The Exploitation of New Technologies brings with it in many cases a considerable increased productivity in business processes and other benefits such as greater agility in the provision of services. But all this comes with a great risk: the information is shared by users of a multitude of systems and the applications are equally accessible by all of them. Like any software development, these applications can present problems of design, errors in code, configuration errors or even the systems on which deployed may present some failure that makes them vulnerable.
