{"id":2595,"date":"2024-11-19T13:28:13","date_gmt":"2024-11-19T12:28:13","guid":{"rendered":"https:\/\/enthec.com\/?p=2595"},"modified":"2025-01-29T13:43:38","modified_gmt":"2025-01-29T12:43:38","slug":"proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/","title":{"rendered":"Proactive security: What is it and why use it to prevent and detect threats and cyberattacks?"},"content":{"rendered":"

Proactive security involves a combination of technologies, processes, and practices designed to protect organizations from attacks or unauthorized access before they occur.<\/strong><\/p>\n

 <\/p>\n

What is proactive security?<\/h2>\n

Proactive security is an approach to cybersecurity that focuses on preventing cyber threats<\/strong> before they occur rather than simply reacting to them once they have occurred.
\nThis approach involves identifying and remediating security vulnerabilities <\/strong>and anticipating future threats to prevent potential security breaches.
\nProactive safety is based on the premise that prevention is better than repair.<\/strong> Rather than waiting for a security incident to occur and then taking steps to minimize or repair the damage, organizations with a proactive approach to cybersecurity seek to prevent these incidents by identifying and eliminating vulnerabilities before cybercriminals can exploit them.
\nA key component of proactive cybersecurity is regularly assessing information systems and networks to identify vulnerabilities.<\/strong> This may involve conducting penetration tests, in which security experts attempt to breach the organization’s systems to uncover weaknesses before attackers do.
\nAnother proactive strategy is the continuous monitoring of the attack surface external to the organization <\/strong>\u2013 the internet, dark web, deep web, social media, and other sources \u2013 to detect leaked information, open breaches, exposed system vulnerabilities,<\/a> and suspicious activity. This involves the use of continuously functioning automated cyber intelligence<\/a> tools for real-time threat detection.
\nSecurity training<\/strong> is also an important aspect of proactive cybersecurity. By educating employees on security best practices and keeping them informed about the latest threats and attack tactics, organizations can reduce the risk of security breaches occurring due to human error or a lack of security knowledge.
\nBy taking a proactive approach to security, organizations empower themselves to prevent threats before they occur, minimizing the risk of cyberattacks and protecting their valuable information assets.<\/strong><\/p>\n

 <\/p>\n

\"proactive<\/strong><\/p>\n

 <\/p>\n

Why use a proactive approach to security?<\/h2>\n

Today, cybersecurity is a critical concern for all organizations. However, many companies still take a reactive approach,<\/strong> responding to threats as they occur, and organizations need to adopt a proactive attitude to security due to the advantages it brings:<\/p>\n

    \n
  1. Attack prevention.<\/strong> Proactive security focuses on preventing attacks before they happen. This is achieved by identifying and remediating vulnerabilities and anticipating future threats. By doing so, organizations avoid the costly downtime and data loss associated with consummate cyberattacks.<\/li>\n
  2. Cost savings.<\/strong> Although implementing proactive security measures may require an upfront investment, the cost of these measures is often much lower than the cost of responding to a cyberattack and its aftermath. In addition, successful cyberattacks can lead to regulatory fines and litigation, which cause financial damage.<\/li>\n
  3. Reputation protection. <\/strong>A cyberattack can significantly damage an organization’s reputation. Your customers and business partners will lose trust in a company that can’t protect their data. By taking a proactive approach, organizations demonstrate their commitment to data security, thereby enhancing their reputation.<\/li>\n
  4. Compliance. <\/strong>Most countries have strict rules and regulations around data security. By taking a proactive approach, organizations can ensure they comply with these standards, thus avoiding fines and penalties, while facilitating partnerships and internationalization.<\/li>\n
  5. Guarantee of business continuity. <\/strong>Organizations can avoid system downtime and keep their operations running smoothly by identifying and fixing vulnerabilities before they are exploited.<\/li>\n
  6. Competitive advantage.<\/strong> Organizations that demonstrate a solid commitment to cybersecurity have a competitive advantage in an increasingly digitized market. Customers and business partners often prefer to do business with companies that take data security seriously.<\/li>\n<\/ol>\n

