Manage risk
New challenges, same priority
In a world that is constantly changing, digitalisation, technological advances and smart grids have created new opportunities, but that also brought new challenges that we face with the same security.
Information, regardless of whether it is digital or physical, is a fundamental strategic component of E-REDES' business. The scope of Information Security Management is to protect people, IT assets and the information they generate and process, covering all the information within the scope of the Information Security Management System (ISMS) managed by E-REDES. To this end, we have developed an Information Security Policy, aligned with the ISMS, in which the E-REDES Board of Directors defines the strategic objectives of Information Security and the respective tactical objectives.
Translated with DeepL.com (free version)

- Ensure compliance with reference standards, including legal and regulatory obligations
- Contribute to consolidating the EDP Group's commitment to Information Security
- Boosting the maturity and continuous improvement of the organisation's cybersecurity

- Ensuring the availability, integrity and confidentiality of information
- Leading the implementation of cybersecurity principles
- Promoting the organisation's commitment to Information Security
- Managing Information Security in the Supply Chain

- Evolving cybersecurity platforms, aiming to adopt cutting-edge technology
- Ensure efficient prevention, detection, response and recovery from Information Security incidents
- Ensuring alignment with business continuity objectives

- Train and encourage employees to act as the first line of defence
- Challenge top management to promote a lead-by-example culture
- Provide differentiated cybersecurity training according to employees' level of risk
- Develop comprehensive and innovative communication initiatives

- Establishing and strengthening national and international information-sharing partnerships
- Benchmarking best practices in the sector
- Enable the detection and response to potential attacks through advance knowledge of peer incidents

Whether in emails or in your web browser, never click on links or open attachments of dubious origin.
Always check that the domains of the senders of the emails you receive are related to the entity sending them.
Check that the websites you access start with https://.
Around 80% of cyber-attacks start through phishing, a cyber-crime that consists of distributing emails with links to fake websites (banking institutions, social networks or others), to obtain personal data from users through update requests.

Ideally, your password should consist of several types of characters, such as letters (lower and upper case), numbers and special characters.
Avoid including names, dates and document numbers.
Do not share your password, do not have it written down and do not use the same one for different logins, because if someone finds it for one account, they will be able to access all the others.
The passwords "123456", "password" and "qwerty" are some of the most commonly used passwords in the world. They are dangerous because they are not very complex and quite common.

Never leave your device without locking it, whether it's your computer, phone or tablet.
Set an automatic lock time for your device. That way, even if you forget to do so, the device will lock itself after that time (e.g. 30 seconds).
Leaving your device unlocked can allow important information to be stolen by third parties.

Be careful with the devices you connect to your computer. Viruses can be spread using infected USBs, external disks or cell phones.
Similarly, don't connect your USB or external disk to devices you don't know or that are used by many people.

Save the most important information on an external device or cloud drive. That way, if anything happens to your computer or the device that holds your data, you'll have a backup of what you need.
