Our news

Cybersecurity in SMEs

The main mistake that small and medium-sized enterprises (SMEs) usually make is thinking that their organizational information is not of interest, and for this reason they neglect it. protection of their data. Nothing could be further from the truth, since that information can be very important for the hackers.
From Apen We offer you the keys for your cybersecurity be more effective.
 

Risks

 
Investing in security Minimizing risks and knowing who will be responsible for managing them is very important. We need to be aware of the level of risk we are willing to take.
 

Updates

 
We shouldn't just buy a firewall and antivirus and forget about it until a problem arises. We need to update it whenever possible, and to speed things up, we can enable the "automatic update" option in the software. security of our teams.
 

Network protection

 
Our company's network must be protected from both external and internal attacks; therefore, it is advisable to confirm that our internet provider includes a firewall.
If we suspect that the security If our company's network has been compromised, it is very important to consult an expert.
 

Malware

 
It is vital to have a package of security A complete solution that globally protects our computers and networks from any malware, spyware, adware, etc…
 

User privileges

 
It is very important to control who accesses our SME's network systems and where, and for this purpose, each employee must have a username and password. Each user's privileges on the system should be limited by the administrator, and it is recommended to keep sensitive data separate and monitored.
 

Removable devices

 
For a greater security It is advisable to use only CDs, DVDs, USB drives, or SD cards provided by the system administrator, and these should be scanned to prevent malware.
 

Monitoring

 
Currently, there are free tools available for monitoring or protocol analysis that helps us detect potential hardware failures or intrusions. If our company is larger and more complex, we can opt for other commercial options that include traffic analysis, IP usage, etc.
 

Good practice

 
We need to ensure that employees know and apply the policy of security of our company. We must periodically remind staff of good practices in security.
 

Employee mobile devices

 
It is essential that the mobile devices of company employees have the approval of the managers of security. We need to make sure they have anti-malware installed, that they are encrypted, and that we can track and remotely delete them in case of loss or theft.
 

Incident response procedure

 
Any setback that compromises the safety of our technological systems This is an incident that affects the company's normal operations. It is essential to be clear about what to do and what not to do if this occurs, and if we have any doubts, it is best to contact an external agent who can help us resolve the situation appropriately.

20/04/2017