Visualização de leitura

¿Cuál es la mejor opción de internet cuando viajamos por trabajo? Por qué Holafly for Business es la preferida de las empresas

Para un equipo IT, uno de los mayores riesgos cuando un empleado viaja no es el vuelo, sino el acceso a internet cuando llega a su destino: un trabajador que aterriza sin conexión no solo pierde tiempo, sino que pierde acceso a herramientas críticas, recurre a redes WiFi inseguras o toma decisiones sin información en tiempo real. Y en contextos donde la movilidad internacional forma parte del día a día de miles de empresas, esto deja de ser una incomodidad para convertirse en un problema operativo real.

Es por eso que soluciones como Holafly for Business empiezan a posicionarse como una capa de infraestructura que permite a los equipos IT recuperar el control y la seguridad de sus equipos. A través de eSIMs corporativas, garantizan que cualquier empleado esté conectado desde el momento en que aterriza, sin fricción, sin dependencia de terceros y con visibilidad centralizada.

Estas son las siete claves que explican por qué cada vez más empresas están apostando por este modelo:

1.- Conexión desde el momento en que aterrizas

Una de las claves está precisamente en esa inmediatez. El usuario puede instalar la eSIM antes de viajar y, una vez llega a destino, su dispositivo está operativo sin necesidad de buscar WiFi, comprar tarjetas físicas o realizar configuraciones adicionales. Esto elimina uno de los puntos de fricción más habituales en los viajes corporativos y reduce significativamente el tiempo improductivo en los primeros momentos del desplazamiento.

2.- Seguridad reforzada

Desde el punto de vista de la seguridad, el impacto es igualmente relevante. Evitar redes WiFi públicas no es solo una buena práctica, sino una necesidad en entornos donde se manejan datos sensibles o accesos a sistemas corporativos. Al priorizar conexiones móviles cifradas, se reduce la superficie de ataque y se protege el tráfico en movilidad, algo especialmente crítico en organizaciones.

3.- Control centralizado para IT

En paralelo, la gestión de la conectividad deja de ser una carga operativa para el departamento. Holafly Business Center permite centralizar la asignación de eSIMs, automatizar la facturación y mantener una visibilidad global sobre el consumo. Esto no solo mejora el control, sino que reduce tareas manuales y facilita la toma de decisiones basada en datos, algo cada vez más necesario en entornos distribuidos.

4.- Ahorro de hasta 85% por cargos de ‘roaming’

Otro de los puntos clave es la previsibilidad financiera. El roaming tradicional sigue siendo una fuente frecuente de desviaciones presupuestarias, con costes difíciles de anticipar y facturas inesperadas. Con modelos que permiten ahorros de hasta el 85%, Holafly for Business no solo optimiza el gasto, sino que aporta algo igual de importante: control y estabilidad en los costes asociados a la movilidad internacional.

5.- Adaptación a distintos perfiles de uso

La solución se adapta a diferentes perfiles de uso dentro de la organización; desde empleados con alta demanda de datos, que necesitan planes ilimitados con funcionalidades como hotspot o soporte para autenticación en dos factores, hasta perfiles con menor intensidad de uso, que pueden operar con planes más acotados sin perder eficiencia.

6.- Siempre conectado

En términos de continuidad, soluciones como Always On introducen una capa de conectividad permanente en más de 150 países, lo que elimina la necesidad de replantear la conectividad en cada desplazamiento. Por otro lado, el Plan Unlimited, accesible en 220 destinos, responde a escenarios de alta demanda de datos, integrando funcionalidades clave como hotspot y SMS para autenticación en dos factores (2FA), fundamental en entornos con políticas de seguridad reforzadas. Para empresas con baja demanda los planes por días incluyen facturación automática, asignación inmediata de eSIMs para empleados y la plataforma para empresas más fácil del mercado.

7.- 100% digital y sin fricciones

A nivel operativo, el modelo de despliegue también responde a las necesidades actuales de IT. La entrega de eSIM por email permite activar dispositivos de forma remota, sin logística ni tiempos de espera, alineándose con modelos de Zero Touch Provisioning. Este enfoque, además, encaja con estrategias de sostenibilidad IT, al eliminar la necesidad de SIM físicas y reducir residuos, algo cada vez más presente en las políticas ESG de las compañías.

Con una valoración de 4.6/5 en Trustpilot y más de 80.000 reseñas, Holafly for Business se posiciona como una de las soluciones mejor valoradas por empresas y viajeros profesionales. Pero más allá de los datos, lo que realmente está cambiando es la forma en la que las empresas entienden la conectividad en movilidad.

Porque en un entorno donde los equipos trabajan desde cualquier parte del mundo, la conectividad ya no es un complemento. Es infraestructura. Y, cada vez más, también es sinónimo de tranquilidad operativa.

El agua quiere dejar de ser un “novato digital”

El agua está tan integrada en nuestra vida cotidiana que ya ni siquiera nos parece algo especial. Abrimos el grifo, tiramos de la cisterna o activamos el chorro de la ducha y allí está, esperando. Sin embargo, para que eso ocurra tienen que pasar muchas cosas, un complejo ciclo del agua que garantiza no solo que circule sino también que sea óptima para el consumo humano. Es un proceso en el que la tecnología también está muy presente.

“Se puede decir que toda el agua es tecnológica. Otra cosa es que sea analógica o digital”, explica Luis Babiano, gerente de la Asociación Española de Operadores Públicos de Abastecimiento y Saneamiento (AEOPAS). “Es un sector altamente tecnificado. Otra cosa es que estemos en el inicio de la digitalización. Nos falta todavía mucho para ser unos auténticos campeones digitales”, reconoce a CIO ESPAÑA.

“Aunque el agua sigue siendo un recurso físico, su gestión hoy es cada vez más digital”, explica al otro lado del correo electrónico María Gil, responsable de Idrica en España. Las utilities han incorporado a nivel global “sensores IoT, sistemas SCADA avanzados, telelectura, plataformas de analítica y, más recientemente, arquitecturas de datos tipo data lake que permiten integrar información de toda la operación”, apunta, lo que permite hacer una gestión más basada en datos.

Aun así, la digitalización del ciclo del agua es uno de los retos a los que se enfrenta el sector, uno que se vuelve mucho más acuciante cuando se tiene en cuenta el contexto en el que opera el agua. “La importancia es enorme porque el agua es un recurso cada vez más escaso y sometido a una gran presión”, explica Gil.

Las organizaciones ecologistas llevan años alertando sobre el impacto que tiene la presión creciente sobre los acuíferos, así como el coste que la crisis climática pasa en término de sequías. Según un informe de la ONU publicado en enero, el mundo ha entrado ya en una fase de “bancarrota hídrica”. “Muchas regiones han vivido muy por encima de sus posibilidades hidrológicas. Es como tener una cuenta bancaria a la que se le extrae dinero cada día sin que entre un solo depósito. El saldo ya es negativo”, explicaba entonces Kaveh Madani, el autor principal del informe.

España es, de hecho, uno de los terrenos más complejos en lo que presión hídrica se refiere. WWF advierte de que el país “se queda sin agua”, por ejemplo, y cada vez se habla más de estrés hídrico.  La situación es compleja, porque, como advierte la propia industria del agua, también se pierden cantidades importantes por culpa de los problemas de las propias infraestructuras que dan soporte al ciclo del agua. Algunas estimaciones hablan de que entre el 19 y 20% del agua se desperdicia por fugas o averías.

La digitalización podría ayudar a ser más eficaces y, sobre todo, a mejorar la eficiencia y resiliencia del ciclo del agua. Como apuntan las fuentes expertas, se podría prever situaciones complejas, identificar problemas, optimizar redes y mejorar las cosas.

El estado de las cosas en España

En este proceso de salto a la digitalización, hay luces y elementos positivos, pero también hay matices que invitan a poner en cierta perspectiva el optimismo. Esto es, hablar con el sector deja claro que se están haciendo cosas y que existe mucho interés, pero que se necesita mucha más inversión y mucha más sensibilidad ante la importancia del problema y la necesidad de actuar para mejorar esas infraestructuras del agua.

“España es uno de los países más avanzados en gestión del agua y eso se está trasladando también al ámbito digital”, defiende Gil. “Estamos viendo utilities que ya operan con plataformas integradas, modelos de gemelo digital, analítica avanzada y despliegues amplios de telelectura”, ejemplifica.

El PERTE del agua (que destinó parte de los fondos europeos del Plan de Recuperación, Transformación y Resiliencia a la digitalización del ciclo del agua) ha servido para dar impulso a la transformación. “El PERTE del agua ha sido una auténtica semilla para sembrar la digitalización en el sector y esto es muy positivo”, señala Babiano. También Gil confirma que “está acelerando” el cambio. Así, ya existen proyectos que incorporan herramientas clave y que “pueden servir de locomotoras”, como apunta el gerente de AEOPAS. Pero esto es solo una parte de la foto. “El reto no es tanto tecnológico —la tecnología ya existe— como de adopción, integración y cambio cultural dentro de las organizaciones”, indica Gil.

Babiano es claro a la hora de pintar el panorama del sector: la digitalización del agua necesita financiación, una que llegue de forma sostenida. Puede que esto lleve a que cambien las tarifas del agua, pero Babiano apunta que se necesitan “también fuentes públicas para su desarrollo”. “Entre otras cosas, porque la digitalización debe ir de la mano con un proyecto país”, defiende. Un aspecto clave por el que es importante que se integre en una visión a nivel Estado y no se quede solo en algo de casos concretos es que se necesita que la digitalización llegue a todas partes. O, como asegura el experto, “no solo nos debemos centrar en las ciudades, sino también en los municipios pequeños”. Se trata de evitar que existan “dos velocidades”, una para municipios capaces de ser digitales y otra para aquellos que se quedarán con “unas carencias importantes en todo tipo de infraestructura, incluida la digitalización”.

Las ‘utilities’ han incorporado a nivel global “sensores IoT, sistemas SCADA avanzados, telelectura, plataformas de analítica y, más recientemente, arquitecturas de datos tipo ‘data lake’ que permiten integrar información de toda la operación”, apunta María Gil (Idrica)

Aquí entra, además, otro factor importante en el que incide Babiano. La digitalización del ciclo del agua necesita una base sólida: antes, hay que optimizar la propia infraestructura física que lleva el agua a la ciudadanía. Puede que hablar de cañerías y plantas de depuración no sea tan cool como hablar de IA, pero esa es la base del ciclo del agua y ahí es donde aparecen los primeros problemas. Ahora mismo, todavía existen zonas de España sin depuradoras (a pesar de que la normativa comunitaria lo penaliza). Además, en líneas generales, la infraestructura del agua tiene ya sus décadas, lo que crea focos de tensión. “Más del 30% de nuestras redes tiene más de 40 años”, recuerda Babiano. Para entenderlo solo hay que pensar en la reforma del baño de casa: llega un momento en el que cambiar las cañerías es inevitable. Aquí pasa a una mayor escala.

“La digitalización nos permite pasar de un nivel razonable de solvencia y mantenerlo en el tiempo”, afirma Babiano. Pero la transformación digital no debe ir sola: el experto advierte que “primero, se trata de optimizar nuestras pérdidas, invertir en nuestras redes, etc y luego entrar (o entrar en paralelo) en la digitalización”.

Los retos del agua

Todo esto ocurre, igualmente, en ese momento lleno de retos para el sector que no se debe perder de vista. “Estamos ante una necesidad imperiosa de una transición”, asegura Babiano. Las cuencas hidrográficas se enfrentan a sequías, a danas (que, como recuerda el experto, llevan al límite en tiempos récord a las infraestructuras, como a las plantas depuradoras que deben asumir una avalancha de agua) y a una mayor presión. “Y, sin embargo, no tenemos un proyecto muy claro en torno a cómo invertir en esta transición hídrica”, asegura. Babiano compara la situación de esta transición con la que viven la transición energética o la de movilidad, en las que existen planes, medidas fiscales e incentivos para la inversión con los que ellos no cuentan. La transición hídrica no cuenta con una situación parecida, aunque desde el sector insisten en que debería serlo.

En ese contexto de transición, la digitalización podría convertirse en una aliada para afrontar los retos del agua. “La tecnología no es la única solución, pero sí es un habilitador clave”, indica Gil. “Los grandes retos del agua (sequía, estrés hídrico, sobreexplotación) tienen una dimensión estructural, climática y también de gobernanza”, explica, pero recuerda que “sin tecnología es prácticamente imposible gestionarlos de forma eficiente”. Permite ver qué está ocurriendo, qué puede fallar y tomar mejores decisiones, al tiempo que “aporta transparencia y trazabilidad”. Como resume Babiano, “la digitalización aumenta exponencialmente nuestra excelencia”. “Por ejemplo, si monitorizas toda tu red, sabes la localización inmediata de los puntos donde está perdiendo más agua de lo normal”, muestra. Se puede avisar al usuario final de lo que está pasando y localizar la fuga (y solventarla).

En España, asegura Babiano, ya existen este tipo de soluciones. “Gran parte de la reducción de muchos de nuestros consumos está viniendo de la mano de los contadores inteligentes y de la monitorización y digitalización de nuestras redes”, apunta. “Lo que no estamos logrando todavía es mayores automatismos”, señala, recordando que alcanzar los niveles más elevados de mejoras llevará un tiempo. “Todavía estamos en una fase de, podemos decir, paso del ‘novato digital’ a la ‘integración vertical’”, resume.

Tecnologías emergentes para el cambio

Pero ¿qué herramientas TI son las que esperan a la vuelta de la esquina cuando se alcanza un nivel avanzado en la digitalización?

