
MALWARE
​
Malicious code, destined to gain access to a computer, with the aim of causing damage, changes, or steal information
​
RANSOMWARE
​
Malicious code (malware) that restricts the access to a computer with a blockage and demands a ransom (cripto coins, usually) to restore access (which is NOT granted!!!)
​
PHISHING
​
Attempts to obtain personal information (such as credit card or authenticacyion matrix cards) through IDENTITY THEFT
WEAK PASSWORDS​
​
A strong password is a (more) serious way to prevent that others gain access to tour computer, mobile device or social media / mail service.
​
DO NOT USE
- Your name, your wife's (husband's), a son's, a pet's
Words like
- password
- password123
- 12345678
​
Use a STRONG password mixing CAPS, Small letters, numbers, special caracters (like comma)
OPEN FIREWALL RULES​
​
Open firewall rules (any to any), either INBOUND or OUTBOUND, are always a step back to security.
​
You must restrict what HAS to be restricted
PHYSICAL SECURITY​
​
Having great firewalls is not enough if anyone can gain access to sensitive sites.
​
Phsysical safety is of the upmost relevance
SERVICES
​
Review of privacy policies
​
Creation/ review of security procedures
​
Creation of documentation related to existing infrastructures/projects
​
Advisement on strong password policy​
​
Execution of backups on personal computers/networks
​
Security of home networks
CLICK BELOW TO SEND EMAIL
​