{"id":5915,"date":"2019-02-05T03:40:55","date_gmt":"2019-02-05T01:40:55","guid":{"rendered":"https:\/\/mrhouston.net\/cybersecurity\/corporate-processes\/"},"modified":"2024-05-07T16:53:04","modified_gmt":"2024-05-07T14:53:04","slug":"corporate-processes","status":"publish","type":"page","link":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/","title":{"rendered":"Corporate processes"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb3.22&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_fullwidth_post_title meta=\u00bboff\u00bb featured_image=\u00bboff\u00bb admin_label=\u00bbTitulo de pagina (automatico)\u00bb _builder_version=\u00bb3.19.4&#8243; title_font=\u00bb|||on|||||\u00bb title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb25px\u00bb title_letter_spacing=\u00bb1px\u00bb background_color=\u00bb#ff6816&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/geometric-bg-overlay-01.jpg\u00bb background_blend=\u00bbluminosity\u00bb custom_padding=\u00bb47px||33px\u00bb title_text_shadow_style=\u00bbpreset4&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb3.22&#8243; custom_margin=\u00bb15px|0px|15px|0px\u00bb custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb3.25&#8243; custom_margin=\u00bb0px||0px|\u00bb custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2024\/05\/CIBERCUMPLIMIENTO-1.png\u00bb _builder_version=\u00bb4.11.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb title_text=\u00bbCIBERCUMPLIMIENTO (1)\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb3.22&#8243; custom_padding=\u00bb0|0px|48px|0px|false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb3.25&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_padding=\u00bb0|0px|24px|0px|false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]A security audit is performed through the analysis and management of systems with the goal of identifying, categorizing and describing potential vulnerabilities within the organization: workstations, networks and WiFi, infrastructure and business applications.<\/p>\n<p>Once the audit is performed, corrective and preventive measures must be implemented by following a continuing risk reduction process that allows for greater security for the business\u2019 systems.<\/p>\n<p>We at mrHouston work on corporate processes adaptation through several stages.<br \/>\n[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/04\/corporate-processes-adaptation-through-several-stages.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text admin_label=\u00bbSubTitulo\u00bb module_class=\u00bbmrhSubTitulo\u00bb _builder_version=\u00bb3.27.4&#8243; text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb1px\u00bb header_text_color=\u00bb#000000&#8243; header_2_font=\u00bb|||on|||||\u00bb header_2_text_color=\u00bb#111111&#8243; header_2_font_size=\u00bb18px\u00bb custom_margin=\u00bb||20px\u00bb custom_padding=\u00bb||\u00bb custom_css_main_element=\u00bbdisplay: inline-block;\u00bb border_width_bottom=\u00bb1px\u00bb border_color_bottom=\u00bb#ff6816&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>ANALYSIS AND AUDIT<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb3.27.4&#8243; custom_margin=\u00bb||30px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li>Security settings audit<\/li>\n<li>Identification of malware in file containers<\/li>\n<li>Applications audit<\/li>\n<li>Code analysis<\/li>\n<li>IP reputation audit<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bbSubTitulo\u00bb module_class=\u00bbmrhSubTitulo\u00bb _builder_version=\u00bb3.27.4&#8243; text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb1px\u00bb header_text_color=\u00bb#000000&#8243; header_2_font=\u00bb|||on|||||\u00bb header_2_text_color=\u00bb#111111&#8243; header_2_font_size=\u00bb18px\u00bb custom_margin=\u00bb||20px\u00bb custom_padding=\u00bb||\u00bb custom_css_main_element=\u00bbdisplay: inline-block;\u00bb border_width_bottom=\u00bb1px\u00bb border_color_bottom=\u00bb#ff6816&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>VULNERABILITY DISCOVERY<\/h2>\n<p>[\/et_pb_text][et_pb_tabs _builder_version=\u00bb3.19.9&#8243; custom_margin=\u00bb||30px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_tab title=\u00bbVULNERABILITY DISCOVERY\u00bb _builder_version=\u00bb3.19.9&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li>Compromised and affected systems and applications<\/li>\n<li>Outdated systems<\/li>\n<\/ul>\n<p>[\/et_pb_tab][et_pb_tab title=\u00bbREMEDIATION\u00bb _builder_version=\u00bb3.19.9&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li>Remediation<\/li>\n<li>What does it entail (impact)?<\/li>\n<li>Correction services<\/li>\n<\/ul>\n<p>[\/et_pb_tab][\/et_pb_tabs][et_pb_text admin_label=\u00bbSubTitulo\u00bb module_class=\u00bbmrhSubTitulo\u00bb _builder_version=\u00bb3.27.4&#8243; text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb1px\u00bb header_text_color=\u00bb#000000&#8243; header_2_font=\u00bb|||on|||||\u00bb header_2_text_color=\u00bb#111111&#8243; header_2_font_size=\u00bb18px\u00bb custom_margin=\u00bb||20px\u00bb custom_padding=\u00bb||\u00bb custom_css_main_element=\u00bbdisplay: inline-block;\u00bb border_width_bottom=\u00bb1px\u00bb border_color_bottom=\u00bb#ff6816&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>ETHICAL HACKING<\/h2>\n<p>[\/et_pb_text][et_pb_accordion _builder_version=\u00bb3.19.9&#8243; custom_margin=\u00bb||30px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_accordion_item title=\u00bbBLACK BOX\u00bb open=\u00bbon\u00bb _builder_version=\u00bb3.19.9&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb]Access to very little data with no collaboration from the business\u2019 IT team.