
At Apolo Cybersecurity, the development of our cybersecurity activity is critically supported by information systems and technologies. We believe that security is an essential pillar not only to ensure business continuity and asset protection, but also to maintain the trust of our customers and ensure legal and regulatory compliance. For this reason, our Management leads and maintains an Information Security Management System (ISMS) that is fully integrated into all company processes.
The personal data provided by users through contact forms or any other means will be used for the purpose of managing requests for information, inquiries or any type of request made by the user.
Comprehensive protection: We protect information and associated assets against all types of internal or external threats, whether deliberate or accidental.
Security Pillars: We guarantee the confidentiality, integrity, availability, authenticity and traceability of all the information we manage.
Legality and Compliance: We strictly comply with applicable legal, regulatory, and contractual requirements.
Prevention and Resilience: We promote a comprehensive model aimed at prevention, detection, response, recovery and continuous improvement in the face of incidents.
Corporate awareness: We actively promote cybersecurity training, responsibility and awareness of all our staff.
Risk Management: We integrate security into decision-making, always based on a constant risk assessment.
The legal basis for data processing is the user's consent by checking the appropriate box and submitting their data.
El Steering Committee is primarily responsible for supporting the security system, allocating resources and approving regulations.
At the executive and operational levels, the Information Security Committee acts as a body for coordinating and supervising risks, controls and incidents.
All personnel, as well as third parties and suppliers with access to our systems, have an unavoidable obligation to know and comply with this security policy.
The data will not be transferred to third parties, unless legally required.
Access control: We operate on the principle of “need to know” and “minimum privilege”, employing strong authentication and advanced protection mechanisms for remote access and critical systems.
Secure remote work: Connections to our corporate resources from remote locations are made exclusively through secure channels such as VPNs and multifactor authentication.
Asset and Information Management: All information is classified and treated with the levels of protection it requires throughout its life cycle.
Workplace safety: We keep all corporate devices up to date, secured against malicious code and configured under strict security standards.
Users have the right to access, rectify and delete data, as well as other rights, as explained in the additional information.
Resilience and continuity: We maintain backup copies of critical information and perform regular recovery tests to ensure operational continuity.
Monitoring: We have detection and recording capabilities (Logging) to quickly identify anomalies or incidents.
Auditing and continuous improvement: We constantly evaluate the effectiveness of our controls using safety indicators and the review of the Management Committee. This Policy is reviewed annually, or in the face of significant changes, to ensure that it is constantly adapted to new needs and threats.