Disarming Cybercriminals: Free Tools to Prevent Social Engineering Attacks
Cybercriminals have a wide variety of techniques within their arsenal to carry out their Social Engineering attacks. If you act proactively, it will be very difficult for cybercriminals to perpetrate in your organization.
OWASP guide to avoid RANSOMWARE infections
This OWASP guide is intended as a checklist in order to avoid infection with Ransomware and, ultimately, to create proper procedures for information recovery.
How to develop a user-oriented security layer
To develop a user-oriented security layer, it is necessary to conduct a User Hardening process. Learn the basics of this process and how to carry it out in a practical way.