{"id":2022,"date":"2024-09-23T16:15:04","date_gmt":"2024-09-23T14:15:04","guid":{"rendered":"https:\/\/enthec.com\/case-studies\/proteccion-del-correo-corporativo\/"},"modified":"2024-11-05T19:37:02","modified_gmt":"2024-11-05T18:37:02","slug":"protecting-corporate-mail","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/use-cases\/protecting-corporate-mail\/","title":{"rendered":"Protecting Corporate Mail"},"content":{"rendered":"
[vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”536538″][vc_custom_heading auto_text=”yes” text_size=”custom” text_weight=”700″ uncode_shortcode_id=”283533″ heading_custom_size=”5em”]T\u00edtulo din\u00e1mico[\/vc_custom_heading][vc_single_image media=”319″ media_width_use_pixel=”yes” uncode_shortcode_id=”664052″ media_width_pixel=”250″][\/vc_column][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”141236″][vc_empty_space empty_h=”3″ mobile_visibility=”yes”][vc_custom_heading heading_semantic=”h1″ text_size=”h4″ text_weight=”300″ uncode_shortcode_id=”164621″]The information provided by Kartos XTI Watchbots enables the hospital to quickly identify the breach and its source and to carry out the necessary corrective measures to protect hospital systems.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ enable_bottom_divider=”default” bottom_divider=”step” shape_bottom_h_use_pixel=”” shape_bottom_height=”500″ shape_bottom_color=”color-lxmt” shape_bottom_opacity=”100″ shape_bottom_index=”0″ content_parallax=”0″ uncode_shortcode_id=”265517″ back_color_type=”uncode-palette” shape_bottom_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”2″ style=”light” back_color=”color-xsdn” overlay_alpha=”50″ shadow=”std” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”10″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”408996″ back_color_type=”uncode-palette”][vc_custom_heading uncode_shortcode_id=”178873″]CHALLENGE[\/vc_custom_heading][vc_single_image media=”473″ media_width_use_pixel=”yes” uncode_shortcode_id=”443915″ media_width_pixel=”50″][vc_custom_heading text_size=”h4″ uncode_shortcode_id=”929797″]A hospital is an organisation that belongs to the category of critical infrastructures subject to strict compliance with legal regulations on the protection of confidential patient data as well as business continuity protection. After a period of malfunction and loss of information in some communication systems, the hospital’s management team accepts the need to find out, with as much certainty as possible, the existence of security breaches in its IT system. In this way, it ensures that the budget allocation for remediation will be adjusted to the real need of the risk.[\/vc_custom_heading][vc_row_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”148772″][vc_single_image media=”747″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”393742″][vc_custom_heading separator=”yes” uncode_shortcode_id=”135113″]Solution[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”139225″]The hospital’s CISO contacts Enthec Solutions and starts using the Kartos XTI Watchbots cyber intelligence and cyber security platform, which is used by the hospital’s CISO:<\/strong><\/p>\n [\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”333741″][vc_single_image media=”453″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”145503″][vc_custom_heading separator=”yes” uncode_shortcode_id=”140739″]Result[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”624266″]After receiving the report with the results of the analysis performed by the Kartos XTI Watchbots platform, the hospital obtains certain proof of security breaches in its IT system, which are being exploited by cybercrime to steal critical confidential information. Thanks to the information gathered, the hospital takes the necessary actions to resolve the vulnerability and close data leaks of which it was unaware. The analysis also detected the flaw in the configuration of the mail system that had been used as a gateway to the hospital’s information. Thanks to the information detected by Kartos XTI Watchbots, the hospital implemented the following immediate corrective measures:<\/p>\n [\/vc_column_text][vc_column_text uncode_shortcode_id=”536193″]Once the effectiveness of the solution provided by Enthec Solutions has been verified and in order to avoid future security breaches, guarantee the integrity of the confidential information hosted in its system and know at all times the exposure in its external perimeter, the hospital permanently hires Enthec Solutions’ Cyber Intelligence and cybersecurity service. Through the Kartos XTI Watchbots platform, it obtains constant monitoring of hospital exposure on the Web, Deep Web, Dark Web and Social Networks, recurrent and continuous analysis of the hospital’s cybersecurity status and immediate detection of any vulnerability or security breach when it occurs.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":" [vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ […]<\/p>\n","protected":false},"author":1,"featured_media":2023,"parent":2010,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2022","page","type-page","status-publish","has-post-thumbnail","hentry","page_category-use-cases"],"yoast_head":"\n\n
\n