Cybersecurity — Ensuring Safe and Secure Networks for All.
But How?

  • Malware
  • Password Theft
  • Traffic Interception
  • Phishing Attacks
  • DDos
  • Cryptojacking
  • Loss of Data
  • Security Breaches (Hackers)
  • Deployment of intrusion detection systems
  • Restriction of access
  1. Assessing and Building Cybersecurity Risk Management (Plan)
  2. Investing, Training a Chief Information Security Officer (CISO) within the organization
  • Administering security procedures, conducting training, and testing
  • Maintaining secure device configurations, installing up-to-date software
  • Building intrusion detect systems
  • Configurating secure networks and protection of business networks
  • Encrypting data where necessary (choosing what data needs to be encrypted prior to)
  • Proper configuration of cloud services



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gabriela Corbera

Gabriela Corbera


Innovation enthusiast with a heart for cities, sociology, culture, policy, environment, and systems change.