Connect

Join us Contact

Blog

Internet of Things: How to protect your home from cyber-attacks?

Internet of Things: How to protect your home from cyber-attacks?

Written by Sebastián Stranieri, CEO of VU The devices connected to the network are as safe as the precautions we take with them and this will depend on the necessary measures we take to protect ourselves from possible cyber attacks. As a result of the process...

Cybersecurity: 5 trends that will lead the way in 2019

Cybersecurity: 5 trends that will lead the way in 2019

At the beginning of the year, we wonder what will be the innovations of 2019 that will change the lives of citizens. Just like companies, criminals also innovate and use advances in technology to their advantage. Here are the trends to which we...

How can I improve my data privacy?

How can I improve my data privacy?

It is well known that laws and regulations have never been an impediment to those who are willing to ignore them, so we should be cautious and not abuse our luck. In this sense, it is appropriate to take measures to improve our position...

International Personal Data Protection Day

International Personal Data Protection Day

From this concept clearly emerges the right to privacy in general that we all have as individuals, and in particular the privacy of data relating to our persons. In the times in which we live, pretending to assert this statement...

New year, new uncertainties.

New year, new uncertainties.

Cyberattacks will not only increase, but they will become more sophisticated by making use of emerging technologies.in this report our Regional Consulting Manager, Eng. Hugo Köncke, seeks to anticipate the cybercriminals and alert us about the threats....

Cybersecurity as a profession

Cybersecurity as a profession

From its origins in the 1980s, cybersecurity itself was not a profession. Computer security specialists came from other disciplines, mainly engineering and technology, as well as mathematics, psychology and management. However, today...

Rethink the commercial strategy with 3 tools

Rethink the commercial strategy with 3 tools

Being close to a new year, the question always arises: how to make a difference in the commercialization of technology products and services? Here are three aspects, which in general in Uruguayan technology companies, there are opportunities to improve....

World Cybersecurity Day

World Cybersecurity Day

Today marks a new date for World Cybersecurity Day. Beyond being just another day, we can allow ourselves to reflect a little on the subject. Cybersecurity is usually a rather abstract concept for most of us, and as a result, it is often...

Discount Days in Uruguay 2018

Discount Days in Uruguay 2018

Uruguay, November 2018. Between November 12 and 14, Cyber Monday took place in Uruguay, and due to its success, many companies will be joining the Cyber Monday that takes place worldwide. In this way, Uruguayans will have a new opportunity to...

The Impact of Cybersecurity from a Corporate Perspective

The Impact of Cybersecurity from a Corporate Perspective

Lately, we've become accustomed to seeing reports in the lay press about cybersecurity attacks and incidents: financial fraud, e-commerce sites going down, personal or confidential data being stolen or leaked, and...

Conditions for the use of Cuti's Blog
  1. Its use may not be contrary to the rules of the Oriental Republic of Uruguay, which means that, among others, publications of discriminatory, violent, pornographic content, or that damage the property, image or honor of persons may not be made.
  2. Any User may report the existence of inappropriate content. Cuti may remove -at its sole discretion- these contents.
  3. Cuti may provide copies of the contents, even those containing personal data, to any police, judicial or administrative authority upon request.
  4. Third-party content must have sufficient rights for publication.
  5. Users of the Blog exonerate Cuti from any civil, commercial, labor, tax, criminal, administrative or any other liability resulting from their actions related to the contents of this Blog.