Unas cuentas tecnologías se han convertido en emergentes en la gestión global del agua, según concluye un informe de la plataforma de software Xylem Vue. Según enumera su análisis son la colaboración entre la administración pública y la empresa privada, las arquitecturas basadas en agentes, la ciberseguridad, los sistemas de alerta temprana y, por supuesto, la ya ubicua IA generativa.

El salto a la digitalización tiene otra cara, la de las potenciales amenazas de ciberseguridad

“La inteligencia artificial está empezando a jugar un papel muy relevante, especialmente cuando ya existe una base sólida de datos”, explica Gil (Idrica es, junto con Xylem, quienes están detrás de Xylem Vue). “Su principal aportación es la capacidad de encontrar patrones complejos y optimizar decisiones en entornos con múltiples variables”, apunta. “Es importante entender que la IA no sustituye al conocimiento experto de la operación”, recuerda, pero señala que cuando se combinan ambos se logran grandes resultados. Otro de los puntos destacados son los sistemas de alerta temprana, que, como explica la experta, “son uno de los mayores cambios de paradigma en la gestión del agua”. En lugar de esperar a que el fallo se produzca e impacte en el propio servicio, se adelantan a lo que va a ocurrir. “El valor está en ganar tiempo: pasar de reaccionar a prevenir. Y en un sistema tan complejo y sensible como el del agua, esa anticipación tiene un impacto directo en la continuidad del servicio, en los costes operativos y en la confianza del ciudadano”, indica.

Aunque, eso sí, el salto a la digitalización tiene otra cara, la de las potenciales amenazas de ciberseguridad. El agua no deja de ser una infraestructura crítica y muy sensible. “Sin duda, la digitalización amplía la superficie de exposición, y el sector del agua no es ajeno a ello”, reconoce Gil, que suma que esto se ha convertido ya “en una prioridad creciente”. “Lo que estamos viendo es una evolución hacia modelos de seguridad más maduros”, afirma. “También hay una mayor concienciación en el sector”, suma. “La clave está en que la digitalización y la ciberseguridad avancen de la mano. No son elementos independientes”.

Más allá del césped: así es la revolución digital del Atlético de Madrid 

En el fútbol de élite, la diferencia ya no se mide solo en el césped. La experiencia del aficionado, la eficiencia operativa o la capacidad de anticipar decisiones se juegan también en el terreno digital. En ese contexto, el Atlético de Madrid lleva años avanzando en una transformación tecnológica que sitúa al club entre los referentes europeos en innovación aplicada al deporte. 

La clave de esta evolución está en una idea clara: la tecnología no es un complemento, sino un eje estructural del modelo de negocio. “En nuestro club hay una apuesta clarísima por la inversión en tecnología desde el traslado al Riyadh Air Metropolitano”, explica René Abril Martín, director de Tecnología y Desarrollo Digital del Atlético de Madrid

Ese punto de inflexión marcó el inicio de una estrategia en la que lo digital pasó a formar parte de los objetivos cada temporada. “La inversión inicial en tecnología en el estadio y la intención del club, basada en que la experiencia digital también acompañara a nuestros aficionados y visitantes no solo en los partidos de fútbol, sino también en el resto de los eventos que alberga nuestro estadio, fue clave en aquel momento. Desde entonces, la tecnología y el desarrollo digital están presentes en nuestros objetivos de cada temporada”, señala. 

El “corazón del club”: el aficionado 

La estrategia tecnológica del Atlético de Madrid tiene una prioridad clara: el aficionado. “Todas nuestras prioridades giran en torno a su experiencia, que siempre debe de ser excelente. Son el corazón del Atlético de Madrid, y también nuestro motor de crecimiento”, explica Abril. 

Esa visión se combina con otras prioridades internas, como la eficiencia operativa, la seguridad de la red y el apoyo tecnológico a la estrategia ESG. “Actualmente estamos enfocados en reforzar la seguridad de la red, algo tan básico como clave. Todos nuestros servicios, tanto de experiencia de usuario como de empleado, corren por nuestra red multiservicio”, explica. En ese sentido, insiste en que la solidez de la red es un elemento crítico para sostener la experiencia digital. 

En esta nueva realidad, el dato se ha convertido en un activo fundamental. “La cantidad de datos que se generan diariamente en un club de élite es ingente. Toda interacción en un entorno digital genera datos, y el análisis de dichos datos nos ayuda a comprender mejor qué está ocurriendo y, por tanto, cómo mejorar aún más la experiencia”, añade. 

Del estadio inteligente al estadio conectado 

Durante los últimos años, muchos clubes han hablado del estadio inteligente. Sin embargo, Abril pone el foco en una capa previa. “A mí me gusta pensar que el estadio conectado es clave y un paso previo, porque se basa en la infraestructura”, afirma. 

Para el Atlético de Madrid, esa base es crítica en un entorno de alta densidad. “Sin una infraestructura bien diseñada, segura y con capacidades de escalar a las necesidades cada vez más altas de conectividad de servicios, esto es imposible de ejecutar en un recinto con más de 70.000 personas conectadas”, sostiene. 

René Abril Martín, director de Tecnología y Desarrollo Digital del Atlético de Madrid

René Abril Martín, director de Tecnología y Desarrollo Digital del Atlético de Madrid.

Atlético de Madrid

“Poder tener datos de la movilidad dentro del estadio y cómo los aficionados y el personal del club interactúan con nuestra infraestructura de red es muy valioso”

La prioridad es clara y operativa: garantizar el rendimiento en los momentos críticos. “Nuestra prioridad número 1 es que nuestras redes puedan soportar esos picos de demanda. Que en esos momentos se asegure la conectividad de los usuarios finales y aficionados, pero también la de los servicios críticos, como staff, operaciones, food and beverage”, explica. “Todo lo demás viene después”. 

El Riyadh Air Metropolitano, una infraestructura preparada para una nueva etapa 

La evolución más visible de esta estrategia es el proyecto de modernización tecnológica del Riyadh Air Metropolitano junto a HPE Networking, que se desarrollará en dos fases durante las temporadas 2025/26 y 2026/27. Para el club, no se trata solo de actualizar tecnología. “Queremos ofrecer la mejor experiencia a nuestros aficionados. Sentimos que llevamos años ofreciendo unas comunicaciones óptimas en nuestro estadio, pero a la vez queremos incorporar todos los avances que la tecnología de redes ha traído desde su inauguración en 2017”, explica. 

Estos años han servido al club para detectar y planificar casos de uso que eran complicados de ejecutar con tecnología de hace 10 años y que ahora los equipos de HPE sí ofrecen. “La primera es el entendimiento de la red. Las herramientas de HPE Networking Central y la información que ofrecen a nuestros ingenieros y administradores es alucinante. Incluso las capacidades que nos trae la Inteligencia Artificial que incluye esta plataforma nos hará entender aspectos de la red que ni siquiera estaban en nuestros requerimientos originales, pero que van a ser cruciales para mejorar”. 

El despliegue contempla la renovación de la infraestructura inalámbrica con más de 1.500 puntos de acceso y la incorporación de tecnologías WiFi 6 y WiFi 7. “Nos van a ofrecer mucha más capacidad y estabilidad en un entorno con muchos dispositivos conectados simultáneamente. La reducción de latencia es otro de los beneficios que los aficionados van a disfrutar con el nuevo despliegue”, detalla Abril. Lo que se busca es mejorar la experiencia en tiempo real, especialmente en los momentos de mayor demanda. 

Para HPE, el enfoque es estructural. “Cuando abordamos la renovación tecnológica de un estadio como el Riyadh Air Metropolitano no hablamos únicamente de sustituir equipamiento, sino de rediseñar la infraestructura digital sobre la que se apoyará toda la experiencia del recinto en los próximos años”, señala Álvaro Morán, director de HPE Networking. Para ello, añade Morán, “incorpora capacidades de optimización automática mediante inteligencia artificial, analítica de presencia y eficiencia energética. En otras palabras, la red deja de ser un elemento pasivo para convertirse en un sistema vivo”. 

IA, datos y eficiencia operativa 

Uno de los ejes del proyecto es su capacidad para generar inteligencia operativa. “El despliegue aporta nuevas funcionalidades en dos aspectos claves para las operaciones: información y comunicación”, explica Abril. 

La red permitirá obtener datos sobre el comportamiento dentro del estadio. “Poder tener datos de la movilidad dentro del estadio y cómo los aficionados y el personal del club interactúan con nuestra infraestructura de red es muy valioso”, señala. 

Esa información se traduce en herramientas concretas. “Nuestro equipo interno de análisis de datos se encarga de transformar todos esos datos en cuadros de mando que son de grandísima utilidad tanto durante los eventos como tras finalizar estos”, explica. “Nos permite tomar decisiones mejor informadas”. 

La inteligencia artificial ya está integrada en ese ecosistema. “Los modelos basados en Inteligencia Artificial están incluidos prácticamente en cualquier tecnología, mejorando sustancialmente los procesos y la velocidad de respuesta”, afirma. 

El fútbol sigue estando en el césped 

Pese a la apuesta tecnológica, el Atlético de Madrid marca un límite claro. “Cualquier tecnología con la que contemos en el estadio o en el club no pretende redefinir la esencia de un partido”, afirma Abril. “Eso pasa en el césped, y todo el protagonismo está en el partido”. 

La tecnología, en cambio, actúa en el entorno. “Toda esa experiencia alrededor de ese momento especial que es el comienzo de un partido cada vez es más conectada”. 

Atlético de Madrid

Atlético de Madrid

Más allá del fútbol 

Pero este modelo no se queda solo en el deporte, sino que se extiende a otros eventos. “Nosotros somos fútbol, evidentemente, pero cada vez tiene más peso en nuestra actividad el uso de nuestras sedes para albergar cualquier tipo de evento multitudinario que necesite grandes espacios y en el que el uso de la tecnología sea diferencial”, explica. 

“Creo que esto último es una ventaja competitiva”, continúa.” Nadie quiere ir a un concierto si estar junto a otros 60.000 espectadores significa estar desconectado. Voy más allá, la experiencia en el concierto mejora si tienes la capacidad de compartir en directo lo que vives con la gente con la que quieres compartir esa emoción, o la de un gol que te da la victoria”. 

Aun así, el objetivo final no cambia. “Nuestro objetivo no está tanto en el papel que queremos jugar como club, sino en que aficionados, visitantes y profesionales tengan siempre la mejor experiencia”. 

Post-quantum encryption for Cloudflare IPsec is generally available

While more than two-thirds of human-generated TLS traffic to Cloudflare is already protected by post-quantum cryptography, the world of site-to-site networking has been a different story. For years, the IPsec community remained caught between the high bar of Internet-scale interoperability and the niche requirements of specialized hardware. That gap is now closing. 

Earlier this month, we announced that Cloudflare has moved its target for full post-quantum security forward to 2029, spurred by several recent advances in quantum computing. To advance that goal, we’ve made post-quantum encryption in Cloudflare IPsec generally available.

Using the new IETF draft for hybrid ML-KEM (FIPS 203), we’ve successfully tested interoperability with branch connectors from Fortinet and Cisco — meaning you can start protecting your wide-area network (WAN) against harvest-now-decrypt-later attacks today using hardware you already have.

This post explains how we implemented the new hybrid IPsec handshake, why it took four years longer to land than its TLS counterpart, and how the industry is finally consolidating around a standard that works at Internet scale.

Cloudflare IPsec

Cloudflare IPsec is a WAN Network-as-a-Service that replaces legacy network architectures by connecting data centers, branch offices, and cloud VPCs to Cloudflare's global IP Anycast network. Customers get simplified configuration, high availability (if a data center becomes unavailable, traffic is automatically rerouted to the nearest healthy one), and the scale of Cloudflare's global network. This is done through encrypted IPsec tunnels that support both site-to-site WAN, outbound Internet connections, and connectivity to the Cloudflare One SASE platform

Post-quantum encryption in IPsec

Cloudflare IPsec now uses post-quantum encryption with hybrid ML-KEM (FIPS 203) to stop harvest-now-decrypt-later attacks. These are attacks where an adversary harvests data today and then decrypts later, after Q-Day, when there are powerful quantum computers that can break the classical public key cryptography used across the Internet.  Harvest-now-decrypt-later attacks are becoming a concern for more organizations as Q-Day approaches faster than expected.

ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) is a post-quantum cryptography algorithm that is based on mathematical assumptions that are not known to be vulnerable to attacks by quantum computers. It does not require special hardware or a dedicated physical link between sender and receiver. ML-KEM is intentionally designed to be implemented in software across standard processors to provide post-quantum encryption of network traffic. 

Draft-ietf-ipsecme-ikev2-mlkem specifies post-quantum encryption for IPsec using hybrid ML-KEM, which combines the well-understood security of classical Diffie-Hellman and the post-quantum security of ML-KEM in a single, standards-compliant handshake. Specifically, a classical Diffie-Hellman exchange runs first, its derived key encrypts a second exchange that runs ML-KEM, and the outputs of both are mixed into the session keys that secure IPsec data plane traffic sent using the Encapsulating Security Payload (ESP) protocol. 

Our interoperable implementation 

Earlier we announced the closed beta of our implementation of draft-ietf-ipsecme-ikev2-mlkem in production in our Cloudflare IPsec product and tested it against a reference implementation (strongswan). Now that we have made this implementation generally available, we have also confirmed interoperability with several other vendors, including Cisco and Fortinet, which is a big win for this new standard.

Cisco: Customers using Cisco 8000 Series Secure Routers after version 26.1.1 as their branch connector can also now establish post-quantum Cloudflare IPsec tunnels per draft-ietf-ipsecme-ikev2-mlkem.

