{"id":14300,"date":"2026-02-25T16:52:47","date_gmt":"2026-02-25T14:52:47","guid":{"rendered":"https:\/\/www.inprosec.com\/?page_id=14300"},"modified":"2026-02-25T17:59:03","modified_gmt":"2026-02-25T15:59:03","slug":"cyberintelligence","status":"publish","type":"page","link":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/","title":{"rendered":"Cyber Intelligence"},"content":{"rendered":"<section class=\"l-section wpb_row cabecera-interior height_medium color_primary with_img parallax_ver parallax_xpos_right\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1018\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-abstracto-azul.jpg);background-position: bottom right;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"g-breadcrumbs us_custom_f4397b66 separator_custom align_left\" itemscope itemtype=\"http:\/\/schema.org\/BreadcrumbList\"><div class=\"g-breadcrumbs-item\">Pages<\/div><\/nav><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\"><span data-sheets-root=\"1\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Access Control&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:14465,&quot;3&quot;:{&quot;1&quot;:0,&quot;3&quot;:1},&quot;10&quot;:1,&quot;14&quot;:{&quot;1&quot;:3,&quot;3&quot;:1},&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Cyber Intelligence<\/span><\/h1>\n<h2>Information Security Services<\/h2>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_f1f1dff3 menu-servicios has_text_color hide_on_mobiles height_auto type_sticky\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"w-menu us_custom_ea2be81a layout_hor style_links us_menu_1\" style=\"--main-gap:2.5rem;--main-ver-indent:0.8em;--main-hor-indent:0.8em;--main-color:inherit;\"><ul id=\"menu-ciber-intelligence\" class=\"menu\"><li id=\"menu-item-14258\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14258\"><a href=\"#brand-protection\">BRAND AND DOMAIN PROTECTION<\/a><\/li><li id=\"menu-item-14259\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14259\"><a href=\"#continuous-monitoring\">CONTINUOUS DARK WEB AND DEEP WEB MONITORING<\/a><\/li><\/ul><style>@media ( max-width:600px ){.us_menu_1 .menu{display:block!important}.us_menu_1 .menu>li{margin:0 0 var(--main-gap,2.5rem)!important}}<\/style><\/nav><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_b03640aa height_auto\"><div class=\"l-section-overlay\" style=\"background:rgba(40,139,208,0.10)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container  has_bg_color stretched\"><div class=\"vc_column-inner us_custom_e0e8c15c us_animate_this\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_23786b5e us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_large\"><\/div><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">We turn information into anticipation<\/span><\/span><\/h2><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We provide <strong>visibility into external threats and potential data leaks<\/strong> that could affect your organisation. Through <strong>continuous monitoring of open and non-visible sources,<\/strong> we anticipate risks and enable a proactive response.<\/p>\n<\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"brand-protection\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Brand and Domain Protection<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We monitor the <strong>misuse of your brand and domains to detect impersonation and fraud attempts.<\/strong> In doing so, we help preserve your brand\u2019s reputation and customer trust.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"pdcb\"><button class=\"w-tabs-section-header\" aria-controls=\"content-pdcb\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-pdcb\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We detect brand impersonation, identify domains that mimic the organisation, and prevent the spread of fake websites and cloned profiles. In doing so, <strong>we reduce the risk of fraud to customers and employees and protect the trust and credibility of the organisation.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"o063\"><button class=\"w-tabs-section-header\" aria-controls=\"content-o063\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-o063\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We implement a process for <strong>detecting, identifying, monitoring, and tracking the Dark Web and Deep Web<\/strong>, which allows us to assess and analyse any latent threats in illegal forums in order to prevent them in advance.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"m2ff\"><button class=\"w-tabs-section-header\" aria-controls=\"content-m2ff\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-m2ff\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduction of the risk of fraud and impersonation.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Obtaining a <strong>comprehensive analysis of potential threats<\/strong> to the company.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Taking early action against possible attacks<\/strong> on the reputation and image of our brand and domain.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/Ciberinteligencia1-e1770712908543.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"continuous-monitoring\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/CIBERINTELIGENCIA-e1770713975438.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Continuous Dark Web and Deep Web Monitoring<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We continuously <strong>track the Dark Web and Deep Web to uncover leaked data, compromised credentials or emerging threats<\/strong> \u2014 enabling you to respond before any damage occurs.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"o207\"><button class=\"w-tabs-section-header\" aria-controls=\"content-o207\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-o207\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We provide a service to <strong>identify threats against your company on the Dark Web and Deep Web<\/strong>. This includes identifying exposed corporate information, leaked credentials, classified information, etc. This information poses a serious threat that must be detected and resolved.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"u46f\"><button class=\"w-tabs-section-header\" aria-controls=\"content-u46f\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-u46f\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We use <strong>tools to monitor, detect and identify the leakage and exposure of sensitive information<\/strong>, as well as credentials and passwords that could be used for future attacks. This monitoring allows us to anticipate potential campaigns and threats that may arise.