There are many types of cyberattacks, and as technology advances, more types emerge. However, there are some hacking techniques that are the most common and used by cybercriminals, as they are the most effective for achieving their objectives.
The 15 most common hacking techniques
There are many types of cyberattacks, and as technology advances, more types emerge. However, there are some hacking techniques that are the most common and used by cybercriminals, as they are the most effective for achieving their objectives.
Web 3.0, what changes and benefits will it entail for companies?
Why do we talk about Web 3.0 when Web 2.0, the upgraded version of Web 1.0, is still being developed?
Specific cybersecurity measures against ransomware
To give us a little context on the current state of ransomware attacks, the annual Sophos report, "The State of Ransomware 2023," reveals that cybercriminals successfully encrypted data in 76% of all ransomware attacks against the surveyed companies in the report. In 30% of the cases where the data was encrypted, it was also successfully exfiltrated."
All types of Phishing attacks
At ESED, we know that we often talk about Phishing, and it might seem like an obsession, but it's because it's one of the most frequent and common cyberattacks due to its high level of effectiveness.
What is social engineering and how to protect yourself: Complete Guide
What is the main objective of cybercriminals when attacking a company or user? To obtain confidential information that could jeopardize the reputation of an organization or individual, aiming to gain economic benefits in exchange for not making it public.
Complete guide for data protection in consulting and law firms
Law firms and consulting agencies handle large amounts of data, including confidential and sensitive information from their clients. For this reason, they are an easy target for cybercriminals. What these criminals seek is to steal this information and demand a ransom for its recovery. However, in most cases, paying the ransom does not guarantee that cybercriminals won't make the information public.
Complete Guide on Cybersecurity in Biotechs and Laboratories
In 2022, cyberattacks in the healthcare sector surged by 650%, according to Tehtris. These attacks can result not only in the loss of sensitive and confidential data about clients, patients, suppliers, collaborators, etc., but also in the potential theft of formulas or disruption of the organization's activities.
Ethical hacking applied to the pharmaceutical sector
At ESED, as a company specialized in cybersecurity, especially in the healthcare sector, we want to discuss some of the ethical hacking techniques we use in the pharmaceutical sector to ensure the security of their information and prevent data leaks.
Stalking: What It Is and How to Prevent It
Stalking is not a new phenomenon; the first anti-stalking law was passed in 1990 in California, which later spread across the United States and ultimately became a federal offense in 1996. In Spain, the first stalking conviction occurred in 2016.
Solutions that will help you keep phishing at bay in your company
In a previous post, we've already discussed phishing, cyberattacks launched through email with the goal of deceiving the user into taking a specific action, such as clicking on a link that includes the download of an infected file.
How to detect computer frauds to prevent access to your data
We refer to cyberfraud as all those crimes or scams that are committed on the internet, whether through a website or the applications we use. Cyberfraud is big business: according to a report from the European Central Bank (ECB), fraudulent transactions amount to 1.8 billion euros annually. In 2019, cybercrimes grew by 36% compared to 2018. According to the Ministry of the Interior, 12 frauds and threats are reported online every hour.
How to protect shared folders to prevent data leakage.
Sharing folders and files is one of the most common practices nowadays, especially now that most of us work in the cloud and spend our days granting and revoking permissions. To you, I say you can only view it, to you, you can view and edit it... and so on all day long. But do we really have control over who has access to the information, who was the last person to modify it, or where it is located?
The importance of reviewing your company's cybersecurity strategy.
Having a cybersecurity strategy is an obligation for any company looking to minimize the risks of suffering a cyberattack that could compromise its information and tarnish the company's reputation. However, it should be regularly reviewed, and a good time to do so is upon returning from holidays.
Consequences of not investing in cybersecurity
Implementing cybersecurity solutions has now become an indispensable requirement for companies. Digitization has made data and information collection and storage easier, but it has also made them more vulnerable to theft if not properly protected. This is why cybersecurity solutions have become essential for any company operating on the internet and in the cloud.
Utilizing Artificial Intelligence to prevent cyberattacks
Artificial Intelligence (AI) is disrupting various aspects and sectors of our society. This technology, which is here to stay and continues to evolve, initially aimed to make our lives easier and provide support in areas where the execution of certain manual tasks required too much effort, time, and money to accomplish
Cybersecurity tips for summer holidays
Did you know that the holiday season is one of the most critical times in terms of cybersecurity for individuals? During summer break, there's so much to plan (flights, hotels, activities, meals...) that we tend to forget about cybersecurity. Here are five easy tips to keep everything secure.
