Search

Cyber security report 2020

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Check Point Software Technologies </dc:creator>
<dc:date>2020</dc:date>
<dc:description xml:lang="es">Sumario: Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, we offer a review of 2019's major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep your organization safe from cyber attacks. With the popularity of cloud computing and network-connected smartphones, it's no secret that there are more ways to invade an organization. A once hardened network perimeter is now blurred and porous to cyber attacks, and the bad actors are well aware. If there's one clear takeaway from 2019, it's that no organization, big or small, is immune from a devastating cyber attack. Cyber exploits are more sophisticated, illusive, and targeted than ever before. With cybercrime rates estimated to have generated US$1.5 trillion in 2018,1 navigating today's complex cyber threat landscape requires comprehensive cyber security.</dc:description>
<dc:description xml:lang="es">Sumario: Executive summary: navigating the ver-changing contours of cyber security -- Timeline of 2019´s major cyber events -- 2020 vision: Check Point´s cyber security predictions -- 2019 cyber security trends -- Global malware statistics -- High-profile global vulnerabilities -- Review of 2019 cyber threat predictions -- Recommendations to prevent the next cyber attack -- Zero trust networks: best practices -- Appendix: malware family descriptions</dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/171331.do</dc:identifier>
<dc:language>spa</dc:language>
<dc:publisher>Check Point Software Technologies</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Ciberseguridad</dc:subject>
<dc:subject xml:lang="es">Cibernética</dc:subject>
<dc:subject xml:lang="es">Ciberataques</dc:subject>
<dc:subject xml:lang="es">Seguridad empresarial</dc:subject>
<dc:subject xml:lang="es">Protección de la información</dc:subject>
<dc:subject xml:lang="es">Recomendaciones</dc:subject>
<dc:type xml:lang="es">Books</dc:type>
<dc:title xml:lang="es">Cyber security report 2020</dc:title>
<dc:format xml:lang="es">80 p.</dc:format>
<dc:relation xml:lang="es">Check Point Research</dc:relation>
</rdf:Description>
</rdf:RDF>