• Skip to primary navigation
  • Skip to main content
S2 Grupo

S2 Grupo

Spanish Company Specialized in Cybersecurity

  • Company
    • About Us
    • Governing Bodies
    • CSR
    • Awards and Acknowledgments
  • Specialization
    • OT Industry
    • IT
    • OT Health
  • Solutions
  • R&D+I
  • Talent
  • News & Publications
  • Contact
  • facebook
  • twitter
  • instagram
  • linkedin
|
en arrow down
  • es
© 2023 S2 Grupo

Diego Sanchez

Cyber Threat Intelligence Report – Trends 1T 2023

S2 Grupo’s cyber intelligence team, Lab52, has generated new intelligence from the collection and analysis of information obtained from internal and external sources throughout the first quarter of 2023.

In it you can access to:

  • Major geopolitical events of the quarter
  • Trends extracted from Lab52 database indicators.
  • Analysis of cyberespionage campaigns and their technological innovations
  • Analyses of cybercrime – ransomware, malware and the deep web
  • Statistics and analysis of critical vulnerabilities

Intelligence is essential to anticipate and prevent cyber threats. Don’t let your organization be affected and rely on us to help you access the first Cyber Threat Intelligence Report of 2023!

Filed Under: Reports

Triple extortion ransomware cyber-threatens companies

  • S2 Grupo has explained that the objective of this new type of cyber-attack is not only the money of the compromised company, but also extortion of third parties that may be affected by the disclosure of the extracted data.
  • As technologies and attack strategies adapt and transform, modern incidents can turn into a ransomware chain that need not end with an increasing number of victims being harmed.

Valencia April 20, 2023.- Valencian company S2 Grupo, specialized in cybersecurity and critical systems management, has explained that triple extortion ransomware is one of the main cyber threats for companies and entities of all types in 2023.

Ransomware is a type of attack whereby a cybercriminal infiltrates a corporate network to encrypt the data on it and prevent its use. It then extorts money (usually cryptocurrencies) from the victim in exchange for the decryption key.

“The problem that arises is that as organizations have begun to implement backup systems for their important data, hackers have become increasingly creative and have added new and sophisticated features to their cyberattacks“, said José Rosell, managing partner of S2 Grupo.

In 2019, the double extortion ransomware attack was born when cybercriminals such as Doppel Paymer or Maze found a second way to persuade victims to pay the ransom for their data, despite having backup copies of the systems. This one consisted of the cyberattackers making a copy of the data so that they could use it in negotiations. In this way, if the victim refuses to pay a ransom, the confidential data stolen from the network will be made public or sold on the black market.

“The double extortion ransomware rendered the backup server useless because cybercriminals have access to sensitive information, and even if an organization can restore its network, the main problem is that the data is made public“, explained Miguel A. Juan, managing partner at S2 Grupo.

“In recent years, cybercriminals have reinvented themselves again. A new method of harm has emerged, which is triple extortion ransomware. This type of attack is based not only on seeking money from the compromised company, but also extorting money from third parties that may be affected by the disclosure of the extracted data or continuing to pressure the damaged company to pay,” said José Rosell.

“The first triple extortion ransomware took place in October 2020 when the Finnish psychotherapy clinic Vastaamo suffered the cyberattack on its servers and cybercriminals extorted their clients by threatening them with the disclosure of information on their therapy sessions,” Miguel A Juan continued.

The problem with this type of ransomware is that not only does it have a new layer of persuading third parties to achieve its goal, but cybercriminals can continue to attack the same organization. For example, if a company has successfully recovered data from backups and is not open to negotiate, attackers can launch a distributed denial-of-service attack to exert more pressure.

Experts at S2 Grupo have concluded that triple extortion ransomware is an extension of the double extortion attack by adding an additional pressure point to get its victim to pay up. In addition to data encryption (the first layer) and the threat of important data leakage (the second layer), the cybercriminal can add another tactic of their choice (the third layer). The third point of extortion can be any kind of technique that ends up getting the compromised company or a third party to pay for the data.

Thus, as technologies and attack strategies adapt and transform, modern incidents can turn into a ransomware chain that need not end, with more and more victims being extorted.

