{"id":2924,"date":"2025-04-10T13:51:38","date_gmt":"2025-04-10T11:51:38","guid":{"rendered":"https:\/\/trustlab.upct.es\/2025\/04\/10\/errores-mas-comunes-de-ciberseguridad-en-las-empresas\/"},"modified":"2025-09-19T10:43:11","modified_gmt":"2025-09-19T08:43:11","slug":"most-common-cybersecurity-mistakes-in-companies","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2025\/04\/10\/most-common-cybersecurity-mistakes-in-companies\/","title":{"rendered":"Most common cybersecurity mistakes in companies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2924\" class=\"elementor elementor-2924 elementor-2086\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6270fe e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"e6270fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17e7e91 elementor-widget elementor-widget-text-editor\" data-id=\"17e7e91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><b>Why do we keep making the same mistakes?\u00a0<\/b><\/h2><p>Cybersecurity has been a priority for years. Even so, every week there is new news about companies being hacked, data being leaked, or systems being paralyzed by ransomware. What is going wrong?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34de4b9 elementor-widget elementor-widget-heading\" data-id=\"34de4b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The 5 most common cybersecurity mistakes and how to avoid them<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee4658a elementor-widget elementor-widget-text-editor\" data-id=\"ee4658a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At TRUST Lab, we see it every day: many organizations invest in technology, but they continue to make basic mistakes. Not because of a lack of resources, but because of a lack of awareness, strategy, or simply time.<\/p><p>This article is not meant to point fingers, but to <strong>shed light<\/strong>. Because if we know exactly <strong>where<\/strong> we are going wrong, we can <strong>correct course intelligently and quickly<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4bbc6a4 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"4bbc6a4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ff02786 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"ff02786\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6056eb7 elementor-widget elementor-widget-heading\" data-id=\"6056eb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Underestimating the importance of internal training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62be303 elementor-widget elementor-widget-text-editor\" data-id=\"62be303\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyberattacks don&#8217;t always start with a sophisticated hacker. Often, they start with a <strong>misplaced click.<\/strong><\/p><p>One of the most common (and dangerous) mistakes is <strong>not training the team properly<\/strong>. It&#8217;s not just about teaching them how to create secure passwords, but something deeper: <strong>cultivating a digital security mindset.<\/strong><\/p><p>Cybercriminals don&#8217;t come in through the door that&#8217;s hardest to open; they come in through the one that&#8217;s left ajar.<\/p><p>If someone doesn&#8217;t know how to identify a phishing email, or doesn&#8217;t understand why they shouldn&#8217;t use a personal USB drive, <strong>technology won&#8217;t be able to protect you<\/strong>.<\/p><p>Investing in firewalls and antivirus software is important, but if your team doesn&#8217;t know how to behave, you&#8217;re <strong>building a castle on sand<\/strong>.<\/p><h4><b>Best practices:<\/b><\/h4><ul><li>Ongoing training programs, not isolated sessions.<\/li><li>Attack simulations (phishing, for example) and response analysis.<\/li><li>Simple and up-to-date internal manuals.<\/li><li>Area managers who ensure good practices.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ddeb12d e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"ddeb12d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0673725 elementor-widget elementor-widget-heading\" data-id=\"0673725\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Using weak or poorly managed passwords<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aad9ea4 elementor-widget elementor-widget-text-editor\" data-id=\"aad9ea4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It seems unbelievable, but in 2025 there are still companies using passwords such as \u201c<strong>admin123<\/strong>\u201d or \u201c<strong>Company2024<\/strong>.\u201d<\/p><p>And yes, we know that remembering a thousand passwords is inconvenient&#8230; but that doesn&#8217;t justify <strong>putting the entire organization at risk<\/strong>.<\/p><p>Another common mistake: <strong>using the same password for different services<\/strong>, or sharing credentials by email or WhatsApp.<\/p><p>Security starts with the basics, and passwords are the front door.<\/p><h4><b>Solutions that work:<\/b><\/h4><ul><li>Mandatory use of <strong>corporate password managers<\/strong>.<\/li><li>Periodic rotation policies (at least every 90 days).<\/li><li>Enabling <strong>two-factor authentication (2FA)<\/strong> on all accesses.<\/li><li>Monitoring suspicious accesses.<\/li><\/ul><p>\u00a0<\/p><p>Remember: a single leaked password can open the<strong> door to disaster<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01badb1 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"01badb1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-824278f e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"824278f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-92fcf00 elementor-widget elementor-widget-heading\" data-id=\"92fcf00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Not keeping software up to date<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e0f4a8 elementor-widget elementor-widget-text-editor\" data-id=\"1e0f4a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Outdated software is a <strong>legal loophole for attackers<\/strong>. Every day, new vulnerabilities are discovered in common programs, from operating systems to WordPress plugins.<\/p><p>If you don&#8217;t apply patches in time, you <strong>leave cracks that are already public exposed<\/strong>.<\/p><p>Did you know that WannaCry infected thousands of companies because they hadn&#8217;t updated a Windows patch that was released two months earlier?<\/p><h3><strong>Key actions:<\/strong><\/h3><ul><li>Automate updates whenever possible.