{"id":16729,"date":"2022-01-17T18:20:45","date_gmt":"2022-01-17T18:20:45","guid":{"rendered":"https:\/\/businessadapter.es\/it-security\/"},"modified":"2024-12-11T10:48:52","modified_gmt":"2024-12-11T10:48:52","slug":"it-security","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"\n<h2><span style=\"color: #800000;\"><strong>IT Security<\/strong><\/span><\/h2>\n<p>In this post we will discuss the basic measures for an adequate <strong>IT (Information Technology) Security <\/strong>in the business environment.<\/p>\n<p>We will break these measures down into four themes: Hardware, Software, Networking and Compliance.<\/p>\n<h3><span style=\"color: #800000;\"><strong>Hardware<\/strong><\/span><\/h3>\n<p>The hardware, understood as the equipment that allows us to access our computer system and process information (Computers, Servers, Smartphone, External memories,<a href=\"https:\/\/businessadapter.es\/en\/who-we-are\/\"><img decoding=\"async\" class=\" wp-image-5371 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/09\/computer-768608_1920-300x200.jpg\" alt=\"\" width=\"615\" height=\"410\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/09\/computer-768608_1920-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/09\/computer-768608_1920-1024x683.jpg 1024w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/09\/computer-768608_1920-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/09\/computer-768608_1920-1536x1024.jpg 1536w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/09\/computer-768608_1920.jpg 1920w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><\/a> etc.). It is obviously a fundamental part of the IT Security of any company.<\/p>\n<p>It must be the one that has been corporately authorized to work and that therefore complies with the necessary security measures to guarantee the confidentiality, integrity, availability and resilience of the information processed, as well as the technical characteristics necessary to carry out the work entrusted.<\/p>\n<p>This statement of intent shall be included in the IT Security and Personal Data Protection Policies, approved by the Management.<\/p>\n<h4><strong>Inventory<\/strong><\/h4>\n<p>An inventory (<em>customer ref. Business Adapter: folder 08 <\/em>), with the detail of the hardware that each user of the company has assigned to work.<\/p>\n<p>It will also include hardware that is not assigned to a user, but which houses or is used to process corporate information in some way, such as servers, printers, point-of-sale terminals, etc.  <\/p>\n<h4><strong>External Servers<\/strong><\/h4>\n<p>Regarding external servers, i.e. those that are contracted to suppliers and are physically located in a place other than the company&#8217;s facilities (e.g. cloud servers), it will be necessary to analyze whether the supplier complies with IT security measures and, if possible, whether the servers are within the <a href=\"https:\/\/www.europarl.europa.eu\/factsheets\/es\/sheet\/169\/el-espacio-economico-europeo-suiza-y-el-norte\" target=\"_blank\" rel=\"noopener\">EEA<\/a>.<\/p>\n<h4><strong>ET Contract<\/strong><\/h4>\n<p>With these suppliers, to whom we delegate some functions, as in the case of the hosting of information, it will be necessary to sign a Data <a href=\"https:\/\/businessadapter.es\/en\/the-data-processor\/\">Processor contract<\/a> with them <a href=\"https:\/\/businessadapter.es\/en\/the-data-processor\/\">in compliance with the RGPD.<\/a><\/p>\n<h4>IT Security<\/h4>\n<p>The IT Security Policy must establish several procedures to ensure the confidentiality, integrity, availability and resilience of the information handled. For example: <\/p>\n<ul>\n<li>Equipment Roaming Policy<\/li>\n<li>Registration of delivery and collection of devices<\/li>\n<li>Equipment use policy (personal use\/professional use\/maintenance, etc.)<\/li>\n<li>Encryption of equipment<\/li>\n<\/ul>\n<h3><span style=\"color: #800000;\"><strong>Software<\/strong><\/span><\/h3>\n<p>Software refers to all those computer programs that together with the hardware allow the management of the information system, from the operating system, which is the most important, to other programs with different functionalities (ERP, CRM, Office automation, E-mail, etc.).<\/p>\n<p>It must be the one that has been corporately authorized to comply with the task entrusted to each one of them and that complies with the necessary security measures to guarantee the confidentiality, integrity and availability of the information processed.