Cyber-security are solutions to avoid cyber-crime. This solutions, combat multi-disciplinary affairs that spans hardware and software through to policy and people.


  • BOTNETS: Collection of software robots that infest the computer and are controlled remotely

  • DISTRIBUTED DENIAL-OF-SERVICES (DDOS) ATTACK : Malicious user sabotage a specific website or server. It happen when the malicious user “tells” to the computer to contact a specific website or server.

  • HACKING: It is the unauthorized access to the computer.

  • MALWARE It is a way to infiltrate or damage the computer through viruses, worms, Trojan horses, spyware or adware.

  • PHARMING: It is an online fraud that redirect the legitimate URL to a malicious website.

  • PHISHING : Phishing is a type of cyber-crime that is proceeded through fake emails, text messages, websites created to look like they are authentic companies.

  • RAMSOMWARE : It is a type of malware that restricts access to the computer or the files. To have access again, the cybercriminals display a message that request a payment. This kind of threats appears on emails that has malicious content and also website pop-up advertisement

  • SPAM : Spam, is one of the ways that distributed unsolicited messages, advertising to other addresses.

  • SPOOFING : This is an attack that steal personnel information, sending an email or redirect to a website that appears to be legitimate. Sometimes, the email includes legitimate information, so it is difficult to discern what it real or fake.

  • SPYWARE : Spyware, is a cyber-attack that infiltrates on the computer. Through a software, it collects personal information without knowing it. This threat appears in a form of free download and is installed automatically with or without a consent of the user.

  • TROJAN HORSE : Trojan horse is a malicious program that is attached to a legitimate software. This program, is an executable file that installed itself and run automatically after the download of the software.

  • VIRUSES : Malicious computer program that are often sent as an email attachment or a download with the intent of infect the computer. It seems to be easy to have it on the computer, because it is automatically installed on the computer.

  • WI-FI EAVESDROPPING : Wi-Fi Eavesdropping is a virtual “listening in” on information that is shared over an unsecure Wi-Fi network. Also, this threat can still personal information.

  • WORMS : Worms, is a cyber threat that lives on computer memory. This threat is propagates itself through computer network.

  • WPA2 HANDSHAKE VULNERABILITIES : It is a krack that affect personal an enterprise network. Such a computer or mobile dispositive is connected to a network or simply a USB key, it can be read by an attacker. Joining the vulnerability of the computer or mobile dispositive, it can steal information or insert malware or ransomware.



Computer 100% secure

It is impossible to keep the computer on a lead box, with no communication to the external world. So to keep it secure, clean frequently the computer, like cookies or temporary files. Also, it is important to install an antivirus like Kaspersky Antivirus.

Inform your employees

Employees informed reduce the incidents in 90% and the volume of cyber risk between 50 to 60%. Some threats affect companies, so it is crucial to inform employees about it and how to prevent. To prevent that, employees should have skills training platform, also the company should have a safety culture, like advising the employees to change passwords or clean the computer frequently.


Check our partner solutions @KASPERSKY LAB www.kaspersky.com