
ASAC Company Cyber Security Posture
asacti.esSomos una empresa de Consultoría Tecnológica que desde 1996 ayudamos a entidades públicas y privadas a su digitalización. La compañía está especializada en infraestructuras tecnológicas tanto en entornos on-premise, Cloud (propio de ASAC, público e híbrido), para empresas privadas y organismos públicos, ofreciendo una amplia diversificación de productos y soluciones: provisión de infraestructuras TI, desarrollo de aplicaciones digitales, servicios de Cloud Computing -contando una herramienta de gestión propia (Cloud4B)-, ciberseguridad y outsourcing. Con un fuerte background en Consultoría y conocimiento en múltiples sectores, ASAC ofrece a sus clientes un servicio integral y flexible en el entorno TI. Disponemos de dos Centro de Procesos de Datos ubicados en Llanera y conectados entre sí por un anillo de fibra óptica, avalados por las principales certificaciones en infraestructuras y servicios de IT: Certificación Tier III, Esquema Nacional de Seguridad (ENS Categoría alta), ISO 9001, ISO 14001 e ISO 50001-2018 (Gestión de Calidad, Medio Ambiente y Eficiencia energética), ISO 27001 (Seguridad de la Información), ISO 20000(Servicios de TI), ISO 22301 (Gestión de la continuidad de negocio) e ISO 33000 (Calidad en el ciclo de vida del Desarrollo de Software). ASAC es especialista en la prestación de servicios Cloud en alta disponibilidad geográfica (RPO y RTO=0), para entornos críticos, así como en servicios Cloud de escritorios y aplicaciones virtuales en todo el territorio español. Nuestro principal valor son las personas que forman el equipo de ASAC, manteniendo siempre el foco en la mejora continua de nuestras actividades y los trabajadores que participan en ellas.
ASAC Company Details
asac-comunicaciones
125 employees
2669
none
Servicios y consultoría de TI
asacti.es
Scan still pending
ASA_2051588
In-progress

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

ASAC Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
ASAC Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
ASAC Comunicaciones | Ransomware | 100 | 6 | 05/2022 | ASA2244181122 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: Asac Comunicaciones S.L., an Asturian company dedicated to IT consultancy and related services suffered a ransomware cyberattack on the 8th of May 2022. The attack encrypted some of its systems and affected some of its customers who belong to both the public and private sectors. A group of professionals, under the guidelines of Asac's CSIRT, however, worked hard to find the causes and restore the affected systems. |
ASAC Company Subsidiaries

Somos una empresa de Consultoría Tecnológica que desde 1996 ayudamos a entidades públicas y privadas a su digitalización. La compañía está especializada en infraestructuras tecnológicas tanto en entornos on-premise, Cloud (propio de ASAC, público e híbrido), para empresas privadas y organismos públicos, ofreciendo una amplia diversificación de productos y soluciones: provisión de infraestructuras TI, desarrollo de aplicaciones digitales, servicios de Cloud Computing -contando una herramienta de gestión propia (Cloud4B)-, ciberseguridad y outsourcing. Con un fuerte background en Consultoría y conocimiento en múltiples sectores, ASAC ofrece a sus clientes un servicio integral y flexible en el entorno TI. Disponemos de dos Centro de Procesos de Datos ubicados en Llanera y conectados entre sí por un anillo de fibra óptica, avalados por las principales certificaciones en infraestructuras y servicios de IT: Certificación Tier III, Esquema Nacional de Seguridad (ENS Categoría alta), ISO 9001, ISO 14001 e ISO 50001-2018 (Gestión de Calidad, Medio Ambiente y Eficiencia energética), ISO 27001 (Seguridad de la Información), ISO 20000(Servicios de TI), ISO 22301 (Gestión de la continuidad de negocio) e ISO 33000 (Calidad en el ciclo de vida del Desarrollo de Software). ASAC es especialista en la prestación de servicios Cloud en alta disponibilidad geográfica (RPO y RTO=0), para entornos críticos, así como en servicios Cloud de escritorios y aplicaciones virtuales en todo el territorio español. Nuestro principal valor son las personas que forman el equipo de ASAC, manteniendo siempre el foco en la mejora continua de nuestras actividades y los trabajadores que participan en ellas.
Access Data Using Our API

Get company history
.png)
ASAC Cyber Security News
Cyber Awareness Day
October is National Cybersecurity Awareness Month, and a great reminder for everyone to participate in growing security awareness!
Senior Secret Service Executive Brian Busony Joins Global Data Risk
Brian has significant experience and proven results in complex global financial crimes investigations, protecting national executive leaders, ...
LTA ASAC 2024 - Workplace Efficiency and Safety technologies showcase
Institute for Infocomm Research (I²R) had the privilege to exhibit with Workplace Safety and Health Institute (WSH), Singapore at the annual ...
Seamless Firewall Service Insertion in the Network with Cisco Catalyst Switches
Authored in collaboration with Sunil Kumar Guduru (Enterprise Networking) and Kamaraj P (Security). The integration of information ...
TSA offers tips for fans departing Seattle-Tacoma International Airport following 2023 MLB All-Star Game
The Transportation Security Administration (TSA) is advising fans attending the 2023 Major League Baseball All-Star Game at T-Mobile Park in Seattle to know ...
New members of Aviation Security Advisory Committee announced by TSA
New members of Aviation Security Advisory Committee announced by TSA · Bill Cason, Coalition of Airline Pilots Association · Wolfgang Koch, Air ...
Searchwater radar to be used by new UK Merlin airborne surveillance helicopters
Military Embedded Systems · Searchwater radar to be used by new UK Merlin airborne surveillance helicopters. News. May 27, 2015. John M. McHale III. Editorial ...

