top of page
security.jpg

MALWARE

​

Malicious code, destined to gain access to a computer, with the aim of causing damage, changes, or steal information

​

RANSOMWARE

​

Malicious code (malware) that restricts the access to a computer with a blockage and demands a ransom (cripto coins, usually) to restore access (which is NOT granted!!!)

​

PHISHING

​

Attempts to obtain personal information (such as credit card or authenticacyion matrix cards) through IDENTITY THEFT

WEAK PASSWORDS​

​

A strong password is a (more) serious way to prevent that others gain access to tour computer, mobile device or social media / mail service.

​

DO NOT USE

- Your name, your wife's (husband's), a son's, a pet's

Words like

- password

- password123

- 12345678

​

Use a STRONG password mixing CAPS, Small letters, numbers, special caracters (like comma)

OPEN FIREWALL RULES​

​

Open firewall rules (any to any), either INBOUND or OUTBOUND, are always a step back to security.

​

You must restrict what HAS to be restricted

PHYSICAL SECURITY​

​

Having great firewalls is not enough if anyone can gain access to sensitive sites.

​

Phsysical safety is of the upmost relevance

SERVICES

​

Review of privacy policies

​

Creation/ review of security procedures

​

Creation of documentation related to existing infrastructures/projects 

​

Advisement on strong password policy​

​

Execution of backups on personal computers/networks

​

Security of home networks

CLICK BELOW TO SEND EMAIL

​

© 2023 by Strategic Consulting. Proudly created with Wix.com

bottom of page