{"id":4387,"date":"2019-01-02T17:43:53","date_gmt":"2019-01-02T16:43:53","guid":{"rendered":"http:\/\/webcic-pre.cic.es\/?page_id=4387"},"modified":"2021-11-04T11:57:13","modified_gmt":"2021-11-04T10:57:13","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<h2><strong>CIC will help protect your company against any interruptions in your work as a result of any errors caused by a lapse in information security<\/strong><\/h2>\n<p>We meet <strong>ISO 27001 standards<\/strong> (SI-0095\/2009) which determines the requirements for security information management system. Our <em>information security<\/em> services goal is to <strong>protect and preserve your data<\/strong>, keeping in mind three precepts: <strong>confidentiality, integrity and availability.<\/strong><\/p>\n<h3><strong>What is Information Security (IS)?<\/strong><\/h3>\n<p>The goal of an information security is to protect all the important data a business possesses. From internal data, to information regarding workers and clients. Information security encompasses different techniques and measures to control all the data that an organisation uses, as well as, ensuring that information remains secure within the company. This type of security must cope with <strong>risks, analyse them, prevent them and find quick solutions<\/strong> to eliminate them.<\/p>\n<h3 class=\"wow fadeIn animated animated\"><strong>Your data is your company\u00b4s greatest asset. Is your information safe from a cyber attack?<\/strong><\/h3>\n<div class=\"col-lg-3 col-md-3 col-xs-12 col-sm-3\">\n<p>Your data is very valuable and sensitive to your company. To guarantee and protect your data is key to your productivity. Data security depends on the way that data is processed by businesses.<\/p>\n<p>All companies, governments, financial institutions, hospitals\u2026. all have an enormous amount of confidential information about the business, clients, employees, patients, etc. This information is <strong>collected, processed, stored<\/strong> and used. It is possible that this data could fall into the wrong hands and this can have grave consequences. Your company\u00b4s reputation and credibility could be jeopardised; you could be sued and you could even go bankrupt.<\/p>\n<p>For this reason, you have to find <strong>technological solutions to information security<\/strong> that will <strong>protect your data<\/strong>, a system that will allow you to know your <strong>protection status<\/strong> of your <strong>infrastructure<\/strong> and have the suitable <strong>tools<\/strong> for the <strong>efficient management <\/strong>of a cyber attack.<\/p>\n<\/div>\n<h3><strong>What are the benefits of the ISO 27001 standard for companies<\/strong> <strong>in Data Security Management?<\/strong><\/h3>\n<ul>\n<li>Protect your company\u00b4s information from hackers, malwares, lost and stolen data.<\/li>\n<li>Identify and minimise risks and damage<\/li>\n<li>Set up security checks to manage and eliminate risks<\/li>\n<li>Allows you to continue about your business in the event of a contingency<\/li>\n<li>Confidentiality, guaranteeing that only authorised users can access to the information<\/li>\n<li>Flexibility to adapt controls to all areas of your business or just the ones you want<\/li>\n<li>Generate confidence and trust with your clients<\/li>\n<\/ul>\n<h3><strong>It would be a mistake to think that information security is a waste of money because there\u00b4s no direct economic gain from it.<\/strong><\/h3>\n<p>To protect oneself from a cyber attack will save you an uncalculated amount of money.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIC will help protect your company against any interruptions in your work as a result of any errors caused by a lapse in information security We meet ISO 27001 standards (SI-0095\/2009) which determines the requirements for security information management system. Our information security services goal is to protect and preserve&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4060,"parent":4241,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-servicios.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4387","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security CIC Consulting Inform\u00e1tico<\/title>\n<meta name=\"description\" content=\"Our information security services goal is to protect and preserve your data, keeping in mind three precepts: confidentiality, integrity and availability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security CIC Consulting Inform\u00e1tico\" \/>\n<meta property=\"og:description\" content=\"Our information security services goal is to protect and preserve your data, keeping in mind three precepts: confidentiality, integrity and availability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CIC Consulting Inform\u00e1tico\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CIC.Consulting\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-04T10:57:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/seguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CICactualidad\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/\",\"name\":\"Information Security CIC Consulting Inform\u00e1tico\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/seguridad.jpg\",\"datePublished\":\"2019-01-02T16:43:53+00:00\",\"dateModified\":\"2021-11-04T10:57:13+00:00\",\"description\":\"Our information security services goal is to protect and preserve your data, keeping in mind three precepts: confidentiality, integrity and availability.