<br \/>\n[\/et_pb_accordion_item][et_pb_accordion_item title=\u00bbWHITE BOX\u00bb _builder_version=\u00bb3.19.9&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb open=\u00bboff\u00bb]Close collaboration with the business&#8217; IT team and significant access to its data. \u00a0\u00a0\u00a0 \u201cRed &amp; Blue Team\u201d<br \/>\n[\/et_pb_accordion_item][et_pb_accordion_item title=\u00bbINTERNAL AND EXTERNAL PENETRATION TEST\u00bb _builder_version=\u00bb3.19.9&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb open=\u00bboff\u00bb]<\/p>\n<ul>\n<li>Networks and infrastructure<\/li>\n<li>WiFi<\/li>\n<li>Website<\/li>\n<li>Email phishing<\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\u00bbSOCIAL ENGINEERING\u00bb _builder_version=\u00bb3.19.9&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb open=\u00bboff\u00bb]Planned attack carried out by introducing malware through the weakest human link in the organization.<br \/>\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_text admin_label=\u00bbSubTitulo\u00bb module_class=\u00bbmrhSubTitulo\u00bb _builder_version=\u00bb3.27.4&#8243; text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb1px\u00bb header_text_color=\u00bb#000000&#8243; header_2_font=\u00bb|||on|||||\u00bb header_2_text_color=\u00bb#111111&#8243; header_2_font_size=\u00bb18px\u00bb custom_margin=\u00bb||20px\u00bb custom_padding=\u00bb||\u00bb custom_css_main_element=\u00bbdisplay: inline-block;\u00bb border_width_bottom=\u00bb1px\u00bb border_color_bottom=\u00bb#ff6816&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2>RISK MANAGEMENT, CERTIFICATIONS<\/h2>\n<p>[\/et_pb_text][et_pb_accordion _builder_version=\u00bb4.11.4&#8243; custom_margin=\u00bb||30px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_accordion_item title=\u00bbINFORMATION SECURITY- ISO 27001&#8243; open=\u00bbon\u00bb _builder_version=\u00bb3.19.9&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb]Allows for the planning, execution, verification and improvement of a set of controls, technical measures, procedures and organizational frameworks that will enable businesses to reduce risk and, above all, provide them with a security process management scheme<br \/>\n[\/et_pb_accordion_item][et_pb_accordion_item title=\u00bbBUSINESS CONTINUITY &#8211; ISO 22301&#8243; _builder_version=\u00bb3.19.9&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb open=\u00bboff\u00bb]Guarantees the alignment of IT services with the company&#8217;s corporate governance requirements and strategy.<br \/>\n[\/et_pb_accordion_item][et_pb_accordion_item title=\u00bbIT SERVICES &#8211; ISO 20000&#8243; _builder_version=\u00bb4.11.4&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/accordion-background.png\u00bb background_size=\u00bbinitial\u00bb background_repeat=\u00bbrepeat\u00bb border_width_all=\u00bb3px\u00bb border_color_all=\u00bb#e6e6e6&#8243; global_colors_info=\u00bb{}\u00bb open=\u00bboff\u00bb]<\/p>\n<p>Any business, no matter its size, will reduce the risk of suffering a potentially \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 damaging incident and, if it occurs, the business will be prepared to respond \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 appropriately and drastically reduce any potential damage resulting from the \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 incident.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/04\/Adaptation-UNE-ISO-IEC.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb3.23&#8243; custom_margin=\u00bb||30px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb3.25&#8243; custom_margin=\u00bb||30px\u00bb custom_padding=\u00bb0px|0px|0px|0px\u00bb custom_padding_tablet=\u00bb5px|5px|5px|5px|true|true\u00bb custom_padding_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Improves the business\u2019 organization<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_624993_ffffff.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Dramatically reduces risks<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_Secured_1433152_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Allows for dashboards<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_dashboard_642473_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Grants access to new markets and clients<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_new-user_441043_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb0px|0px|0px|0px\u00bb custom_padding_tablet=\u00bb5px|5px|5px|5px|true|true\u00bb custom_padding_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Demonstrates good practices<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_good_1608156_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Adequate management of unexpected events<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_animation_200269_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Hundreds of audit controls<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_Audit_618766_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb20px|20px|20px|20px\u00bb custom_css_main_element=\u00bbbox-shadow: 0 0 10px rgba(0,0,0,0.1);\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text module_class=\u00bbmrhTituloCuadro\u00bb _builder_version=\u00bb3.27.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<h3>Reduces resource consumption<\/h3>\n<p>[\/et_pb_text][et_pb_image src=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/noun_bargaining_678244_000000.png\u00bb align=\u00bbcenter\u00bb align_tablet=\u00bbcenter\u00bb align_phone=\u00bbcenter\u00bb align_last_edited=\u00bbon|desktop\u00bb module_class=\u00bbnormal43B\u00bb _builder_version=\u00bb3.23&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb3.22&#8243; custom_margin=\u00bb15px|0px|15px|0px\u00bb custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security audit is performed through the analysis and management of systems with the goal of identifying, categorizing and describing potential vulnerabilities within the organization: workstations, networks and WiFi, infrastructure and business applications. Once the audit is performed, corrective and preventive measures must be implemented by following a continuing risk reduction process that allows for greater security for the