Connect

Join us Contact

Partner Blog

German banks drop SMS as second authentication factor

German banks drop SMS as second authentication factor

Through the online banking service, banks seek to alleviate the workload that represents the attention to the public in their branches, aiming to reduce the number of customers who are served physically in their facilities. Since the existence of...

BEC, a major fraud

BEC, a major fraud

For quite some time now, there has been a form of scam called "BEC", which stands for "Business Email Compromise" or Business Email Compromise. It has been responsible for a huge number of frauds committed all over the...

Successful week of discounts for Fenicio stores

Successful week of discounts for Fenicio stores

However, several companies opted to extend their discounts in their online stores during the whole week, as well as to carry out promotions in parallel to the official event. For Fenicio's customers, the results of this action were positive, compared to those of...

Uruguay present at Collision Tech Conference 2019

Uruguay present at Collision Tech Conference 2019

With an estimated attendance of more than 25,000 people, Collision was for a week the meeting point for startups, companies and delegations from around the world. Cuti together with Smart Services (Uruguay XXI) and eight Uruguayan companies (Bunker db, Código del Sur, Convexa,...

Internet of Things: How to protect your home from cyber-attacks?

Internet of Things: How to protect your home from cyber-attacks?

Written by Sebastián Stranieri, CEO of VU The devices connected to the network are as safe as the precautions we take with them and this will depend on the necessary measures we take to protect ourselves from possible cyber attacks. As a result of the process...

Cybersecurity: 5 trends that will lead the way in 2019

Cybersecurity: 5 trends that will lead the way in 2019

At the beginning of the year, we wonder what will be the innovations of 2019 that will change the lives of citizens. Just like companies, criminals also innovate and use advances in technology to their advantage. Here are the trends to which we...

How can I improve my data privacy?

How can I improve my data privacy?

It is well known that laws and regulations have never been an impediment to those who are willing to ignore them, so we should be cautious and not abuse our luck. In this sense, it is appropriate to take measures to improve our position...

International Personal Data Protection Day

International Personal Data Protection Day

From this concept clearly emerges the right to privacy in general that we all have as individuals, and in particular the privacy of data relating to our persons. In the times in which we live, pretending to assert this statement...

New year, new uncertainties.

New year, new uncertainties.

Cyberattacks will not only increase, but they will become more sophisticated by making use of emerging technologies.in this report our Regional Consulting Manager, Eng. Hugo Köncke, seeks to anticipate the cybercriminals and alert us about the threats....

Cybersecurity as a profession

Cybersecurity as a profession

From its origins in the 1980s, cybersecurity itself was not a profession. Computer security specialists came from other disciplines, mainly engineering and technology, as well as mathematics, psychology and management. However, today...