Download PDFOpen PDF in browserAnalysis of the Technical and Corporate Strategies Implemented to Combat Punishable Conducts That Have Affected the Cybersecurity of Personal Data in Financial and Telecommunications Organizations in Colombia During 2020EasyChair Preprint 134339 pages•Date: May 24, 2024AbstractInformation security seeks to reduce, minimize and mitigate risks to an acceptable level of operation. This consists of avoiding latent threats or computer breaches that allow the commission of criminal conduct, and takes into account the complex surveillance necessary to provide users with an optimal level pf security with the aim of avoiding in its minimum cybercrime events and alien incursions that are every day risks in internet networks. In this era we cannot downplay that information is the most valuable asset for organizations and individuals, considered the oil of the future; information data is found in various forms: physical, digital, analog, verbal, written and transcribed: therefore, all kinds of thoughts or ideas have great value. Considering the value of the resources, the necessary security measures must be implemented to safeguard data and keep it secure in form and application.Information security seeks to reduce, minimize and mitigate risks to an acceptable level of operation. This consists of avoiding latent threats or computer breaches that allow the commission of criminal conduct, and takes into account the complex surveillance necessary to provide users with an optimal level pf security with the aim of avoiding in its minimum cybercrime events and alien incursions that are every day risks in internet networks. In this era we cannot downplay that information is the most valuable asset for organizations and individuals, considered the oil of the future; information data is found in various forms: physical, digital, analog, verbal, written and transcribed: therefore, all kinds of thoughts or ideas have great value. Considering the value of the resources, the necessary security measures must be implemented to safeguard data and keep it secure in form and application. Keyphrases: Cybercrime, Cybersecurity, Technology, information, information technologies
|