business\u2019 systems. We at mrHouston work on corporate processes adaptation through several stages. ANALYSIS AND AUDIT Security settings audit Identification of<\/p>\n<div class=\"view-full-post\"><a href=\"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/\" class=\"view-full-post-btn\">Leer Mas<\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"parent":5910,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-5915","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Corporate Processes<\/title>\n<meta name=\"description\" content=\"Security audit that analyzes and manages the systems in order to identify, classify and describe the vulnerabilities of the organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corporate Processes\" \/>\n<meta property=\"og:description\" content=\"Security audit that analyzes and manages the systems in order to identify, classify and describe the vulnerabilities of the organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/\" \/>\n<meta property=\"og:site_name\" content=\"mrHouston Tech Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T14:53:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@mrHoustontech\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/cybersecurity\\\/corporate-processes\\\/\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/cybersecurity\\\/corporate-processes\\\/\",\"name\":\"Corporate Processes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#website\"},\"datePublished\":\"2019-02-05T01:40:55+00:00\",\"dateModified\":\"2024-05-07T14:53:04+00:00\",\"description\":\"Security audit that analyzes and manages the systems in order to identify, classify and describe the vulnerabilities of the organization.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/cybersecurity\\\/corporate-processes\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mrhouston.net\\\/en\\\/cybersecurity\\\/corporate-processes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/cybersecurity\\\/corporate-processes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mrhouston.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Corporate processes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#website\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/\",\"name\":\"Mr. Houston Tech Solutions\",\"description\":\"Potenciamos tu negocio mediante la tecnolog\u00eda.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mrhouston.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#organization\",\"name\":\"Mr. Houston\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/logo_mrHouston.jpg\",\"contentUrl\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/logo_mrHouston.jpg\",\"width\":250,\"height\":250,\"caption\":\"Mr. Houston\"},\"image\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/mrHoustontech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mr-houston-tech-solutions\\\/mycompany\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC3C9rLSc8yB6d6IkWi789dw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Corporate Processes","description":"Security audit that analyzes and manages the systems in order to identify, classify and describe the vulnerabilities of the organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/","og_locale":"es_ES","og_type":"article","og_title":"Corporate Processes","og_description":"Security audit that analyzes and manages the systems in order to identify, classify and describe the vulnerabilities of the organization.","og_url":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/","og_site_name":"mrHouston Tech Solutions","article_modified_time":"2024-05-07T14:53:04+00:00","twitter_card":"summary_large_image","twitter_site":"@mrHoustontech","twitter_misc":{"Tiempo de lectura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/","url":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/","name":"Corporate Processes","isPartOf":{"@id":"https:\/\/mrhouston.net\/#website"},"datePublished":"2019-02-05T01:40:55+00:00","dateModified":"2024-05-07T14:53:04+00:00","description":"Security audit that analyzes and manages the systems in order to identify, classify and describe the vulnerabilities of the organization.","breadcrumb":{"@id":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mrhouston.net\/en\/cybersecurity\/corporate-processes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mrhouston.net\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/mrhouston.net\/en\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Corporate processes"}]},{"@type":"WebSite","@id":"https:\/\/mrhouston.net\/#website","url":"https:\/\/mrhouston.net\/","name":"Mr. Houston Tech Solutions","description":"Potenciamos tu negocio mediante la tecnolog\u00eda.","publisher":{"@id":"https:\/\/mrhouston.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mrhouston.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/mrhouston.net\/#organization","name":"Mr. Houston","url":"https:\/\/mrhouston.net\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mrhouston.net\/#\/schema\/logo\/image\/","url":"https:\/\/mrhouston.net\/wp-content\/uploads\/2021\/06\/logo_mrHouston.jpg","contentUrl":"https:\/\/mrhouston.net\/wp-content\/uploads\/2021\/06\/logo_mrHouston.jpg","width":250,"height":250,"caption":"Mr. Houston"},"image":{"@id":"https:\/\/mrhouston.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/mrHoustontech","https:\/\/www.linkedin.com\/company\/mr-houston-tech-solutions\/mycompany\/","https:\/\/www.youtube.com\/channel\/UC3C9rLSc8yB6d6IkWi789dw"]}]}},"_links":{"self":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages\/5915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/comments?post=5915"}],"version-history":[{"count":0,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages\/5915\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages\/5910"}],"wp:attachment":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/media?parent=5915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}