Connect

Join us Contact

Blog

International Personal Data Protection Day

International Personal Data Protection Day

From this concept clearly emerges the right to privacy in general that we all have as individuals, and in particular the privacy of data relating to our persons. In the times in which we live, pretending to assert this statement...

New year, new uncertainties.

New year, new uncertainties.

Cyberattacks will not only increase, but they will become more sophisticated by making use of emerging technologies.in this report our Regional Consulting Manager, Eng. Hugo Köncke, seeks to anticipate the cybercriminals and alert us about the threats....

Cybersecurity as a profession

Cybersecurity as a profession

From its origins in the 1980s, cybersecurity itself was not a profession. Computer security specialists came from other disciplines, mainly engineering and technology, as well as mathematics, psychology and management. However, today...

Rethink the commercial strategy with 3 tools

Rethink the commercial strategy with 3 tools

Being close to a new year, the question always arises: how to make a difference in the commercialization of technology products and services? Here are three aspects, which in general in Uruguayan technology companies, there are opportunities to improve....

World Cybersecurity Day

World Cybersecurity Day

Today marks a new date for World Cybersecurity Day. Beyond being just another day, we can allow ourselves to reflect a little on the subject. Cybersecurity is usually a rather abstract concept for most of us, and as a result, it is often...

Discount Days in Uruguay 2018

Discount Days in Uruguay 2018

Uruguay, November 2018. Between November 12 and 14, Cyber Monday took place in Uruguay, and due to its success, many companies will be joining the Cyber Monday that takes place worldwide. In this way, Uruguayans will have a new opportunity to...

The Impact of Cybersecurity from a Corporate Perspective

The Impact of Cybersecurity from a Corporate Perspective

Lately, we've become accustomed to seeing reports in the lay press about cybersecurity attacks and incidents: financial fraud, e-commerce sites going down, personal or confidential data being stolen or leaked, and...

Migrate expands its operations to Paraguay

Migrate expands its operations to Paraguay

We are present in the Brazilian and Uruguayan market with more than 500 partner companies, software developers, reaching more than 20,000 final issuers. With the InvoiCy Platform we are expanding our operations, starting to serve Paraguay, Uruguay and...

What is a Digital Twin? Advantages of applying it to any business

What is a Digital Twin? Advantages of applying it to any business

Digital Twin is the ultimate representation of the next technological leap: the union of the physical world with intelligent virtual models, which are even considered pioneers in what we know as the Fourth Industrial Revolution. Born from the concept of...

How to invest in Cybersecurity and save at the same time?

How to invest in Cybersecurity and save at the same time?

There are several alternatives in how to comply with cybersecurity requirements, as not all organizations have the obligation, need or ability to consider the responsibilities and operations related to cybersecurity, as well as the...

How to be sure the person is who they say they are

How to be sure the person is who they say they are

The increase in cyber attacks coupled with people's insecure behaviors, such as the use of weak and equal passwords in several services such as Facebook, Twitter, LinkedIn, Google and Apple, for example, make it necessary to use authentication methods...

5 important steps to organize business processes

5 important steps to organize business processes

For that, it is possible to invest in several tools, such as: the construction of flow charts, internal communication (IC) and business management systems. With these and other changes it will be possible to see a big difference in the performance indicators ....

Conditions for the use of Cuti's Blog
  1. Its use may not be contrary to the rules of the Oriental Republic of Uruguay, which means that, among others, publications of discriminatory, violent, pornographic content, or that damage the property, image or honor of persons may not be made.
  2. Any User may report the existence of inappropriate content. Cuti may remove -at its sole discretion- these contents.
  3. Cuti may provide copies of the contents, even those containing personal data, to any police, judicial or administrative authority upon request.
  4. Third-party content must have sufficient rights for publication.
  5. Users of the Blog exonerate Cuti from any civil, commercial, labor, tax, criminal, administrative or any other liability resulting from their actions related to the contents of this Blog.