Etek

Why invest in cybersecurity?

In the current scenario, any company should be present in the digital world, either to simplify processes or to attract more and new customers. However, online business presence brings risks because it increases the attack surface and exposes businesses to cyber-attacks. A recent Kaspersky report shows that 50% of small and medium-sized Colombian companies find […]

Log4Shell: Critical Vulnerability in Apache.

On December 9, a critical remote code execution (RCE) vulnerability was recently reported in the Apache Log4j 2 logging package versions 2.14.1 and below. Apache Log4j is the most popular Java logging library with over 400,000 downloads on its GitHub project. It is used by many companies worldwide, enabling logging in a broad set of […]

How to manage digital identity? ETEK has the answer

ETEK’s Digital Identity Management provides the tools and technologies to control user access to critical information within an organization.  A comprehensive cloud-based service ensures that every association and interaction of identities with applications is protected, monitored and secured.  Bogota, Colombia – October 7, 2021 – ETEK International Corporation presented the evolution of Digital Identity Management through a comprehensive service that unifies in […]

Security in OT (Operational Technologies)

La velocidad con la que avanza la tecnología va en paralelo a la aparición de nuevas vulnerabilidades y amenazas que pueden comprometer significativamente a la infraestructura de las compañías. Los sistemas industriales y de operación no son ajenos a estas amenazas, por lo que es necesario implementar programas de seguridad que busquen mitigar los riesgos […]

Next generation endpoint protection EDR (Endpoint Detection and Response)

Not only have cyberthreats increased in numbers, but also in complexity. Hacking campaigns that a few years ago were intended to exploit certain fairly well known code have become structured and chameleon-like processes, capable of studying a network and its vulnerabilities before exploiting them. Therefore, solutions based on the behavior analysis of malicious codes already […]

MDR Service Definitions

What is MDR? The purpose of MDR services is to quickly identify and reduce the impact of security incidents on customers. These services focus on 24/7 monitoring, detection and targeted threat response activities. In ETEK we use a combination of host and network layer technologies as well as advanced analysis, threat intelligence, forensic data and […]

Cryptomining and the impact on business environments in Latin America

Cryptomining via malware has become the preferred strategy of cybercriminals to quickly and effectively monetize their efforts. With the increase in prices and types of crypto currencies, as well as the difficulty of detecting these programs, ideal conditions have been created for their appearance in markets such as Latin America. Over the past few years, […]

COVID 19 – SURVIVAL OF THE AGILIST

“It is not the strongest who will survive, but those who can best manage change” this quote resonated well with me when the COVID-19 crisis hit us. We were clear that to survive, we need to adapt, innovate and think out of the box. In the last 4 weeks, we executed on multiple fronts and are sharing some […]

RANSOMWARE Attacks Can be Managed

What is Ransomware? Ransomware is a malicious software program (Malware) that seeks to infect machines, blocking access to read files, boot zones, devices as such, and in general any type of critical feature to claim or ask for a reward to release said features already mentioned. What is the cause of Ransomware Attacks?  Navigation: Browsing […]

Recommendations for Secure Zoom Sessions

Many organizations and professionals are having increased security concerns while using Zoom as a Conferencing platform. However, it is difficult to switch platforms because of investments, user experience, and past practices. ETEK Security Advisory experts are providing the following 7 Key Technical and Zoom Tool Management Recommendations to use Zoom securely:   Updates: All platforms […]

Apply Now