{"id":2026,"date":"2024-08-23T11:32:11","date_gmt":"2024-08-23T09:32:11","guid":{"rendered":"https:\/\/enthec.com\/descargables\/"},"modified":"2025-02-20T13:56:50","modified_gmt":"2025-02-20T12:56:50","slug":"downloadables","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/downloadables\/","title":{"rendered":"Downloadables"},"content":{"rendered":"

[vc_row unlock_row_content=”yes” row_height_percent=”0″ back_color=”color-lxmt” back_image=”105″ overlay_alpha=”50″ gutter_size=”0″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ bottom_divider=”gradient” uncode_shortcode_id=”147860″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ position_vertical=”middle” align_horizontal=”align_center” gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”149311″][vc_custom_heading text_size=”custom” text_weight=”700″ uncode_shortcode_id=”149633″ heading_custom_size=”5em”]Resources[\/vc_custom_heading][vc_single_image media=”1033″ media_width_use_pixel=”yes” alignment=”center” uncode_shortcode_id=”155683″ media_width_pixel=”150″][vc_single_image media=”774″ media_width_use_pixel=”yes” alignment=”center” uncode_shortcode_id=”262822″ media_width_pixel=”250″][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ back_color=”color-lxmt” overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ enable_bottom_divider=”default” bottom_divider=”step” shape_bottom_h_use_pixel=”” shape_bottom_height=”500″ shape_bottom_color=”color-xsdn” shape_bottom_opacity=”100″ shape_bottom_index=”0″ changer_back_color=”yes” uncode_shortcode_id=”185069″ back_color_type=”uncode-palette” shape_bottom_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”2″ style=”light” back_color=”color-xsdn” overlay_alpha=”50″ shadow=”std” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”10″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”142181″ back_color_type=”uncode-palette”][vc_custom_heading text_size=”h4″ uncode_shortcode_id=”183978″]Downloadables[\/vc_custom_heading][vc_separator sep_color=”color-521277″ icon_position=”left” uncode_shortcode_id=”208572″ sep_color_type=”uncode-palette” el_width=”50px” el_height=”2px”][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”183259″ border_color_type=”uncode-palette” css=”.vc_custom_1725964616223{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}”][vc_single_image media=”273″ media_width_use_pixel=”yes” uncode_shortcode_id=”669384″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”210006″ heading_custom_size=”1.5em”]Third Party Risk[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”110436″ text_color_type=”uncode-palette”]Assessing and managing third party risk accurately and effectively for the duration of the business relationship is crucial to ensure the security and continuity of any organisation’s operations. In this paper we discuss the importance of third-party cyber risk assessment, common assessment methods, their shortcomings and the benefits of introducing the XTI approach to third-party risk assessment.[\/vc_column_text][vc_button button_color=”color-165520″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”199566″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-Third-Party-Risk.pdf|target:_blank”]Download Third Party Irrigation Document[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”302036″ css=”.vc_custom_1725964605932{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}” border_color_type=”uncode-palette”][vc_single_image media=”805″ media_width_use_pixel=”yes” uncode_shortcode_id=”150871″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”806867″ heading_custom_size=”1.5em”]NIS 2 compliance[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”190483″ text_color_type=”uncode-palette”]More than a decade ago, the European Union became aware of the need to develop a common legal framework on cyber security that would provide the basis for a shared strategy among Member States to fight cyber crime together.[\/vc_column_text][vc_button button_color=”color-165520″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”740428″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-NIS2-ENG.pdf|target:_blank”]Download NIS 2 Compliance Document[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”793437″ css=”.vc_custom_1725964619503{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}” border_color_type=”uncode-palette”][vc_single_image media=”273″ media_width_use_pixel=”yes” uncode_shortcode_id=”160364″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”157518″ heading_custom_size=”1.5em”]Extended Cybersecurity[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”126164″ text_color_type=”uncode-palette”]The CISO faces a number of challenges that hinder his or her ability to protect the organisation. These relate to the scope of the strategy, the lack of involvement of the rest of the organisation and the insufficient corporate resources allocated to cyber security. In this paper we analyse these challenges and propose how to solve them using the corporate cyber security strategy itself based on innovative cyber security solutions.[\/vc_column_text][vc_button button_color=”color-165520″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”155806″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-CISO-Extended-Cybersecurity.pdf|target:_blank”]Download the Extended Cybersecurity document[\/vc_button][\/vc_column_inner][\/vc_row_inner][vc_row_inner limit_content=””][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”183259″ border_color_type=”uncode-palette” css=”.vc_custom_1725964616223{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}”][vc_single_image media=”805″ media_width_use_pixel=”yes” uncode_shortcode_id=”152349″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”139436″ heading_custom_size=”1.5em”]Cyber Threat Intelligence[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”128757″ text_color_type=”uncode-palette”]Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.[\/vc_column_text][vc_button button_color=”color-165520″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”408735″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-IA-Ciberintelligence.pdf|target:_blank”]Download Cyber Threat Intelligence Document[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”302036″ css=”.vc_custom_1725964605932{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}” border_color_type=”uncode-palette”][vc_single_image media=”273″ media_width_use_pixel=”yes” uncode_shortcode_id=”152401″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”117744″ heading_custom_size=”1.5em”]Phishing, Fraud and Scam campaigns in RRSS[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”125179″ text_color_type=”uncode-palette”]In this paper we explore the major brand challenge posed by phishing, fraud and scam campaigns involving corporate identity theft on social media, the techniques used, the consequences for organisations, and advanced prevention and protection strategies against these ever-evolving cyberthreats.