Monthly Archive December 2018

The Importance of Protecting Data in the Health Sector

Digital transformation is a reality in all areas. Technologies leverage a broad set of opportunities to satisfy diverse needs, optimizing available resources and reducing the risks associated with the use of technologies. The health sector is one of the sectors that most care must have in the processing of personal data, ensuring the privacy of patient data. With the entry into force of the new GDPR, the importance of protecting data in the health sector is even more evident. We discuss in this article the main implications of the treatment of personal data in the health sector.

Read More

How can fake news be harmful to your business?

In recent times, the term “fake news” has become part of our day-to-day life. Fake news is created to attract audiences by getting people to click on the links. The goal is to increase revenue through ads. Fake news is also used for its own benefit and to deconstruct ideas rooted in the population. The term “fake news” gained fame during the United States presidential election, but its performance goes far beyond politics. Companies like PepsiCo have seen their reputation threatened due to the spread of fake news. In an age when information travels so quickly, it is very important that companies also protect themselves from this threat. In today’s article, we leave you some tips for not being a victim of fake news and for not taking the risk of seeing your company name “damaged” by this new threat! Read More

Learn how to analyze the vulnerability of your IT system

In an increasingly digital market, information security is a growing concern in companies. The data generated daily is the most precious asset of organizations and, due to data protection laws, it is necessary to ensure compliance with legal requirements so that the company is not penalized. It is essential to know how to analyze the vulnerability of an IT system. In today’s article, we leave you important tips so you can analyze the vulnerability of your system!

Read More