Fortinet: Customers using Fortinet FortiOS 7.6.6 and later as their branch connector can now establish post-quantum Cloudflare IPsec tunnels to Cloudflare's global network per draft-ietf-ipsecme-ikev2-mlkem.

The importance of being interoperable

Given that upgrading cryptography is hard and can take years, our 2029 target date for a full update to post-quantum cryptography is going to require concentrated effort. That’s why we hope the IPsec community continues to focus on the development of interoperable standards like draft-ietf-ipsecme-ikev2-mlkem.

Let us explain why these standards are vitally important. A full specification for hybrid ML-KEM in IPsec, draft-ietf-ipsecme-ikev2-mlkem, became available only in late 2025. That's roughly four years after support for hybrid ML-KEM landed in TLS. (In fact, Cloudflare turned on hybrid post-quantum key agreement with TLS in 2022, even before NIST finalized the standardization of ML-KEM, because the TLS community quickly converged on a single, interoperable approach and pushed it into production. Today more than two-thirds of the human-generated TLS traffic to Cloudflare's network is protected with hybrid ML-KEM.)

The four-year delay is likely due in part to the IPsec community's continued interest in Quantum Key Distribution (QKD), as codified in RFC 8784, published in 2020. We've written before about why QKD is not part of our post-quantum strategy: QKD requires specialized hardware and a dedicated physical link between the two parties, which fundamentally means it will not operate at Internet scale. Also, QKD does not provide authentication, so you still need post-quantum cryptography anyway to stop active attackers. It’s difficult to find implementations of QKD that interoperate across vendors.   

The U.S. NSA, Germany's BSI, and the UK's NCSC have all warned against solely relying on QKD. Post-quantum cryptography, by contrast, runs on the hardware you already have, authenticates the parties at both ends, and works end-to-end across the Internet. 

RFC 9370, published in 2023, opened the door to post-quantum cryptography in IPsec, allowing up to seven key exchanges to be run in parallel with classical Diffie-Hellman. However, RFC 9370 did not specify which ciphersuites should be used in these parallel key exchanges. In the absence of that specification, some vendors shipped early implementations under RFC 9370 before the hybrid ML-KEM draft was available, defining their own ciphersuites including some which are not NIST-standardized. This is exactly the kind of “ciphersuite bloat” NIST SP 800 52r2 warned against. And the risks to interoperability have played out in practice: Cloudflare IPsec does not yet interoperate with Palo Alto Networks' RFC 9370–based implementation, because it was launched before draft-ietf-ipsecme-ikev2-mlkem was available. 

Fortunately, we now have draft-ietf-ipsecme-ikev2-mlkem that fills in the gaps in RFC 9370, specifying hybrid ML-KEM as one of the key exchange mechanisms that can be operated in parallel with classical Diffie-Hellman. We hope to add Palo Alto Networks to the list of interoperable post-quantum branch connectors as the industry continues to consolidate around draft-ietf-ipsecme-ikev2-mlkem.

But the journey towards interoperable post-quantum IPsec standards is not over yet. While draft-ietf-ipsecme-ikev2-mlkem supports post-quantum encryption, we still need IPsec standards for post-quantum authentication, so that we can stop attacks by quantum adversaries on live systems after Q-Day. Given the shortened timeline for full post-quantum readiness, we hope the IPsec community will continue to focus on interoperable PQC implementations, rather than diverting focus to niche use cases with QKD.

Towards an interoperable post-quantum Internet

At Cloudflare, we’re helping make a secure and post-quantum Internet accessible to everyone, without specialized hardware and at no extra cost to our customers. Post-quantum Cloudflare IPsec is one more step on our path to full post-quantum security by 2029, and we’re doing it in a way that ensures that the Internet remains open and interoperable for years to come. 

AI 시대 IT 인력의 진화… “실행보다 통제·관리 역할 커졌다”

솔라윈드가 15일 발표한 보고서에 따르면, 인공지능(AI)이 IT 역할을 재편하고 있는 것으로 나타났다. 전체 전문가의 80%는 기존의 직접 운영 중심 업무에서 벗어나, 자동화된 시스템과 워크플로를 감독하는 방향으로 역할이 이동하고 있다고 응답했다.

솔라윈드에 따르면, 기업들이 AI 기반 도구와 자동화를 확대 도입하면서 IT 실무자들은 점차 오케스트레이션 중심의 책임을 맡고 있다. 이번 조사는 기업 환경에서 AI 도입의 효과와 과제를 분석하기 위해 1,048명의 IT 전문가를 대상으로 진행됐다.

보고서는 “IT 실무자 10명 중 8명은 기술 인력이 운영자에서 오케스트레이터로 이동하고 있다는 데 동의한다”며 “업무를 직접 수행하는 시간은 줄어드는 대신, 시스템과 워크플로, 그리고 이를 대신 실행하는 AI 도구를 통제하고 관리하는 데 더 많은 시간을 투입하고 있다”고 밝혔다.

인식과 현실 사이의 격차

보고서는 AI 준비 수준을 둘러싸고 경영진과 기술 인력 간 뚜렷한 인식 차이가 존재한다고 지적했다. C레벨 임원의 47%는 자사가 AI 기반 변화에 “매우 잘 준비돼 있다”고 평가한 반면, 실무 기술 인력 중 같은 응답은 13%에 그쳤다.

한편, 일상적인 IT 운영에서 AI가 가져온 실질적인 효과도 확인됐다. 응답자의 65%는 수작업이 감소했다고 밝혔고, 61%는 근본 원인 분석 속도가 빨라졌다고 답했다. 또한 49%는 AI가 의사결정에 대한 확신을 높이는 데 기여한다고 평가했다.

그러나 이러한 성과는 동시에 업무 부담 증가로 이어지고 있다. 응답자의 71%는 AI 도입 이후 업무가 더 까다로워졌다고 답했으며, 이는 AI가 생성한 결과를 검증하고 관련 리스크를 관리해야 하는 요구가 늘어난 데 따른 것으로 분석된다. 특히 신뢰 문제는 여전히 핵심 과제로 남아 있다. IT 전문가의 71%는 AI 결과를 반드시 재확인해야 한다고 밝혔고, 62%는 AI의 권고를 신뢰하는 데 어려움을 겪고 있다고 답했다.

AI 도입 수준 역시 조직별로 차이를 보였다. 전체 응답자의 절반(부분 도입 34%, 전면 도입 16%)은 AI를 수용했다고 답한 반면, 37%는 인프라, 예산, 시스템 복잡성 등의 이유로 도입에 저항이 존재한다고 응답했다.

보고서는 IT 역할이 점차 전략 중심이면서 자동화 기반으로 전환되고 있다고 분석했다. 응답자의 52%는 전략성과 자동화 비중이 모두 증가했다고 답했다. 또한 역할은 점점 더 부서 간 협업 중심(47%)으로 확대되고 있으며, 복잡성 역시 증가(41%)하고 있는 것으로 나타났다. 이는 AI가 IT를 넘어 전사 비즈니스 프로세스 전반에 통합되고 있기 때문이라는 설명이다.

AI는 IT 조직의 시간 활용 방식에도 변화를 가져오고 있다. IT 인력은 전략 수립이나 시스템 성능 분석과 같은 선제적 업무에 더 많은 시간을 투자하는 반면, 장애 대응 등 일부 사후 대응 업무는 감소하는 추세다.

거버넌스·교육·데이터 과제

보고서는 AI 도입을 효과적으로 추진하기 위해 조직이 해결해야 할 과제로 거버넌스, 교육, 데이터 품질을 제시했다.

응답자의 56%는 보다 명확한 AI 정책과 가이드라인이 필요하다고 밝혔으며, 50%는 체계적인 교육의 필요성을 지적했다. 특히 데이터 품질은 AI 성과를 좌우하는 핵심 요소로 꼽힌다. 응답자의 83%는 AI의 효과가 활용 가능한 데이터의 범위와 품질에 달려 있다고 답했다.

이와 함께 도구 간 파편화와 통합 부족 문제도 AI 활용을 저해하는 주요 요인으로 지목됐다.

향후 전망에 대해 응답자들은 AI와 자동화의 역할이 더욱 확대될 것으로 내다봤다. 응답자의 77%는 향후 2~3년 내 조직이 자동화 확대와 데이터 기반 인사이트를 바탕으로 보다 선제적인 운영 체계를 갖추게 될 것으로 예상했다.

다만 동시에 역량 격차, 거버넌스 요구, AI 기반 시스템의 정확성과 신뢰성 확보 등 해결해야 할 과제도 지속될 것으로 전망된다.

솔라윈즈의 최고기술책임자(CTO) 크리슈나 사이는 공식 보도자료를 통해 “AI는 IT를 단순하게 만드는 것이 아니라, 오히려 더 중요한 영역으로 만들고 있다”며 “이 환경에서 성과를 내는 조직은 단순히 AI 도구를 많이 보유한 곳이 아니라, 이를 신뢰할 수 있도록 거버넌스와 구조를 구축한 조직”이라고 말했다.
dl-ciokorea@foundryco.com

No sólo la IA marca la transformación digital de los sectores clave: pulso a 5G, ‘edge’ y ‘cloud’

Sí, la inteligencia artificial (IA) está ahí, pero todo lo que se trató ayer en cuanto a su desarrollo en el CIO ForwardTech & ThreatScape Spain celebrado en Madrid no sería posible sin infraestructuras como el 5G, las comunicaciones, la computación en el edge y los modelos cloud. Así lo pudieron de manifiesto Israel Devesa, director general digital & tecnólogo del Grupo Aldesa; Carlos Garriga, CIO del IE Business School; y Rubén Andrés Priego, director general de Tecnología, Operaciones e Innovación de Singular Bank, en un panel moderado por Esther Macías, directora editorial de CIO y COMPUTERWORLD en España. Empresas las tres primeras muy diferentes, pero en las que aquellas tecnologías mencionadas juegan un papel fundamental.

Israel Devesa comenzó su intervención centrándose en la parte pública y en cómo se comunica la evolución del ámbito energético. “Resulta clave explicar de forma clara cómo se está transformando este sector. El enfoque tradicional, bastante centralizado, de la red eléctrica en cuanto a cómo debe producirse la energía dentro de España, está evolucionando hacia un modelo más distribuido, donde cobra importancia el edge. En este contexto, es fundamental contar con infraestructuras capaces de analizar la información en tiempo real directamente en el ‘borde’. En nuestro caso, los aerogeneradores o los paneles solares producen una enorme cantidad de datos que generan activos, a partir de los que se toman decisiones relacionadas con la producción, su optimización o incluso el movimiento de activos. Por tanto, no toda la información debe viajar a sistemas centrales; muchas decisiones deben tomarse localmente para ganar rapidez y eficiencia. Este es un claro ejemplo de cómo el 5G y el cloud computing forman un conjunto indivisible en la forma de gestionar la información dentro de las organizaciones”.

Grupo Aldesa

Israel Devesa, director general digital & tecnólogo del Grupo Aldesa

Garpress | Foundry.

Por su parte, Rubén Andrés Priego centró su análisis en dos vertientes. La primera que destacó es el desarrollo de soluciones basadas en los nuevos DNI electrónicos con tecnología NFC en el ámbito de la banca digital y el onboarding. “Este sistema permite, mediante un simple contacto con el móvil, leer los datos del documento, incluyendo certificados validados por la Policía Nacional, así como la imagen del DNI. Esto supone un cambio significativo respecto a los procesos tradicionales, que requerían grabar vídeos, tomar fotografías y pasar por validaciones manuales por parte de equipos de operaciones”, explicó.

En segundo lugar, citó la telemetría. “A través de los dispositivos móviles es posible recoger información comportamental sobre cómo operan los usuarios. Esto permite detectar situaciones anómalas, como operaciones que cambian de localización de forma imposible en pocos segundos, o identificar si la interacción la realiza un humano o una máquina. Gracias a esta información, se pueden ajustar dinámicamente los niveles de seguridad, reduciendo la fricción para el usuario en situaciones normales y reforzando los controles cuando se detecta un mayor riesgo”, añadió.

Carlos Garriga puso como ejemplo cómo la torre del IE Business School está sensorizada para detectar cómo es el uso de los espacios en el día a día. “Casi monitorizas experiencias. Esto empezó con el cocid, que permitió repensar y redefinir aulas y procesos”. En cuanto al 5G y edge, Garriga puso ejemplos como un proyecto piloto de gafas de realidad virtual para toda la actividad académica, “que permite llevar la educación a una nueva dimensión”.

La importancia de las conexiones satelitales

Preguntado por la cuestión, Priego explicó que “tras el corte eléctrico del año pasado, los centros de datos continuaron funcionando con normalidad, pero las oficinas físicas se quedaron sin conexión a internet. Como respuesta, se desplegó la solución de Starlink basada en conectividad satelital en toda la red de oficinas y sedes centrales. Esto permitió garantizar la resiliencia del sistema, mantener la operatividad en situaciones críticas y explorar soluciones combinadas de conectividad y autonomía energética”.

En este sentido, Devesa añadió lo importante que es contar con conectividad cuando el 5G falla. “En entornos de obra, que suelen estar en ubicaciones remotas, la conectividad es un reto clave para integrar sistemas, monitorizar operaciones y garantizar la seguridad. A diferencia de entornos urbanos, estas zonas carecen de infraestructuras como fibra o red estable, lo que dificulta la comunicación. Para resolverlo, se recurre cada vez más a soluciones como redes satelitales de baja órbita (por ejemplo, Starlink), que permiten mantener la conectividad durante largos periodos. Además, existe una complejidad adicional en el ámbito OT frente a IT, debido al uso de protocolos menos estandarizados como Modbus, lo que exige soluciones y equipos especializados”, por lo que “en este contexto, el principal desafío del 5G no es la tecnología en sí, sino su despliegue en este tipo de entornos”, añadió.

