#cybersecurity
Computer security involves regulations, procedures, methods and techniques destined to achieve a reliable and secure information system. Security is one of the main challenges that both users and organizations are facing. At Iberdrola we are committed to IT security and we provide our suppliers with a mailbox for reporting possible incidents in this area. You can find all the information here [PDF].
-
At Iberdrola, as a leading company in innovation, transformation and digitalization, we attach strategic importance to cybersecurity, which is essential to evolve and provide increasingly secure services and operations in all the geographies in which we operate and in an increasingly complex ecosystem and threat landscape.
Discover the importance of cybersecurity, how we defend ourselves against cyberattacks at Iberdrola and our tips to avoid them.
-
Artificial intelligence, for those who do not use it on a daily basis, seems like a concept typical of great film productions or science fiction books. But the truth is that it is a set of almost century-old concepts that are increasingly present and to which we resort, often without realising it. Find out what artificial intelligence is, what it is for, what its risks and challenges are and what we expect from it in the future.
From the Iberdrola Group's startup program, PERSEO, we seek solutions that allow coordinating the integral cybersecurity of the Smart City by means of simulators for the design of joint solutions and for the early detection of cybersecurity incidents.
-
Mobile phone scams are becoming more frequent and the methods used to carry them out are becoming more complex. Smishing is a type of text message scam. Find out what it involves, what types exist and how to avoid falling victim to this scam.
The digital technologies we use on a daily basis have become a breeding ground for new forms of scams and frauds. One of these is vishing, a type of deception via a phone call. Find out what it involves, what types exist and how to avoid data spoofing.