icon

Blog Hideez | Novedades, mejores prácticas y consejos sobre gestión de identidades

Definición de phishing: ¿Qué significa phishing? Phishing selectivo frente a Phishing

<b>Phishing Defined: What Does Phished Mean? Spear Phishing vs Phishing</b>

Even if you aren’t very much into cybersecurity and are not particularly tech-savvy, you’ve probably heard about the term phishing. But, do you know how it works and what the most common forms of phishing are? It’s estimated that around 15 billion spam emails are sent out daily. More worryingly, on average, one in every 99 emails is a phishing attack, meaning that the overall attack rate is just over 1%.

Restablecimiento de contraseña para la cuenta de Microsoft. Las mejores formas de proteger su cuenta

Password reset for Microsoft account
Since Microsoft account often contains a lot of sensitive digital information, you'll obviously want to keep it safe. The good news is that you don't have to be an experienced security specialist to set up strong defense against hackers and con artists. This post will teach you how to keep your account secure, as well as how to implement alternative methods in the event you forget your password or suspect a hack, including how to reset password for Microsoft password.

¿Qué es la autenticación LDAP? LDAP frente a SAML

<b>What is LDAP authentication? LDAP vs SAML </b>
Both the Lightweight Directory Access Protocol and the Security Assertion Markup Language (LDAP and SAML) are widely used access and authentication protocols, often used for applications, and in a variety of organizations, yet they are employed for quite distinct use cases. Despite this, organizations should not be forced to pick either LDAP or SAML. Most firms can access a wider range of IT resources when they use a combination of authentication protocols, which ultimately helps them better achieve their business goals.

Directorio activo frente a LDAP. ¿Para qué se utiliza LDAP? | Ocultar

<b>Active Directory vs LDAP. What LDAP is used for? </b>
For managed services providers (MSPs), Active Directory and Lightweight Directory Access Protocol (AD and LDAP) are so common and familiar that they rarely bother to discuss their functions and how to use them most effectively. This is unfortunate as the AD and LDAP are critical to all the work that IT experts do. For this reason, it is imperative that these concepts are thoroughly understood and reflected on to show how they can be applied most effectively within IT organizations. 

¿Qué es el robo de identidad? Consecuencias del robo de identidad y formas de prevenirlo

How to prevent identity theft
Identity theft is any crime in which the attacker gets a hold of another person’s data and uses the victim’s identity to commit fraud. For example, a common type of identity theft is when someone uses another person’s credit card to make unauthorized transactions.

¿Qué es la gestión de contraseñas? ¿Qué administrador de contraseñas es el mejor?

What is password management
Nowadays, there are many challenges the average user has to face in order to make sure their passwords and credentials are safe. With each passing year, the number of cyberattacks increases. Not only that, but attackers constantly develop new ways to exploit unsuspecting users and gain access to their valuable information.

¿Qué es el registro de teclas? Consejos sobre cómo detectar y prevenir el registro de teclas

What is Keylogging

keylogging can refer to keystroke logging. This is the activity of keeping a detailed record of every key pressed on a keyboard. Besides that, it can also describe keylogger tools. These are devices or programs that are used to record these keystrokes.  In their nature, keyloggers can be used for legitimate research purposes. 

¿Qué es FERPA ya quién protege? HIPAA frente a FERPA

What is FERPA? HIPAA versus FERPA

Las instituciones y agencias educativas deben mantener un cierto nivel de privacidad y garantizar una protección confiable de los datos de sus estudiantes. Aquí es donde entra en juego la FERPA. Entonces, ¿qué significa la FERPA para los estudiantes y cómo se compara con la HIPAA? Más importante aún, ¿cómo garantizar el cumplimiento de la FERPA? Siga leyendo y descúbralo.

Seguridad de cuentas y contraseñas.
¿Cómo mantener su cuenta segura?

<b>Account and Password Safety. How to Keep Your Account Secure?</b>
The number of security breaches in 2021 significantly surpassed the one in 2020, and this unfortunate trend is set to continue in 2022. With many cybersecurity experts dubbing 2022 “the year of the breach”, your personal and financial information will be even more vulnerable than before.

¿Cómo enviar un correo electrónico seguro en Outlook? Consejos para la máxima protección

<b>How to Send a Secure Email in Outlook? Tips for Maximum Protection </b>
The Microsoft Outlook email provider is compatible with the standard S/MIME protocol, much like the industry-leading Gmail email service. So, the best and most straightforward way to add additional protection and secure email on Outlook is to enable this feature.

¿Cómo enviar un correo electrónico seguro en Gmail? Consejos para la máxima protección

<b>How to Send a Secure Email in Gmail? Tips for Maximum Protection </b>
Whether you use Gmail email services for business, communication, entertainment, or any other purpose, you should know how to secure emails and know what you need to do to make sure all of your information is always protected. In this article, we’ll provide you with valuable tips and tricks for maximum protection and share helpful pointers on how to send a secure email in Gmail.

Autorización de punto de venta: ¿Cómo evitar problemas de seguridad de POS?

<b>Point of Sale Authorization: How to Avoid POS Security Issues?</b>
Nowadays, every reputable retailer, no matter their size, should use a POS system. Point of sale authorization makes every business more streamlined, is cost-effective, and brings a ton of additional benefits. That said, POS authorization also brings up potential security issues.