Maybe you shouldn't have scanned that QR!
This could have been a Phishing attack and now we would have access to all your data. Shall we sit down and talk about cybersecurity?
Contact form
In the meantime, you may be interested in acquiring some of our services:
-
Offer
Digital Research
regular price €1.980,00 EURregular priceUnit price / by€2.480,00 EUROffer price €1.980,00 EUROffer -
Pentesting: Internal Audit Service for Networks and Systems (Ethical Hacking)
regular price From €3.874,00 EURregular priceUnit price / by -
Implementation of the ISO 27001 Standard
regular price €5.265,00 EURregular priceUnit price / by -
Implementation of the National Security Scheme (ENS)
regular price €6.494,00 EURregular priceUnit price / by -
Identification of internal email fraud
regular price From €590,00 EURregular priceUnit price / by
Or read some of our latest articles:
See everything-
Secure Development: A fundamental pillar for th...
Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...
Secure Development: A fundamental pillar for th...
Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...
-
A08:2021 - Software and Data Integrity Failures
En este capítulo del OWASP Top Ten, vamos a hablar de la vulnerabilidad A08:2021 - Software and Data Integrity Failures o en español A08:2021 - Fallos en el software y...
A08:2021 - Software and Data Integrity Failures
En este capítulo del OWASP Top Ten, vamos a hablar de la vulnerabilidad A08:2021 - Software and Data Integrity Failures o en español A08:2021 - Fallos en el software y...
-
Current state of cybersecurity: challenges and ...
Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...
Current state of cybersecurity: challenges and ...
Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...
-
Identification and authentication failures
¿Identificación, autenticación o autorización? Primero, debemos entender la diferencia entre identificación y autenticación: Identificación: Es el proceso donde se proporciona una identidad; un u...
Identification and authentication failures
¿Identificación, autenticación o autorización? Primero, debemos entender la diferencia entre identificación y autenticación: Identificación: Es el proceso donde se proporciona una identidad; un u...