Amazon Web Services: Guide to Migrating Your Servers to the Cloud
In the current era where technology plays an increasingly important role in the business world, the cloud has become an essential tool for improving system efficiency and scalability. AWS (Amazon Web Services) is the most popular and powerful cloud platform in the market, and migrating your servers to it can offer a range of benefits, such as increased scalability, higher availability, and improved security.
Ransomware Guide: Tips to Protect Your Company from Attacks
In previous posts, we already mentioned that ransomware attacks increased by 500% in 2019. It is one of the most frequent types of malware that companies and users have to constantly battle.
Phishing: What is it and how does it affect your company?
"In 2019, Spain was one of the countries with the highest number of phishing attacks. Many companies and individuals fell victim to cyberattacks through email, resulting in the loss of confidential information due to stolen credentials and passwords.
Influencers and cyberattacks on social media: How to protect yourself?
"In Spain, there are more than 9,100 professional influencers with over 100,000 followers on one of the existing social media platforms: TikTok, Facebook, YouTube, Instagram, or Twitch. 900 of them have reached one million followers." Tubular Labs.
How much does a cyberattack cost companies?
The Cyber Preparedness Report 2022 states that last year, half of the Spanish companies (51%) fell victim to cyberattacks more than 84 times.
.zip and .mov domains, a new danger for phishing cyberattacks
Google has caused quite a stir with the launch of the new top-level domains (TLDs) .zip and .mov. After the introduction of this novelty, a wide debate has arisen about the potential dangers that could accompany these extensions.
Cybersecurity in advisory and consulting firms
Advisory and consulting firms handle and collect a large amount of data and confidential information that could be vulnerable in the event of a cyberattack.
How to recover files infected by a virus?
The loss of files and data, whether due to accidental deletion or the entry of a virus into our system or device, is very common. With the years we have spent in the world of cybersecurity and IT solutions, we have realized that data recovery services or Disaster Recovery continue to be in high demand.
How to recover lost bookmarks in Google Chrome
Bookmarks are an essential tool for organising your information, and keeping track of what you prioritise and where you want it to go. With so much information available in a couple of clicks, getting organised is becoming increasingly important. Did you accidentally delete your bookmarks? Is there a way to recover deleted bookmarks from Chrome?
8 tricks to protect your privacy online
By making a few simple changes to your devices and accounts you can keep them secure from unwanted third parties, as well as protect your online privacy.
11 tips to protect your smartphone against cyber attacks
Currently, 94% of users use mobile phones to connect to the Internet, according to the AIMC. A very relevant but worrying figure at the same time. Those of us who work in computer security are aware that mobile security is not usually the same as computer security.
The 15 most common hacking techniques
Mar 21, 2024 1:00:03 PM / by Marc Bernaldo posted in cybersecurity, cyberattacks, ethical hacking
Web 3.0, what changes and benefits will it entail for companies?
Mar 21, 2024 9:35:14 AM / by Esteban Sardanyés posted in web, blockchain
Why do we talk about Web 3.0 when Web 2.0, the upgraded version of Web 1.0, is still being developed?
Specific cybersecurity measures against ransomware
Dec 22, 2023 2:47:14 PM / by Marc Bernaldo posted in ransomware, cybersecurity
To give us a little context on the current state of ransomware attacks, the annual Sophos report, "The State of Ransomware 2023," reveals that cybercriminals successfully encrypted data in 76% of all ransomware attacks against the surveyed companies in the report. In 30% of the cases where the data was encrypted, it was also successfully exfiltrated."
All types of Phishing attacks
Nov 9, 2023 12:37:09 PM / by Esteban Sardanyés posted in phishing, cybersecurity
At ESED, we know that we often talk about Phishing, and it might seem like an obsession, but it's because it's one of the most frequent and common cyberattacks due to its high level of effectiveness.
What is social engineering and how to protect yourself: Complete Guide
Nov 9, 2023 12:27:20 PM / by Eduard Bardají posted in cybersecurity
What is the main objective of cybercriminals when attacking a company or user? To obtain confidential information that could jeopardize the reputation of an organization or individual, aiming to gain economic benefits in exchange for not making it public.