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"y6fc\"><button class=\"w-tabs-section-header\" aria-controls=\"content-y6fc\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-y6fc\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i>Strategic advantage in <strong>detecting and preventing potential threats.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Early detection and identification of information leaks and exposed credentials<\/strong> allows us to anticipate future attacks.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Regulatory compliance<\/strong> with proactive threat management and cyber threat intelligence (ENS, ISO 27001 and NIST CSF).<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large color_primary\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Why choose Inprosec?<\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">people<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Multidisciplinary team<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">At Inprosec we have a multilingual team formed of various academic profiles (engineers, business analysts, auditors, \u2026) who perform their duties assuming the roles of consultants, auditors, project managers, etc.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">signal_cellular_alt<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Continuous improvement<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">In a world that is constantly changing, it is fundamental learn and improve to adapt and offer services aligned with the needs of Customers.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox acordeon iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">add_task<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Value proposition<\/h4><div class=\"w-iconbox-text\"><ul style=\"text-align: left;\">\n<li><i class=\"fas fa-check-square\"><\/i>We are not incompatible with audits.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We are independent. We are Consultants.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We do not compete in markets that are unfamiliar to us.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<section class=\"l-section wpb_row height_large\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 class=\"titular\" style=\"text-align: center;\"><span class=\"fina\">Do you want to learn about Cyber Intelligence?<\/span><\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-grid type_grid layout_5303 cols_3 overflow_hidden with_css_animation\" id=\"us_grid_1\" style=\"--gap:0.5rem;\" data-filterable=\"true\"><style>@media (max-width:1024px){#us_grid_1 .w-grid-item{width:50%}}@media (max-width:600px){#us_grid_1 .w-grid-list{margin:0}#us_grid_1 .w-grid-item{width:100%;padding:0;margin-bottom:var(--gap,0px)}}.layout_5303 .w-grid-item-h{background:var(--color-header-middle-bg);color:var(--color-content-text);box-shadow:0 0rem 0rem rgba(0,0,0,0.1),0 0rem 0rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_5303 .w-grid-item-h:hover{box-shadow:0 0.1rem 0.2rem rgba(0,0,0,0.1),0 0.33rem 1rem rgba(0,0,0,0.15);z-index:4}.layout_5303 .usg_post_title_1{font-size:1.4rem!important;font-weight:700!important}.layout_5303 .usg_vwrapper_1{padding:9% 11% 11% 11%!important}.layout_5303 .usg_post_taxonomy_1{font-weight:700!important;text-transform:uppercase!important;font-size:10px!important;position:absolute!important;top:1.2rem!important;right:1.2rem!important;left:1.2rem!important}.layout_5303 .usg_hwrapper_1{color:var(--color-content-faded)!important;font-size:0.9rem!important}@media (max-width:600px){.layout_5303 .usg_post_title_1{font-size:1.2rem!important}}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item us_animate_fade size_1x1 post-9342 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security tag-security-committee tag-strategic-security\" data-id=\"9342\" style=\"animation-delay:0s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/what-is-an-it-security-committee\/\" aria-label=\"\u00bfWhat is an IT Security Committee?\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/comite-de-seguridad-it-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/comite-de-seguridad-it-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/comite-de-seguridad-it-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/comite-de-seguridad-it-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/comite-de-seguridad-it.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/what-is-an-it-security-committee\/\">\u00bfWhat is an IT Security Committee?<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2023-08-30T10:34:14+02:00\" title=\"30 August 2023 at 10:34:14 +02:00\">August 30, 2023<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/what-is-an-it-security-committee\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In this article we are going to explain which is the purpose, activities, and configuration of an IT Security Committee.&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-9280 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity-en category-information-security tag-phishing tag-technical-security\" data-id=\"9280\" style=\"animation-delay:0.1s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/\" aria-label=\"How to prevent phishing in your company\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-54 term-cybersecurity-en\" href=\"https:\/\/www.inprosec.com\/en\/category\/cybersecurity-en\/\"><span class=\"w-btn-label\">Cybersecurity<\/span><\/a><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/\">How to prevent phishing in your company<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2023-08-10T11:09:15+02:00\" title=\"10 August 2023 at 11:09:15 +02:00\">August 10, 2023<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Cybercriminals do not focus on just one or a few strategies to achieve their goals, but have multiple tactics at&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-8705 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article tag-information-security-audit tag-strategic-security\" data-id=\"8705\" style=\"animation-delay:0.2s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/iso-27001-and-iso-27002-benefits-greatest-hits\/\" aria-label=\"ISO 27001 and ISO 27002: Benefits &#038; greatest hits\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/Novedades-y-bondades-de-las-ISO-27001-e-ISO-27002-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/Novedades-y-bondades-de-las-ISO-27001-e-ISO-27002-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/Novedades-y-bondades-de-las-ISO-27001-e-ISO-27002-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/Novedades-y-bondades-de-las-ISO-27001-e-ISO-27002-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/03\/Novedades-y-bondades-de-las-ISO-27001-e-ISO-27002.