¿Se puede vivir sin 5G?, preguntó Esther Macías a Carlos Garriga. “Más que el 5G en sí, lo crítico son sus capacidades, especialmente la baja latencia, que resulta esencial para aplicaciones como IoT o experiencias inmersivas, donde el tiempo de respuesta es clave”, respondió. De igual manera, también quiso dar su opinión en cuanto a comunicaciones satelitales, aunque reconoció que “aún no están completamente desplegadas” en el IES Business School, “han cobrado relevancia tras situaciones de crisis, donde garantizar la continuidad de la comunicación y la toma de decisiones es fundamental, especialmente para mantener informados a equipos y usuarios”.

“En este contexto —dijo para concluir su opinión en este sentido—, soluciones emergentes como el 5G satelital directo a dispositivos se están explorando como una opción eficaz para asegurar la conectividad de personal crítico y la continuidad operativa, incluso en escenarios adversos”.

Singular Bank

A la derecha, Rubén Andrés Priego, director general de Tecnología, Operaciones e Innovación de Singular Bank.

Garpress | Foundry.

Con la ciberseguridad hemos topado

Israel Devesa certificó que la ciberseguridad es fundamental en este mundo hiperconectado. “La ciberseguridad se ha convertido en una preocupación creciente en el sector energético, especialmente tras incidentes recientes que evidencian la vulnerabilidad de las infraestructuras. En entornos como parques eólicos o fotovoltaicos, donde la operación es cada vez más remota, aumenta la exposición al riesgo, ya que el acceso a sistemas críticos se realiza a distancia”.

“A diferencia de otros sectores —precisó—, el ámbito OT ha ido más rezagado que IT en materia de seguridad, pero esto está cambiando, impulsado en gran parte por nuevas regulaciones que exigen mayores niveles de protección y responsabilidad, incluso a nivel de dirección”. En opinión de Devesa, aunque históricamente la inversión en ciberseguridad en renovables ha sido muy baja, la creciente conciencia del riesgo y el cambio regulatorio están impulsando un aumento progresivo. “La ciberseguridad pasa así de ser un aspecto secundario a convertirse en un elemento clave y estratégico dentro de las organizaciones del sector energético”, dijo.

En este caso concreto, Rubén Andrés Priego reconoció que su compañía está apostando con fuerza por la inteligencia artificial, con soluciones como asistentes basados en modelos de lenguaje para apoyar a los banqueros, que ya muestran una alta adopción en el día a día. Sin embargo, estos modelos presentan limitaciones en términos de disponibilidad y fiabilidad, lo que puede suponer un riesgo, especialmente en situaciones críticas como la interacción directa con clientes. Por ello, se plantea el uso de edge computing para desplegar modelos en local, reduciendo la dependencia de sistemas externos y mejorando la resiliencia y la continuidad del negocio. Además, se destaca que muchas tareas específicas podrían resolverse mejor con modelos locales en lugar de modelos generalistas, optimizando así el rendimiento y la eficiencia”.

IE Business School

Carlos Garriga, CIO del IE Business School

Garpress | Foundry.

El papel de la tecnología en el desarrollo de los sectores

Para finalizar el panel, Esther Macías preguntó a estos tres expertos por el papel que tendrá la tecnología en el desarrollo de los sectores donde están enclavadas sus empresas, así como su propia función. “Lo que vemos, y ha pasado ahora con la guerra de Irán, es que la infraestructura hay que diseñarla desde el peor escenario posible. El tema de las guerras o los ataques terroristas es una realidad. Tenemos que buscar formas de replicar nuestra infraestructura; por ejemplo, en Dubái, donde de hecho cayeron restos de un misil encima de un CPD de AWS y hubo varios bancos que lo pasaron bastante mal. Es decir, hay que tener infraestructura redundante, estar preparados para lo peor que pueda ocurrir. Y, por otro lado, ser atrevidos: lanzarnos con la IA y con todas estas tecnologías de última generación en España. Parece que hay mucho miedo alrededor de la IA. Yo creo que ese nerviosismo viene más del desconocimiento que de lo que realmente puede generar”, explicó Rubén Andrés Priego.

Por su parte, Andrés Devesa respondió que “lo fundamental es verlo como una oportunidad”. “En nuestra compañía —continuó— decimos mucho que el sector de la construcción, y en general el industrial, lleva años de retraso en comparación con sectores como la banca o incluso el educativo, como el Instituto de Empresa. Pero precisamente ese retraso es una oportunidad. Con la IA y las nuevas infraestructuras, se está reduciendo esa brecha entre el mundo industrial y otros sectores. Y en el caso de la construcción, probablemente el retraso sea aún mayor, lo que hace que el potencial de mejora sea significativo”. Y es que, dijo, “aunque la digitalización es necesaria, la inversión siempre se analiza mucho en este sector. Aun así, los costes tecnológicos están bajando, lo que facilita avanzar. Para nosotro, la clave es entender todo esto como una oportunidad.

Para finalizar, Carlos Garriga admitió que “no tanto a nivel de nuestra industria, la educación superior, sino más en el rol de la función tecnológica dentro de cualquier industria, creo que es una mezcla de oportunidad y reto”, para desarrollar así su explicación: “Estamos afrontando un periodo de fuerte redefinición de todas las industrias, pero especialmente del papel de la tecnología. ¿Cuál va a ser el rol de los departamentos de tecnología cuando el desarrollo tecnológico se está descentralizando? Probablemente, el foco se desplace más hacia la gestión de infraestructuras, la gestión de riesgos y el compliance. Muchas veces digo que el CIO o el CTO del futuro va a asumir muchas de esas funciones menos “atractivas”, pero críticas. Al mismo tiempo, vamos a ganar protagonismo como habilitadores de soluciones tecnológicas abiertas, que luego serán utilizadas por las áreas de negocio”.

무료 강의부터 전문 자격증 과정까지…ISC2·IBM·AWS 양자 보안 교육 총정리

양자 컴퓨팅 기업들의 발표는 이른바 ‘Q-데이(Q-day)’ 도래 시점을 점점 앞당기고 있다. Q-데이는 양자 컴퓨터가 일반적인 비즈니스 애플리케이션에 활용될 만큼 강력해지거나, 기존 암호화 표준을 무력화할 수 있는 시점을 의미한다. 시장조사기관 포레스터의 최신 전망에 따르면 그 시점은 2030년경이 될 가능성이 크다.포레스터의 애널리스트 브라이언 홉킨스는 보고서에서 “양자 컴퓨팅 산업은 2025년에 변곡점을 넘어섰다”라며 “벤더가 이론적 오류 내성 아키텍처를 넘어 초기 엔지니어링 현실 단계로 이동했다”라고 분석했다.

예를 들어 IBM은 2029년까지 오류 내성 양자 컴퓨팅을 달성하겠다는 로드맵을 제시했다. 홉킨스는 “불과 몇 년 전만 해도 비현실적으로 치부됐을 목표”라고 평가했다.

글로벌 사이버 보안 교육 기관 ISC2의 CISO 존 프랑스는 “양자 컴퓨팅은 기존 암호화 방식에 대한 명확하고도 현실적인 위협”이라고 진단했다.

기업이 양자 컴퓨팅에 대비하는 방법은 크게 두 가지다. 첫 번째이자 가장 시급한 과제는 핵심 기밀을 보호하는 일이다. 국가 단위 행위자와 기타 위협 주체가 이미 암호화된 정보를 수집해 두었다가, 향후 양자 컴퓨터로 이를 해독하려 할 가능성이 높다는 분석이다. 이를 방어하려면 온라인 통신에 주로 사용되는 비대칭 암호보다 상대적으로 해독이 어려운 대칭 암호와, 양자 안전 비대칭 암호 알고리즘을 병행 적용해야 한다. 프랑스는 “이상적으로는 지금 당장 양자 복원력이 있는 알고리즘을 사용해야 한다”라며 “이미 많은 조직이 그렇게 하고 있다”라고 설명했다.

두 번째는 양자 컴퓨팅 도입 시 실질적 이점을 얻을 수 있는 기업이 관련 역량을 선제적으로 확보하는 일이다. 복잡한 금융, 물류, 과학 문제를 다루는 기업이라면 양자 기술을 통해 경쟁력을 강화할 수 있다. 단순히 암호화를 보완하는 것만으로는 충분하지 않으며, 인증 체계 등 보안 전반에 대한 재검토도 필요하다는 지적이 나온다.

다행히 양자 물리학 박사 학위가 여러 개 없어도 기술을 활용할 수 있는 환경이 조성되고 있다. 주요 벤더가 일반 사용자도 접근할 수 있도록 플랫폼을 고도화하고 있기 때문이다. 다만 기본적인 이해를 갖추는 일은 여전히 중요하다.

ISC2는 이러한 수요에 맞춰 최근 사이버 보안 관점에서 양자 컴퓨팅을 다루는 속성 입문 과정을 개설했다. 30분 분량의 온라인 프로그램으로, 수강료는 23달러이며 ISC2 회원은 19달러에 수강할 수 있다. 별도의 선수 요건은 없다.

ISC2의 학습 경험 담당 부디렉터 존 더건은 “이 과정은 주제를 빠르게 이해할 수 있는 기초를 제공하는 데 목적이 있다”라며 “수강생이 양자 컴퓨터를 직접 설계하는 수준까지 다루는 것은 아니지만, 최신 흐름을 따라가면서 보수 교육 학점을 취득할 수 있도록 설계됐다”라고 전했다.프랑스는 향후 양자 관련 과정을 추가로 확대할 계획이라고 밝혔다. 프랑스는 “양자 분야는 변화 속도가 매우 빠르기 때문에 익스프레스 학습 형태로 지속적으로 다룰 예정”이라고 언급했다.

암호화 대응이 가장 많은 기업에 시급한 과제라면, 일부 기업은 이미 양자 컴퓨팅 분야 인재 채용에 나서고 있다. 인재 채용 전문 기업 CNA 서치(CNA Search)의 설립자이자 수석 리크루터 제이슨 크레인은 방산업체, 국립 연구소, 금융 서비스 기업이 대표적이라고 소개했다. 크레인은 “JP모건, 골드만삭스, 여러 헤지펀드가 활발한 양자 연구팀을 운영하고 있다”라며 “대규모 채용 단계는 아니지만, 현재 존재하는 직무의 보상 수준은 매우 높은 편”이라고 설명했다.

다만 양자 인재를 둘러싼 병목 현상도 이미 나타나고 있다. 크레인은 기업이 필요한 인재를 찾고 검증하는 데 어려움을 겪고 있다고 전했다. 대다수 고용주는 물리학, 수학, 암호학, 소프트웨어 엔지니어링 분야의 전문성을 갖춘 학문적 배경을 중시한다. 크레인은 “그 다음으로는 실제 도구와 프레임워크를 활용한 경험을 확인하려 한다”라고 설명했다.

잠재력을 보고 인재를 선발해 내부에서 육성하는 기업도 있다. 크레인은 “현재 클라우드나 사이버 보안 분야처럼 명확한 양자 인증 체계는 아직 없다”라며 “양자 분야로 전환하려는 인재는 벤더 교육, 온라인 강좌, 주요 기업이 공개한 클라우드 환경에서의 실습을 조합해 준비하고 있다”라고 전했다. 이어 “상당 부분은 직접 해보며 배우는 방식”이라고 표현했다.크레인은 구직자에게 양자 역량은 장기적인 투자에 가깝다고 조언했다. 다만 선제적으로 진입할 수 있는 기회가 열려 있다고 봤다. 크레인은 “2010년에 AWS를 배우는 것과 비슷하다”라며 “당시에는 필요성이 크지 않았지만 지금은 모두가 필요로 한다. 초기에 뛰어든 사람은 후회하지 않았다”라고 분석했다.

이제 가격, 경험 수준, 학습 기간별로 살펴본 주요 온라인 양자 컴퓨팅 및 사이버 보안 교육 과정을 소개한다.

