Blog

RSS

7 results

  • Reuniones online

    Privacy in Online Meetings

    Virtual online meetings via voice calls, video or web services are a common feature of today's work and teleworking, which has been greatly increased due to the COVID-19 pandemic. Although we are increasingly aware of the need to protect our privacy and security online, virtual meetings require us...

    Read more

  • Cifrado homomorfico

    Encryption and Privacy III: Homomorphic encryption

    In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...

    Read more

  • Data protection and security

    Data protection and security

    Security is a necessary but not sufficient element to safeguard rights and freedoms of people regarding personal data protection. In addition, if security measures are not aimed at protecting said rights but to achieving other objectives, they may actually pose a threat to freedom.

    Read more

  • Phishing Campaigns Regarding The Coronavirus

    The alert situation caused by the coronavirus at a global level is a dangerous breeding ground for phishing attacks, which are being carried out internationally through instant messaging services, e-mail and any social media. Cybercriminals always try to take advantage of situations of fear and...

    Read more

  • 2019-11-15-cifrado

    Encryption and Privacy: Encryption in the GDPR

    The use of encryption or encryption techniques or cryptographic techniques is a basic security element in the information policy of an agency and, more precisely, it is one of the additional guarantees that may be used to reduce the risk in personal data processing.

    Read more

  • 2019-10-02-seguridad

    Data breaches: protect yourself against the loss or theft of a portable device

    In this blog entry we will demonstrate some measures such as device encryption to limit damage when portable devices such as a laptop computer, a smartphone, a tablet or an external storage device, are lost or stolen.

    Read more

  • Ransomware

    Personal data breaches: protect yourself against ransomware

    Ransomware is a significant cyberthreat to personal data in both SMEs and large companies. We tell you how to protect yourself.

    Read more