practices in your company

29_2

How to assess your company’s information security

Adopting new technologies as a fundamental part of the evolutionary process of digital transformation involves knowing, identifying and understanding new risks, incidents, events, vulnerabilities and threats that companies may be facing.

31_2

What is Multi-Factor Authentication or MFA?

Multi-Factor Authentication (MFA) is an access management component that requires users to prove their identity using at least two different verification factors before gaining access to a website, mobile app, or any other online resource.

32_2

Social Engineering

Social engineering is a malicious practice that aims to obtain sensitive information, doing so through the manipulation of legitimate users so that they reveal it to the attacker.

41_2

Microsoft releases patches for vulnerabilities in Azure

Wiz discovered information about a set of vulnerabilities in Linux virtual machines in the Azure cloud. This occurred when using the proprietary agent functions of the Open Management Infrastructure (OMI) platform.

42_2

Companies believe they will suffer a breach in customer data next year

In the new digital era, cybersecurity and information security has become indispensable for various organizations such as private or public, every year more risks in information have increased, information theft, identity theft, bribery, viruses such as Ransomware, phishing, among others, we all know that security is very important today, but what you don’t see and that can put you in a vulnerable situation is also a priority today.

45_2

Budget for cybersecurity in companies increases, despite cuts due to COVID-19

Cybersecurity continues to be a priority investment for companies. In Latin America, the share of IT security in the overall IT budget grew from 22% in 2019 to 30% in 2020 in SMBs and from 27% to 34% in larger companies. Likewise, 59% of organizations expect to increase their cybersecurity budget in the next three years.

46_2

Cyber Security: Whose responsibility is it?

These are issues related to security and shared compliance between AWS and the customer. This shared model can ease the operational burden on the customer, as AWS operates, manages, and controls the components of the host operating system and virtualization layer right down to the physical security of the premises in which the services operate.

47_2

Migrating Data to the Cloud with VMware Cloud on AWS

VMware and AWS provide organizations with a fast, easy, and cost-effective path to hybrid cloud while enabling customers to modernize applications with co-engineered solutions. Use your current governance, processes, and skills to deliver secure virtual desktops and applications with our virtual desktop infrastructure (VDI) solutions to enable your workforce to work securely from any location.

48_2

Worried about SaaS misconfigurations? Check these 5 settings

Businesses rely on SaaS applications for countless features, such as collaboration, marketing, file sharing, and more. But, problematically, they often lack the resources to configure those applications to prevent cyberattacks, data exfiltration, and other risks.