- Open administration
- Innovation
The AOC participates in the GovTech conference on local innovation at the service of citizens
Lately the media have alerted us to the privacy risks posed by the widespread use of mobile phones or cloud information storage services, and is that despite the countless advantages that technology brings, it is not without risks. Risks that, obviously well managed, allow us to enjoy the wide advantages of these services.
Regarding mobile phones, a few months ago we mentioned an article on mobile security: The cellphone puts the batteries in safety, describes Mobile Connect, a system introduced at the MWC that allows users to securely access mobile services through a single authentication code inserted inside the SIM card.
In fact, one of the main risks is the theft of our identity. In this regard, we recommend that you perform the following test, which will allow you to analyze how likely you are to suffer the theft based on your habits: Identity theft test.
On the other hand, we also recommend reading the following CESICAT guide to make your cloud a secure storage resource: Complete Cloud Security Guide
The AOC Consortium, through CESSATED, offers services to local public administrations so that they improve the security of their information systems and apply measures, both organizational and technical, to achieve this goal.
In 2009, the Government of the Generalitat approved the National Plan to promote information security with a series of actions aimed at improving the information security of Catalan society. The Center for Information Security of Catalonia (CESICAT) was created as a support body for this national plan and has been promoted, among others, by the Government of the Generalitat de Catalunya and the Open Administration Consortium of Catalonia (AOC Consortium) .
For more information about the security services offered to the public administrations of Catalonia, you can consult the following link: Security Services
If you want to consult a list of security resources, we recommend the following, from the Internet Security Office: Security Tools