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/iso-27001-and-iso-27002-benefits-greatest-hits\/\">ISO 27001 and ISO 27002: Benefits &#038; greatest hits<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2023-03-09T12:01:28+02:00\" title=\"9 March 2023 at 12:01:28 +02:00\">March 9, 2023<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/iso-27001-and-iso-27002-benefits-greatest-hits\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">Below we share an article by our CEO Iago Fortes on the news and benefits of ISO 27001 and ISO&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-preloader\">\t<div class=\"g-preloader type_1\">\r\n\t\t<div><\/div>\r\n\t<\/div>\r\n\t<\/div>\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:2,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;3&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;5303&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;fade&quot;,&quot;overriding_link&quot;:&quot;%7B%22url%22%3A%22%22%7D&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;information-security&quot;]},{&quot;taxonomy&quot;:&quot;post_tag&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;ciberinteligencia&quot;,&quot;strategic-security&quot;,&quot;technical-security&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;,&quot;acf-disabled&quot;],&quot;posts_per_page&quot;:&quot;3&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_params&quot;:[],&quot;us_grid_index&quot;:1,&quot;_us_grid_post_type&quot;:&quot;post&quot;,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large with_img parallax_ver\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1265\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-ordenador-composicion.jpg);\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-9 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Can we help with Cyber Intelligence?<\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-3 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-btn-wrapper default_align_none laptops_align_none tablets_align_none mobiles_align_center\"><a class=\"w-btn us-btn-style_1\" title=\"Contacto\" href=\"http:\/\/inprosec.com\/contacto\/\"><span class=\"w-btn-label\">Contacta con nosotros<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Below we share an article by our CEO Iago Fortes on the news and benefits of ISO 27001 and ISO 27002: I will not extend and try to make it interesting to write about something is my passion and which I consider key, regarding the organization and management of Information Security (or cybersecurity). Despite there...","protected":false},"author":6,"featured_media":0,"parent":14160,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-14300","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Intelligence | Inprosec, seguridad de la informaci\u00f3n.<\/title>\n<meta name=\"description\" content=\"Brand and domain protection with continuous Dark Web and Deep Web monitoring to detect impersonation attempts, fraudulent websites, leaked credentials, and emerging threats before they have an impact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Intelligence\" \/>\n<meta property=\"og:description\" content=\"Brand and domain protection with continuous Dark Web and Deep Web monitoring to detect impersonation attempts, fraudulent websites, leaked credentials, and emerging threats before they have an impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T15:59:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/cyberintelligence\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/cyberintelligence\\\/\",\"name\":\"Cyber Intelligence | Inprosec, seguridad de la informaci\u00f3n.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2026-02-25T14:52:47+00:00\",\"dateModified\":\"2026-02-25T15:59:03+00:00\",\"description\":\"Brand and domain protection with continuous Dark Web and Deep Web monitoring to detect impersonation attempts, fraudulent websites, leaked credentials, and emerging threats before they have an impact.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/cyberintelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/cyberintelligence\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/cyberintelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/servicios\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Intelligence | Inprosec, seguridad de la informaci\u00f3n.","description":"Brand and domain protection with continuous Dark Web and Deep Web monitoring to detect impersonation attempts, fraudulent websites, leaked credentials, and emerging threats before they have an impact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Intelligence","og_description":"Brand and domain protection with continuous Dark Web and Deep Web monitoring to detect impersonation attempts, fraudulent websites, leaked credentials, and emerging threats before they have an impact.","og_url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/","og_site_name":"Inprosec","article_modified_time":"2026-02-25T15:59:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/","url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/","name":"Cyber Intelligence | Inprosec, seguridad de la informaci\u00f3n.","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2026-02-25T14:52:47+00:00","dateModified":"2026-02-25T15:59:03+00:00","description":"Brand and domain protection with continuous Dark Web and Deep Web monitoring to detect impersonation attempts, fraudulent websites, leaked credentials, and emerging threats before they have an impact.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/cyberintelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.inprosec.com\/en\/servicios\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.inprosec.com\/en\/services\/information-security\/"},{"@type":"ListItem","position":4,"name":"Cyber Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=14300"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14300\/revisions"}],"predecessor-version":[{"id":14314,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14300\/revisions\/14314"}],"up":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14160"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=14300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}