{"id":17777,"date":"2025-03-17T16:08:16","date_gmt":"2025-03-17T15:08:16","guid":{"rendered":"https:\/\/immune.institute\/?post_type=proyecto&#038;p=17777"},"modified":"2025-10-07T10:23:57","modified_gmt":"2025-10-07T08:23:57","slug":"cybergo-aliado-pymes-ante-phishing","status":"publish","type":"proyectos","link":"https:\/\/immune.institute\/en\/proyectos\/cybergo-aliado-pymes-ante-phishing\/","title":{"rendered":"Cyber&amp;Go: The SME's ally against phishing"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-f72ede8d wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\">The human factor is one of the key pieces and problems when using corporate email, as it is the first filter to detect a fraud attempt that has gone unnoticed by the basic tools of an email manager. Coupled with the lack of cyber protection in the vast majority of SMEs, personnel become a vulnerability that needs to be corrected.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The biggest concern for SMEs is email attacks, with 70% admitting to having experienced one. However, only a fraction of them have the skills and knowledge to deal with this scenario. Cyber&amp;Go comes in to raise that number as high as possible, offering solutions that require little effort. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"card card-light wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-1-color\">Carried out by<\/mark><\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/carmenluciats\/\" target=\"_blank\" rel=\"noopener\">Carmen Torre S\u00e1nchez<\/a><\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Programme<\/strong> <a href=\"https:\/\/cybertalent.immune.institute\/\">Cybertalent: Cybersecurity Entrepreneurship Programme<\/a> | In collaboration with the National Institute for Cybersecurity (INCIBE)<\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Technologies<\/strong> Artificial Intelligence | Sandbox | NPL | IDS\/IPS | Fingerprinting | Frontend | Backend | Backend<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">What is the motivation? <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">La protecci\u00f3n ante intentos de<strong> phishing y fraude mediante el correo electr\u00f3nico<\/strong> es pr\u00e1cticamente inexistente en las pymes, a pesar de ser las grandes v\u00edctimas de este tipo de ciberdelincuencia. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Cyber&amp;Go busca hacer accesible la ciberseguridad, reduciendo los ataques exitosos y ofreciendo una capa de protecci\u00f3n que no requiere grandes esfuerzos por parte de la organizaci\u00f3n.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\ud83d\udd17Landing page: <a href=\"https:\/\/www.cyberandgo.es\/\" target=\"_blank\" rel=\"noopener\">www.cyberandgo.es<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"482\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-1024x482.png\" alt=\"\" class=\"wp-image-17786\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-1024x482.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-256x120.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-512x241.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-768x361.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-1536x722.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336-18x8.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-093336.png 1799w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Program aims <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Achieve an advanced level of real-time protection to prevent attacks from thriving.<\/li>\n\n\n\n<li>To achieve an integration of the software into the daily life of the employees, without disturbing or distracting them, but still being useful.<\/li>\n\n\n\n<li>Adopt the philosophy of prevention as opposed to lamenting the foreseeable consequences of not investing in cyber security.<\/li>\n\n\n\n<li>Make cyber security accessible to everyone who needs it without incurring large costs or procedures.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">Development <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The process for solving these problems includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Development of intelligent software that integrates with the various email applications used in the corporate world in order to detect and prevent attacks in real time.<\/li>\n\n\n\n<li>Analysis of the different elements that make up an email, such as images, text patterns and attachments, in order to identify phishing attempts or the introduction of malware on the device.<\/li>\n\n\n\n<li>Analysis of user behaviour patterns in order to be able to instruct in the prevention of information leakage.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"652\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-1024x652.png\" alt=\"\" class=\"wp-image-17819\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-1024x652.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-256x163.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-512x326.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-768x489.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-1536x978.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1-18x12.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Carmen-Lucia-Torre-CyberGo-1.png 1696w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Results <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Cyber&amp;Go logra que la ciberseguridad sea accesible y cercana para las pymes, que son las que m\u00e1s sufren ataques y m\u00e1s consecuencias sienten tras los mismos. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adem\u00e1s, el modelo de negocio incorpora una funcionalidad poco com\u00fan en otras soluciones: el<strong> an\u00e1lisis de patrones de los usuarios<\/strong> para guiarlos en buenas pr\u00e1cticas y reforzar la protecci\u00f3n, sumando m\u00e1s control sobre los mismos vectores de entrada.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Entrepreneur Carmen Luc\u00eda Torre - Ciber&amp;Go | CyberTalent Incubator by INCIBE\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/ZPxhSnUMdTg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">El enfoque anal\u00edtico e integrado de Cyber&amp;Go la posicionan como una gran alternativa para empresas m\u00e1s peque\u00f1as que no pueden contar con un equipo de ciberseguridad exclusivo.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>El phishing es un m\u00e9todo de ciberdelincuencia muy extendido que busca obtener datos y accesos no autorizados mediante la apelaci\u00f3n al factor humano. Cyber&amp;Go contrarresta estos ataques, logrando detectarlos y prevenirlos en tiempo real para que las pymes puedan centrarse en ofrecer sus productos y servicios.<\/p>","protected":false},"featured_media":17784,"menu_order":0,"template":"","area":[245,247],"class_list":["post-17777","proyectos","type-proyectos","status-publish","has-post-thumbnail","hentry","area-cyber","area-emprendimiento"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/proyectos"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/17784"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=17777"}],"wp:term":[{"taxonomy":"area","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/area?post=17777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}