|
Post by account_disabled on Feb 18, 2024 1:03:57 GMT -6
Likewise, we leave you 4 recommendations so that you avoid falling into pages that put the security of your information and digital infrastructure at risk . Do not enter adult content sites Do not go to pirate program download sites Do not download music or videos from free download pages. Do not use programs that use P2P communication How to control access to the company's servers to prioritize information security? Business servers often store valuable information for attackers, to avoid password theft we must follow the recommendations of cybersecurity experts. In the files in case the attacker manages to penetrate all the barriers of our ISMS phone numbers in mexico Implement 2FA (Second Factor Authentication) in all systems where we have to register with a password, since NO PASSWORD IS SECURE. Furthermore, we can see that users often choose simple passwords causing cybercriminals to obtain the password in various ways, that is why we need a second way to validate the identity of users on high-risk systems. For this reason we have brought two forms of 2FA offered by Google and Telefónica's cybersecurity team. Google Authenticator : It is a software developed by Google that allows us to authenticate ourselves using secret codes generated in an app that we can control from our iPhone or Android device. Latch : It is an authentication system developed by Elevenpaths, Telephone's cybersecurity division, which can be used to authorize entry to our various authentication systems. It also has a version for iOS and Android.
|
|