온라인 강의 및 수료 프로그램

ISC2 익스프레스 과정

• 과정명: Introduction to Quantum Computing Express Course
• 가격: 비회원 23달러, ISC2 회원 19달러
• 기간 및 방식: 30분, 주문형(on-demand) 자율 학습 과정으로 오디오 및 텍스트 기반 콘텐츠와 이해도 점검 문제 포함
• 선수 요건: 없음
• 이수 혜택: 디지털 수료증, ISC2 자격에 자동 보고되는 그룹 A CPE 0.5학점
• 대상: 신기술과 전략적 보안 이슈에 대한 이해를 넓히려는 사이버 보안 전문가
• 학습 내용: 양자 컴퓨팅의 작동 원리와 기술 발전 방향, 그리고 조직이 양자 시대의 위협에 대비하기 위해 취해야 할 조치를 실무 중심으로 개괄

SISA 수료

• 과정명: 공인 양자 보안 전문가(CQSP)
• 가격: 자격 시험만 299달러, 자격·교육·재시험 1회 포함 700달러
• 기간 및 방식: 16시간 과정으로 온·오프사이트 워크숍 형태, 문서 키트 제공, 팀 교육 및 경영진 대상 프레젠테이션 포함
• 선수 요건: 16시간 CQSP 워크숍 이수 또는 시험 블루프린트 주제를 다루는 최소 16시간 이상의 동등한 공식 교육 이수 권장(사이버 보안 전문가 대상)
• 이수 혜택: CQSP 수료증
• 대상: 양자 컴퓨팅 시대를 준비하는 보안 리더, 아키텍트, 컴플라이언스 담당자
• 학습 내용: 양자 안전 암호, 위험 평가, NIST·ISO·ETSI 표준과의 정렬 방안 등 조직의 양자 대응 전략을 주도할 수 있도록 하는 실무 중심 교육

토넥스(Tonex) 수료

• 과정명: 공인 양자 사이버 보안 분석가(CQCA)
• 가격: 2,199달러
• 기간 및 방식: 2일 과정으로 강의, 실습, 실제 사례 연구를 병행
• 선수 요건: 사이버 보안 개념과 암호 기술에 대한 기본 이해
• 이수 혜택: 전체 시험 점수 70% 이상 및 각 영역별 최소 기준 점수 충족 시 토넥스 CQCA 수료증 부여
• 대상: 사이버 보안 전문가, IT 관리자, 시스템 아키텍트, 보안 솔루션 설계·구현·운영에 관여하는 담당자
• 학습 내용: 양자 컴퓨팅의 기초와 사이버 보안에 대한 영향, 고급 암호 기술, 양자 저항 알고리즘, 양자 키 분배(QKD) 프로토콜

토넥스는 이와 함께 ‘공인 양자 및 포스트 양자 암호 전문가(QPQCP)’ 자격 프로그램도 운영하고 있다.

IBM 양자 학습 프로그램

• 과정명: Practical Introduction to Quantum-Safe Cryptography
• 가격: 무료
• 기간 및 방식: 자율형 온라인 과정으로, 멀티모달 강의와 인터랙티브 실시간 코드 예제 제공
• 선수 요건: 별도 명시 없음, 개발자 대상 설계
• 이수 혜택: 온라인 단기 시험 통과 시 크레들리(Credly)를 통한 IBM 디지털 배지 발급
• 대상: 포스트 양자 시대에 맞춰 애플리케이션 보안을 현대화하려는 개발자
• 학습 내용: 암호학적 해시 함수, 대칭·비대칭 키 암호, 양자 안전 암호의 개념과 함께 진화하는 사이버 보안 위협 환경, 그리고 양자 시대에 적용 가능한 최신 대응 방식

IBM은 이와 함께 200달러에 ‘IBM Certified Quantum Computation using Qiskit v2.X Developer – Associate’ 수료 프로그램을 제공한다. 또한 시험 준비를 지원하기 위해 무료 강좌 5개로 구성된 ‘Understanding Quantum Information and Computation’ 시리즈도 운영하고 있다.

마이크로소프트(MS) 애저 퀀텀 학습

• 과정명: Azure Quantum Learning Path
• 가격: 무료
• 기간 및 방식: 마이크로소프트 런(Microsoft Learn)을 통해 제공되는 6개 자율형 온라인 인터랙티브 모듈(총 약 3시간)과 Q# 프로그래밍 튜토리얼 ‘Quantum Katas’ 포함
• 선수 요건: 애저 생태계와 선형대수에 대한 기본 지식, 비주얼 스튜디오 코드 사용 경험
• 이수 혜택: Microsoft Learn 수료 배지
• 대상: MS 도구를 활용해 양자 프로그래밍을 직접 실습하려는 개발자 및 기술 전문가
• 학습 내용: 양자 컴퓨팅 기초, Quantum Development Kit 및 Q#을 활용한 프로그램 개발 방법, Azure Quantum 리소스 추정기를 통한 물리적 자원 요구량 산정 방법

아마존웹서비스(AWS) 양자 애플리케이션 개발 학습

• 과정명: Skill Builder: Amazon Braket Learning Plan
• 가격: 무료
• 기간 및 방식: AWS 스킬 빌더에서 제공하는 2개 자율형 온라인 과정으로, 60분 입문 과정과 90분 양자 애플리케이션 개발 과정으로 구성
• 선수 요건: 별도 명시 없음, AWS 서비스에 대한 기본 이해 권장
• 이수 혜택: 50문항 온라인 평가에서 80% 이상 획득 시 Amazon Braket 디지털 배지 발급
• 대상: 양자 컴퓨팅 개발자, 교육자, 일반 관심자, 브라켓을 수업에 활용하는 강사
• 학습 내용: Amazon Braket의 기본 개념, 양자 컴퓨터 프로그래밍과 잠재적 활용 사례 탐색, AWS 도구를 활용한 하이브리드 양자-고전 알고리즘 실행 방법

MIT xPRO 프로그램

• 과정명: Quantum Computing Fundamentals
• 가격: 2개 과정 패키지 2,500달러
• 기간 및 방식: 각 4주 과정 2개로 구성되며, 주당 4~6시간 학습 분량. 영상 강의, 시뮬레이션, 사례 연구, 라이브 웨비나를 포함한 100% 온라인 과정
• 선수 요건: 선형대수 기초 지식
• 이수 혜택: MIT 전문 수료증 및 4.0 평생교육학점(CEU)
• 대상: 양자 컴퓨팅이 비즈니스와 기술에 미치는 영향을 이해해야 하는 기업·정부·기술 분야 전문가 및 리더
• 학습 내용: 사이버 보안, 화학, 최적화 분야에서 양자 알고리즘이 기존 알고리즘을 능가하는 방식, 양자 시스템의 공학적 요구사항, IBM Q 경험을 활용한 실습 중심의 비즈니스 적용 사례

시카고대학교 edX 자격 과정

• 과정명: Quantum Computing for Everyone
• 가격: 청강 무료, 수료증 과정 398달러(현재 358달러로 할인 중)
• 기간 및 방식: 약 3개월, 주당 3~5시간, 자율형 온라인 과정
• 선수 요건: 프로그래밍 경험과 기초 대수 지식, 물리학 배경은 필요 없음
• 이수 혜택: 시카고대학교 edX 전문 수료증
• 대상: 고급 수학 지식 없이도 양자 컴퓨팅이 기업, 정부, 사회에 미칠 영향을 이해하려는 학습자
• 학습 내용: 양자 컴퓨팅의 물리학적 기초, 산업과 사회에 대한 영향, 구체적 활용 사례 식별 방법, 1·2큐비트 연산을 활용한 기초 양자 소프트웨어 구현

델프트 공과대학교(TU Delft) edX 자격 과정

• 과정명: Quantum 101: Quantum Computing & Quantum Internet
• 가격: 청강 무료, 인증 전문 수료증 370달러(현재 333달러로 할인 중)
• 기간 및 방식: 2개 과정, 3개월, 주당 6~8시간, 자율형 온라인
• 선수 요건: 기초 물리·수학 지식이 있으면 도움이 되며, 고급 학위는 필요 없음
• 이수 혜택: 델프트 공과대학교 edX 전문 수료증
• 대상: 공학, 화학, 컴퓨터 과학, 물리학 등 다양한 분야에서 양자 기술 심화 학습이나 경력 확장을 준비하는 학생 및 전문가
• 학습 내용: 양자 컴퓨터와 양자 인터넷의 물리적 구현 및 제어 방식, 양자 알고리즘, 오류 수정, 컴파일러와 프로그래밍 언어, 양자 네트워킹과 안전한 양자 통신의 원리

메릴랜드대학교 볼티모어카운티(UMBC) edX 자격 과정

• 과정명: Introduction to Post-Quantum Cryptography
• 가격: 청강 무료, 인증서 249달러(현재 212달러로 할인 중)
• 기간 및 방식: 6주 온라인 과정으로 강의와 실습 병행
• 선수 요건: STEM 입문 학습자 대상, 고급 배경 지식 불필요
• 이수 혜택: UMBC edX 인증 수료증
• 대상: 양자 컴퓨팅 위협에 대응하려는 사이버 보안 전공 학생 및 실무자
• 학습 내용: 양자 안전 암호의 이론과 실제 문제 해결을 포함한 몰입형 입문 과정. NIST 포스트 양자 암호(PQC) 표준인 카이버(Kyber)와 딜리시움(Dilithium)을 활용한 실습 포함

다코타주립대학교 대학원 수료 과정

• 과정명: Quantum Computing for Cybersecurity Graduate Certificate
• 가격: 7,197달러
• 기간 및 방식: 12학점, 온라인 제공
• 선수 요건: STEM 분야 종사자 또는 최근 졸업자, 대학원 입학 요건 충족 필요
• 이수 혜택: 다코타주립대학교 대학원 수료증
• 대상: 포스트 양자 암호와 양자 암호학을 포함해 양자 컴퓨팅이 사이버 보안에 미치는 영향을 심층적으로 학습하려는 STEM 전문가
• 학습 내용: 양자 공격에 견딜 수 있는 암호 솔루션을 분석·설계하는 방법과 함께 공격·방어 전략 전반을 포괄

로드아일랜드대학교 대학원 수료 과정

• 과정명: Quantum Computing Graduate Certificate
• 가격: 약 1만 1,000달러
• 기간 및 방식: 4개 과목, 12학점, 비동기식 100% 온라인 과정으로 2개 학기 이상에 걸쳐 이수하도록 설계
• 선수 요건: STEM 분야 종사자 또는 최근 졸업자, 대학원 입학 요건 충족 필요
• 이수 혜택: 로드아일랜드대학교 대학원 수료증
• 대상: 양자 산업 분야 진출을 준비하는 STEM 전문가 및 졸업자
• 학습 내용: 양자 컴퓨팅 기초 이론, IBM 키스킷(Qiskit) SDK를 활용한 양자 알고리즘 설계 및 적용 역량, 양자 센싱, 텔레포테이션, 암호, 회로, 통신에 대한 전반적 이해

dl-ciokorea@foundryco.com

Cargill deploys private 5G to aid factory AI and automation efforts

Connectivity at legacy facilities can present significant challenges for manufacturing companies seeking to optimize operations on the factory floor.

To remedy that, food production giant Cargill is tapping private 5G as a means for unlocking new levels of automation across its extensive system of factories, including the introduction of AI-powered robots.

NTT DATA’s private 5G network will provide the backbone for the company’s factory connectivity strategy, which was launched in March 2025 and covers 50 of its 1,100 facilities as of February 2026. The company plans to add private 5G to more than 100 sites per year.

The network provides Cargill with reliable, low-latency connectivity to smartphones and tablets on factory floors and has open the door to experiments with AI-powered robots, including its deployment of Boston Dymanics’ Spot at its Amsterdam facility to automate inspections. The four-legged robot checks for hazards such as overheating equipment and looks for ways to improve worker safety.

Spot roams the factory in a preset pattern and builds a database of information about the conditions it finds there, says Robert Greiner, Cargill’s director of platform engineering for customer, commercial, and business operations digital technology.

“It’ll do vibration tests, it’ll do air quality tests, it’ll do a whole bunch of different measures of what the plant should look like in normal conditions,” he adds. “Because it’s doing that same path every day, it then starts building a database of what normal looks like and what normal doesn’t look like.”

Cargill robotics on factory floor

Cargill

Cargill is exploring other ways to bring AI to its factory facilities, many of which are decades old, Greiner says. Reliable connectivity will enable the company to retrofit the buildings with modern sensors.

“Whether it’s a motor that turns or a mill, they generate heat, they have bearings, and they have failures,” he says. “5G has lit up a large area of those plants that didn’t have connectivity out there.”

More coverage

Cargill turned to NTT DATA and private 5G because of challenges with traditional Wi-Fi at many of its factories, Greiner says. In addition to covering a wider area than Wi-Fi routers, private 5G networking provides better connectivity through thick walls and other obstacles than public cellular networks, he notes.

“In the manufacturing environment, when you get outside of what I call a carpeted space, connectivity becomes an issue,” he adds. “Coming out of COVID, with Industry 4.0, there’s been a need for advanced connectivity out there in the plant floor, and our model was struggling to get that connectivity.”

Cargill can now deploy one private 5G network access point to cover the same area as about nine Wi-Fi access points.  And while private 5G assess points can cost more than Wi-Fi equipment, additional savings come during installation, with a 70% reduction in cabling and setup costs, Greiner says.

“In our environment we mostly have to run that cabling in conduits, and we have all that infrastructure cost that has to go into the factory floor to enable that access point toward the other side,” he says.

Meanwhile, private 5G gives the company more control over its networks than public cellular networks would, he adds.

“If you’re running on that public network and you’re in the middle of Nebraska, then the school lets out and the school bus pulls up next to the plant and every kid starts streaming data,” he says. “You’re relying on that connection to do some process, but that cell tower could be overrun by the school bus that just happens to be sitting there at that critical time.”

Pen and paper no more

Private 5G also will enable Cargill to update major software platforms and other apps in a secure and reliable way, Greiner says. The company has had several small warehouses sprinkled around the world with no connectivity, and private 5G deployments will allow them to install ERP systems.

“These dark warehouses didn’t have Wi-Fi in them, and they basically were using a No. 2 pencil and a yellow pad for keeping track of the inventory,” he says. “They’re moving to SAP, they have an inventory management system now, and they had the ability to switch over to an electronic inventory system, a warehousing system.”

Cargill took a smart approach to deploying private 5G by approaching it as foundational infrastructure rather than a single-use technology, says Parma Sandhu, vice president of enterprise 5G products and services at NTT.

“Instead of building networks for individual applications, the company deployed connectivity across facilities so multiple use cases — connected worker, robotics, sensors, inspections, and worker tools — can run on the same network,” Sandhu adds. “That approach allows new capabilities to be added over time without rebuilding the underlying connectivity.”

