Blog
Featured blog posts

Featured blog posts

Technology
8
min read

The Tidal wave of data: How you should prepare

Most of our grandparents probably could not have imagined the technology we have now at our fingertips. Tablets, PCs, even a smartphone you can hold in your hand — all of these prove the rapid progress of tech nowadays.

Technology
8
min read

The IT gap: Three Reasons to Rethink Your Security

Cybersecurity has swept the world. According to a report from Business Insider Intelligence, initiatives for cybersecurity will spend an estimate of $655 billion to protect information on PCs, mobile devices, and Internet of Things devices by 2020.

Technology
15
min read

Privacy and data classification in Marketing

Learn more about cybersecurity regulation in the Marketing industry, GPDR data classification and data automation worldwide.

Technology
12
min read

Payment Card Industry Data Security Standard

PCI DSS is a security standard for organizations that handle credit card information from some significant branded credit card companies.

Technology
14
min read

Phishing, Why it happens and How can it be Avoibed?

Learn how phishing can produce a serious data leakage in an organization through different practices by means of mails, SMS messages and more.

Technology
15
min read

Open Source Technologies: Protect your servers Efficiently. Interview with María Fernanda Suárez

María Fernanda Suárez tells us about the importance of taking measures to protect the servers where user information is handled and stored.

Technology
14
min read

Why are Passwords important and How to Protect them?

Passwords, how to protect them, and avoid them being stolen?

Technology
11
min read

The National Institute of Standards and Technology (NIST)

NIST has published a Cyber Security Framework, which is voluntary guidance based on existing practices for organizations to reduce cybersecurity risk.