Complete guide for data protection in consulting and law firms
Nov 9, 2023 11:45:33 AM / by Esteban Sardanyés posted in cybersecurity
Law firms and consulting agencies handle large amounts of data, including confidential and sensitive information from their clients. For this reason, they are an easy target for cybercriminals. What these criminals seek is to steal this information and demand a ransom for its recovery. However, in most cases, paying the ransom does not guarantee that cybercriminals won't make the information public.
Complete Guide on Cybersecurity in Biotechs and Laboratories
Nov 9, 2023 11:33:24 AM / by Eduard Bardají posted in cybersecurity, biotech
In 2022, cyberattacks in the healthcare sector surged by 650%, according to Tehtris. These attacks can result not only in the loss of sensitive and confidential data about clients, patients, suppliers, collaborators, etc., but also in the potential theft of formulas or disruption of the organization's activities.
Ethical hacking applied to the pharmaceutical sector
Nov 3, 2023 4:19:08 PM / by Eduard Bardají posted in cybersecurity, ethical hacking
At ESED, as a company specialized in cybersecurity, especially in the healthcare sector, we want to discuss some of the ethical hacking techniques we use in the pharmaceutical sector to ensure the security of their information and prevent data leaks.
Stalking: What It Is and How to Prevent It
Nov 3, 2023 4:06:30 PM / by Esteban Sardanyés posted in stalking, cyberstalking, cybersecurity
Stalking is not a new phenomenon; the first anti-stalking law was passed in 1990 in California, which later spread across the United States and ultimately became a federal offense in 1996. In Spain, the first stalking conviction occurred in 2016.
Solutions that will help you keep phishing at bay in your company
Nov 3, 2023 3:36:00 PM / by Eduard Bardají posted in phishing, ciberseguridad
In a previous post, we've already discussed phishing, cyberattacks launched through email with the goal of deceiving the user into taking a specific action, such as clicking on a link that includes the download of an infected file.
How to detect computer frauds to prevent access to your data
Nov 3, 2023 3:24:10 PM / by Eduard Bardají posted in cybersecurity
We refer to cyberfraud as all those crimes or scams that are committed on the internet, whether through a website or the applications we use. Cyberfraud is big business: according to a report from the European Central Bank (ECB), fraudulent transactions amount to 1.8 billion euros annually. In 2019, cybercrimes grew by 36% compared to 2018. According to the Ministry of the Interior, 12 frauds and threats are reported online every hour.
How to protect shared folders to prevent data leakage.
Nov 3, 2023 3:09:28 PM / by Eduard Bardají posted in cybersecurity
Sharing folders and files is one of the most common practices nowadays, especially now that most of us work in the cloud and spend our days granting and revoking permissions. To you, I say you can only view it, to you, you can view and edit it... and so on all day long. But do we really have control over who has access to the information, who was the last person to modify it, or where it is located?
Email Security 2024
Sep 18, 2023 11:22:34 AM / by Eduard Bardají posted in phishing, cybersecurity, cyberattacks
Let's put ourselves in a bit of context...
The importance of reviewing your company's cybersecurity strategy.
Sep 18, 2023 11:04:24 AM / by Esteban Sardanyés posted in cybersecurity
Having a cybersecurity strategy is an obligation for any company looking to minimize the risks of suffering a cyberattack that could compromise its information and tarnish the company's reputation. However, it should be regularly reviewed, and a good time to do so is upon returning from holidays.
Consequences of not investing in cybersecurity
Sep 18, 2023 10:43:08 AM / by Esteban Sardanyés posted in cybersecurity
Implementing cybersecurity solutions has now become an indispensable requirement for companies. Digitization has made data and information collection and storage easier, but it has also made them more vulnerable to theft if not properly protected. This is why cybersecurity solutions have become essential for any company operating on the internet and in the cloud.
Utilizing Artificial Intelligence to prevent cyberattacks
Sep 18, 2023 10:11:00 AM / by Eduard Bardají posted in cyberattacks, artificial intelligence
Artificial Intelligence (AI) is disrupting various aspects and sectors of our society. This technology, which is here to stay and continues to evolve, initially aimed to make our lives easier and provide support in areas where the execution of certain manual tasks required too much effort, time, and money to accomplish
Cybersecurity tips for summer holidays
Aug 24, 2023 1:49:42 PM / by Esteban Sardanyés posted in cybersecurity, cyberattacks
Did you know that the holiday season is one of the most critical times in terms of cybersecurity for individuals? During summer break, there's so much to plan (flights, hotels, activities, meals...) that we tend to forget about cybersecurity. Here are five easy tips to keep everything secure.