Filed Under: Current events

S2 Grupo will participate in the #STICPUNTACANA conference to create a unique cybersquad for Ibero-America

  • The Valencian cybersecurity company is a VIP sponsor of this event that has been organized by the National Cryptologic Center of the National Intelligence Center, the National Institute of Cybersecurity, the Joint Cyberspace Command of Spain and the National Department of Investigations of the Dominican Republic.
  • S2 Grupo will hold two conferences that will be given by José Rosell, managing partner of the company, and by Buenaventura Salcedo, Cybersecurity Consultant and forensic analyst in mobile devices and IoT at S2 Grupo.

Valencia April 13, 2023.- The Valencian cybersecurity company S2 Grupo, which has become one of the international benchmarks in the sector, will participate from April 19 to 21 in the III STIC Conference Dominican Republic Chapter (#STICPUNTACANA) organized by the National Cryptological Center of the National Intelligence Center, the National Institute of Cybersecurity, the Joint Command of Cyberspace of Spain and the National Department of Investigations of the Dominican Republic.

This is one of the largest cybersecurity events in the world in which more than 70 speakers from 14 countries will offer the keys to create a unique cybersquad for Ibero-America.

S2 Grupo will be one of the VIP sponsors of this conference and, among other actions, will offer two conferences given by José Rosell, managing partner of the company, and by Buenaventura Salcedo, cybersecurity consultant and forensic analyst in mobile devices and IoT of S2 Grupo.

Specifically, on April 19, José Rosell will give the presentation ‘SOC in a box’ in which he will give the keys to describe the process of design, start-up, training and operation of a Cybersecurity Operations Center depending on the sector in which it operates. He will explain the organizational structure and technological base necessary for the deployment of the SOC, the description of a hybrid IT/OT SOC and will emphasize the use cases.

For his part, Buenaventura Salcedo will conduct a practical workshop on April 20 on ‘Forensic studies and threats on mobile devices‘ where the management of various tools to obtain and analyze forensic information will be studied. He will also show techniques and scenarios to obtain dynamic information to study possible threats, especially in iOS, which will occupy most of the time.

“This conference has become a powerful meeting of the Ibero-American Defense Forum, which is made up of Argentina, Brazil, Chile, Colombia, Ecuador, Mexico, Guatemala, Paraguay, Peru, Portugal, Uruguay and Spain. Our purpose is to work together to develop and advance on the path to combat cyber threats, achieve technological independence and co-create a cybersecure world,” said José Rosell. The III #STICPUNTACANA Conference, to be held at the Barceló Bávaro Grand Resort Convention Center, will be broadcast live and online in its entirety (https://www.ccn-cert.cni.es/iiijornada-rdominicana.html).

More information

Patricia Berzosa – Prensa S2 Grupo – T. 658 810 015 – patricia.berzosa@ext.s2grupo.es

Filed Under: Corporate, Current events

Ten cybersecurity tips for senior citizens

  • The company S2 Grupo has warned that the elderly are one of the most vulnerable groups in the use of new technologies and that is why they are one of the targets of cybercrime.
  • They should be aware of cyber-scams such as vishing, the use of strong passwords, the dangers of public Wi-Fi or the importance of not participating in chain messages, are some recommendations that can help them protect themselves from digital dangers.

Valencia, March 30, 2023.- The elderly are one of the targets of cybercriminals due to their vulnerability in the use of new technologies. As with children, their lack of inexperience or knowledge of devices and the Internet makes them an easy target.

In this context, the cybersecurity and critical systems management company S2 Grupo has highlighted that it is very important to protect our senior family members by showing them some basic recommendations that will prevent them from putting themselves at risk.

“Connected devices have become a resource of great help in the day-to-day life of the elderly, both when it comes to facilitating tasks such as when they activate devices by voice, as well as with the use of connected surveillance systems or simply to be able to be closer to their relatives through video calls, for example“, said José Rosell, managing partner of S2 Grupo.

“However, it is an environment in which they have entered abruptly many times, without really controlling its operation and that lack of knowledge means that on many occasions they are truly put at risk while using devices connected to the Internet. Cybercriminals know this and take advantage of it. That is why it is essential to protect the elderly so that they can use technology without falling into these risks“, explained Miguel A. Juan, managing partner of S2 Grupo.