Private 5G can use several slices of the radio spectrum, and NTT DATA works with customers to find the best spectrum for their needs, Sandhu says. Connections can vary from sub-300Mbps to multigigabit speeds, depending on the spectrum used, but throughput isn’t the primary concern on most factory floors, he adds.

“In industrial environments, reliability and consistency matter more than peak speed,” Sandhu says. “Private 5G delivers high capacity and low latency, but the real advantage is secure, predictable connectivity across large facilities with thousands of connected devices. That reliability is what enables automation, robotics, and real-time monitoring on the factory floor.”

Private 5G is gaining traction in manufacturing as factories embrace generative AI, agentic AI, edge AI, and physical AI, Sandhu says. “There has been an explosion in demand for OT data, which requires more compute power and a faster, more reliable, and more secure connectivity,” he adds.

The factory use case

Private 5G makes sense in factory settings, says Jason Leigh, senior research manager for the mobility team at IT analyst firm IDC. While the gap is narrowing, private 5G has given factories more control over network performance than traditional Wi-Fi, and it is also built on a zero-trust security model, he adds.

“If you’re deploying a private network, you can pretty much tune it to say, ‘This network is always going to give me 100 megabits down, 50 megabits up,’” he says. “You can get a little better performance and control who comes on and off the network. “

While outsiders can access a Wi-Fi network if they have the password, private 5G can authenticate at the device SIM level, Leigh says. “It doesn’t matter if you have the password,” he adds.

Private 5G also has advantages as factories adopt more automation and other digital transformation initiatives, Leigh says. While smartphones and tablets running standard applications may not need a specialized network, technologies like AR and VR can benefit.

“Where it gets interesting is when you move towards more automation, more robotics,” he adds. “When you’re running a high-speed factory line and you’re using video to scan for quality issues, with private 5G, you can run that at high speed.”

AI-driven maintenance will need stable connections, he says. “You want that real-time super low-latency connection to exchange the image with the processing and back,” he adds. “You don’t want 10 minutes before the data processing to say, ‘This was an error in this problem, and the product should have been rejected.’”

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises

It’s hard to overstate the role that Wi-Fi plays in virtually every facet of life. The organization that shepherds the wireless protocol says that more than 48 billion Wi-Fi-enabled devices have shipped since it debuted in the late 1990s. One estimate pegs the number of individual users at 6 billion, roughly 70 percent of the world’s population.

Despite the dependence and the immeasurable amount of sensitive data flowing through Wi-Fi transmissions, the history of the protocol has been littered with security landmines stemming both from the inherited confidentiality weaknesses of its networking predecessor, Ethernet (it was once possible for anyone on a network to read and modify the traffic sent to anyone else), and the ability for anyone nearby to receive the radio signals Wi-Fi relies on.

Ghost in the machine

In the early days, public Wi-Fi networks often resembled the Wild West, where ARP spoofing attacks that allowed renegade users to read other users' traffic were common. The solution was to build cryptographic protections that prevented nearby parties—whether an authorized user on the network or someone near the AP (access point)—from reading or tampering with the traffic of any other user.

Read full article

Comments

© Getty Image | BlackJack3D

Ways to Tell if a Website Is Fake

Unfortunately, scammers today are coming at us from all angles, trying to trick us into giving up our hard-earned money. We all need to be vigilant in protecting ourselves online. If you aren’t paying attention, even if you know what to look for, they can still catch you off guard. There are numerous ways to detect fake sites, phishing, and other scams, including emails.

Before we delve into the signs of fake websites, we will first take a closer look at the common types of scams that use websites, what happens when you accidentally access a fake website, and what you can do in case you unknowingly purchased items from it.

What are fake or scam websites?

Fake or scam websites are fraudulent sites that look legitimate while secretly attempting to steal your personal information, money, or account access.

These deceptive platforms masquerade as trustworthy businesses or organizations, sending urgent messages that appear to be from popular shopping websites offering fantastic limited-time deals, banking websites requesting immediate account verification, government portals claiming you owe taxes or are eligible for refunds, and shipping companies asking for delivery fees.

The urgency aims to trick you into logging in and sharing sensitive information, such as credit card numbers, Social Security details, login credentials, and personal data. Once you submit your data, the scammers will steal your identity, drain your accounts, or sell your details to other criminals on the dark web.

These scam websites have become increasingly prevalent because they’re relatively inexpensive to create and can reach millions of potential victims quickly through email and text campaigns, social media ads, and search engine manipulation.

Cybersecurity researchers and consumer protection agencies discover these fraudulent sites through various methods, including monitoring suspicious domain registrations, analyzing reported phishing attempts, and tracking unusual web traffic patterns. According to the FBI’s Internet Crime Complaint Center, losses from cyber-enabled fraud totaled $13.7 billion, with fake websites accounting for a significant portion of these losses.

Consequences of visiting a fake website

Visiting a fake website, accidentally or intentionally, can expose you to several serious security risks that can impact your digital life and financial well-being:

  • Credential theft: Scammers can capture your login information through fake login pages that look identical to legitimate sites. Once they have your username and password, they can access your real accounts and steal personal information or money.
  • Credit card fraud: When you enter your bank or credit card details on fraudulent shopping or fake service portals, scammers can use your payment information for unauthorized purchases or sell these to other criminals on the dark web.
  • Malware infection: Malicious downloads, infected ads, or drive-by downloads may happen automatically when you visit certain fake sites. These, in turn, can steal personal files, monitor your activity, or give criminals remote access to your device.
  • Identity theft: Fake sites can collect personal information, such as Social Security numbers, addresses, or birthdates, through fraudulent forms or surveys.
  • Account takeovers: Criminals can use stolen credentials to access your email, banking, or social media accounts, potentially locking you out and using your accounts for further scams.

Common types of scam websites

Scammers employ various tactics to create fake websites that appear authentic, but most of these techniques follow familiar patterns. Knowing the main types of scam sites helps you recognize danger faster. This section lists the most common categories of scam websites, explains how they operate, and identifies the red flags that alert you before they can steal your information or money.

  • Fake shopping stores: These fraudulent e-commerce sites steal your money and personal information without delivering products. They offer unrealistic discounts (70%+ off), have no customer service contact information, or accept payments only through wire transfers or gift cards. These sites often use stolen product images and fake customer reviews to appear legitimate.
  • Phishing login pages: These sites mimic legitimate services such as banks, email providers, or social media platforms to harvest your credentials. Their URLs that don’t match the official domain, such as “bankofamerica-security.com” instead of “bankofamerica.com.” Their urgent messages claim your account will be suspended unless you log in immediately.
  • Tech support scam sites: These fake websites claim to detect computer problems and offer remote assistance for a fee. They begin with a pop-up ad with a loud alarm to warn you about viruses, providing phone numbers to call “immediately” or requesting remote desktop access from unsolicited contacts.
  • Investment and crypto sites: These sites guarantee incredible returns on cryptocurrency or investment opportunities, feature fake celebrity endorsements, or pressure you to invest quickly before a “limited-time opportunity” expires.
  • Giveaway and lottery pages: You receive notifications with a link to a page that claims you’ve won prizes In contests you never entered, but require upfront fees or personal information to receive them. They will request bank account details to “process your winnings” or upfront processing fees.
  • Shipping and parcel update portals: These typically appear as tracking pages that mimic delivery services, such as USPS, UPS, or FedEx, to steal personal information or payment details. The pages ask for immediate payment to release and deliver the packages, or for login credentials to accounts you don’t have with that carrier.
  • Malware download pages: These ill-intentioned sites offer “free” but uncertified software, games, or media files that contain harmful code to infect your device once you click on the prominent “Download” button.
  • Advance fee and loan scams: These sites claim to guarantee approved loans or financial services, regardless of your credit score. But first, you will have to post an upfront payment or processing fees before any actual assistance is rendered.

Understanding these common scam types helps you recognize fake sites before they can steal your information or money. When in doubt, verify legitimacy by visiting official websites directly through bookmarks or search engines rather than clicking suspicious links.

For the latest warnings and protection guidance, check resources from the Federal Trade Commission and the FBI’s Internet Crime Complaint Center.

Recognize a fake site

You can protect yourself by learning to recognize the warning signs of fake sites. By understanding what these scams look like and how they operate, you’ll be better equipped to shop, bank, and browse online with confidence. Remember, legitimate companies will never pressure you to provide sensitive information through unsolicited emails or urgent pop-up messages.

  1. Mismatched domain name and brand: The website URL doesn’t match the company name they claim to represent, like “amazoon-deals.com” instead of “amazon.com.” Scammers use similar-looking domains to trick you into thinking you’re on a legitimate site.
  2. Spelling mistakes and poor grammar: Legitimate businesses invest in professionally created content to ensure clean and error-free writing or graphics. If you are on a site with multiple typos, awkward phrasing, or grammatical errors, this indicates that it was hastily created and not thoroughly reviewed, unlike authentic websites.
  3. Missing or invalid security certificate: The site lacks the “https://” prefix in the URL or displays security warnings in your browser. Without proper encryption, any information you enter can be intercepted by criminals.
  4. Fantastic deals: Look out for prices that are dramatically low—like designer items at 90% off or electronics at impossibly low costs. Scammers use unrealistic bargains to lure victims into providing payment information.
  5. High-pressure countdown timers: The site displays urgent messages such as “Only 2 left!” or countdown clocks with limited-time offers that reset when you refresh the page. These fake urgency tactics push you to make hasty decisions without proper research.
  6. No physical address, contact information, or legitimate business details: The site provides only an email address or contact form. In the same vein, any email address they provide may look strange, like northbank@hotmail.com. Any legitimate business will not use a public email account, such as Hotmail, Gmail, or Yahoo.
  7. Missing or vague return policy: Legitimate businesses want satisfied customers and provide clear policies for returns and exchanges. Scams, however, often fail to provide clear refund policies, return instructions, or customer service information.
  8. Stolen or low-quality images: Scammers often steal images from legitimate sites without permission, making their product photos look pixelated, watermarked, or inconsistent in style and quality.
  9. Fake or generic reviews: Authentic reviews include specific details and a mix of ratings and comments. On fake websites, however, customer reviews are often overly positive, using generic language, posted on the same dates, or containing similar phrasing patterns.
  10. Limited payment options: Legitimate businesses offer secure payment options with buyer protection. Fake websites, however, only accept wire transfers, cryptocurrency, gift cards, or other non-reversible or untraceable payment methods.
  11. Recently registered domain: The website was created very recently—often just days or weeks ago, whereas established businesses typically have older, stable web presences.
  12. Fake password: If you’re at a fake site and type in a phony password, the fake site is likely to accept it.

Recognize phishing, SMiShing, and other fake communications

Most scams typically start with social engineering tactics, such as phishingsmishing, and fake social media messages containing suspicious links, before directing you to a fake website.

From these communications, the scammers impersonate legitimate organizations before finally executing their malevolent intentions. To avoid being tricked, it is essential to recognize the warning signs wherever you encounter them.

Email phishing red flags

Fake emails are among the most common phishing attempts you’ll encounter. If you see any of these signs in an unsolicited email, it is best not to engage:

  • One way to recognize a phishing email is by its opening greeting. A legitimate email from your real bank or business will address you by name rather than a generic greeting like “Valued Customer” or something similar.
  • In the main message, look for urgent language, such as “Act now!” or “Your account will be suspended immediately.” Legitimate organizations rarely create artificial urgency around routine account matters. Also, pay attention to the sender’s email address. Authentic companies use official domains, not generic email services like Gmail or Yahoo for business communications.
  • Be suspicious of emails requesting your credentials, Social Security number, or other sensitive information. Banks and reputable companies will never ask for passwords or personal details via email.
  • Look closely at logos and formatting. Spoofed emails often contain low-resolution images, spelling errors, or slightly altered company logos that don’t match the authentic versions.

SMS and text message scams

Smishing messages bear the same signs as phishing emails and have become increasingly sophisticated. These fake messages often appear to come from delivery services, banks, or government agencies. Common tactics include fake package delivery notifications, urgent banking alerts, or messages claiming you’ve won prizes or need to verify account information.

Legitimate organizations typically don’t include clickable links in unsolicited text messages, especially for account-related actions. When in doubt, don’t click the link—instead, open your banking app directly or visit the official website by typing the URL manually.

Social media phishing

Social media platforms give scammers new opportunities to create convincing fake profiles and pages. They might impersonate customer service accounts, create fake giveaways, or send direct messages requesting personal information. These fake sites often use profile pictures and branding that closely resemble legitimate companies.

Unusual sender behavior is another indicator of a scam across all platforms. This includes messages from contacts you haven’t heard from in years, communications from brands you don’t typically interact with, or requests that seem out of character for the supposed sender.

Examples of fake or scam websites

Scammers have become increasingly cunning in creating fake websites that closely mimic legitimate businesses and services. Here are some real-life examples of how cybercriminals use fake websites to victimize consumers:

USPS-themed scams and websites

Scammers exploit your trust in the United States Postal Service (USPS), designing sophisticated fake websites to steal your personal information, payment details, or money. They know you’re expecting a package or need to resolve a delivery issue, making you more likely to enter sensitive information without carefully verifying the site’s authenticity.

USPS-themed smishing attacks arrive as text messages stating your package is delayed, undeliverable, or requires immediate action. Common phrases include “Pay $1.99 to reschedule delivery” or “Your package is held – click here to release.”

