Skip to content
  • The Office
  • Public grants
    • Grants
    • Infographics
  • Advisory
    • Project Grants
    • US Trariffs
    • Competitiveness
      • Financial Area
      • Business Advisory Services
      • Operations
      • Human Resources
      • Startups
      • Circular and Sustainable Economy
    • Innovation
    • Energy
    • Industry
    • Company questions (FAQs)
    • Business guides and tools
  • Industrial Projects
    • Industrial land
    • Concellos emprendedores
  • What’s New
    • Events
    • News
  • The Office
  • Public grants
    • Grants
    • Infographics
  • Advisory
    • Project Grants
    • US Trariffs
    • Competitiveness
      • Financial Area
      • Business Advisory Services
      • Operations
      • Human Resources
      • Startups
      • Circular and Sustainable Economy
    • Innovation
    • Energy
    • Industry
    • Company questions (FAQs)
    • Business guides and tools
  • Industrial Projects
    • Industrial land
    • Concellos emprendedores
  • What’s New
    • Events
    • News

Archives

What is the difference between social commerce and traditional e-commerce?

The main difference is that social commerce integrates purchasing directly within social networks, eliminating intermediate steps

How can I assess the cybersecurity level of my company?

There are various methodologies: periodic security audits, penetration tests that simulate real attacks to detect vulnerabilities

What role does employee training play in cybersecurity?

The majority of incidents have their origin in human errors: opening a malicious email, downloading an unsecure file

How does cybersecurity affect the protection of innovation?

Innovation is based on ideas, processes and sensitive information that, if stolen, can be exploited by third parties before the company…

What basic measures should an SME implement in terms of cybersecurity?

Among the most important ones stand out: establishing robust and updated password policies, using authentication systems,

What are the main cybersecurity threats for an SME?

The most common ones are phishing (fraudulent emails that seek to steal data), ransomware (programs that lock systems and demand ransoms)

What role does employee training play in your company’s cybersecurity?

Technology helps, but people remain the main vulnerability in a company’s cybersecurity.

How should companies manage shared accounts?

Shared accounts are a frequent problem in the business world. In cybersecurity we always say that the user

What is a phishing attack and how does it affect password management?

Phishing is a technique in which attackers impersonate a trusted entity

Is it safe to store passwords in documents or notes on the computer?

No. Storing them in text files, spreadsheets or unprotected notes is very risky, since anyone who accesses the computer

← Previous
Next →
  • Atención á cidadanía
  • Site Map
  • Legal Notice
  • Accessibility
  • Atención á cidadanía
  • Site Map
  • Legal Notice
  • Accessibility

CC Xunta de Galicia. Información mantida e publicada en Internet pola Xunta de Galicia

Xestiona consentimento

Para ofrecer as mellores experiencias, utilizamos tecnoloxías como cookies para almacenar e/ou acceder á información do dispositivo. Aceptar estas tecnoloxías permitiranos procesar datos como o comportamento de navegación ou os ID únicos neste sitio. Non aceptar ou retirar o consentimento pode afectar negativamente a certas funcións e características.

Funcional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Estatísticas
O almacenamento ou acceso técnico que se utiliza exclusivamente con fins estatísticos. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Márketing
O almacenamento ou acceso técnico é necesario para crear perfís de usuario para enviar publicidade, ou para rastrexar ao usuario nun sitio web ou en varios sitios web con fins de márketing similares.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Ver preferencias
  • {title}
  • {title}
  • {title}
  • English
  • Galego
  • Español
  • The Office
  • Public grants
    • Grants
    • Infographics
  • Advisory
    • Project Grants
    • US Trariffs
    • Competitiveness
      • Financial Area
      • Business Advisory Services
      • Operations
      • Human Resources
      • Startups
      • Circular and Sustainable Economy
    • Innovation
    • Energy
    • Industry
    • Company questions (FAQs)
    • Business guides and tools
  • Industrial Projects
    • Industrial land
    • Concellos emprendedores
  • What’s New
    • Events
    • News
  • English
  • Galego (Galician)
  • Español (Spanish)