Blog

Articles on cybersecurity and IT services

How to Design a SOC for Logistics Companies

How to Design a SOC for Logistics Companies

Mar 11, 2026 10:00:00 AM 5 min read
Summary: Most Targeted Sectors by Phishing in 2025

Summary: Most Targeted Sectors by Phishing in 2025

Mar 10, 2026 10:00:01 AM 2 min read
How to detect unauthorized access and internal fraud in a company
acceso-no-autorizado

How to detect unauthorized access and internal fraud in a company

Mar 3, 2026 10:00:00 AM 4 min read
Summary: Overview and evolution of phishing 2024–2025

Summary: Overview and evolution of phishing 2024–2025

Feb 27, 2026 12:00:00 AM 2 min read
Use of cloud applications and systems in the Biotech Sector: risks and protection

Use of cloud applications and systems in the Biotech Sector: risks and protection

Feb 24, 2026 10:30:00 AM 2 min read
How to prepare for an ENS compliance audit?
auditoria-cumplimiento-ens

How to prepare for an ENS compliance audit?

Feb 19, 2026 10:00:00 AM 4 min read
Cyberattacks in Legal Firms

Cyberattacks in Legal Firms

Feb 16, 2026 11:00:01 AM 2 min read
Data Protection Updates in 2026 That May Affect Your Company
normativa protección datos 2026

Data Protection Updates in 2026 That May Affect Your Company

Feb 12, 2026 10:00:00 AM 2 min read
Differences between the ENS and other international regulations

Differences between the ENS and other international regulations

Feb 11, 2026 8:49:24 AM 4 min read
Guide to choosing the right IT provider

Guide to choosing the right IT provider

Feb 9, 2026 11:00:00 AM 3 min read
Disaster Recovery Plan for the Agri-Food Sector

Disaster Recovery Plan for the Agri-Food Sector

Feb 3, 2026 11:00:00 AM 3 min read
How to Implement the National Security Framework (ENS) Step by Step in an Organization

How to Implement the National Security Framework (ENS) Step by Step in an Organization

Jan 28, 2026 11:00:00 AM 4 min read
ESED. Cyber Security & IT Solutions

Blog

Articles about cybersecurity and IT services

How to Design a SOC for Logistics Companies
How to detect unauthorized access and internal fraud in a company
Summary: Overview and evolution of phishing 2024–2025
Use of cloud applications and systems in the Biotech Sector: risks and protection
How to prepare for an ENS compliance audit?
Cyberattacks in Legal Firms
Data Protection Updates in 2026 That May Affect Your Company
Differences between the ENS and other international regulations
Guide to choosing the right IT provider
Disaster Recovery Plan for the Agri-Food Sector
How to Implement the National Security Framework (ENS) Step by Step in an Organization