     <\/p>\n

    Proactive Security Best Practices for Detecting Cyberattacks<\/h2>\n

    A proactive security attitude involves deploying a series of best practices in the organization’s cybersecurity strategy.<\/strong><\/p>\n

    Endpoint Detection and Response (EDR)<\/h3>\n

    It provides continuous visibility into network endpoints and enables rapid responses to cyber threats.<\/strong> EDR collects and analyzes endpoint data to detect, investigate, and prevent threats.
    \nThis proactive solution enables organizations to identify abnormal behavior, <\/strong>perform forensic analysis, and mitigate risks before they become security incidents, thereby improving their overall security posture.<\/p>\n

    Data Loss Prevention (DLP)<\/h3>\n

    It focuses on identifying, monitoring, and protecting data in use, in motion, and at rest.<\/strong> DLP uses security policies to classify and protect sensitive and critical information, preventing users from sending, storing, or using sensitive data inappropriately.
    \nBy detecting potential data breaches before they occur, DLP helps organizations prevent the exposure of valuable information, <\/strong>comply with regulations, and protect their reputation.<\/p>\n

    Vulnerability Detection<\/h3>\n

    Monitoring the external attack surface and locating exposed vulnerabilities is an effective proactive cybersecurity practice. It consists of identifying, classifying, and prioritizing vulnerabilities in the corporate system <\/strong>that are accessible to the public.
    \nThis practice allows organizations to detect potential cyberattack entry points, <\/strong>providing a clear view of potential threats. By locating and remediating these vulnerabilities, organizations strengthen their cybersecurity strategy, prevent intrusions, and minimize the impact of any attacks. This practice is essential for effective cybersecurity management.<\/p>\n

    Disaster Recovery Plan<\/h3>\n

    It prepares an organization to respond to a cyberattack.<\/strong> It includes procedures for detecting, evaluating, and recovering from security incidents.
    \nThis plan helps minimize damage, accelerate recovery, and protect data integrity. <\/strong>It is essential to maintain business continuity, protect the company’s reputation, and ensure customer trust. The goal is to restore normal operations as quickly as possible after a cyberattack.<\/p>\n

     <\/p>\n

    Benefits of Proactive Security<\/h2>\n

    Staying one step ahead of cybercriminals makes it possible to neutralize attacks before they are executed or minimize their consequences <\/strong>if they cannot be avoided.
    \nA proactive attitude to security provides the organization with the following advantages:<\/strong><\/p>\n

    Threat Anticipation<\/h3>\n

    By anticipating threats, organizations can take preventative measures to protect their systems and data, reducing the risk of security breaches<\/strong> and minimizing the impact of any attacks.<\/p>\n

    Strengthening the relationship with the customer<\/h3>\n

    Proactive cybersecurity strengthens the customer relationship by building trust and security.<\/strong> Customers value their privacy and the protection of their data.
    \nBy implementing proactive measures, organizations demonstrate their commitment to customer data security. This increases customer satisfaction, improves retention, and attracts new customers.<\/strong> In addition, in the event of a cyberattack, a quick and effective response can minimize the impact on customers, maintaining their trust in the organization.<\/p>\n

     <\/p>\n

    \"Strengthening<\/p>\n

     <\/p>\n

    Reducing business risk<\/h3>\n

    Proactive cybersecurity reduces business risk by preventing cyberattacks. By identifying and mitigating vulnerabilities, exposure to threats is minimized, protecting the integrity of data and systems.<\/strong>
    \nThis avoids costly outages and information loss, maintaining customer trust while complying with privacy and data protection regulations.<\/strong> Proactive cybersecurity protects the company’s value and reputation.
    \nTo stay up-to-date in this sector, we encourage you to access our content<\/strong>\u2192 The 5 cybersecurity trends you need to know.<\/a><\/p>\n