<\/li><li>Establish weekly review routines for critical systems.<\/li><li>Monitor manufacturers&#8217; security bulletins.<\/li><li>Have inventory and patch management tools in place.<\/li><\/ul><p>\u00a0<\/p><p>Not updating is like having an alarm&#8230; without batteries. It may seem like you&#8217;re protected, but in reality, <strong>it&#8217;s already too late.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef5890d e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"ef5890d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0911946 elementor-widget elementor-widget-heading\" data-id=\"0911946\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Not having an incident response plan<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2da654d elementor-widget elementor-widget-text-editor\" data-id=\"2da654d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Imagine that tomorrow you detect unauthorized access to your servers. What do you do? Who do you call? What information do you need to preserve?<\/p><p>If you don&#8217;t have a clear plan, you&#8217;ll not only waste time, you&#8217;ll lose data, reputation, and a lot of money.<\/p><p>The important thing is not only to prevent the incident, but to know <strong>how to act when it inevitably occurs<\/strong>.<\/p><h4><b>Keys to a good response plan:<\/b><\/h4><ul><li>Designate an incident management team (even if it is external).<\/li><li>Simulate crises at least twice a year.<\/li><li>Establish internal and external communication protocols.<\/li><li>Document everything that happened for future learning.<\/li><\/ul><p>\u00a0<\/p><p>Having a plan does not eliminate risks, but it multiplies your <strong>ability to react and minimizes damage<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-faa5a73 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"faa5a73\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cac80a3 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"cac80a3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d54e0ae elementor-widget elementor-widget-heading\" data-id=\"d54e0ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Giving too much access without control<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3239bf8 elementor-widget elementor-widget-text-editor\" data-id=\"3239bf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Often, for convenience or ignorance, unnecessary access is granted to employees, suppliers, or temporary collaborators.<\/p><p>The principle of least privilege states that<strong> each person should have only the access necessary to do their job, nothing more.<\/strong><\/p><p>The more unnecessary access you grant, the more doors you leave open to a possible internal or external attack.<\/p><h4><b>Solutions you should implement:<\/b><\/h4><ul><li>Regular access audits.<\/li><li>Elimination of inactive or orphaned accounts.<\/li><li>Identity management with centralized control (IAM).<\/li><li>Automatic reviews when changing roles or leaving the company.<\/li><\/ul><p>\u00a0<\/p><p>Access control is like keys in a building: if anyone can enter any room&#8230; <strong>you are losing control.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44b1aae e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"44b1aae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc9309c elementor-widget elementor-widget-heading\" data-id=\"bc9309c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Other mistakes you should also avoid <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d139e9f elementor-widget elementor-widget-text-editor\" data-id=\"d139e9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to the big five, there are other common mistakes that you should keep an eye out for:<\/p><ul><li><strong>Not performing secure and frequent backups<\/strong>.<\/li><li><strong>Not encrypting sensitive information<\/strong>, either in transit or at rest.<\/li><li><strong>Using Wi-Fi without adequate security<\/strong>, especially in small or mobile locations.<\/li><li><strong>Not performing penetration tests or external audits<\/strong>.<\/li><li><strong>Not having a clear BYOD<\/strong> (Bring Your Own Device) policy.<\/li><\/ul><p>\u00a0<\/p><p>Each of these mistakes may seem minor, but together, they can be the <strong>Achilles heel of your corporate cybersecurity<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-315a852 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"315a852\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69bb485 elementor-widget elementor-widget-image\" data-id=\"69bb485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"766\" height=\"257\" src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2024\/12\/cabecera_ctf.jpg\" class=\"attachment-large size-large wp-image-2864\" alt=\"\" srcset=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2024\/12\/cabecera_ctf.jpg 766w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2024\/12\/cabecera_ctf-300x101.jpg 300w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f95aba2 elementor-widget elementor-widget-heading\" data-id=\"f95aba2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are you interested in cybersecurity? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bf2ef2 elementor-widget elementor-widget-text-editor\" data-id=\"0bf2ef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At TRUST lab we share exclusive content, updates and practical tips on digital privacy, data protection and cybersecurity. \ud83d\udee1\ufe0f<br \/><strong>Subscribe to our newsletter and stay one step ahead.