Ten recommendations for cybersecurity for the elderly are:

  1. It is important to protect personal information: “Many grandparents do not realize that publishing photos of their grandchildren could be a problem, for example. That is why they should know that any information that is published is in the public domain and, therefore, it is important to be careful with this“, said José Rosell.
  2. Warn them to be careful with SMS and to know that many times cybercriminals use them to impersonate other entities such as the Post Office or the bank.
  3. Remind them that the bank will never ask for their passwords by message or email and, if this happens, we are facing a possible cyber-scam.
  4. Advise them not to participate in chain messages inviting you to forward them or telling you that if you click on the link you will participate in a contest to win important discounts or prizes. Usually, there are cybercrime actions behind them.
  5. They should enter only secure web pages, which are those that use the padlock symbol and always have the letters “https” at the beginning.
  6. If they use a Wi-Fi, it is better that it is only the one at home and if they use a public one, they should only use it to consult webs where they do not enter any type of personal credential because anyone can access these networks.
  7. To use strong passwords (with uppercase and lowercase letters, alphanumeric characters and numbers), and not always the same one for all accounts and not write them down in a notebook that is always carried about, because it could be lost or stolen and compromise them.
  8. To always install antivirus in the devices connected to the Internet.
  9. Warn them about telephone scams such as the so-called “vishing”, in which a call is made to trick the person to obtain personal information such as passwords or a bank account, for example. 
  10. To update the telephone or computer whenever the alert appears. It is important to tell them that this is not dangerous and is very simple. If they do not know how to do it, tell them to ask for help.

Filed Under: Current events

Fallas will raise awareness of the cyber dangers of network-connected toys

  • Since 2018, the Valencian cybersecurity company S2 Grupo has joined forces with the Falla Chiva-Francisco de Llano to create the first project that unites tradition and cybersecurity.
  • This year the motto of the children’s monument of this commission is “Joguets Conectats“, work of Salva Dolz, and from it you can download a study prepared by experts from the cybersecurity company so that families know the risks of the so-called ‘smart toys’ and how to use them safely.
  • Among the main dangers are impersonation, manipulation, disclosure of private information, denial of service and elevation of privileges, among others.

Valencia, March 13, 2023 – The Valencian cybersecurity company S2 Grupo has collaborated for another year with the Falla Chiva-Francisco de Llano to create the first cybersecure falla in Valencia. On this occasion, under the slogan “Joguets Conectats“, experts from the company have advised on the creation of the monument to emphasize the most common cyber dangers associated with this type of items and tips to enjoy them in a cybersecure way.

The artist Salva Dolz has shown through the different scenes and ninots the two faces of toys connected to the Internet: the more playful and with which caution should be taken. In this sense, as can be seen in the children’s monument of the Falla Chiva-Francisco de Llano, some of the main cyber threats related to smart toys are attacks through impersonation, manipulation, disclosure of private information, denials of service and elevation of privileges, among others.

“Technology is present in practically all facets of our lives and that makes it essential that the work of raising awareness about cybersecurity habits is a constant. For this reason, since 2018 we have been collaborating with the Falla Chiva-Francisco de Llano with the purpose of helping in this task and taking advantage of the great loudspeaker that these festivities are to reach the whole of society“, said José Rosell, managing partner of S2 Grupo.

“Smart toys can bring important benefits to children in terms of learning, entertainment, and even socio-cognitive development. That is why parents perceive technology as a force for progress that can have a significant capacity to transform and improve their children’s lives, but precisely to this, we must take into account that there are

associated cybersecurity risks and precisely knowing them is the first step to combat them“, said Miguel A. Juan, managing partner of S2 Grupo.

This is the first cyber-secure falla and it has become an innovative project to raise awareness of cybercrime, which is especially dangerous in the case of the most vulnerable groups such as children. All those who visit this Commission will be able to download a report on cybersecurity in connected toys made by the team of experts from S2 Grupo through a QR code, so that families have a better knowledge of this area and can take the necessary precautions while enjoying this type of games. In this way, the tradition of a centenary festivity is united with technology.

Patricia Berzosa

Prensa S2 Grupo

T. 658 810 015

patricia.berzosa@ext.s2grupo.es

Filed Under: Corporate, Current events

Ten tips to protect our digital identity

  • S2 Grupo has pointed out that identity theft, physical or digital theft, or loss of work, are just some of the consequences of problems in protecting our digital identity.
  • Some recommendations are to periodically search the Internet to find out what digital identity we have, not to make publications that could compromise us in the future or to correctly configure the privacy of our accounts.

