The world of industry has changed a lot in recent times. The place where before we saw an operator performing highly repetitive tasks has become a place with computer or tablet, where the operator tells the machine what to do. However, the use of these elements always involves some risk. For the entrepreneur, it is essential to know what the,,es,keys to good cybersecurity companies,,es claves para una buena ciberseguridad en empresas.

Any manager of a company in the industrial or any other field, you must know the risks that may exist to prevent and prepare your system to an attack does not cause great impact on the activities of the same. Among the measures to consider should be aware of preventive maintenance programs. These allow you to reduce downtimes of equipment, avoid loss of product processing and eliminate long stops.,,es,It is advisable to make a,,es,penetration test, or pentesting,,gl,by a,,es,ciberserguidad expert companies,,es,Thus we can identify and correct security vulnerabilities and hazards associated computer system.,,es,Motivation of cyberattacks,,es

Es aconsejable realizar un test de penetración o pentesting por parte de un experto en ciberserguidad de empresas, de este modo podremos identificar y corregir vulnerabilidades de seguridad y sus peligros asociados del sistema informático.

Motivación de los ciberataques

With the investment we make in technological advances, companies are exposed to new risks, known by other sectors for some time. To fight it we must understand what motivates,,es,cybercriminals,,es,and the types of attacks that we can launch.,,es ciberdelincuentes y los tipos de ataques que nos pueden lanzar.

Pentest cybersecurity Enterprise

Normally attacks are most affecting espionage, blackmail and threats of a process interruption, damage to the image of the company, fraud and worst of all, the economic damage. This causes problems at different levels, it carries data manipulation, breach of statutory duty by the inability to register certain information, manipulation in decision-making based on information system log ...,,es,What can we do to protect user level?,,es,Antivirus,,en

¿Qué podemos hacer para protegernos a nivel de usuario?

Antivirus

First, we must review the PC's industrial control system have a valid license antivirus and it is updated. If not, we put it in its latest version, as recommended by the experts.,,es,OS update,,es,We must do the same with our operating system. It makes little sense that anclemos us in past versions, since when no longer supported begin to give real problems and many open gaps in security.,,es,external devices,,es,A pretty peleagudo issue is how to manage the issue of USB. These are usually a hotbed of,,es,malware,,en

Actualización del sistema operativo

Debemos de hacer lo mismo con nuestro sistema operativo. No tiene mucho sentido que nos anclemos en versiones pasadas, puesto que cuando dejan de soportarse comienzan a dar verdaderos problemas y se abren muchas brechas en temas de seguridad.

Dispositivos externos

Un tema bastante peleagudo es cómo gestionamos el tema de los USB. Estos suelen ser un foco de malware. Not only is not to introduce USB virus that can bring out series; but we must also ask ourselves whether we should use the same pendrive to introduce programs and manufacturing machines for Internet downloads.,,es,System users,,es,In addition, we must have full control of system users connecting to our system. You have to keep track of everyone who has access and to what degree. And if they are connected to the Internet, we must consider the security policies we have and have external companies.,,es

Sistema de usuarios

Además, debemos tener un control total del sistema de usuarios que se conectan a nuestro sistema. Hay que llevar un registro de todas las personas que tiene acceso y en qué grado. Y si están conectados a Internet, debemos tener en cuenta las políticas de seguridad que tenemos y tienen las empresas externas.

Key corporate cybersecurity

Backup copies

We should note that we must back up our databases every so often (depending on the volume of data) so that if any attack occurs against our system, we can always retrieve the latest copy of those. It is recommended that this copy is kept in an isolated system to prevent attacks seconds.,,es,external links,,es,Finally, we assess the need to connect to production systems externally. By all it knows that WiFi networks is another focus for which we can attack. If we are connected to our system this way, we facilitate the passage of pirates to be able to perform true barbarities.,,es,A summary mode, highlight the most important thing is,,es

Conexiones externas

Finalmente, debemos valorar la necesidad de conectarnos a los sistemas de producción de forma externa. Por todos es conocido que la conexión a redes Wifi es otro foco por el que nos pueden atacar. Si estamos conectados a nuestro sistema de esta manera, facilitamos el paso de los piratas a poder realizar verdaderas barbaridades.

A modo resumen, destacar que lo más importante es cybersecurity awareness to our team,,es,so that it becomes an active element of computer security. To do this, nothing better than making a good,,es,and the,,es,staff training,,es,in these respects.,,es,2017-11-20T14:14:26 00:00,,en para que se convierta en un elemento activo en materia de seguridad informática. Para ello, nada mejor que la realización de una buena cybersecurity audit así como la formación del personal en estos aspectos.