{"id":6336,"date":"2021-12-20T06:33:01","date_gmt":"2021-12-20T06:33:01","guid":{"rendered":"https:\/\/focusalcogal.com\/la-evolucion-de-la-ciberseguridad-en-las-empresas-en-la-era-digital\/"},"modified":"2022-01-17T17:28:15","modified_gmt":"2022-01-17T17:28:15","slug":"the_evolution_of_corporate_cybersecutiry_in_the_digital_age","status":"publish","type":"post","link":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/","title":{"rendered":"The evolution of corporate cybersecurity in the digital age"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]\n<h3>Author: Jorge Orillac<\/h3>\n<p><span style=\"font-weight: 400;\">Protecting your business is paramount. For this reason, around the world, hundreds of companies invest significant amounts of money each year in surveillance systems, as well as protection and prevention of possible risks to data security and business continuity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, what happens when these transgressions are invisible or unnoticeable? What can be done when such attacks have compromised the very roots of our business through a series of intricate digital networks capable of capturing critically important data? That&#8217;s where cybersecurity comes in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Perhaps ten to fifteen years ago, the issue of cybersecurity, although it was considered important, was not necessarily as much of a crucial area in business administration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, the reality is different. Whether it is a company, a law firm or a retail business, cybersecurity has increasingly become an essential aspect, as business sustainability becomes increasingly dependent on digital systems, networks, and programs to be efficient and conduct business at the speed that is required today to be competitive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every day more data is captured including sales, customer billing, and in the case of law firms or banks; sensitive and confidential data requiring careful management and administration; which makes digital attacks a real threat to data protection and business continuity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, law firms capture sensitive data required to conduct due diligence and that requires special care, including passports, bank reference letters, and the roles that different people have in companies and foundations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is why cybersecurity goes way beyond what you used to worry about.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past, attacks were primarily focused on denial of service (DoS) attacks, which saturated or bombarded servers with unsurmountable amounts of requests, causing them to collapse its services and interrupting the ability to do business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today the concern is more than anything about retaining and protecting data privately and securely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to an article on cybersecurity in<\/span><a href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2021\/03\/02\/alarming-cybersecurity-stats-------what-you-need-to-know-for-2021\/?sh=5324453f58d3\"> <span style=\"font-weight: 400;\">Forbes magazine<\/span><\/a><span style=\"font-weight: 400;\">, 2020 broke all records with regards to the loss of data due to data breaches as well as a huge number of cyber attacks on companies, governments and individuals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, it highlights the increase in threat sophistication due to the application of emerging technologies such as<\/span><a href=\"https:\/\/www.businessinsider.com\/sc\/how-artificial-intelligence-is-changing-everyday-technology-2021-11\"> <span style=\"font-weight: 400;\">machine learning<\/span><\/a><span style=\"font-weight: 400;\">, artificial intelligence and 5G technology.<\/span><\/p>\n<h2><b>Data protection in Panama<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Given the importance of this issue, on May 28<\/span><span style=\"font-weight: 400;\">th<\/span><span style=\"font-weight: 400;\">, 2021,<\/span><a href=\"https:\/\/www.antai.gob.pa\/reglamentacion-de-la-ley-n-81-de-proteccion-de-datos-personales\/\"> <span style=\"font-weight: 400;\">Panama regulated Law 81 on the Protection of Personal Data<\/span><\/a><span style=\"font-weight: 400;\">, which establishes the principles, rights, obligations and procedures to regulate the protection of personal data in Panama, which became effective on March 29<\/span><span style=\"font-weight: 400;\">th<\/span><span style=\"font-weight: 400;\">, 2021, two years after its sanction and promulgation in the Official Gazette.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With these regulations, companies that store personal or private data on companies or clients are required to go one step further. This means that you should not only worry about the data protection for your own company or the interruption of your services, but you should also worry about protecting your customers&#8217; data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To achieve this, proactive and constant management is necessary, a trend that has changed over time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past, the standard practice was for you to hire an external auditing company to review your systems annually or to carry out penetration tests to see if your security measures could withstand an attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, that test returned results that indicated vulnerabilities to you at that specific point in time, something that today is not enough.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today these tests have to be done constantly, as technology risks and threats change at unprecedented rates.<\/span><\/p>\n<p><a href=\"https:\/\/www.wsj.com\/articles\/hackers-circle-as-individual-investors-pour-cash-into-crypto-11637499603\"><span style=\"font-weight: 400;\">Hackers themselves<\/span><\/a><span style=\"font-weight: 400;\"> develop new tools that learn from themselves to attack more intelligently; therefore, your defense tools must also use machine learning so that they learn at the same rate or faster about how to stop the attacks; so that your chances of defending yourself against those threats improve.