ODS – Cybersecurity ODS – Cybersecurity
  • SERVICES
    • PENETRATION TESTING
    • TRAINING
    • COMPUTER FORENSICS
  • Contact
  • PRODUCTS
    • SECUREACCESS.COM©
  • BLOG
  • WHO WE ARE
    • CORPORATE RESPONSIBILITY
    • SPONSORSHIPS
    • CAREERS
ODS – Cybersecurity ODS – Cybersecurity
  • SERVICES
    • PENETRATION TESTING
    • TRAINING
    • COMPUTER FORENSICS
  • Contact
  • PRODUCTS
    • SECUREACCESS.COM©
  • BLOG
  • WHO WE ARE
    • CORPORATE RESPONSIBILITY
    • SPONSORSHIPS
    • CAREERS

The keys to get the ISO 27001 certification

Information is the main asset of any company. As organisations we are aware of the large amount of sensitive data that is handled within organisation´s systems and, therefore, must remain... read more →
  • November 14, 2019
  • Marketing
  • Cyber security advice, Cyber security for business, News

Managed Security Service – MSSP

In today's post, we will be talking about a concept that is being highly discussed recently, which is the Managed Security Service Provider (MSSP). To explain the meaning of Managed... read more →
  • October 23, 2019
  • Marketing
  • Cyber security advice, Cyber security for business, News
Ataques DDoS

DDoS Attacks – An In-Depth Guide

The modern world is unfortunately rife with online crime, with various different cyber-attacks having taken their toll on individuals and businesses across the globe in recent years. This certainly doesn’t... read more →
  • September 12, 2019
  • Marketing
  • Cyber security advice, Cyber security for business, News
Acceso Remoto Seguro

Tips for ensuring secure remote access to a corporate network

If you own a company or you are in charge of its management, you may have surely heard about remote working or teleworking. However, many companies are reluctant to grant... read more →
  • June 18, 2019
  • Marketing
  • Cyber security advice, Cyber security for business, News
Phishing en redes sociales: no te fíes de tus amigos. Open Data Security

Phishing in social networks: do not trust your friends

Phishing is an attack technique in which a cybercriminal creates a fraudulent copy of a page in a social network or of an email and contacts the user to ask... read more →
  • August 29, 2018
  • AranaM
  • Cyber security advice
  • 1
  • 2
  • 3
  • ...
  • 14

Next Page »

Safe Password Generator
Cybersecurity Guide for Dummies

Recent posts:

  • The keys to get the ISO 27001 certification
  • Managed Security Service – MSSP
  • DDoS Attacks – An In-Depth Guide
  • Cyber security in critical infrastructures
  • How to work on hotel cyber security
TIME TO PROTECT YOUR BUSINESS!

Contact US!

ES: 900 838 167
UK: +44 203 034 0056
US: +1 347 669 9174

FOLLOW US

      Youtube

We promote cyber security

MENU

HOME SERVICES PENETRATION TESTING TRAINING COMPUTER FORENSICS SOCIAL RESPONSIBILITY SPONSORING CAREERS
© 2021 Open Data Security | Legal Warning -   Privacy Policy and Cookies Policy
We use our own and third-party cookies to improve our services, and analyze the traffic on our page. If you accept or continue browsing our website, we understand that you have accepted the installation of cookies. More information in our Cookies Policy.