Security Measures to Prevent Cyber Attacks
- Elizabeth Cantillo
- May 11, 2023
- 2 min read
Updated: May 11, 2023
Companies are responsible for providing adequate security measures and educating their employees on the importance of following cybersecurity policies.

Cybercriminals use different tactics to obtain payment from individuals and companies. Here are some examples to be careful with:
Ransomware: They can demand a ransom payment in exchange for data recovery. Companies should make payments in a way that makes it difficult for criminals to trace.
Phishing: Gaining access to a company's bank accounts through phishing and conducting fraudulent transactions. Also, they use stolen credit cards or banking information to purchase online.
Billing fraud: They send out fraudulent invoices, hoping you will pay for goods or services that were never provided. Cybercriminals use information obtained from phishing attacks or social engineering to create invoices that appear legitimate.
Changes of accounts to deposit: they use fraudulent emails, which pretend to be genuine, to send documents in the name of real clients, requesting the change in the bank account to deposit. What corresponds is to consult with the administrative procedures before proceeding with any payment.
Wire Transfer Scams: Use social engineering techniques to trick and convince wire transfers to accounts controlled by cybercriminals.
Companies are responsible for providing adequate security measures and educating their employees on the importance of following cybersecurity policies.
Grupo Comeca, like any other company, uses several security measures, which for some people may be uncomfortable in their daily workflow. Still, compliance with them is strictly necessary:
Complex passwords: include the combination of numbers, uppercase and lowercase letters, special characters, and a certain length.
Two-Factor Authentication: requires people to enter an additional security code after entering their password.
Software updates: These take time to download, install, and keep your PC in top condition.
Restrictions on personal devices: Some companies have policies restricting the use of personal devices for work tasks.
Remember! Security measures are essential to protect confidential information and prevent cyber attacks. Be cautious when transacting online and verify the authenticity of all invoices and payment requests before processing them.
Contact: Mario Barboza | mbarboza@grupocomeca.com





Comments