ODS – Cybersecurity ODS – Cybersecurity
  • SERVICES
    • PENETRATION TESTING
    • TRAINING
    • COMPUTER FORENSICS
  • Contact
  • PRODUCTS
    • SECUREACCESS.COM©
  • BLOG
  • WHO WE ARE
    • CORPORATE RESPONSIBILITY
    • SPONSORSHIPS
    • CAREERS
ODS – Cybersecurity ODS – Cybersecurity
  • SERVICES
    • PENETRATION TESTING
    • TRAINING
    • COMPUTER FORENSICS
  • Contact
  • PRODUCTS
    • SECUREACCESS.COM©
  • BLOG
  • WHO WE ARE
    • CORPORATE RESPONSIBILITY
    • SPONSORSHIPS
    • CAREERS

About Marketing

Metacleaner for JIRA Cloud

We are delighted to announce that last Friday, March 22 Atlassian published our Metacleaner product on its marketplace, as an add-on to JIRA Cloud.   There’s a free trial version available for one month for all those interested in testing the tool in... read more →
  • March 25, 2019
  • Marketing
  • Uncategorized

Cybersecurity in the Hotel Industry: Lessons from Marriott Data Breach

Last November, it was revealed that the private information of around 500 million guests at the Marriott International had been leaked. The exposed data include names, addresses, phone numbers, passport numbers, and... read more →
  • February 20, 2019
  • Marketing
  • Cyber security for business, News
Cómo usar el correo electrónico de forma segura - Open Data Security

A Guide On How To Use E-mail Safely

When the Internet wasn’t known as Internet, but ARPANET in the 70’s, the email was already becoming popular. However, if there is something we have known for a while, it... read more →
  • September 27, 2018
  • Marketing
  • Cyber security for business
Cómo debería ser la ciberseguridad en el cloud computing

Cyber Security In Cloud Computing: This Is How It Should Be

There is a technology that has made life easier for users and businesses. It is known as cloud computing. Nowadays it is impossible to understand the digital transformation of businesses... read more →
  • September 21, 2018
  • Marketing
  • Cyber security for business
Qué es el cryptojacking y cómo se lleva a cabo

What is cryptojacking and how does it work?

Mining cryptocurrencies through the equipment of users without their consent is known as cryptojacking. This concept comes from the words “crypto” (cryptography) and “hijacking”. In computer science, these concepts aren’t... read more →
  • July 9, 2018
  • Marketing
  • Cyber security advice
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 10

« Previous Page — Next Page »

Safe Password Generator
Cybersecurity Guide for Dummies

Recent posts:

  • The keys to get the ISO 27001 certification
  • Managed Security Service – MSSP
  • DDoS Attacks – An In-Depth Guide
  • Cyber security in critical infrastructures
  • How to work on hotel cyber security
TIME TO PROTECT YOUR BUSINESS!

Contact US!

ES: 900 838 167
UK: +44 203 034 0056
US: +1 347 669 9174

FOLLOW US

      Youtube

We promote cyber security

MENU

HOME SERVICES PENETRATION TESTING TRAINING COMPUTER FORENSICS SOCIAL RESPONSIBILITY SPONSORING CAREERS
© 2021 Open Data Security | Legal Warning -   Privacy Policy and Cookies Policy
We use our own and third-party cookies to improve our services, and analyze the traffic on our page. If you accept or continue browsing our website, we understand that you have accepted the installation of cookies. More information in our Cookies Policy.