Valencia, February 23, 2023.- The cybersecurity and critical systems management company S2 Grupo has warned that it is essential to protect our digital identity because it can have important consequences in our personal, work or family environment, among others.

These can range from losing a job, directly not being selected as a candidate for a job offer, being a victim of identity theft, digital and also physical theft (for example, when we report where we live and where we are at every moment, it is easy to know when no one is at home), etc.

“In this context, we need to be aware that protecting our digital identity is just as important as protecting our identity in analog life. Many people believe that a comment, a criticism or an opinion on social networks is of no consequence, but this is not so. Everything we publish is recorded and shapes who we are in the digital sphere and this can have important repercussions, perhaps not at the time, but after a few years we may regret something we publish“, said José Rosell, managing partner of S2 Grupo.

“Our digital identity is shaped by all the information we publish on the Internet, comments on social networks, registration on online pages, registration of personal data, photographs, video, when we say where we are going, with whom, etc. And everything on the Internet leaves a trace. Just because we have deleted it does not mean that it has disappeared. That is why we have to protect what trace we want to leave and how to make it safe for us“, explained Miguel A. Juan, managing partner of S2 Grupo.

Ten tips to protect our digital identity

Given the importance of this issue, S2 Grupo experts have highlighted ten recommendations that can help us protect our identity on the Internet:

1. Use strong passwords and change them periodically.

2. Modify the privacy of our profiles on social networks according to their purpose .- For example, perhaps we have a professional profile in which we only share topics related to this field and which we leave completely public. However, we can have a very private profile to share more personal or recreational issues.

3. Update apps .- This step is essential to avoid vulnerabilities in programs and applications that are exploited by cybercriminals to gain access to other people’s information.

4. Do not make compromising publications .- Everything we publish leaves a trace on the Internet. Even if we do it under a name other than our own, it is possible to find out who is behind the profile. Therefore, posting photos, videos or comments that could put us in a delicate position in the future, is something that once done we will not be able to remove even if it seems that it does not appear because we have deleted it. The first rule to protect our digital identity is not to publish anything that could harm us.

5. Don’t be part of hoaxes or fake news .- Nowadays, we share news because they are attractive to us and without checking them. When these are false, we have contributed to one of the great dangers of disinformation, which is often caused by cybercrime. This also shapes our digital personality.

6. Choose privacy options on social networks appropriately .- Decide who can see what.

7. Log out whenever we access our accounts from other people’s computers.

8. Do not post content copyrighted by others, as this could lead to legal problems.

9. Check our digital identity periodically looking for information about ourselves .- S2 Grupo recommends doing this several times a year. We can look at Google or networks, for example, to be informed about what information about us appears on a regular basis.

10. If your digital identity has been damaged, ask for help .- Notifying the authorities and/or organizations that deal with cybercrime will help us and give us the support we need to respond to complex situations such as cyberbullying, sextortion or identity theft, for example.

Filed Under: Current events

6 recommendations to improve cybersecurity in our personal lives

  • Experts from S2 Grupo have highlighted that knowing the cyber risks we face as well as the tools we have to avoid them, are essential steps in raising cybersecurity awareness in society.
  • Having a NAS server, a personal VPN, cybersecure wallets, USB blockers or RFDI protection systems are some of the gadgets that can increase cybersecurity in homes in a very simple way.

Valencia, February 6, 2023.- On the occasion of the celebration of the International Safe Internet Day tomorrow, Tuesday, February 7, the Valencian company S2 Grupo has highlighted the importance of cyberprotecting homes and our personal lives to avoid being victims of cybercrime.

“If we want to protect our digital life and that of our family, it is essential that we become aware of both the risks that we can find on the Internet and the tools we have today to be cyberprotected and thus be able to enjoy technology while minimizing the risks that may accompany it,” explained José Rosell, managing partner of S2 Grupo.

“Little by little, society is becoming more aware of cybersecurity. We know the risks of using public WiFis, using weak passwords or not regularly updating the systems of our devices, for example. But it is also interesting that we incorporate new tools that can help us at all ages, ranging from cybersecurity stories for children to smartphones especially designed to help the elderly,” said Miguel A. Juan, managing partner of S2 Grupo.

