Computer science security

Prevention before Reaction

Security of the information in Colombia

Most evident, €œit is that the companies do not invest in security, but react to an attack€.

In other words, the SMEs throw padlock to him to the business after the thieves put.

According to McAfee, 8% of the cost in YOU of the small and medium businesses are only destined to the computer science security.

Considering that 73% of the Colombian SMEs at least underwent a computer science attack, and that these companies move 96% of the economy of the country, he is worrisome the lack of computer science securing

Security Web

The increase of a 87% in the number of URLs suspicious between 2013 and 2014, causes that the risk is increased of which personal without formation in ciberseguridad, can accede to dangerous links and ends up bringing about an attack in its organization.

According to the last study of Intel Security, realised on the basis of opinions of people in charge YOU of European companies, sales staff is exhibited to attacks, thanks to the frequency of his contact online with external personnel. Nevertheless, 64% of the consulted companies do not offer formation YOU to these people.

Type of qualification:

  • Detection of fraudulent post office or with infected programs
  • Social engineering €“ Prevention of Hackeo to accounts of social networks, accounts of mail, etc.
  • Security in the mobile: Security for safe connections by Wifi networks
  • Security on the Web
  • Law of Protection of data

Type of Consultant's office and/or Audit:

  • Monitoring of black list or Blacklist
  • Encryption with SSL
  • Prevention of malware
  • Security of Network
  • Security on the Web
  • Prevention of attacks of injection of SQL, Cross Site Scripting (XSS)
SAN GeoTrust

Consultant's office, Audit and Qualification


Security Web

The threats can be caused by:

  • Users: Cause of the greater problem related to the security of a computer science system
  • Malicious programs: Programs destined to harm or to make an illicit use of the resources of the system, generally known as malware
  • Errors of programming: The majority of the programming errors that can be considered as a computer science threat is by its condition for being able to be used as exploits by crackers, although occurs cases where the evil development is, in itself, a threat
  • Intruders: Person who is able to accede to the data or programs to which is not authorized (crackers, defacers, hackers, script kiddie or script boy, viruxers, etc.)
  • A wreck (robbery, fire, flood): A bad manipulation or a bad intention derives to the loss of the material or the archives
  • Internal technical personnel: Technicians of systems, database administrators, technicians of development, etc.
  • Electronic or logical failures of the computer science systems generally
  • Natural catastrophes: Rays, earthquakes, floods, cosmic rays, etc.

Threats by used means

Computer science security

They are possible to be classified by the modus operandi of the attacker, although the effect can be different for a same type from attack:

  • Computer virus: Malware that it intends to alter the normal operation of the computer, without the permission or the knowledge of the user. The virus, habitually, replaces EXE files by infected others with the code of this. The virus can destroy, of deliberate way, the data stored in a computer, although also more inoffensive others exist, than they are only characterized for being annoying
  • Phishing
  • Social engineering
  • Refusal on watch
  • Spoofing: Of DNS, IP, DHCP, etc.

Average of Payment