<\/span><\/p>\n<h2><b>Protection tools and systems<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It is healthy for a company to maintain annual evaluations of all its systems, but it is even more important to adopt a real-time internal security management that allows it to maintain the security of its systems for the rest of the year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are systems called SIEM (System Information Event Monitoring) which issue alerts to any system configuration or possible threats due to attacks. These tools are managed in a SOC (Security Operation Center), by a company dedicated to monitoring alerts that arise in real time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, it is recommended that companies have a vulnerability scanning and patching system that carries out a review at least weekly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using this method, as its name suggests, the computers on the company network are scanned, and if a patch is found to be missing &#8211; from Windows, for example &#8211; that has been identified as a vulnerability, it is deployed and installed immediately.<\/span><\/p>\n<h2><b>The human factor<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of the greatest vulnerabilities that exists is the human factor. Users with access to a network or a system within the company can open a door to potential threats, such as the use of unsecure passwords.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The trend until recently had been to ask employees to use strong passwords, and to change them regularly every three months. However, what in practice ends up happening &#8211; in the face of repeated password change demands &#8211; is that users apply the same passwords with slight variations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This makes them much more vulnerable than having a single strong and secure password combined with the application of a second authentication factor, such as a token that changes every 30 seconds or validated text message to the registered cell phone that includes a temporary code to log in at that time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is why the use of strong passwords combined with a second authentication factor, known as two-factor authentication, is the most recommended.<\/span><\/p>\n<h2><b>Cybersecurity training<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It should be noted that, even if a company has all these surveillance systems, if a user is not able to recognize a phishing email and clicks on it, they can unknowingly open a malicious form, input their username and password, and immediately face a threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where constant user training becomes crucial. Doing social engineering exercises is highly recommended, in which users ability to recognize malicious threats is tested by sending a controlled<\/span><a href=\"https:\/\/www.techradar.com\/news\/most-phishing-scams-targeting-online-shoppers-originate-in-the-us\"> <span style=\"font-weight: 400;\">phishing<\/span><\/a><span style=\"font-weight: 400;\"> email to see if they believe it and open a vulnerability.<\/span><\/p>\n<h2><b>IT Policy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Every company must have an internal IT policy that indicates what the systems can be used for, what the password and token policies are, what can and cannot be installed on computers, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This policy focuses on users and the technology department will use it as a manual to apply the system configurations in accordance with that policy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to this, doing social engineering exercises with users biweekly or monthly is recommended, so that they receive constant training and remain alert of potentially malicious emails.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reality is that phishing emails and security threats change all the time, which is why all companies must keep up to date, comply with national and international cybersecurity standards to offer the secure environment for data protection that external clients seek.<\/span>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden flows by their place and supplies it with the necessary regelialia.<\/p>\n","protected":false},"author":2,"featured_media":6300,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[36],"tags":[],"class_list":{"0":"post-6336","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-otros-viewpoints-en"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The evolution of corporate cybersecurity in the digital age - Focus<\/title>\n<meta name=\"description\" content=\"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The basic steps for data protection and private information\" \/>\n<meta property=\"og:description\" content=\"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\" \/>\n<meta property=\"og:site_name\" content=\"Focus\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-20T06:33:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-17T17:28:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iperez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The basic steps for data protection and private information\" \/>\n<meta name=\"twitter:description\" content=\"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iperez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\"},\"author\":{\"name\":\"iperez\",\"@id\":\"https:\/\/focusalcogal.com\/en\/#\/schema\/person\/57263783d346f9568bc8bcac2029d2c8\"},\"headline\":\"The evolution of corporate cybersecurity in the digital age\",\"datePublished\":\"2021-12-20T06:33:01+00:00\",\"dateModified\":\"2022-01-17T17:28:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\"},\"wordCount\":1292,\"publisher\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg\",\"articleSection\":[\"Other viewpoints\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\",\"url\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\",\"name\":\"The evolution of corporate cybersecurity in the digital age - Focus\",\"isPartOf\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg\",\"datePublished\":\"2021-12-20T06:33:01+00:00\",\"dateModified\":\"2022-01-17T17:28:15+00:00\",\"description\":\"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.\",\"breadcrumb\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage\",\"url\":\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg\",\"contentUrl\":\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg\",\"width\":1920,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/focusalcogal.