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/seguridad.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/seguridad.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"CIC\",\"item\":\"https:\\\/\\\/www.cic.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cic.es\\\/en\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cic.es\\\/\",\"name\":\"CIC Consulting Inform\u00e1tico\",\"description\":\"Somos una consultor\u00eda de ingenier\u00eda de desarrollo y proyectos de inform\u00e1tica y comunicaciones\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/#organization\"},\"alternateName\":\"CIC Consulting Inform\u00e1tico\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cic.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/#organization\",\"name\":\"CIC Consulting Inform\u00e1tico\",\"alternateName\":\"CIC Consulting Inform\u00e1tico\",\"url\":\"https:\\\/\\\/www.cic.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cic.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cic_color.png\",\"contentUrl\":\"https:\\\/\\\/www.cic.es\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cic_color.png\",\"width\":300,\"height\":200,\"caption\":\"CIC Consulting Inform\u00e1tico\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cic.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CIC.Consulting\\\/\",\"https:\\\/\\\/x.com\\\/CICactualidad\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2157627\\\/\",\"https:\\\/\\\/www.pinterest.es\\\/cicconsultinginformatico\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/webmastercic\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security CIC Consulting Inform\u00e1tico","description":"Our information security services goal is to protect and preserve your data, keeping in mind three precepts: confidentiality, integrity and availability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security CIC Consulting Inform\u00e1tico","og_description":"Our information security services goal is to protect and preserve your data, keeping in mind three precepts: confidentiality, integrity and availability.","og_url":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/","og_site_name":"CIC Consulting Inform\u00e1tico","article_publisher":"https:\/\/www.facebook.com\/CIC.Consulting\/","article_modified_time":"2021-11-04T10:57:13+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/seguridad.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CICactualidad","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/","url":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/","name":"Information Security CIC Consulting Inform\u00e1tico","isPartOf":{"@id":"https:\/\/www.cic.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/seguridad.jpg","datePublished":"2019-01-02T16:43:53+00:00","dateModified":"2021-11-04T10:57:13+00:00","description":"Our information security services goal is to protect and preserve your data, keeping in mind three precepts: confidentiality, integrity and availability.","breadcrumb":{"@id":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/#primaryimage","url":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/seguridad.jpg","contentUrl":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/08\/seguridad.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/www.cic.es\/en\/cybersecurity\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"CIC","item":"https:\/\/www.cic.es\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.cic.es\/en\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cic.es\/#website","url":"https:\/\/www.cic.es\/","name":"CIC Consulting Inform\u00e1tico","description":"Somos una consultor\u00eda de ingenier\u00eda de desarrollo y proyectos de inform\u00e1tica y comunicaciones","publisher":{"@id":"https:\/\/www.cic.es\/#organization"},"alternateName":"CIC Consulting Inform\u00e1tico","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cic.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cic.es\/#organization","name":"CIC Consulting Inform\u00e1tico","alternateName":"CIC Consulting Inform\u00e1tico","url":"https:\/\/www.cic.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cic.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/04\/cic_color.png","contentUrl":"https:\/\/www.cic.es\/wp-content\/uploads\/2018\/04\/cic_color.png","width":300,"height":200,"caption":"CIC Consulting Inform\u00e1tico"},"image":{"@id":"https:\/\/www.cic.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CIC.Consulting\/","https:\/\/x.com\/CICactualidad","https:\/\/www.linkedin.com\/company\/2157627\/","https:\/\/www.pinterest.es\/cicconsultinginformatico\/","https:\/\/www.youtube.com\/user\/webmastercic"]}]}},"_links":{"self":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/comments?post=4387"}],"version-history":[{"count":1,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4387\/revisions"}],"predecessor-version":[{"id":8403,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4387\/revisions\/8403"}],"up":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/pages\/4241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/media\/4060"}],"wp:attachment":[{"href":"https:\/\/www.cic.es\/en\/wp-json\/wp\/v2\/media?parent=4387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}