MGS Cybersecurity
For small and medium-sized businesses and professional offices
Days
Hours
Minutes
Seconds
MGS Digital Protection offers a complete solution that protects the main entry points in the event of a digital security incident caused by third parties.
It does this through digital security incident protection and management coverages supported by the best professionals, complemented by broad compensation coverages.
The complete solution is structured as follows:
• A first-level basic coverage that offers the services of the best specialists in the event of a digital security incident for its management. This coverage is extended to digital content that contributes to improving the company’s digital security awareness.
In addition, all IT equipment can be protected and monitored, and potential website vulnerabilities can be identified through the technical vulnerability report, using the Cyberprotection Guarantee.
• Optional coverages that reduce the economic impact on the insured in the event of a digital security incident caused by third parties, such as:
Legal services, image restoration, notification costs, data protection obligations, liability for the use and processing of information, activities on digital media, cyber extortion, network interruption and external service provider.
Although cloud services are primarily used for storing information, access to these services is typically done from a computer.
Of course. It’s essential to have security software installed on all devices in order to be able to provide the protection and constant monitoring service.
The installation of the malware protection software is very simple. The Policyholder will receive an email at the notification address (which they provided when taking out the policy) with a link to download it and instructions on how to proceed.
Yes. Although it can be kept as it is not incompatible, the old antivirus can be uninstalled, as the provided anti-malware protection software offers sufficient protection for computers against all types of malware.
No, because they have different functions.
The firewall is used to control that all communications between the company’s internal network and the Internet comply with established security policies.
From the website URL provided by the client, the analysis system crawls the links and analyses all content belonging to the same web domain.
All content that does not require an authentication or user verification mechanism to access is analysed.
The Technical Vulnerability Report will only be able to analyse web pages that are publicly accessible from the Internet and only content that does not require an authentication or user verification mechanism to access it, such as a private website or intranet.
Once the service is activated, the analysis of the client’s website will be scheduled periodically. It is expected that this assessment will be carried out at least twice a year, approximately every six months.
Subject to feasibility criteria determined by professionals on a case-by-case basis, a service is offered for any type of cybersecurity incident affecting the Insured’s computer systems.
Depending on the nature of the incident, and always subject to the feasibility criteria established by the professionals, some cases may be fully resolved remotely by the cybersecurity experts provided by MGS, while others will require the intervention of the Insured’s qualified personnel to carry out the necessary actions.
In the event of a cybersecurity incident, the cybersecurity experts who constantly monitor the computers are likely to detect it and contact the Insured to initiate the sequence of actions necessary to resolve it.
If, due to the nature of the incident, it is not detected by the monitoring, the Insured must contact MGS as soon as they detect it at the telephone number 917 572 404, where they will be assisted 24 hours a day, 365 days a year.
The sequence of actions taken in the event of a cybersecurity incident is as follows:
Given that cybersecurity must be constantly evolving, lessons are learned from each cybersecurity incident in order to integrate them and improve the protection system.
The MGS Cybersecurity service is distinguished by a complete incident prevention and management service, which, in most cases, will be proactive on the part of Ackcent. Response times will be as short as possible, as time is of the essence in these situations.
Yes. In cybersecurity, zero risk does not exist, as is the case for virtually all the risks that surround us.
However, thanks to the services offered by MGS Cybersecurity, the main cyber risks to which any company is exposed are minimised, regardless of its sector or specificities.
Yes. It is necessary to install anti-malware software on all computers, even those that are used as servers.
Car Insurance | Home Insurance | Shared Building Insurance | Cybersecurity | Travel
In accordance with current regulations regarding Personal Data Protection, we inform you that your data will be incorporated into the processing system owned by GABINET SENIA & ASSOCIATS SL, with CIF B17580291 and registered office at Carrer SENIA DEL BARRAL 63, 17310 LLORET DE MAR, in order to respond to your requests.
In compliance with current regulations, GABINET SENIA & ASSOCIATS SL informs you that the data will be kept for the period strictly necessary to comply with the aforementioned precepts. GABINET SENIA & ASSOCIATS SL informs you that it will process the data in a lawful, fair, transparent, adequate, relevant, limited, accurate and up-to-date manner. 1 Therefore, GABINET SENIA & ASSOCIATS SL undertakes to take all reasonable measures to ensure that they are deleted or rectified without delay when they are inaccurate.
In accordance with the rights conferred on you by current data protection regulations, you may exercise your rights of access, rectification, limitation of processing, erasure, portability and objection to the processing of your personal data and to the consent given for their processing, by addressing your request to the postal address indicated above or to the email address administracio@gabinetsenia.com. You can contact the competent Control Authority to submit the claim you deem appropriate. The sending of this data implies acceptance of this clause.
Cookie | Duration | Description |
---|---|---|
IDE | 13 months | Used by Google DoubleClick and stores information about how the user uses the website and any other advertisement before visiting the website. This is used to present users with ads that are relevant to them according to the user profile. |
test_cookie | 15 minutes | This cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 6 months | his cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website. |
YSC | session | This cookies is set by Youtube and is used to track the views of embedded videos. |
yt.innertube::nextId | Persistant | These cookies are set via embedded youtube-videos. |
yt.innertube::requests | Persistant | These cookies are set via embedded youtube-videos. |
Cookie | Duration | Description |
---|---|---|
CONSENT | Persistent | These cookies are set via embedded youtube-videos. They register anonymous statistical data on for example how many times the video is displayed and what settings are used for playback.No sensitive data is collected unless you log in to your google account, in that case your choices are linked with your account, for example if you click “like” on a video. |
Cookie | Duration | Description |
---|---|---|
pll_language | 11 months | This cookie is set by Polylang plugin for WordPress powered websites. The cookie stores the language code of the last browsed page. |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement". |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
datadome | session | This is a security cookie used for detecting BOTS and malicious traffic. |
didomi_token | Persistant | This cookie is set by the provider Didomi. This cookie contains consent information for custom purposes and vendors along with the Didomi-specific information. |
elementor | Persistent | This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
PRIVACY POLICY SUMMARY
We detail the treatment of your data:
We process the collection of fees set by the Community, which you can make by direct debit to your account or by bank transfer to your Community account or by bank deposit into your Community account.
We do not handle cash payments at our offices.