In this regard, experts from the company have highlighted 6 recommendations that will help improve cybersecurity in homes and in our personal lives:

  1. Have a NAS storage server. – This is a private home cloud where you can store information and avoid relying on third-party services such as Google, Apple, Dropbox or Wetransfer. This type of server is easily connected to the home network and allows us to store information, manage it and share it with the users we choose.
  2. Have a personal VPN. – This consists of a virtual private network, widely used in cases of teleworking, which is also very interesting for our personal security. They act as a tunnel that protects our Internet activity and prevents others from accessing our data and stealing personal information.
  3. Acquire a privacy kit. – As pointed out by S2 Grupo, this type of gadget is one of the best anti-spyware shields since it has an RFDI blocking card to prevent contactless cards from being read, a USB data blocker to charge devices securely, and a webcam cover.
  4. Have a cybersecure wallet. – These types of accessories usually have RFDI protection (which becomes a shield that prevents cards from being cloned, personal data from being accessed or unauthorized purchases from being made). They also have card anti-fall mechanisms, even if the wallet is turned upside down, and a pocket for Airtag, Apple’s tracking device, among other elements.
  5. Reducing the digital divide with adapted smartphones. – In this regard, S2 Grupo has highlighted the usefulness of “Maximiliana”, a smartphone especially designed for the elderly, which works on its own. It was created by the engineer Jorge Terreu to be able to see his grandmother Maximiliana while he was on Erasmus in France. It is a very simple phone with which you can receive video calls and messages without having to touch anything.
  6. Give away cybersecurity stories. – To raise awareness among the youngest members of the household, it is recommended to give away these types of stories that explain the problems that a child may face every time he or she has a smartphone or tablet in his or her hands in a fun and easy way through fables. Through them, they will learn to detect threats through situations in which the characters face a problem, reflect on it, ask for help and see how it is solved.

.

Patricia Berzosa – Prensa S2 Grupo – T. 658 810 015 – patricia.berzosa@ext.s2grupo.es

Filed Under: Current events

Automotive Sector

In this sector, you can easily see how it is a large supply chain with several companies involved. How would a cybersecurity breach affect this level? At S2 Grupo, we have extensive experience in protecting large IT and OT infrastructures. In this success story, we do it for a large automotive components supplier.

In the automotive sector, customers are starting to demand minimum cybersecurity measures when making their supply contracts with potential suppliers.

We conduct an assessment of the company’s cybersecurity environment and then propose an improvement plan, tailored to the cybersecurity needs of this component supplier.

In the document we show you how S2 Grupo experts build step by step the entire cybersecurity of the organization. Don’t wait any longer and download it here!

Filed Under: Reports

S2 Grupo grows more than 30% in 2022

  • The Valencian cybersecurity company has closed the last year with a turnover of 32.7 million euros and its workforce has grown by 19%.
  • One of the main objectives of the company to combat cybercrime, cyberwarfare and cyberespionage is the work to achieve digital sovereignty in Europe with its own technology, so it invested in the last year 2.2 million euros in the development of R&D+i projects.

Valencia, January 26, 2023.- S2 Grupo, a Valencian company specialized in cybersecurity and critical systems management, closed 2022 with a turnover of 32.7 million euros. This represents a growth of 30.2% compared to 2021, whose turnover was 25 million euros.

“The growth we are experiencing at S2 Grupo in recent years is, among others, the result of the current situation in which we have experienced how, since the pandemic, the number of cyber-attacks has increased considerably, as well as their sophistication. Moreover, we are at a time when organizations of all types and sizes, from large corporations to SMEs as well as public and private organizations, are aware that cybersecurity is essential in the development of their business processes and in safeguarding them“, said José Rosell, managing partner of S2 Grupo.

The company’s investment in R&D+i in 2022 was 2.2 million and the forecast for 2023 is to increase to 2.4 million euros. In this area, S2 Grupo participates in projects dedicated to industrial cybersecurity, for protection against advanced attacks, protection of IoT devices, protection of critical infrastructures, artificial intelligence, anomaly detection or user security, with a clear objective: the achievement of European digital sovereignty.