[\/vc_column_text][vc_button button_color=”color-165520″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”147641″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-Phishing-Fraud-Scam-Campaignes.pdf|target:_blank”]Download document on Phishing, Fraud and Scam Campaigns in RRSS[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”793437″ css=”.vc_custom_1725964619503{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}” border_color_type=”uncode-palette”][vc_single_image media=”805″ media_width_use_pixel=”yes” uncode_shortcode_id=”149460″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”524608″ heading_custom_size=”1.5em”]Top 10 Network Vulnerabilities[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”156924″ text_color_type=”uncode-palette”]The success of a cyberattack lies in the amount of information about the targeted organisation that cybercriminals have at their disposal, which makes it easier for them to prepare an attack that is very difficult to neutralise. In this document we analyse the ten most common corporate security vulnerabilities found in the network that are exploited by cybercriminals to plan their successful attack.[\/vc_column_text][vc_button button_color=”color-165520″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”210031″ el_id=”descargablesqondar” link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-Top-10-Vulnerabilities.pdf|target:_blank”]Download document Top 10 Network Vulnerabilities[\/vc_button][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”3″ shift_y=”0″ z_index=”0″ limit_content=”” uncode_shortcode_id=”747239″][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”183259″ border_color_type=”uncode-palette” css=”.vc_custom_1725964616223{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}”][vc_single_image media=”1576″ media_width_use_pixel=”yes” uncode_shortcode_id=”106520″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”628021″ heading_custom_size=”1.5em”]Individual Cybersecurity for Relevant Individuals[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”192757″ text_color_type=”uncode-palette”]In the digital environment, protecting information has become a critical priority for organisations. Corporate cybersecurity strategies are designed to secure the organisation’s data and systems and prevent security breaches that could lead to an attack that could put them at risk.[\/vc_column_text][vc_button button_color=”color-363025″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”194368″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2024%2F11%2F2024-ENG-WP-Q-Individual-Cybersecurity-Relevant-People.pdf|target:_blank”]Download Individual Cybersecurity Document for Relevant Persons[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”302036″ css=”.vc_custom_1725964605932{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}” border_color_type=”uncode-palette”][vc_single_image media=”1578″ media_width_use_pixel=”yes” uncode_shortcode_id=”183465″ media_width_pixel=”150″][vc_custom_heading text_size=”custom” text_weight=”700″ separator=”yes” uncode_shortcode_id=”405232″ heading_custom_size=”1.5em”]Artificial Intelligence: The challenge for people’s security[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”236127″ text_color_type=”uncode-palette”]The emergence of artificial intelligence has revolutionised multiple sectors, offering significant benefits that no one doubts. However, as with every new technology, its development has also given rise to new threats and vulnerabilities.[\/vc_column_text][vc_button button_color=”color-363025″ size=”link” btn_link_underline=”btn-underline-in” scale_mobile=”no” button_color_type=”uncode-palette” icon=”fa fa-document” uncode_shortcode_id=”675541″ link=”url:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2024%2F11%2F2024-ENG-WP-Q-AIIndivudual-Security.pdf|target:_blank”]Download Artificial Intelligence Paper: The Challenge for Human Security[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ override_padding=”yes” column_padding=”2″ expand_height=”yes” overlay_alpha=”50″ radius=”sm” preserve_border=”yes” preserve_border_mobile=”yes” border_color=”color-jevc” border_style=”solid” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/3″ uncode_shortcode_id=”444235″ border_color_type=”uncode-palette”][\/vc_column_inner][\/vc_row_inner][vc_single_image media=”473″ media_width_use_pixel=”yes” uncode_shortcode_id=”527928″ media_width_pixel=”35″][\/vc_column][\/vc_row][vc_row row_height_percent=”85″ back_color=”color-xsdn” back_image=”732″ overlay_color=”color-xsdn” overlay_alpha=”94″ gutter_size=”6″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ enable_top_divider=”default” top_divider=”gradient” shape_top_h_use_pixel=”” shape_top_height=”250″ shape_top_color=”color-xsdn” shape_top_opacity=”100″ shape_top_index=”0″ enable_bottom_divider=”default” bottom_divider=”gradient” shape_bottom_h_use_pixel=”” shape_bottom_height=”250″ shape_bottom_color=”color-xsdn” shape_bottom_opacity=”100″ shape_bottom_index=”0″ content_parallax=”0″ uncode_shortcode_id=”131288″ back_color_type=”uncode-palette” overlay_color_type=”uncode-palette” shape_top_color_type=”uncode-palette” shape_bottom_color_type=”uncode-palette” row_name=”sectores”][vc_column column_width_percent=”100″ position_vertical=”middle” gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”847664″][vc_single_image media=”1033″ media_width_use_pixel=”yes” uncode_shortcode_id=”937764″ media_width_pixel=”200″][vc_custom_heading text_size=”custom” text_weight=”700″ uncode_shortcode_id=”146552″ heading_custom_size=”2.5em”]Downloadables by sector
\n(Brouchers)[\/vc_custom_heading][vc_column_text text_lead=”small” text_color=”color-jevc” uncode_shortcode_id=”170678″ text_color_type=”uncode-palette”]If you want to know how Digital Risk is a threat to the viability of the business that also affects all departments of the organisation and how it can be minimised thanks to XTI Cybersurveillance, we tell you about it in this document that we have written specifically for your sector.[\/vc_column_text][vc_row_inner row_inner_height_percent=”0″ overlay_alpha=”50″ gutter_size=”1″ shift_y=”0″ z_index=”0″ limit_content=”” uncode_shortcode_id=”112327″][vc_column_inner width=”1\/2″][uncode_list larger=”yes” icon=”fa fa-download5″ icon_color=”color-jevc” uncode_shortcode_id=”278407″ icon_color_type=”uncode-palette”]<\/p>\n

\n
\n