Importance of cybersecurity in the healthcare sector
Aug 24, 2023 1:49:40 PM / by Eduard Bardají posted in cybersecurity, biotech
Amazon Web Services: Guide to Migrating Your Servers to the Cloud
Aug 24, 2023 1:49:37 PM / by Alex Tello
In the current era where technology plays an increasingly important role in the business world, the cloud has become an essential tool for improving system efficiency and scalability. AWS (Amazon Web Services) is the most popular and powerful cloud platform in the market, and migrating your servers to it can offer a range of benefits, such as increased scalability, higher availability, and improved security.
Ransomware Guide: Tips to Protect Your Company from Attacks
Aug 24, 2023 1:49:34 PM / by Esteban Sardanyés posted in ransomware, cybersecurity, cyberattacks
In previous posts, we already mentioned that ransomware attacks increased by 500% in 2019. It is one of the most frequent types of malware that companies and users have to constantly battle.
Phishing: What is it and how does it affect your company?
Aug 24, 2023 1:49:30 PM / by Esteban Sardanyés posted in phishing, cybersecurity, cyberattacks
"In 2019, Spain was one of the countries with the highest number of phishing attacks. Many companies and individuals fell victim to cyberattacks through email, resulting in the loss of confidential information due to stolen credentials and passwords.
Influencers and cyberattacks on social media: How to protect yourself?
Aug 24, 2023 1:49:27 PM / by Ester Ribas Arbós posted in cybersecurity
"In Spain, there are more than 9,100 professional influencers with over 100,000 followers on one of the existing social media platforms: TikTok, Facebook, YouTube, Instagram, or Twitch. 900 of them have reached one million followers." Tubular Labs.
How much does a cyberattack cost companies?
Aug 24, 2023 1:49:23 PM / by Guillem Raja posted in cybersecurity, cyberattacks
The Cyber Preparedness Report 2022 states that last year, half of the Spanish companies (51%) fell victim to cyberattacks more than 84 times.
.zip and .mov domains, a new danger for phishing cyberattacks
Aug 24, 2023 1:49:17 PM / by Àlex Tello posted in phishing, cybersecurity, cyberattacks
Google has caused quite a stir with the launch of the new top-level domains (TLDs) .zip and .mov. After the introduction of this novelty, a wide debate has arisen about the potential dangers that could accompany these extensions.
Cybersecurity in advisory and consulting firms
Aug 24, 2023 1:49:04 PM / by Eduard Bardají posted in cybersecurity
Advisory and consulting firms handle and collect a large amount of data and confidential information that could be vulnerable in the event of a cyberattack.
How to recover files infected by a virus?
Aug 24, 2023 1:47:43 PM / by Eduard Bardají posted in virus, cybersecurity
The loss of files and data, whether due to accidental deletion or the entry of a virus into our system or device, is very common. With the years we have spent in the world of cybersecurity and IT solutions, we have realized that data recovery services or Disaster Recovery continue to be in high demand.
How to recover lost bookmarks in Google Chrome
Aug 24, 2023 1:47:09 PM / by ESED - It & CyberSecurity posted in google chrome, Chrome, Windows, backups, security backups
Bookmarks are an essential tool for organising your information, and keeping track of what you prioritise and where you want it to go. With so much information available in a couple of clicks, getting organised is becoming increasingly important. Did you accidentally delete your bookmarks? Is there a way to recover deleted bookmarks from Chrome?
8 tricks to protect your privacy online
Dec 1, 2022 1:31:00 PM / by ESED - It & CyberSecurity posted in cybersecurity
By making a few simple changes to your devices and accounts you can keep them secure from unwanted third parties, as well as protect your online privacy.
11 tips to protect your smartphone against cyber attacks
Dec 1, 2022 10:39:00 AM / by Eduard Bardají posted in cybersecurity, cyber
Currently, 94% of users use mobile phones to connect to the Internet, according to the AIMC. A very relevant but worrying figure at the same time. Those of us who work in computer security are aware that mobile security is not usually the same as computer security.