ASAC Similar Companies

Grupo BGH
Somos un grupo empresario con 110 años de historia en la innovación, el desarrollo y la comercialización de productos y servicios tecnológicos de vanguardia. Brinda respuestas a las necesidades de empresas, organismos públicos y consumidores de América Latina y África. Misión Brindar productos y

BPM Consulting SAS
BPM CONSULTING SAS, es una compañía colombiana con más de 19 años de experiencia que ofrece servicios de Contact Center y BPO, Outsourcing de Tecnologías de Información, Pasarela de Pagos y Facturación Electrónica. Para nuestro servicio de facturación y nomina electrónica, desarrollamos un software

ESIGN LATAM
Somos una empresa especializada en brindar soluciones de Identidad Digital, Documentos Electrónicos y Seguridad de la Información, teniendo como valores la innovación, el trabajo en equipo y la confianza. Nuestras soluciones apoyan a gestionar y proteger el activo más valioso que poseen las persona

Timestamp España
𝗧𝗶𝗺𝗲𝘀𝘁𝗮𝗺𝗽 es una consultora especializada en Tecnologías de la Información e Integración de Sistemas en la que 𝗮𝗽𝗼𝘀𝘁𝗮𝗺𝗼𝘀 𝗽𝗼𝗿 𝗲𝗹 𝗹𝗶𝗱𝗲𝗿𝗮𝘇𝗴𝗼 𝘁𝗲𝗰𝗻𝗼𝗹𝗼́𝗴𝗶𝗰𝗼, 𝗯𝗮𝘀𝗮𝗱𝗼 𝗲𝗻 𝗹𝗮 𝗰𝗮𝗹𝗶𝗱𝗮𝗱, 𝗹𝗮 𝗰𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝗰𝗶𝗼́𝗻 𝘆 𝗹𝗮 𝗳𝗼𝗿𝗺𝗮𝗰𝗶𝗼́𝗻 𝗰𝗼𝗻𝘁𝗶𝗻𝘂𝗮 de nuestros colaboradores. Solemos trabajar en escenarios críticos y muy exigentes,

Globant Salesforce Studio
Globant is where Engineering, Innovation, and Design meet scale. Our Salesforce Studio is part of a worldwide transformative organization seeking business reinvention and industry disruption for our Customers. For 20 years we have been delivering Salesforce services and multi-cloud projects across t

SM2 by PLEXUS
SM2 pertenece al Grupo Plexus, formado por más de 1.600 profesionales, con 17 oficinas en España y tres sedes en el extranjero Frankfurt, Londres y Lisboa. Actuamos en 27 países, contamos con 12 clientes de Ibex35 y una cifra de negocio de 79 millones de € en 2020. En Baleares somos un equipo de má

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
ASAC CyberSecurity History Information
How many cyber incidents has ASAC faced?
Total Incidents: According to Rankiteo, ASAC has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at ASAC?
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
How does ASAC detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through an recovery measures with a group of professionals, under the guidelines of asac's csirt, worked hard to find the causes and restore the affected systems.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: Asac Comunicaciones S.L. Ransomware Attack
Description: Asac Comunicaciones S.L., an Asturian company dedicated to IT consultancy and related services suffered a ransomware cyberattack on the 8th of May 2022. The attack encrypted some of its systems and affected some of its customers who belong to both the public and private sectors. A group of professionals, under the guidelines of Asac's CSIRT, however, worked hard to find the causes and restore the affected systems.
Date Detected: 2022-05-08
Type: Ransomware
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware ASA2244181122
Systems Affected: Some of its systems
Which entities were affected by each incident?

Incident : Ransomware ASA2244181122
Entity Type: Company
Industry: IT Consultancy
Location: Asturias
Customers Affected: Some of its customers who belong to both the public and private sectors
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware ASA2244181122
Incident Response Plan Activated: True
Recovery Measures: A group of professionals, under the guidelines of Asac's CSIRT, worked hard to find the causes and restore the affected systems
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware ASA2244181122
Data Encryption: True
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware ASA2244181122
Data Encryption: True
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through A group of professionals, under the guidelines of Asac's CSIRT, worked hard to find the causes and restore the affected systems.
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2022-05-08.
Impact of the Incidents
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Some of its systems.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
