What is doxing, and how to prevent your personal data from being exposed on the Internet
8 May 2025Social Media,Cybersecurity,Persons,RisksPrivacy
The Internet is a space where we share information daily. Social networks, forms, online purchases……
Enthec obtains ISO 27001 International Certification
6 May 2025NewsCertification,Enthec
Continuing with our philosophy of ensuring the protection of our clients and partners, we are proud…
Due Diligence in cybersecurity: How to protect your company during an audit?
30 April 2025CybersecurityCybersecurity,Kartos,Organizations
The word 'audit' usually causes some tension in any company. Whether for legal, financial, or…
IoT and cybersecurity: Risks and strategies to protect connected devices
25 April 2025CybersecurityCybersecurity,Kartos,Risks
We live in an era where everything is interconnected. From our smart watches to the home…
Compliance with CRA regulation: How can you achieve it in your company?
22 April 2025CybersecurityRegulations,Cybersecurity,Kartos,Organizations
The CRA regulation (Cyber Resilience Act) is one of the terms that is being heard increasingly in…
The importance of cloud security in protecting your data
16 April 2025Organizations,Cybersecurity,Cybersecurity,KartosRisks
Personal and professional data has become one of the most valuable assets. We are not just talking…
NIS 2: How does it affect companies, and what measures must be taken to comply with the regulations?
10 April 2025Regulations,Cybersecurity,OrganizationsCybersecurity
In an environment where cybersecurity has become critical for business survival, the entry into…
Common Types of Cyberattacks - Part II.
7 April 2025CybersecurityCybersecurity,Kartos,Risks
Computer security is a fundamental pillar for companies and individuals. Technological advances…
Factors that facilitate BEC attacks on senior managers and solutions to mitigate them
1 April 2025Cybersecurityphishing,Kartos,Risks,Organizations
Businesses are increasingly exposed to sophisticated cyberattacks that seek to exploit their…