{"id":16664,"date":"2021-03-16T12:28:37","date_gmt":"2021-03-16T12:28:37","guid":{"rendered":"https:\/\/businessadapter.es\/cyberattack\/"},"modified":"2024-12-11T10:48:36","modified_gmt":"2024-12-11T10:48:36","slug":"cyberattack","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/cyberattack\/","title":{"rendered":"Cyberattack"},"content":{"rendered":"\n<h2 style=\"text-align: justify;\"><span style=\"color: #800000;\">What is a Cyber Attack?<\/span><\/h2>\n<p style=\"text-align: justify;\">A cyber-attack is considered to be any computer attack, therefore malicious, with the aim of accessing information (loss of confidentiality), eliminating (lack of availability) or altering such information (integrity).<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\">Purposes of a cyber-attack<\/span><\/h3>\n<p style=\"text-align: justify;\">The most common purpose is economic, although there may be others, such as cyberterrorism.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\">How can they attack my company?<\/span><\/h3>\n<p style=\"text-align: justify;\">Currently, it is estimated that approximately 90% of SMEs and freelancers suffer cyber-attacks<a href=\"https:\/\/businessadapter.es\/brechas-violaciones-de-seguridad\/\"><img decoding=\"async\" class=\" wp-image-4690 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/04\/seguridad-300x200.jpg\" alt=\"\" width=\"460\" height=\"308\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/04\/seguridad-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/04\/seguridad-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/04\/seguridad.jpg 1280w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/a> and the self-employed suffer cyber-attacks every day.<\/p>\n<p style=\"text-align: justify;\">Moreover, as we have recently learned, cybercriminals are not limited to the private sphere, as we have cases of public entities, such as the <a href=\"https:\/\/www.20minutos.es\/noticia\/4577992\/0\/estafan-21-000-euros-al-palacio-de-congresos-de-valencia-haciendose-pasar-por-la-empresa-de-seguridad\/\" target=\"_blank\" rel=\"noopener\">Palacio de Congresos<\/a>, the <a href=\"https:\/\/www.lavanguardia.com\/local\/valencia\/20190930\/47719655163\/juan-garlos-galindo-estafa-emt-ceo-grezzi.html\" target=\"_blank\" rel=\"noopener\">EMT<\/a> and some more recent ones such as the <a href=\"https:\/\/www.elmundo.es\/economia\/2021\/03\/09\/6047578dfc6c83411b8b4795.html\" target=\"_blank\" rel=\"noopener\">SEPE<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/businessadapter.es\/en\/who-we-are\/\">Business Adapter\u00ae<\/a>, in its work of constant advice, intends with this article to offer a &#8220;Quick Guide&#8221; to alert and instruct on the most relevant aspects to be taken into account to prevent a possible cyber-attack.  <\/p>\n<p style=\"text-align: justify;\">All this, in order to obtain the maximum protection of the information we handle, which is the most valuable asset of any professional activity.<\/p>\n<p style=\"text-align: justify;\">Below, we will detail the most common ways used in the cyber-attack:<\/p>\n<p style=\"text-align: justify;\"><strong>Identity theft<\/strong>: To make purchases in your name or in the name of companies, requesting bank transfers by pretending to be suppliers, etc.<\/p>\n<p style=\"text-align: justify;\"><strong>Impersonating another entity<\/strong>: Impersonating a bank to ask for access credentials to bank accounts and steal money.<\/p>\n<p style=\"text-align: justify;\">Impersonate IT providers by requesting passwords to access the computer and steal or hijack information for different purposes (espionage, ransomware, etc.).<\/p>\n<p style=\"text-align: justify;\"><strong>Infecting computer equipment<\/strong>: With information that arouses your interest, (request for a quote, delivery of a package, invoice attachment, etc.) they encourage you to open a document or click on links that download a malicious program, which would cause your computer to become unusable, deletion of information, sending emails to infect other computers, etc.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\">What can I do to avoid cyber-attacks?<\/span><\/h3>\n<p style=\"text-align: justify;\">INCIBE reports that the main channel of cyber-attacks are employees, therefore, the first step is <a href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/formacion\">specialized training<\/a>, both in data protection and information security.<\/p>\n<p style=\"text-align: justify;\">The Nielsen and Panda Security report reveals that 90% of companies use portable devices for work (Smartphone or Tablets) and that 25% of tablets and 35% of smartphones do not have security software.<\/p>\n<p style=\"text-align: justify;\">Therefore, another measure would be to install antivirus software on such devices, which will prevent (or at least drastically reduce) receiving emails from cybercriminals.<\/p>\n<p style=\"text-align: justify;\">Every company must approve a Data Protection and Security Policy, which is mandatory for all staff. <span style=\"font-size: inherit;\">We remind you that the <\/span><span style=\"font-size: inherit;\"> European (<a href=\"https:\/\/www.boe.es\/doue\/2016\/119\/L00001-00088.pdf\" target=\"_blank\" rel=\"noopener\">RGPD<\/a>) and Spanish (<a href=\"https:\/\/www.boe.es\/diario_boe\/txt.php?id=BOE-A-2018-16673\" target=\"_blank\" rel=\"noopener\">LOPD-GDD<\/a>)<\/span><a style=\"font-size: inherit;\" href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/proteccion-datos-valencia\">data protection regulations<\/a><span style=\"font-size: inherit;\"> are mandatory for any company or professional in Spain.<\/span><\/p>\n<p style=\"text-align: justify;\">This policy will guarantee the security of information and personal data. With measures such as those mentioned above or as for example: <\/p>\n<p style=\"text-align: justify;\">  &#8212; Security Breach Policy<\/p>\n<p style=\"text-align: justify;\">&#8212; Network usage policy for portable devices<\/p>\n<p style=\"text-align: justify;\">&#8212; Software download and maintenance policy<\/p>\n<p style=\"text-align: justify;\">&#8212; Backup policy<\/p>\n<p style=\"text-align: justify;\">&#8212; Password Policy<\/p>\n<p style=\"text-align: justify;\">&#8212; Telework Policy<\/p>\n<p style=\"text-align: justify;\">&#8212; Etc.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\">Business Adapter\u00ae Cybersecurity<\/span><\/h3>\n<p style=\"text-align: justify;\">Business Adapter helps you in all phases of a cyber-attack, but most importantly, we offer you all the necessary <a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\">cybersecurity<\/a> tools to prevent a cyber-attack.<\/p>\n<p> <\/p>\n<p style=\"text-align: center;\">[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]WE HELP YOU[\/su_button]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a Cyber Attack? A cyber-attack is considered to be any computer attack, therefore malicious, with the aim of [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[],"class_list":["post-16664","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16664"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16664\/revisions"}],"predecessor-version":[{"id":16666,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16664\/revisions\/16666"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}