What is doxing, and how to prevent your personal data from being exposed on the Internet
8 May 2025Persons,Risks,Privacy,Social MediaCybersecurity
The Internet is a space where we share information daily. Social networks, forms, online purchases……
Enthec obtains ISO 27001 International Certification
6 May 2025NewsCertification,Enthec
Continuing with our philosophy of ensuring the protection of our clients and partners, we are proud…
Due Diligence in cybersecurity: How to protect your company during an audit?
30 April 2025Cybersecurity,Kartos,OrganizationsCybersecurity
The word 'audit' usually causes some tension in any company. Whether for legal, financial, or…
IoT and cybersecurity: Risks and strategies to protect connected devices
25 April 2025Cybersecurity,Kartos,RisksCybersecurity
We live in an era where everything is interconnected. From our smart watches to the home…
Compliance with CRA regulation: How can you achieve it in your company?
22 April 2025Cybersecurity,Kartos,Organizations,CybersecurityRegulations
The CRA regulation (Cyber Resilience Act) is one of the terms that is being heard increasingly in…
The importance of cloud security in protecting your data
16 April 2025Cybersecurity,Kartos,Risks,OrganizationsCybersecurity
Personal and professional data has become one of the most valuable assets. We are not just talking…
NIS 2: How does it affect companies, and what measures must be taken to comply with the regulations?
10 April 2025Cybersecurity,Organizations,CybersecurityRegulations
In an environment where cybersecurity has become critical for business survival, the entry into…
Common Types of Cyberattacks - Part II.
7 April 2025Cybersecurity,Kartos,RisksCybersecurity
Computer security is a fundamental pillar for companies and individuals. Technological advances…
Factors that facilitate BEC attacks on senior managers and solutions to mitigate them
1 April 2025Kartos,Risks,Organizations,Cybersecurityphishing
Businesses are increasingly exposed to sophisticated cyberattacks that seek to exploit their…