Common URL tricks in USPS scams

Scammers use various URL manipulation techniques to make their fake sites appear official. Watch for these red flags:

  • Misspelled domains: Sites like “uspps.com,” “uspo.com,” or “us-ps.com” instead of the official “usps.com”
  • Extra characters: URLs containing hyphens, numbers, or additional words like “usps-tracking.com” or “usps2024.com”
  • Different extensions: Domains ending in .net, .org, .info, or country codes instead of .com
  • Subdomain tricks: URLs like “usps.fake-site.com” where “usps” appears as a subdomain rather than the main domain
  • HTTPS absence: Legitimate USPS pages use secure HTTPS connections, while some fake sites may only use HTTP

Verify through official USPS channels

Always verify package information and delivery issues through official USPS channels before taking any action on suspicious websites or messages:

  • Official USPS website: Report the incident directly to usps.com by typing the URL into your browser rather than clicking links from emails or texts. Use the tracking tool on the homepage to check your package status with the official tracking number.
  • Official USPS mobile app: The USPS mobile app, available from official app stores, provides secure access to tracking, scheduling, and delivery management. Verify that you are downloading from USPS by checking the publisher name and official branding.
  • USPS Customer Service: If you receive conflicting information or suspect a scam, call USPS Customer Service at 1-800-ASK-USPS (1-800-275-8777) to verify delivery issues or payment requests.
  • Your local post office: When you need definitive verification, speak with postal workers at your local USPS location who can access your package information directly in their systems.

Where and how to report fake USPS websites

Reporting fake USPS websites helps protect others from falling victim to these scams and assists law enforcement in tracking down perpetrators.

  • Report to USPS: Forward suspicious emails to the United States Postal Inspection Service and report fake websites through the USPS website’s fraud reporting section. The Postal Inspection Service investigates mail fraud and online scams targeting postal customers.
  • File with the Federal Trade Commission: Report the fraudulent website at ReportFraud.ftc.gov, providing details about the fake site’s URL, any money lost, and screenshots of the fraudulent pages.
  • Contact the Federal Bureau of Investigation: Submit reports through the FBI’s Internet Crime Complaint Center, especially if you provided personal information or lost money to the scam.
  • Alert your state attorney general: Many state attorneys general’s offices track consumer fraud and can investigate scams targeting residents in their jurisdiction.

Remember that legitimate USPS services are free for standard delivery confirmation and tracking. Any website demanding payment for basic package tracking or delivery should be treated as suspicious and verified through official USPS channels before providing any personal or financial information.

Tech support pop-up ads scams

According to the Federal Trade Commission, tech support scams cost Americans nearly $1.5 billion in 2024. These types of social engineering attacks are increasingly becoming sophisticated, making it more important than ever to verify security alerts through official channels.

Sadly, many scammers are misusing the McAfee name to create fake tech support pop-up scams and trick you into believing your computer is infected or your protection has expired, and hoping you’ll act without thinking.

These pop-ups typically appear while you’re browsing and claim your computer is severely infected with viruses, malware, or other threats. They use official-looking McAfee logos, colors, and messaging to appear legitimate to get you to call a fake support number, download malicious software, or pay for unnecessary services.

Red flags of fake McAfee pop-up

Learning to detect fake sites and pop-ups protects you from scams. Be on the lookout for these warning signs:

  • Offering phone numbers to call immediately: Legitimate McAfee software never displays pop-ups demanding you call a phone number right away for virus removal.
  • Requests for remote access: Authentic McAfee alerts won’t ask you for permission to control your computer to “fix” issues remotely.
  • Immediate payment demands: Real McAfee pop-ups don’t require instant payment to resolve security threats.
  • Countdown timers: Fake alerts often include urgent timers claiming your computer will be “locked” or “damaged” if you don’t act immediately.
  • Poor grammar and spelling: Many fraudulent pop-ups contain obvious spelling and grammatical errors.
  • Browser-based alerts: Genuine McAfee software notifications appear from the actual installed program, not through your web browser.

Properly close a McAfee-themed pop-up ad

If you see a suspicious pop-up claiming to be from McAfee, here’s exactly what you should do:

  1. Close the tab immediately: Don’t click anywhere on the pop-up, not even the “X” button, as this might trigger malware downloads.
  2. Use keyboard shortcuts: Press Ctrl+Alt+Delete or Command+Option+Escape (Mac) to force-close your browser safely.
  3. Don’t call any phone numbers: Never call support numbers displayed on the pop-ups, as these connect you directly to scammers.
  4. Avoid downloading software: Don’t download any “cleaning” or “security” tools offered through pop-ups.
  5. Clear your browser cache: After closing the pop-up, clear your browser’s cache and cookies to remove any tracking elements.

Verify your actual McAfee protection status

To check if your McAfee protection is genuinely active and up-to-date:

  • Open your installed McAfee software directly: Click on the McAfee icon in your system tray or search for McAfee in your start menu.
  • Visit the official McAfee website: Go directly to mcafee.com by typing it into your address bar.
  • Log in to your McAfee account: Check your subscription status through your official McAfee online account.
  • Use the McAfee mobile app: Download the official McAfee Mobile Security app to monitor your protection remotely.

Remember, legitimate McAfee software updates and notifications come through the installed program itself, not through random browser pop-ups. Your actual McAfee protection works quietly in the background without bombarding you with alarming messages.

Crush fake tech support pop-ups

Stay protected by trusting your installed McAfee software and always verifying security alerts through official McAfee channels, such as your installed McAfee dashboard or the official website.

  1. Close your browser safely. If you see a fake McAfee pop-up claiming your computer is infected, don’t click anything on the pop-up. Instead, close your browser completely using Alt+F4 (Windows) or Command+Q (Mac). If the pop-up does not close, open Task Manager (Ctrl+Shift+Esc) and end the browser process. This prevents any malicious scripts from running and stops the scammers from accessing your system.
  2. Clear browser permissions. Fake security pop-ups often trick you into allowing notifications that can bombard you with more scam alerts. Go to your browser settings and revoke notification permissions for suspicious sites. In Chrome, go to Settings > Privacy and Security > Site Settings > Notifications, then remove any unfamiliar or suspicious websites from the list of allowed sites.
  3. Remove suspicious browser extensions. Malicious extensions can generate fake McAfee alerts and redirect you to scam websites. Check your browser extensions by going to the extensions menu and removing any that you don’t recognize or that you didn’t intentionally install.
  4. Reset your browser settings. If fake pop-ups persist, reset your browser to its default settings to remove unwanted changes made by malicious websites or extensions, while preserving your bookmarks and saved passwords. In most browsers, you can find the reset option under Advanced Settings.
  5. Run a complete security scan. Use your legitimate antivirus software to perform a full system scan. If you don’t have security software, download a reputable program from the official vendor’s website only, such as McAfee Total Protection, to detect and remove any malware that might be generating the fake pop-ups.
  6. Update your operating system and browser. Ensure your device has the latest security and web browser updates installed, which often include patches for vulnerabilities that scammers exploit. Enable automatic updates to stay protected against future threats.
  7. Review and adjust notification settings. Configure your browser to block pop-ups and block sites from sending you notifications. You could be tempted to allow some sites to send you alerts, but we suggest erring on the side of caution and just block all notifications.

Steps to take if you visited or purchased from a fake site

Be prepared and know how to respond quickly when something doesn’t feel right. If you suspect you’ve encountered a fake website, trust your instincts and take these protective steps immediately.

  1. Disconnect immediately: Close your browser by using Alt+F4 (Windows), Ctrl + W (Chrome), or Command+Q (Mac) on your keyboard.
  2. Run a comprehensive security scan: If you suspect a virus or malware, disconnect from the internet to prevent data transmission. Conduct a full scan using your antivirus software to detect and remove any potential threats that may have been downloaded.
  3. Contact your credit card issuer: Call the number on the back of your card and report the fraudulent charges for which you can receive zero liability protection. Card companies allow up to 60 days for charge disputes under federal law and can refund payments made to the fake store. Consider requesting a temporary freeze on your account while the investigation proceeds.
  4. Cancel your credit card: Request a replacement card with a new number to give you a fresh start. Your card issuer can expedite the request if needed, often within 24-48 hours.
  5. Document everything thoroughly: Save all emails, receipts, order confirmations, and screenshots of the fake website before it potentially disappears. This documentation will be crucial for your chargeback and insurance claims, and any legal proceedings.
  6. Update passwords on other accounts: Scammers often test stolen credentials across multiple platforms, so if you reused the same password on the fake site that you use elsewhere, change those passwords immediately. Enable two-factor authentication on important accounts like email, banking, and social media.
  7. Stay alert for follow-up scams: Scammers may attempt to contact you via phone, email, or text claiming to “resolve” your situation through fake shipping notifications, additional payments to “release” your package, or “refunds” on your money in exchange for personal information.
  8. Monitor your credit and financial accounts. Keep a close eye on your bank and credit card statements for several months and place a fraud alert on your credit reports through one of the three major credit bureaus—TransUnion, Equifax, and Experian. Consider a credit freeze for maximum protection.
  9. Check for legitimate alternatives. If you were trying to purchase a specific product, research authorized retailers or the manufacturer’s official website. Verify business credentials, secure payment options, and return policies before making new purchases.

Report a scam website, email, or text message

  • Federal Trade Commission: Report fraudulent websites to the FTC, which investigates consumer complaints and uses this data to identify patterns of fraud and take enforcement action against scammers.
  • FBI’s Internet Crime Complaint Center: Submit detailed reports to the IC3 for suspected internet crimes. IC3 serves as a central hub for reporting cybercrime and coordinates with law enforcement agencies nationwide.
  • State Attorney General: If the fake store claimed to be located in your state, consider reporting to your state attorney general’s office, as these have dedicated fraud reporting systems and can take action against businesses operating within state boundaries. Find your state’s reporting portal through the National Association of Attorneys General website.
  • Domain registrar, hosting provider, social media: Look up the website’s registration details using a WHOIS tool, then report abuse to both the domain registrar and web hosting company. Most providers have dedicated abuse reporting emails and will investigate violations of their terms of service. If the fake page is on social media, you can report it to the platform to protect other consumers.
  • Search engines: Report fraudulent sites to Google through their spam report form and to Microsoft Bing via their webmaster tools to prevent the fake sites from appearing in search results.
  • The impersonated brand: If scammers are impersonating a legitimate company, report directly to that company’s fraud department or customer service. Most brands have dedicated channels for reporting fake websites and will work to shut them down.
  • Share your experience to protect others: Leave reviews on scam-reporting websites such as the Better Business Bureau’s Scam Tracker or post about your experience on social media to warn friends and family. Your experience can help others avoid the same trap and contribute to the broader fight against online fraud.
  • Essential evidence to gather:
    • Full website URL and any redirected addresses
    • Screenshots of the fraudulent pages, including fake logos or branding
    • Transaction details, if you made a purchase (receipts, confirmation emails, payment information)
    • Email communications from the scammers
    • Date and time when you first encountered the site
    • Any personal information you may have provided
  • Additional reporting resources: The CISA maintains an updated list of reporting resources, while the Anti-Phishing Working Group investigates cases of fake sites that appear to be collecting personal information fraudulently. For text message scams, forward the message to 7726 (SPAM).

Final thoughts

Recognizing fake sites and emails becomes easier with practice. The key is to trust your instincts—if something feels suspicious or too good to be true, take a moment to verify through official channels. With the simple verification techniques covered in this guide, you can confidently navigate the digital world and spot fake sites and emails before they cause harm.

Your best defense is to make these quick security checks a regular habit—verify URLs, look for secure connections, and trust your instincts when something feels off. Go directly to the source or bookmark your most frequently used services and always navigate to them. Enable two-factor authentication on important accounts, and remember that legitimate companies will never ask for sensitive information via email. Maintaining healthy skepticism about unsolicited communications will protect not only your personal information but also help create a safer online environment for everyone.

For the latest information on fake websites and scams and to report them, visit the Federal Trade Commission’s scam alerts or the FBI’s Internet Crime Complaint Center.

The post Ways to Tell if a Website Is Fake appeared first on McAfee Blog.

What to Do If Your Email Is Hacked

I think I could count on one hand the people I know who have NOT had their email hacked. Maybe they found a four-leaf clover when they were kids! Email hacking is one of the very unfortunate downsides of living in our connected, digital world. And it usually occurs as a result of a data breach – a situation that even the savviest tech experts find themselves in.

What is a data breach?

In simple terms, a data breach happens when personal information is accessed, disclosed without permission, or lost. Companies, organisations, and government departments of any size can be affected. Data stolen can include customer login details (email addresses and passwords), credit card numbers, identifying IDs of customers e.g. driver’s license numbers and/or passport numbers, confidential customer information, company strategy, or even matters of national security.

Data breaches have made headlines, particularly over the last few years. When the Optus and Medibank data breaches hit the news in 2022 affecting almost 10 million Aussies apiece, we were all shaken. But then when Aussie finance company Latitude was affected in 2023 with a whopping 14 million people from both Australia and New Zealand, it almost felt inevitable that by now, most of us would have been impacted.

The reality is that data breaches have been happening for years. In fact, the largest data breach in Australian history happened in 2019 to the online design site Canva which affected 139 million users globally. In short, it can happen to anyone, and the chances are you may have already been affected.

Your email is more valuable than you think

The sole objective of a hacker is to get their hands on your data. Any information that you share in your email account can be very valuable to them. Why do they want your data, you ask? It’s simple really – so they can cash in!

Some will keep the juicy stuff for themselves – passwords or logins to government departments or large companies they may want to ’target’ with the aim of extracting valuable data and/or funds. The more sophisticated ones will sell your details including name, telephone, email address, and credit card details to cash in on the dark web. They often do this in batches. Some experts believe they can get as much as AU$250 for a full set of details including credit cards. So, you can see why they’d be interested in you.

