LinkedIn turns 18 and we give you 5 recommendations to use it safely

Cybersecurity and Encryption


LinkedIn comes of age! Today marks 18 years since the launch of the world’s largest professional network for business, enterprise and employment use. However, like any social network, we must be aware of cyber-attacks and risk situations that we may face when using it. For this reason, we leave you with 5 key recommendations to use Linkedin safely:

  1. Use a unique, strong and different password.

Change the password periodically (every 3 months), do not use the same password for different applications and robust: more than 10 characters, with capital letters, numbers, punctuation marks and symbols. And remember, the password is only the user’s. Don’t tell anyone your password, and never write it down!

  1. Enable two-step verification.

It is one of the most frequent recommendations when we want to improve the security of our accounts, as it reduces the chances of identity theft and unauthorized access to confidential information. It requires a person to use more than one form of verification to access an account, usually “knowing something”, such as a password, and “having something”, such as a cell phone.

To set up two-step verification, follow these steps:

  1. Periodically review your active sessions the sessions you have active.

Details of each session can be viewed, showing the approximate location, the browser logged in, the IP address and the owner of the IP address. From here you can also close individual sessions or close all sessions at once.

A list of all currently active sessions will be displayed:


  1. Report spam, offensive and inappropriate content, phishing or suspicious messages.

In order for LinkedIn to review the alleged infringing content, we have to warn of these cases, and if necessary, always taking into account the definition contained in the Community Standards and Terms of Use, LinkedIn will remove them.

  1. Review the management of your personal data.

LinkedIn collects a lot of data about users through their profile.However, since recently, we can manage them. To do so, follow the steps below:

From this section you can view, manage and modify how LinkedIn uses your data and activity, you can download data at any time, you can get a copy of account data, contacts and more information, manage cookie preferences, choose the detailed personal information you provide and choose whether you want them to share your account information for academic research and policy purposes.

Through this route, you can access the personal data management:


By following these brief recommendations we can reduce the risk of suffering different types of cyber-attacks and of overexposing our data.


Family of SATCOM On The Move (SOTM) terminals for vehicular installation and stable mobile connection

SGoSat is a family of high-tech SOTM (Satellite Comms On The Move) terminals that are installed in a vehicle, providing the ability to target and maintain a stable connection to the satellite when the vehicle is in motion in any type of conditions.

The SGoSat family is composed of versatile terminals, which can be installed on any type of platform: trains and buses, military and/or government vehicles, aircraft, ships, etc. Originally designed for the military sector, SGoSat terminals are extremely reliable and robust, integrating high-performance components that comply with the most stringent environmental and EMI/EMC regulations. The product uses low-profile, high-efficiency antennas and a high-performance positioning and tracking unit, allowing the terminal to be operated anywhere in the world.

In order to meet the diverse needs of its customers, INSTER has developed single band and dual band terminals in X, Ka and Ku frequencies.

The SGoSat family of terminals can also be configured with a wide range of radomes (including ballistic options) to suit customer requirements.