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac562c elementor-widget elementor-widget-shortcode\" data-id=\"bac562c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2888-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2888\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/2924#wpcf7-f2888-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2888\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2888-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n <label> Your name\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n\n<label>Your email\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n\n<button style=\"background-color: #1625ee; color: white;\">Send<\/button> <p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"56\"\/><script>\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n<\/script>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0c2a23 elementor-widget elementor-widget-heading\" data-id=\"d0c2a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security starts with the basics <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-797848b elementor-widget elementor-widget-text-editor\" data-id=\"797848b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are no magic formulas. But there is a golden rule: <strong>do the basics well, and you&#8217;ll be ahead of 90% of companies<\/strong>. The mistakes we&#8217;ve seen are not new. But they continue to happen because we often don&#8217;t know where to start, or we don&#8217;t have the right support. At TRUST Lab, we are here to light the way, share our experience, and help you build a more secure, practical, and human digital environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90da830 elementor-widget elementor-widget-heading\" data-id=\"90da830\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44ecdfc rael-faq-box-layout-yes align-at-left elementor-widget elementor-widget-rael-faq\" data-id=\"44ecdfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"rael-faq.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id='rael-faq-wrapper-722' class=\"rael-faq-wrapper\">\n\t\t\t<div class=\"rael-faq-container rael-faq-layout-accordion\" data-layout=\"accordion\">\n\t\t\t\t\t\t\t\t\t\t<div id=\"rael-accordion-6c6bfa5\" class=\"rael-faq-accordion rael-active\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"rael-accordion-title\" aria-expanded=\"true\" role=\"tab\">\n\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon rael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<span class=\"rael-question-6c6bfa5 rael-question-span\" tabindex=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat types of companies are most vulnerable to cybersecurity mistakes? \t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"rael-accordion-content\" role=\"tabpanel\" style=\"display:block;\">\n\t\t\t\t\t\t\t\t<span>\n\n\t\t\t\t\t\t\t\t\t<span><p>The most vulnerable companies are usually <strong>small and medium-sized enterprises<\/strong> (SMEs). Not because they have less complex systems, but because in many cases:<\/p><ul><li><strong>They don't have staff dedicated to cybersecurity<\/strong>; instead, the IT department (if there is one) is responsible for \u201ceverything.\u201d<\/li><li><strong>They do not have clear internal policies on password management<\/strong>, use of personal devices, or remote access.<\/li><li><strong>They do not provide ongoing training<\/strong>, simulation tests, or awareness campaigns.<\/li><li>And above all, they <strong>do not consider themselves real targets for attack<\/strong>. Many leaders believe that cyberattacks only affect large corporations, when the reality shows the opposite: massive attacks, such as ransomware, are automated and affect large and small companies alike.<\/li><\/ul><p>A study by the <strong>National Cybersecurity Institute (INCIBE)<\/strong> indicates that in Spain, <strong>more than 70% of cyber incidents affect SMEs<\/strong>. This is no coincidence: attackers know that SMEs are more likely to have basic configurations, access without two-factor authentication, or outdated software.<\/p><p>The good news is that, with simple and well-implemented measures, many of these vulnerabilities can be <strong>closed without large budgets<\/strong>, just with organization, awareness, and support.<\/p><\/span>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div id=\"rael-accordion-5924a4e\" class=\"rael-faq-accordion rael-active\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"rael-accordion-title\" aria-expanded=\"true\" role=\"tab\">\n\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon rael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<span class=\"rael-question-5924a4e rael-question-span\" tabindex=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tHow often should a cybersecurity audit be performed in a company? \t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"rael-accordion-content\" role=\"tabpanel\" style=\"display:block;\">\n\t\t\t\t\t\t\t\t<span>\n\n\t\t\t\t\t\t\t\t\t<span><p>The ideal frequency depends on the type and size of the company, but the minimum recommendation is:<\/p><ul><li><strong>One complete audit per year<\/strong>, reviewing everything from technical configurations to access policies, updates, backups, and incident response.<\/li><li>In more sensitive sectors (such as banking, healthcare, education, or technology), it is advisable to conduct <strong>a partial review every quarter.<\/strong><\/li><li>An extraordinary audit should also be conducted whenever there is a <strong>major change<\/strong> in the system: server migrations, incorporation of critical software, expansion of the technical team, or after a security incident.<\/li><\/ul><p>In addition to technical audits, it is important to implement<strong> internal drills, risk assessments, and regulatory compliance reviews<\/strong>, such as the General Data Protection Regulation (GDPR) or the National Security Scheme (ENS), if applicable.<\/p><p>An audit is not just a technical review; it is also a <strong>tool for learning<\/strong>, prioritization, and continuous improvement. Doing it well and regularly is one of the best investments in prevention.<\/p><\/span>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f663e50 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"f663e50\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Why do we keep making the same mistakes?\u00a0 Cybersecurity has been a priority for years. Even so, every week there is new news about companies being hacked, data being leaked, or systems being paralyzed by ransomware. What is going wrong? The 5 most common cybersecurity mistakes and how to avoid them At TRUST Lab, we [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2925,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-2924","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/2924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=2924"}],"version-history":[{"count":10,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/2924\/revisions"}],"predecessor-version":[{"id":3228,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/2924\/revisions\/3228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/2925"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=2924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=2924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=2924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}