The other reason why hackers will be interested in your email address and password is that many of us re-use our login details across our other online accounts. Once they’ve got their hands on your email credentials, they may be able to access your online banking and investment accounts, if you use the same credentials everywhere. So, you can see why I harp on about using a unique password for every online account!

How big is the problem?

There is a plethora of statistics on just how big this issue is – all of them concerning. According to the Australian Institute of Criminology, of all the country’s cybercrime reports in 2024, about 21.9% involved identity theft and misuse. The Australian Bureau of Statistics adds that the identity theft victimisation rate has steadily increased from 0.8% to 1.2% from 2021 to 2024, respectively.

Meanwhile, The Australian Government revealed that at least one cybercrime is reported every 6 minutes, with business email compromise alone costing the national economy up to $84 million in losses. Regardless of which statistic you choose to focus on, we have a big issue on our hands.

How does an email account get hacked?

Hackers use a range of techniques—some highly sophisticated, others deceptively simple—to gain access. It is important to know how these attacks happen so you can stay ahead and prevent them.

  • Phishing scams: These are deceptive emails that trick you into entering your login details on a fake website that looks legitimate.
  • Data breaches: If a website where you used your email and password gets breached, criminals can use those leaked credentials to try and access your email account.
  • Weak or reused passwords: Using simple, easy-to-guess passwords or the same password across multiple sites makes it easy for hackers to gain access.
  • Malware: Malicious software like keyloggers can be installed on your computer without your knowledge, capturing everything you type, including passwords.
  • Unsecure Wi-Fi networks: Using public Wi-Fi without a VPN can expose your data to criminals monitoring the network.

From email hack to identity theft

Yes, absolutely. An email account is often the central hub of your digital life. Once a cybercriminal controls it, they can initiate password resets for your other online accounts, including banking, shopping, and social media. They can intercept sensitive information sent to you, such as financial statements or medical records.

With enough information gathered from your emails, they can commit identity theft, apply for credit in your name, or access other sensitive services. If you suspect your email was hacked, it’s crucial to monitor your financial statements and consider placing a fraud alert with credit bureaus.

Signs that your email has been hacked

  • You can no longer log in. The most obvious sign of an email hack is when your password suddenly stops working. Cybercriminals often change the password immediately to lock you out.
  • Friends receive strange messages from you. If your contacts report receiving spam or phishing emails from your address that you didn’t send, it’s a major red flag that someone else has control of your account.
  • Unusual activity in your folders. Check your “Sent” folder for messages you don’t recognize. Hackers might also set up forwarding rules to send copies of your incoming emails to their own address, so check your settings for any unfamiliar forwarding addresses.
  • Password reset emails you didn’t request. Receiving unexpected password reset emails for other services (like your bank or social media) is a sign that a hacker is using your email to try and take over your other online accounts.
  • Security alerts from your provider. Pay attention to notifications about new sign-ins from unfamiliar devices, locations, or IP addresses. These are often the first warnings that your account has been compromised.

Steps to email recovery

If you find yourself a victim of email hacking, these are a few very important steps you need to take. Fast.

Change your password

Using a separate, clean device, this is the very first thing you must do to ensure the hacker can’t get back into your account. It is essential that your new password is complex and totally unrelated to previous passwords. Always use random words and characters, a passphrase with a variety of upper and lower cases, and throw in some symbols and numbers.

I really like the idea of a crazy, nonsensical sentence – easier to remember and harder to crack! But, better still, get yourself a password manager that will create a password that no human would be capable of creating. If you find the hacker has locked you out of your account by changing your password, you will need to reset the password by clicking on the ‘Forgot My Password’ link.

Update other accounts that use the same password

This is time-consuming, but essential. Ensure you change any other accounts that use the same username and password as your compromised email. Hackers love the fact that many people use the same logins for multiple accounts, so it is guaranteed they will try your info in other email applications and sites such as PayPal, Amazon, Netflix – you name it!

Once the dust has settled, review your password strategy for all your online accounts. A best practice is to ensure every online account has its own unique and complex password.

Sign out of all devices

Most email services have a security feature that lets you remotely log out of all active sessions. Once you’ve changed your password, signing out from your email account also signs out the hacker and forces them to log-in with the new password, which fortunately they do not know. These, combined with two- or multi-factor authentication, will help you to regain control of your account and prevent further compromise.

Inform your email contacts

A big part of the hacker’s strategy is to get their claws into your address book to hook others as well. Send a message to all your email contacts as soon as possible so they know to avoid opening any emails—most likely loaded with malware—that have come from you.

Commit to multi-factor authentication

Two-factor or multi-factor authentication may seem like an additional, inconvenient step to your login, but it also adds another layer of protection. Enabling this means you will need a special one-time-use code to log in, aside from your password. This is sent to your mobile phone or generated via an authenticator app. So worthwhile!

Check your email settings

It is common for hackers to modify your email settings so that a copy of every email you receive is automatically forwarded to them. Not only can they monitor your logins to other sites; they can also keep a watchful eye on any particularly juicy personal information. So, check your mail forwarding settings to ensure no unexpected email addresses have been added.

Also, ensure your ‘reply to’ email address is actually yours. Hackers have been known to create an email address that looks similar to yours, so that when someone replies, it will go straight to their account, not yours.

Don’t forget to check your email signature to ensure nothing spammy has been added, as well as your recovery phone number and alternate email address. Hackers also change these to maintain control. Update them to your own secure details.

Scan your computer for malware and viruses

Regularly scanning your devices for unwanted invaders is essential. If you find anything, please ensure it is addressed, and then change your email password again. If you don’t have antivirus software, please invest in it.

Comprehensive security software will provide you with a digital shield for your online life, protecting all your devices – including your smartphone – from viruses and malware. Some services also include a password manager to help you generate and store unique passwords for all your accounts.

Consider creating a new email address

If you have been hacked several times and your email provider isn’t mitigating the amount of spam you are receiving, consider starting afresh. Do not, however, delete your old email address because email providers are known to recycle old email addresses. This means a hacker could spam every site they can find with a ‘forgot my password’ request and try to impersonate you and steal your identity.

Your email is an important part of your online identity so being vigilant and addressing any fallout from hacking is essential for your digital reputation. Even though it may feel that getting hacked is inevitable, you can definitely reduce your risk by installing some good-quality security software on all your devices.

Trusted and reliable comprehensive security software will alert you when visiting risky websites, warn you when a download looks dodgy, and block annoying and dangerous emails with anti-spam technology. It makes sense really – if you don’t receive the dodgy phishing email – you can’t click on it. Smart!

Finally, don’t forget that hackers love social media – particularly those of us who overshare on it. So, before you post details of your adorable new kitten, remember it may just provide the perfect clue for a hacker trying to guess your email password!

Report the incident

Reporting an email hack is a crucial step to create a necessary paper trail for disputes with banks or credit agencies. When reporting, gather evidence such as screenshots of suspicious activity, unrecognized login locations and times, and any phishing emails you received. This information can be vital for the investigation.

  • Your email provider: Use their official support or recovery channels immediately. They can help you investigate and regain control of your account. Do not use links from suspicious emails claiming to be from support.
  • Financial institutions: If you’ve disclosed sensitive financial information or use the email for banking, contact your bank and credit card companies immediately. Alert them to potential fraud and monitor your statements.
  • Friends, family, and contacts: Send a message to your contacts warning them that your account was compromised. Advise them not to open suspicious messages or click on links sent from your address during that time.
  • Your employer: If it’s a work email, or if your personal email is used for work purposes, notify your IT department immediately. They need to take steps to protect company data and systems.
  • Relevant authorities: For financial loss or identity theft, you can report the incident to authorities like the FBI’s Internet Crime Complaint Center or Action Fraud in the UK. This creates an official record and aids in wider law enforcement efforts.

Check if online accounts linked to your email were compromised

  • Prioritize critical accounts: Immediately check your online banking, financial, and government-related accounts. Review recent activity for any unauthorized transactions or changes.
  • Review social media and shopping sites: Check your social media for posts or messages you didn’t send. Review your online shopping accounts like Amazon for any purchases or address changes you don’t recognize.
  • Enable alerts: Turn on login and transaction alerts for your sensitive accounts. This will give you real-time notifications of any suspicious activity in the future.

Should you delete your hacked email account?

Generally, no. Deleting the account can cause more problems than it solves. Many online services are linked to that email, and deleting it means you lose the ability to receive password reset links and security notifications for those accounts.

More importantly, some email providers recycle deleted addresses, meaning a hacker could potentially re-register your old email address and use it to impersonate you and take over your linked accounts.

The better course of action is to regain control, thoroughly secure the account with a new password and multi-factor authentication, and clean up any damage. Only consider migrating to a new email address after you have fully secured the old one.

Future-proof your email after reclaiming control

  • Run a full security scan: Before doing anything else, run a comprehensive scan with a trusted antivirus program on all your devices to ensure no malware or keyloggers remain.
  • Double-check security settings: Confirm that your recovery email and phone number are correct and that multi-factor authentication is enabled, preferably using an authenticator app rather than SMS.
  • Review account permissions: Check which third-party apps and websites have access to your email account. Revoke access for any service you don’t recognize or no longer use.
  • Set periodic reminders: Make it a habit to review your account’s security logs and settings every few months to catch any potential issues early.
  • Learn to spot phishing: Be skeptical of unsolicited emails asking for personal information or creating a sense of urgency. Check the sender’s address and hover over links before clicking.
  • Keep software updated:Regularly update your operating system, web browser, and security software to protect against the latest vulnerabilities.
  • Secure your devices: Use comprehensive security software like McAfee+ on all your devices—computers, tablets, and smartphones—to protect against malware, viruses, and risky websites.

Provider-specific email recovery

Each email provider has a specific, structured process for account recovery. It is vital to only use the official recovery pages provided by the service and be wary of scam websites or third-party services that claim they can recover your account for a fee. Below are the official steps of the major providers that you can follow.

Gmail

  1. Go to Google’s official Account Recovery page.
  2. Enter your email address and follow the on-screen prompts. You will be asked questions to confirm your identity, such as previous passwords or details from your recovery phone number or email.
  3. Once you regain access, you will be prompted to create a new password.
  4. Immediately visit the Google Security Checkup to review recent activity, remove unfamiliar devices, check third-party app access, and enable 2-step verification.

Yahoo email

  1. Navigate to the Yahoo Sign-in Helper page.
  2. Enter your email address or recovery phone number and click “Continue.”
  3. Follow the instructions to receive a verification code or account key to prove your identity.
  4. Once verified, create a new, strong password.
  5. After regaining access, go to your Account Security page to review recent activity, check recovery information, and turn on 2-step verification.

Outlook or Hotmail

  1. Go to the official Microsoft account recovery page.
  2. You’ll need to provide your email, phone, or Skype name, and verify your identity using the security information linked to your account.
  3. If you cannot access your recovery methods, you will be directed to an account recovery form where you must provide as much information as possible to prove ownership.
  4. After resetting your password, visit your Microsoft account security dashboard to review sign-in activity, check connected devices, and enable two-step verification.

Final thoughts

Your email account is the master key to your digital kingdom, and protecting it is more critical than ever since many of your other accounts are connected with your email. Realizing “my email has been hacked” is a stressful experience, but taking swift and correct action can significantly limit the damage.

By following the recovery steps and adopting strong, ongoing security habits like using a password manager and enabling multi-factor authentication, you can turn a potential crisis into a lesson in digital resilience. Stay vigilant, stay proactive, and keep your digital front door securely locked.

To add another wall of defense, consider investing in a trusted and reliable comprehensive security software like McAfee+. Our solution will help you dodge hacking attempts by alerting you when visiting risky websites, or downloading questionable apps, and blocking malicious emails with anti-spam technology.

The post What to Do If Your Email Is Hacked appeared first on McAfee Blog.

What to do if you can’t get into your Facebook or Instagram account

How to prove your identity after your account gets hacked and how to improve security for the future

Your Facebook or Instagram account can be your link to friends, a profile for your work or a key to other services, so losing access can be very worrying. Here’s what to do if the worst happens.

If you have access to the phone number or email account associated with your Facebook or Instagram account, try to reset your password by clicking on the “Forgot password?” link on the main Facebook or Instagram login screen. Follow the instructions in the email or text message you receive.

If you no longer have access to the email account linked to your Facebook account, use a device with which you have previously logged into Facebook and go to facebook.com/login/identify. Enter any email address or phone number you might have associated with your account, or find your username which is the string of characters after Facebook.com/ on your page. Click on “No longer have access to these?”, “Forgotten account?” or “Recover” and follow the instructions to prove your identity and reset your password.

If your account was hacked, visit facebook.com/hacked or instagram.com/hacked/ on a device you have previously used to log in and follow the instructions. Visit the help with a hacked account page for Facebook or Instagram.

Change the password to something strong, long and unique, such as a combination of random words or a memorable lyric or quote. Avoid simple or guessable combinations. Use a password manager to help you remember it and other important details.

Turn on two-step verification in the “password and security” section of the Accounts Centre. Use an authentication app or security key for this, not SMS codes. Save your recovery codes somewhere safe in case you lose access to your two-step authentication method.

Turn on “unrecognised login” alerts in the “password and security” section of the Accounts Centre, which will alert you to any suspicious login activity.

Remove any suspicious “friends” from your account – these could be fake accounts or scammers.

If you are eligible, turn on “advanced protection for Facebook” in the “password and security” section of the Accounts Centre.

Continue reading...

© Photograph: bigtunaonline/Alamy

© Photograph: bigtunaonline/Alamy

❌