Blog

Contenido Blog

Preventing the leaking of information in ICS

Posted on 28/05/2020, by
INCIBE (INCIBE)
Preventing the leaking of information in ICS
Exfiltration of data, or information leakage, poses a threat to all companies throughout the world. It is important to know the possible ways information can get out to control them and avoid a loss of information in our organisation. Since in industry the most important factor is availability, this threat has to be put into perspective.

Cyber-resilience: the key to overcoming incidents

Posted on 14/05/2020, by
INCIBE (INCIBE)
Cyber-resilience
The goal of cyber-resilience for an organization, whether or not it belongs to a strategic sector, whether or not it provides one of these digital services, is to maintain its primary purpose and integrity in the face of a cybersecurity threat or attack to an ideal level. Continuous detection processes must be established given that total prevention will never be guaranteed.

Sodinokibi: features and operation

Posted on 06/04/2020, by
INCIBE (INCIBE)
Sodinokibi
The ransomware attacks have experienced a great evolution from its beginnings, being able to identify a great amount of different families at the present time, many of them are highly sophisticated, with high propagation and persistence. In this blog we explain what is Sodinokibi and how it works.

Teleworking: VPN and other recommendations

Posted on 30/03/2020, by
Adrián Flecha (INCIBE)
Teletrabajo: VPN y otras recomendaciones
In this article, we review virtual private networks, or VPNs, one of the most important measures for teleworking, as they allow a connection to the organization through secure networks, and the advantages they offer, as well as additional security recommendations to help ensure cyber security.

Guide for an asset inventory management in industrial control systems

Posted on 12/03/2020, by
INCIBE (INCIBE)
decorative image
The first step in securing industrial control systems is making an inventory containing all the assets involved in the process. With this information, the inventory can be used to properly manage vulnerabilities, which will make it possible to take the necessary measures to solve and mitigate them.

NTP, SNTP and PTP: what time synchronization do I need?

Posted on 05/03/2020, by
INCIBE (INCIBE)
NTP, SNTP and PTP
Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.