{"id":18253,"date":"2025-04-29T18:06:35","date_gmt":"2025-04-29T16:06:35","guid":{"rendered":"https:\/\/immune.institute\/?p=18253"},"modified":"2025-04-30T10:07:19","modified_gmt":"2025-04-30T08:07:19","slug":"espana-sufre-un-gran-apagon-como-protegerse","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/espana-sufre-un-gran-apagon-como-protegerse\/","title":{"rendered":"The big blackout in Spain: Are we really prepared for the next crisis?"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Yesterday, 28 April, <strong>Spain experienced one of the largest digital and electrical blackouts in its recent history. <\/strong>For hours, the entire country was without power, data networks were paralysed, public services were disrupted and thousands of citizens were disconnected from the digital world. What seemed a distant hypothesis has become a disturbing reality: <strong>technological vulnerability<\/strong> is an urgent problem.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This event has made it clear that <strong>we were not prepared<\/strong>. And it raises a critical question: <strong>what would happen if the next blackout was caused by a cyber-attack?<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Un apag\u00f3n que nos ha dejado \u00aba oscuras\u00bb&#8230; tambi\u00e9n en lo digital<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">M\u00e1s all\u00e1 del caos visible, el apag\u00f3n de ayer mostr\u00f3 cu\u00e1n dependientes somos de la infraestructura tecnol\u00f3gica para tareas cotidianas: desde hacer una transferencia bancaria hasta coordinar servicios de emergencia. No hablamos solo de \u00abno tener luz\u00bb. Hablamos de hospitales, aeropuertos, sistemas de tr\u00e1fico inteligente, abastecimiento de agua y comunicaciones absolutamente paralizados.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">And in a global context of growing threats, <strong>the risk of massive cyber-attacks<\/strong> affecting our critical infrastructures is not science fiction: it is the new battlefield.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What do the experts think?<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">In recent interviews for<a href=\"https:\/\/revistabyte.es\/actualidad-it\/gran-apagon-digital\/\" target=\"_blank\" rel=\"noopener\"> <em>Byte TI Magazine<\/em> <\/a>and RTVE, <strong>Victor Deutsch<\/strong>Director of the Software Development Engineering Program at <strong>IMMUNE Technology Institute<\/strong> and cybersecurity specialist, has already warned of the urgent need to strengthen our systems:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u00abLa resiliencia digital debe ser un pilar estrat\u00e9gico. No es una cuesti\u00f3n solo t\u00e9cnica, sino de formaci\u00f3n, cultura y prevenci\u00f3n.\u00bb<\/p>\n<\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Deutsch insists that preparing highly skilled cybersecurity professionals is not optional. It is a necessity to ensure the continuity and security of our vital systems.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Cybersecurity measures in the face of the blackout\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Ni_SsYSVu1w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">What has the blackout taught us?<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Relying on technology alone without contingency plans makes us vulnerable.<\/strong><\/li>\n\n\n\n<li><strong>Cybersecurity must be at the heart of national and business strategy.<\/strong><\/li>\n\n\n\n<li><strong>Lack of trained professionals<\/strong> to design, protect and recover critical infrastructure.<\/li>\n\n\n\n<li><strong>Continuous cybersecurity training<\/strong> is not a luxury: it is a necessity for any sector.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, Victor Deutsch has highlighted five key risks to technology infrastructures following an outage: <\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Immediate interruption of services<\/strong><br>When there are no backup power sources such as batteries or generators, servers, applications and systems shut down suddenly, bringing essential services to a halt. This was clearly evident during the blackout and can impact data centres, healthcare systems or financial institutions.<br>It is crucial to have storage that includes internal batteries and write-protected caching mechanisms, along with real-time backups located at different sites, to ensure effective recovery.<\/li>\n\n\n\n<li><strong>Risk of loss or damage to information<\/strong>.<br>Power interruption can cause abrupt shutdowns, leading to a high risk of data loss or file corruption. A typical case occurs when backups are performed right at the moment of the outage. Only frequent and well-distributed backups can ensure recovery without significant loss, which is particularly sensitive if medical or financial information is involved.<\/li>\n\n\n\n<li><strong>Weakness in physical security<\/strong><br>Although Spain has demonstrated a remarkable capacity to deal with cyber incidents, some take advantage of these situations to steal information or cause damage. In the event of power outages, security cameras, alarms and access systems can be put out of service. Therefore, having backup power sources focused on physical security is essential to prevent illegal access or sabotage.<\/li>\n\n\n\n<li><strong>Authentication and access management errors<\/strong>. <br>If the servers that validate access or manage permissions go down, failures or improper access could occur when they are up and running again, posing a major security risk. In particular, the downtime of authentication servers can open the door to privilege escalation or unauthorised access during recovery. Therefore, robust restoration protocols and constant monitoring are key.<\/li>\n\n\n\n<li><strong>Threats during reactivation of systems<\/strong>. <br>The restart phase after a power outage is particularly sensitive in terms of cybersecurity. If systems are brought back online without the protection mechanisms being fully active, this creates loopholes that can be exploited by attackers. It is therefore essential to carefully control the restoration process to prevent these weaknesses from becoming entry points for cyber-attacks.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What next?<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">The outage was a warning. The next challenge may not be a technical failure, but an orchestrated cyber-attack. The difference between resisting or collapsing will depend on how many professionals we have ready to protect ourselves.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you have ever considered training in cybersecurity, <strong>now is the time<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At <strong>IMMUNE Technology Institute<\/strong>we have designed the <a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\"><strong>Cybersecurity Master<\/strong><\/a> to train the experts that the market is already urgently demanding. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">What are the objectives of this master's degree in cybersecurity?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define and develop the organization and the processes related to corporate cybersecurity.<\/li>\n\n\n\n<li>Identify the main <strong>vulnerabilities affecting code<\/strong> and how to develop secure code.<\/li>\n\n\n\n<li>Forensic techniques applied to cybersecurity breaches. Learn to investigate and respond to incidents.<\/li>\n\n\n\n<li>To develop in a variety of scenarios of <strong>auditing and pentesting<\/strong>.<\/li>\n\n\n\n<li>Apply <strong>forensic and incident response techniques<\/strong> to respond to and investigate a cybersecurity breach.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, this programme includes:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Flexible and up-to-date online 100% training.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hands-on learning with real cyber-attack scenarios.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2705 Practicing professors and leaders in the cybersecurity sector. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">High employability in national and international companies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\ud83d\udcac <em>\u00abLa mejor defensa contra las amenazas del futuro es empezar a prepararse hoy.\u00bb<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\ud83d\udd17 Find out more about our master's degree here: <a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\">https:\/\/immune.institute\/programas\/master-online-de-ciberseguridad\/<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Porque el futuro, y el presente, ser\u00e1 tecnol\u00f3gico&#8230; o no ser\u00e1.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ayer, 28 de abril, Espa\u00f1a vivi\u00f3 uno de los mayores apagones digitales y el\u00e9ctricos de su historia reciente. Durante horas, todo el pa\u00eds se qued\u00f3 sin suministro el\u00e9ctrico, redes de datos paralizadas, servicios p\u00fablicos interrumpidos y miles de ciudadanos desconectados del mundo digital. Lo que parec\u00eda una hip\u00f3tesis lejana se ha convertido en una realidad [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":18255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-18253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/18253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=18253"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/18253\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/18255"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=18253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=18253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=18253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}