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The evolution of corporate cybersecurity in the digital age\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/focusalcogal.com\/en\/#website\",\"url\":\"https:\/\/focusalcogal.com\/en\/\",\"name\":\"Focus\",\"description\":\"Alcogal\",\"publisher\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/focusalcogal.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/focusalcogal.com\/en\/#organization\",\"name\":\"Focus by Alcogal\",\"url\":\"https:\/\/focusalcogal.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/focusalcogal.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2021\/12\/banner_2-1.jpg\",\"contentUrl\":\"https:\/\/focusalcogal.com\/wp-content\/uploads\/2021\/12\/banner_2-1.jpg\",\"width\":1200,\"height\":400,\"caption\":\"Focus by Alcogal\"},\"image\":{\"@id\":\"https:\/\/focusalcogal.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/alcogal\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/focusalcogal.com\/en\/#\/schema\/person\/57263783d346f9568bc8bcac2029d2c8\",\"name\":\"iperez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/cfc437eac59564aef399a008ece34c7d6cce14d0277d6c51dd45172b0ada88a5?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cfc437eac59564aef399a008ece34c7d6cce14d0277d6c51dd45172b0ada88a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cfc437eac59564aef399a008ece34c7d6cce14d0277d6c51dd45172b0ada88a5?s=96&d=mm&r=g\",\"caption\":\"iperez\"},\"url\":\"https:\/\/focusalcogal.com\/en\/author\/iperez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The evolution of corporate cybersecurity in the digital age - Focus","description":"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/","og_locale":"en_US","og_type":"article","og_title":"The basic steps for data protection and private information","og_description":"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.","og_url":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/","og_site_name":"Focus","article_published_time":"2021-12-20T06:33:01+00:00","article_modified_time":"2022-01-17T17:28:15+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg","type":"image\/jpeg"}],"author":"iperez","twitter_card":"summary_large_image","twitter_title":"The basic steps for data protection and private information","twitter_description":"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.","twitter_image":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg","twitter_misc":{"Written by":"iperez","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#article","isPartOf":{"@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/"},"author":{"name":"iperez","@id":"https:\/\/focusalcogal.com\/en\/#\/schema\/person\/57263783d346f9568bc8bcac2029d2c8"},"headline":"The evolution of corporate cybersecurity in the digital age","datePublished":"2021-12-20T06:33:01+00:00","dateModified":"2022-01-17T17:28:15+00:00","mainEntityOfPage":{"@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/"},"wordCount":1292,"publisher":{"@id":"https:\/\/focusalcogal.com\/en\/#organization"},"image":{"@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage"},"thumbnailUrl":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg","articleSection":["Other viewpoints"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/","url":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/","name":"The evolution of corporate cybersecurity in the digital age - Focus","isPartOf":{"@id":"https:\/\/focusalcogal.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage"},"image":{"@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage"},"thumbnailUrl":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg","datePublished":"2021-12-20T06:33:01+00:00","dateModified":"2022-01-17T17:28:15+00:00","description":"Every day the threats and dangers from cyberattacks are more sophisticated and cybersecurity plays a crucial role.","breadcrumb":{"@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#primaryimage","url":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg","contentUrl":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2017\/02\/focus-cirberseguridad.jpg","width":1920,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/focusalcogal.com\/en\/the_evolution_of_corporate_cybersecutiry_in_the_digital_age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/focusalcogal.com\/en\/"},{"@type":"ListItem","position":2,"name":"The evolution of corporate cybersecurity in the digital age"}]},{"@type":"WebSite","@id":"https:\/\/focusalcogal.com\/en\/#website","url":"https:\/\/focusalcogal.com\/en\/","name":"Focus","description":"Alcogal","publisher":{"@id":"https:\/\/focusalcogal.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/focusalcogal.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/focusalcogal.com\/en\/#organization","name":"Focus by Alcogal","url":"https:\/\/focusalcogal.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/focusalcogal.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2021\/12\/banner_2-1.jpg","contentUrl":"https:\/\/focusalcogal.com\/wp-content\/uploads\/2021\/12\/banner_2-1.jpg","width":1200,"height":400,"caption":"Focus by Alcogal"},"image":{"@id":"https:\/\/focusalcogal.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/alcogal\/"]},{"@type":"Person","@id":"https:\/\/focusalcogal.com\/en\/#\/schema\/person\/57263783d346f9568bc8bcac2029d2c8","name":"iperez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cfc437eac59564aef399a008ece34c7d6cce14d0277d6c51dd45172b0ada88a5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cfc437eac59564aef399a008ece34c7d6cce14d0277d6c51dd45172b0ada88a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cfc437eac59564aef399a008ece34c7d6cce14d0277d6c51dd45172b0ada88a5?s=96&d=mm&r=g","caption":"iperez"},"url":"https:\/\/focusalcogal.com\/en\/author\/iperez\/"}]}},"_links":{"self":[{"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/posts\/6336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/comments?post=6336"}],"version-history":[{"count":4,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/posts\/6336\/revisions"}],"predecessor-version":[{"id":6603,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/posts\/6336\/revisions\/6603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/media\/6300"}],"wp:attachment":[{"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/media?parent=6336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/categories?post=6336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/focusalcogal.com\/en\/wp-json\/wp\/v2\/tags?post=6336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}