“Currently, one of the main needs we have in this sector is to achieve digital sovereignty. If we want to advance in cybersecurity and minimize the risks of cyber espionage, cyber wars and cyber crime, we need to stop being technologically dependent on other countries. For this reason, at S2 Grupo we are committed to investing in R&D+i and the development of our own technology, as the only way to create solutions that will allow Europe to be technologically independent in the field of cybersecurity“, explained Miguel A. Juan, managing partner of S2 Grupo.

S2 Grupo has become an international benchmark in the field of cybersecurity and currently works for leading companies in the Distribution, Energy, Banking and Insurance, Healthcare, Industry and Public Administration sectors. In addition, its presence in Europe is reinforced by its role as one of the founding members of ECSO (European Cybersecurity Association) and by being part of the PartnershipBoard of this association, which is the body in charge of collaborating with the European Commission to define the R&D strategy in cybersecurity for the coming years.

The company’s objectives for 2023 include continuing to grow by increasing the presence of cybersecurity in Industry 4.0, mainly in the field of OT. This is the integration of cybersecurity in the industry’s control systems and in other sectors.

S2 Grupo already has facilities in Valencia, Madrid, Seville, Barcelona, San Sebastian, Brussels, Bogotá, Brindisi, Santiago, Chile, Mexico City, Rotterdam and Lisbon.

S2 Grupo’s workforce increases by 19%.

The company, which continues its expansion in Europe and Latin America, has a stable workforce of 544 employees, which represents a 19% increase in 2022 compared to the previous year.

In this area, last year it took the initiative to create the first Talent Management department to promote the professional development of its employees, as well as their potential and unique talents. The purpose of S2 Grupo is to be a company in which each person can contribute their full value without limitations or conditions. One of its main values is to promote equal opportunities and, in this line, for years it has been developing an important work to promote the presence of women in all areas of S2 Grupo, and to promote female talent in cybersecurity.

Another of its major projects in the field of team growth and training is the consolidation of Enigma University, in which for several years S2 Grupo professionals who are currently international references in the field of cybersecurity, train new promotions of students who want to enter a sector that is in full growth, promoting their specific knowledge and attracting talent. More than 90 people have already participated and it is aimed at students of university degrees related to Information Technology, Artificial Intelligence and Big Data, although candidates from other disciplines are also accepted because cybersecurity is transversal.

In addition, S2 Grupo also offers Enigma Tech, a training program similar in content to Enigma University, which is aimed at graduates of higher education.

Filed Under: Corporate

Food Sector

The food sector is immersed in a process of digitalisation and process optimisation, like many other industries. Are we aware of the impact that a cyber incident could have on this sector?

At S2 Grupo we are experts in OT cybersecurity and we want to bring you a real case in which our specialists work hand in hand with the company and help the organisation to improve its cybersecurity. If you would like to know more, click here and take a look.

Filed Under: Reports

  • Go to page 1
  • Go to page 2
  • arrow right
S2 Grupo
© 2023 S2 Grupo
  • Press Center
  • Legal Disclaimer
  • Privacy Policy
  • Cookie policy
S2 Grupo utiliza cookies propias y de terceros para permitir tu navegación, fines analíticos y para mostrarte publicidad personalizada en base a un perfil elaborado a partir de tus hábitos de navegación (por ejemplo, páginas visitadas). Clica aquí para acceder a nuestra Política de Cookies. Puedes aceptar todas las cookies pulsando el botón “ACEPTAR” o configurar o rechazar su uso pulsando el Botón “CONFIGURAR”
ConfigurarAceptar cookies
Manage consent

Resumen de Privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De estas, las cookies que se clasifican como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funcionalidades básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza este sitio web. Estas cookies se almacenarán en su navegador solo con su consentimiento. También tiene la opción de optar por no recibir estas cookies. Pero la exclusión voluntaria de algunas de estas cookies puede afectar su experiencia de navegación.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
pll_language1 yearThe pll _language cookie is used by Polylang to remember the language selected by the user when returning to the website, and also to get the language information when not available in another way.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Necessary
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
_GRECAPTCHA6 monthsThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Analytics" category .
cookielawinfo-checkbox-functional1 yearThe cookie is set by the GDPR Cookie Consent plugin to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necesaria1 yearSet by the GDPR Cookie Consent plugin to store the user consent for cookies in the category "Necessary".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
SAVE & ACCEPT
Powered by CookieYes Logo