<\/p>\n<p>This statement of intent shall be included in the IT Security and Personal Data Protection Policy, approved by the Management. But this Policy will also include several aspects: <\/p>\n<h4>IT Security<\/h4>\n<p>The IT Security Policy must establish several procedures to ensure the confidentiality, integrity, availability and resilience of the information handled. For example: <\/p>\n<ul>\n<li>User Identification and Authentication Measures<\/li>\n<li>E-mail use policy<\/li>\n<li>Videoconference use policy<\/li>\n<li>Telework or Telecommuting Policy  <\/li>\n<li>Backup policy<\/li>\n<\/ul>\n<h4><strong>Inventory<\/strong><\/h4>\n<p>An inventory (<em>customer ref. Business Adapter: folder 08 <\/em>), with the details of the hardware that each user of the company will be able to use to develop their work.  <\/p>\n<p>It will also include software that does not have a specific purpose necessary for the work, but has an essential utility for the security of the information, (example: antivirus systems, antimalware, etc.).<\/p>\n<h4><strong>ET Contract<\/strong><\/h4>\n<p>With those suppliers that provide services that involve the processing of personal data under the responsibility of the data controller, it will be necessary to sign a <a href=\"https:\/\/businessadapter.es\/en\/the-data-processor\/\">data processor contract<\/a> with them in <a href=\"https:\/\/businessadapter.es\/en\/the-data-processor\/\">compliance with the RGPD.<\/a><\/p>\n<h3><span style=\"color: #800000;\"><strong>Networks<\/strong><\/span><\/h3>\n<p>Networks would be the means by which the different corporate teams are interconnected internally, but also the networks needed to be connected to the outside.<\/p>\n<p>There are many types of networks and depending on the type of data processed, <a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\">a type of network<\/a> is recommended according to the type of data or information to be processed. The more relevant the information, the more secure the network used should be. <\/p>\n<h4><strong>Inventory<\/strong><\/h4>\n<p>An inventory (<em>customer ref. Business Adapter: folder 08 <\/em>), with details of the network system used by the company.  <\/p>\n<h4>IT Security<\/h4>\n<p>The IT Security Policy must establish several procedures to ensure the confidentiality, integrity, availability and resilience of the information handled. For example: <\/p>\n<ul>\n<li>Authorization for the use of networks<\/li>\n<li>Use of networks outside the workplace<\/li>\n<li>User identification and authentication policy  <\/li>\n<\/ul>\n<h3><span style=\"color: #800000;\"><strong>Regulatory Compliance<\/strong><\/span><\/h3>\n<p>The European General Data Protection Regulation<a href=\"https:\/\/www.boe.es\/doue\/2016\/119\/L00001-00088.pdf\" target=\"_blank\" rel=\"noopener\">(GDPR<\/a>) and the Spanish Organic Law on Data Protection<a href=\"https:\/\/www.boe.es\/boe\/dias\/2018\/12\/06\/pdfs\/BOE-A-2018-16673.pdf\" target=\"_blank\" rel=\"noopener\">(LOPD-GDD<\/a>) must be implemented in any company and their degree of application will depend on a <a href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/proteccion-datos-valencia\">technical-legal analysis<\/a> that an expert data protection consultant will perform for your company.<\/p>\n<p>If you are looking for a <strong>data protection company in Valencia<\/strong>, <a href=\"https:\/\/businessadapter.es\/en\/\">Business Adapter\u00ae<\/a> data protection Valencia, is your best option. If you want to know what they think about us click <strong><a href=\"https:\/\/www.google.es\/search?source=hp&amp;ei=sQFDXqSYE8ycjLsPleCXQA&amp;q=business+adapter&amp;oq=business+adapter&amp;gs_l=psy-ab.3..0j0i22i30j0i22i10i30j0i22i30l7.2367.6023..6236...0.0..0.108.1206.15j1......0....1..gws-wiz.......0i131..23%3A0g101g72g87g94g98g90g124g85g82g95g113j24%3A0g1g1g1g1g1g1g1g1g1g5g2.2hAOuclz0Bg&amp;ved=0ahUKEwjktM-En8rnAhVMDmMBHRXwBQgQ4dUDCAg&amp;uact=5#lrd=0xd605b478437f377:0x1eb68001eb2759b9,1,,,\" target=\"_blank\" rel=\"noopener\">here<\/a><\/strong>. <\/p>\n<p><strong>[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]I would like a quote to hire an expert Data Protection Consultant.[\/su_button]<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Security In this post we will discuss the basic measures for an adequate IT (Information Technology) Security in the [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[],"class_list":["post-16729","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16729"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16729\/revisions"}],"predecessor-version":[{"id":16731,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16729\/revisions\/16731"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}