At present the risks related to information security are on the rise, so companies have decided to watch their backs and protect their most precious treasure: their information. This is where the roll of a Security Officer appears, the CISO (Chief Information Security Officer).
They say that there is no password in the world that is indecipherable, although it is true that we can create an almost perfect password. Moreover, we have to keep in mind basic rules that a perfect password should follow. The first one, and also the most important, it must be very easy to remember; and the second one, we take a careful look at length. They recommend a minimum of twelve characters. Therefore, the use of words has several factors of risk: short extension and facility to be found in a dictionary.
Some time ago, we talked about the main differences between the different types of cloud (public, private and hybrid). In this post, we delve into one of them, hybrid cloud, and we explain you the main differences that it offers. (more…)
Digital transformation is a key issue for the continuity of businesses. However, only 20% of the worldwide companies are currently implementing solutions to make it effective.
In this article we explain you the challenges of the digital transformation, its main barriers and best practices to implement it. (more…)
Have you ever lost any file, image or folder containing important information? It has probably occurred to you once or, at least, you’ll know someone that has experienced it. This kind of situations can be caused by human error, hardware incidents, viruses or any kind of disaster. Thus, in order to prevent it, we explain you what 3-2-1 Backup Strategy is about. (more…)