Cybersecurity Agency of Catalonia
Search
Cybersecurity
Access to ""
Home
The Agency
Information on the internal functioning, functions and projects of the Agency.
Access to "The Agency"
The entity
What do we do?
Access to "What do we do?"
Protection and prevention
Responding to cybersecurity incidents
Awareness and training
Certification Audits in the ENS
Projects
Access to "Projects"
Secure Internet
CDR Europe
RETECH
Personalised Digital Care Plan
Cyberap-GT1
Women in Cybersecurity
DCA-Cybersecurity
Work with us
Data protection
Access to "Data protection"
General Data Protection Regulation
Record of processing activities
Data Protection Officer
Detailed information on the treatments
Rights of the interested parties
Transparency
Access to "Transparency"
Ethics mailbox - Internal alert system
Organisation and administrative structure
Regulations and information of legal interest
Citizenship and public policies
Senior officials, management staff and civil service
Contracts, agreements and subsidies
Economy and heritage
Calls for public tenders
News
Cybersecurity news, warnings and alerts and other current affairs.
Access to "News"
Alerts and warnings
Events
Access to "Events"
Barcelona Cybersecurity Congress
Cyberhack
DonaTIC Awards
Newsletters
Safer Internet Day
Citizenship
Service information aimed at citizens in order to improve and train citizens in digital security.
Access to "Citizenship"
Fraud and impersonation
Access to "Fraud and impersonation"
What do I do if I've been scammed?
Scam calls
Fake emails
WhatsApp scams
Scam Text Messages
Artificial intelligence scams
Secure Purchase
Social media fraud
False investments
Identity theft
QR fraud
Duplicate SIM Scam
Cryptocurrency theft
Romance scams
Video game fraud
Fake Job Offers
Home rental scams
Fake tourist bookings
Bank cards
Fraudulent ticket sales
Privacy and data
Access to "Privacy and data"
Two-factor authentication
Strong passwords
Account theft
Social networks
Data Leakage
Biometric data
Browsers
Programs and applications
Information management
Digital identity
Cookies
Digital footprint
Secure devices
Access to "Secure devices"
Mobile phones
Computers
TVs
Smart Watches
Secure game consoles
Voice assistants
Internet of Things
Shared devices
Digital violence
Access to "Digital violence"
Cyberbullying
Digital gender violence
Artificial intelligence
Access to "Artificial intelligence"
Hypercheats
Fake news
Data shared with AI
Protection of minors
Access to "Protection of minors"
Accompaniment and parental control
Exposure of minors on the Internet
Misuse of the Internet
Sexual cyberbullying
Classification of video games
Advice for the elderly
Interactive activities
Access to "Interactive activities"
$D@DE at stake
The Hacker Wins
Find the fake
Educational resources
Access to "Educational resources"
Didactic proposals for Primary
Didactic proposals for Secondary
Stories about cybersecurity
Cyber tricks
Digital educational platforms
Study cybersecurity
Company
Service information aimed at companies in order to improve their resilience in cybersecurity.
Access to "Company"
Cyber threats
Access to "Cyber threats"
Ransomware
Supply chain attack
Zero-day vulnerabilities
Business Email Attack
Good practices
Access to "Good practices"
Authentication
Tips for workers
Using the VPN
Backups
Safe use of AI
Digital sustainability
Identity management
Directory of companies
Regulations
Access to "Regulations"
Directive on the Security of Network and Information Systems (NIS 2)
Cybersecurity data
Access to "Cybersecurity data"
Cybersecurity Reports
Access to "Cybersecurity Reports"
Monthly Trend Summary
Prospects 2026
Trend reports by areas
Other cybersecurity reports
Language:
Found results
No results found
Try searching again or change any of the data you entered