Posts Tagged 'risk management'

Sabemos que en ocasiones es difícil entender por qué el área responsable de las tecnologías de la información (TI) insiste tanto a los usuarios de computadoras y dispositivos que deben respetar las reglas y cuidar la seguridad digital, por eso explicaremos los riesgos por amenazas informáticas que enfrenta una organización mediante el uso de términos […]

Data breaches are commonplace. Every organization that handles sensitive or private data should have a proper capability to respond to an incident. Many companies have a basic set of procedures, while others maintain a mature set of people and processes. A small percentage of organizations over the years have refined their capabilities to a professional level. […]

Este blog fue publicado inicialmente en CSO Online La seguridad adecuada en cualquier empresa tiene que ver totalmente con la gestión de los riesgos de su negocio. La palabra operativa es “su”. No existen dos organizaciones iguales cuando se trata de su negocio, así que no hay dos perfiles de tolerancia a riesgos idénticos. Debido […]

Do you know that insiders, whether through accident or intent, account for more than 40% of data exfiltration? These incidents often happen when Office documents are copied to a removable drive, USB storage, or cloud file sharing application. One way to significantly reduce these incidents is through the use of a file protection and encryption […]

It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it. Although many CISOs see automation as a necessity to deal with limited resources and increasing workloads, there is a lingering reticence to adopt it widely because their security staff […]