     <\/p>\n

    Discover the Kartos by Enthec CTEM platform<\/h2>\n

    Kartos Corporate Threat Watchbots, <\/a>the Continuous Threat Exposure Management platform for companies developed by Enthec<\/a>, provides organizations with the most evolved Cyber Surveillance capabilities on the market <\/strong>to respond to attacks’ evolutions and trends.
    \nUsing Artificial Intelligence internally developed and working automatedly and continuously, Kartos by Enthec obtains and delivers data on companies’ open and exposed vulnerabilities,<\/strong> providing real-time alarms and issuing reports on their cybersecurity status and that of their value chain.
    \nIn this way, Kartos allows organizations to implement a proactive approach in their cybersecurity strategy <\/strong>and ensure the detection and nullification of open breaches and exposed vulnerabilities before they are used to execute a cyberattack.
    \nIf you would like to learn more about how Kartos can help you implement a proactive approach in your cybersecurity strategy, <\/strong>don\u00b4t hesitate to
    contact us.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

    Proactive security involves a combination of technologies, processes, and practices designed to protect organizations from attacks or unauthorized access before […]<\/p>\n","protected":false},"author":4,"featured_media":2592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,32,38],"class_list":["post-2595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-kartos-en","tag-organizations"],"yoast_head":"\nProactive Security to Detect Cyberattacks - Enthec<\/title>\n<meta name=\"description\" content=\"Find out what proactive security is and why preventing cyberattacks is so essential. \u261d We'll tell you all about it from Enthec\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proactive Security to Detect Cyberattacks - Enthec\" \/>\n<meta property=\"og:description\" content=\"Find out what proactive security is and why preventing cyberattacks is so essential. \u261d We'll tell you all about it from Enthec\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-19T12:28:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T12:43:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Proactive security: What is it and why use it to prevent and detect threats and cyberattacks?\",\"datePublished\":\"2024-11-19T12:28:13+00:00\",\"dateModified\":\"2025-01-29T12:43:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\"},\"wordCount\":1232,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Organizations\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\",\"url\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\",\"name\":\"Proactive Security to Detect Cyberattacks - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg\",\"datePublished\":\"2024-11-19T12:28:13+00:00\",\"dateModified\":\"2025-01-29T12:43:38+00:00\",\"description\":\"Find out what proactive security is and why preventing cyberattacks is so essential. \u261d We'll tell you all about it from Enthec\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg\",\"width\":2560,\"height\":1548,\"caption\":\"Female human wear formal work suit presenting presentation use smart device\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proactive security: What is it and why use it to prevent and detect threats and cyberattacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"description\":\"Deep tech cyber-surveillance company\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proactive Security to Detect Cyberattacks - Enthec","description":"Find out what proactive security is and why preventing cyberattacks is so essential. \u261d We'll tell you all about it from Enthec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Proactive Security to Detect Cyberattacks - Enthec","og_description":"Find out what proactive security is and why preventing cyberattacks is so essential. \u261d We'll tell you all about it from Enthec","og_url":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2024-11-19T12:28:13+00:00","article_modified_time":"2025-01-29T12:43:38+00:00","og_image":[{"width":2560,"height":1548,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Proactive security: What is it and why use it to prevent and detect threats and cyberattacks?","datePublished":"2024-11-19T12:28:13+00:00","dateModified":"2025-01-29T12:43:38+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/"},"wordCount":1232,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg","keywords":["Cybersecurity","Kartos","Organizations"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/","url":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/","name":"Proactive Security to Detect Cyberattacks - Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg","datePublished":"2024-11-19T12:28:13+00:00","dateModified":"2025-01-29T12:43:38+00:00","description":"Find out what proactive security is and why preventing cyberattacks is so essential. \u261d We'll tell you all about it from Enthec","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/11\/Ciberseguridad-proactiva-scaled.jpg","width":2560,"height":1548,"caption":"Female human wear formal work suit presenting presentation use smart device"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/proactive-security-what-is-it-and-why-use-it-to-prevent-and-detect-threats-and-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Proactive security: What is it and why use it to prevent and detect threats and cyberattacks?"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","description":"Deep tech cyber-surveillance company","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC \u00b7 Kartos \u00b7 Qondar"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15b8af9966a7c8e3e248729e378b7f5d?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=2595"}],"version-history":[{"count":2,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2595\/revisions"}],"predecessor-version":[{"id":3141,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/2595\/revisions\/3141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/2592"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=2595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=2595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=2595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}