In recent years, the growth of new technologies, and connectivity via electronic devices (mobile phones, tablets, etc) has made a major change in the lives of people, who gradually rely more on these technologies. The main protagonist of the digital age we live in is the network of networks, which has become a necessary and element always present, both in homes and in all companies. Vast amounts of information (advertising, press releases, social blogs) are moved through digital communications. All these services accessible through the network of networks, often are not properly insured, or are affected by failures of design, since the issue of security is often treated as an afterthought. In our days has emerged a new way of expressing themselves, which consists of search failures in services (web portals, for example) published on the Internet and exploit them once found. This way of working, carried out by persons with specific knowledge computer, it has become fashionable, creating groups organized with common purposes.
The purposes can range from stealing mail from a person credentials, or your password to a social network, to steal banking data of great importance. Fundamentally, the most typical purposes are related to information theft, and denial of service. This situation has generated a panic widespread in society, who begins to see through the media that systems that use in their daily lives are not as secure as you thought. The result is mistrust on the Internet and its technologies, although at this stage, be it depends on too these technologies to dispense with them. The best way to not feel vulnerable against these attacks is bet on security. In the area of the home, the best weapons to prevent cyberattacks are: have current anti-virus software and keep it updated install updates of programs and operating system used to have installed a Firewall host that inform us of unauthorized connections are attempting to perform. Maintain a preventive against messages attitude or emails from strangers or suspicious looking as regards the business sector, these measures are equally valid, being necessary also implement other additional measures, such as: implementation of secure networks, using systems perimeter protection review and updating these systems realization of audits of security and Intrusion execution of audits of code to verify that applications are safe as you can see, implement all measures can lead to a major economic sote, and however be the victim of an attack can lead to even higher costs.
In conclusion, our best weapon is awareness. We must have very clear what might happen, what form of behavior must take to minimize the chance of attacks to succeed, and what measures we can implement to increase the protection against external threats. . Audea security of information S.L. Jose Francisco Londinez Echeverria Department of security ICT