{"id":15901,"date":"2019-02-05T12:10:16","date_gmt":"2019-02-05T11:10:16","guid":{"rendered":"https:\/\/immune.institute\/?p=275"},"modified":"2019-02-05T12:10:16","modified_gmt":"2019-02-05T11:10:16","slug":"que-es-la-ciberseguridad","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/que-es-la-ciberseguridad\/","title":{"rendered":"What is cybersecurity? Is my data at risk?"},"content":{"rendered":"<p>The continuous use of the Internet in our daily lives has meant that we are continuously exposed to the various dangers of the network. Just as we are, so are companies, which store gigabytes and gigabytes of relevant and confidential information from other companies and customers. This is where the concern for <em>cybersecurity<\/em>which is \"the ability to minimise the level of risk to which information is exposed to threats or incidents of a cybernetic nature\", as ConectaSoftware explains.<\/p>\n<p><strong>So, is my data at risk?<\/strong><\/p>\n<p>The answer is yes and no. If you follow a series of basic tips, you will greatly reduce the possibility of suffering a cyber-attack... although sometimes there is nothing we can do to prevent it. Various cybersecurity media explain that installing secure software, keeping both the operating system and installed applications up to date and creating strong passwords can be an important defence against a possible cyberattack.<\/p>\n<p>If you are the owner of a company, it is also advisable to give your employees a series of instructions in order to reduce the chances of suffering an attack as much as possible. For example, avoid giving out confidential information over the Internet, whether it is company or customer data; use electronic devices with antivirus software and, above all, seek expert advice.<\/p>\n<h2><strong>Why does cybercrime occur?<\/strong><\/h2>\n<p>As Deepak Daswani, a hacker and former advisor to the <a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">INCIBE<\/a>There are three main motives: financial gain, control of information and hacktivism. On the latter reason, Daswani points out that \"although they commit crimes, their aim is not to steal information or money, but to vindicate a cause or idea\".<\/p>\n<h2><b>\u00bfCu\u00e1ntos<\/b><strong>\u00a0cybercrime every year?<\/strong><\/h2>\n<p>Last year, McAfee, a software company specialising in computer security, published <a href=\"https:\/\/elderecho.com\/economic-impact-of-cybercrime-no-slowing-down-mcafee-y-center-for-strategic-and-international-studies-csis\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a report<\/a> which showed how much companies lose each year because they fail to take cybersecurity precautions. McAfee puts the loss at almost \u20ac600 billion, equivalent to 0.8% of global GDP and far higher than the 2019 figure of \u20ac445 billion. Another fact to note: the theft of intellectual property during cyberattacks accounts for at least 25% of cybercrime.<\/p>\n<p>For her part, the regional director of McAfee in Spain and Portugal, Mar\u00eda Campos, said that \"we are seeing that cybercrime, far from stopping or diminishing, has become a growing, tireless and incessant activity\". These statements are supported by Daswani, who said that \"today, cybercrime moves more money in the world than drug trafficking, arms smuggling or human trafficking\". All this data confirms that cybercrime is a real problem, not a 'ploy' for companies to generate business.<\/p>\n<p>If you are still interested in the cybersecurity and cyberdefence sector, IMMUNE offers 2 courses on cybersecurity and cyberdefence. The first one is the <strong><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\" target=\"_blank\" rel=\"noopener noreferrer\">master's degree in Cybersecurity in Madrid<\/a><\/strong>and the second of these is the <strong><a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\" target=\"_blank\" rel=\"noopener noreferrer\">online master's degree in cybersecurity<\/a><\/strong>. In addition, and if you have not yet started in the world of new technologies, at IMMUNE we have a <a href=\"https:\/\/immune.institute\/en\/ingenieria-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">degree in software engineering<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>El continuo uso de Internet en nuestro d\u00eda a d\u00eda ha hecho que estemos expuestos, de forma continua, a los distintos peligros de la red. Al igual que lo estamos nosotros, lo est\u00e1n las empresas&#8230;<\/p>","protected":false},"author":3,"featured_media":7831,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-15901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/15901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=15901"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/15901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/7831"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=15901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=15901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=15901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}