{"id":1379,"date":"2024-03-09T14:30:26","date_gmt":"2024-03-09T20:30:26","guid":{"rendered":"https:\/\/miprotectordigital.com\/?p=1379"},"modified":"2024-05-24T21:52:27","modified_gmt":"2024-05-25T03:52:27","slug":"amenazas-y-practicas-de-seguridad","status":"publish","type":"post","link":"https:\/\/miprotectordigital.com\/index.php\/2024\/03\/09\/amenazas-y-practicas-de-seguridad\/","title":{"rendered":"Amenazas  y Pr\u00e1cticas de Seguridad"},"content":{"rendered":"\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-6131ab1\" data-block-id=\"6131ab1\"><style>.stk-6131ab1{margin-bottom:0px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-6131ab1-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-72a1d66\" data-v=\"4\" data-block-id=\"72a1d66\"><style>.stk-72a1d66{align-self:center !important;margin-top:-5px !important;margin-right:-200px !important;margin-bottom:8px !important;margin-left:-200px !important}.stk-72a1d66-inner-blocks{justify-content:center !important}.stk-72a1d66-container{min-height:0px !important}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-72a1d66-container stk--no-background stk--no-padding\"><div class=\"stk--column-flex stk-block-content stk-inner-blocks stk-72a1d66-inner-blocks\">\n<div class=\"wp-block-cover\" style=\"border-style:none;border-width:0px;border-radius:0px;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;min-height:317px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-1315 lazyload\" alt=\"\" data-src=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-yan-krukau-4458420-2-scaled-e1710100669247.jpg\" style=\"--smush-placeholder-width: 2470px; --smush-placeholder-aspect-ratio: 2470\/1335;object-position:72% 23%\" data-object-fit=\"cover\" data-object-position=\"72% 23%\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-container-core-cover-is-layout-bf96b11b wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-stackable-heading alignwide stk-block-heading stk-block-heading--v2 stk-block stk-ab2b9ad\" id=\"span-style-color-ffffff-class-stk-highlight-tener-conciencia-sobre-las-amenazas-ciberneticas-es-ideal-para-protegerte-span-span-style-color-var-theme-palette-color-1-fb-7258-class-stk-highlight-span\" data-block-id=\"ab2b9ad\"><style>.stk-ab2b9ad .stk-block-heading__text{font-family:\"Walter Turncoat\",Sans-serif !important}<\/style><h4 class=\"stk-block-heading__text has-text-align-center\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">\u00abTener conciencia sobre las amenazas cibern\u00e9ticas, es ideal para protegerte\u00bb<\/span><span style=\"color: var(--theme-palette-color-1, #FB7258);\" class=\"stk-highlight\"> <\/span><\/h4><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<nav style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\"has-text-color has-palette-color-4-color has-background has-palette-color-5-background-color is-responsive items-justified-space-between alignwide wp-block-navigation is-content-justification-space-between is-layout-flex wp-container-core-navigation-is-layout-b2891da8 wp-block-navigation-is-layout-flex\" aria-label=\"Main Menu\" \n\t\t data-wp-interactive=\"core\/navigation\" data-wp-context='{\"overlayOpenedBy\":{\"click\":false,\"hover\":false,\"focus\":false},\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Men\\u00fa\"}'><button aria-haspopup=\"dialog\" aria-label=\"Abrir el men\u00fa\" class=\"wp-block-navigation__responsive-container-open\" \n\t\t\t\tdata-wp-on--click=\"actions.openMenuOnClick\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M4 7.5h16v1.5H4z\"><\/path><path d=\"M4 15h16v1.5H4z\"><\/path><\/svg><\/button>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-container  has-text-color has-palette-color-4-color has-background has-palette-color-6-background-color\"  id=\"modal-1\" \n\t\t\t\tdata-wp-class--has-modal-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-class--is-menu-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-watch=\"callbacks.initMenu\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t\tdata-wp-on--focusout=\"actions.handleMenuFocusout\"\n\t\t\t\ttabindex=\"-1\"\n\t\t\t>\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\t\tdata-wp-bind--aria-modal=\"state.ariaModal\"\n\t\t\t\tdata-wp-bind--aria-label=\"state.ariaLabel\"\n\t\t\t\tdata-wp-bind--role=\"state.roleAttribute\"\n\t\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Cerrar el men\u00fa\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\t\tdata-wp-on--click=\"actions.closeMenuOnClick\"\n\t\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"m13.06 12 6.47-6.47-1.06-1.06L12 10.94 5.53 4.47 4.47 5.53 10.94 12l-6.47 6.47 1.06 1.06L12 13.06l6.47 6.47 1.06-1.06L13.06 12Z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" \n\t\t\t\tdata-wp-watch=\"callbacks.focusFirstElement\"\n\t\t\t id=\"modal-1-content\">\n\t\t\t\t\t\t\t\t<ul style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\"wp-block-navigation__container has-text-color has-palette-color-4-color has-background has-palette-color-5-background-color is-responsive items-justified-space-between alignwide wp-block-navigation\"><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/\"><span class=\"wp-block-navigation-item__label\">Inicio<\/span><\/a><\/li><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/index.php\/conocenos\/\"><span class=\"wp-block-navigation-item__label\">Con\u00f3cenos<\/span><\/a><\/li><li data-wp-context=\"{ &quot;submenuOpenedBy&quot;: { &quot;click&quot;: false, &quot;hover&quot;: false, &quot;focus&quot;: false }, &quot;type&quot;: &quot;submenu&quot;, &quot;modal&quot;: null, &quot;previousFocus&quot;: null }\" data-wp-interactive=\"core\/navigation\" data-wp-on--focusout=\"actions.handleMenuFocusout\" data-wp-on--keydown=\"actions.handleMenuKeydown\" data-wp-watch=\"callbacks.initMenu\" tabindex=\"-1\" style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\"wp-block-navigation-item has-child open-on-click wp-block-navigation-submenu\"><button data-wp-bind--aria-expanded=\"state.isMenuOpen\" data-wp-on--click=\"actions.toggleMenuOnClick\" aria-label=\"Submen\u00fa de Recursos\" class=\"wp-block-navigation-item__content wp-block-navigation-submenu__toggle\" ><span class=\"wp-block-navigation-item__label\">Recursos<\/span><\/button><span class=\"wp-block-navigation__submenu-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" viewBox=\"0 0 12 12\" fill=\"none\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M1.50002 4L6.00002 8L10.5 4\" stroke-width=\"1.5\"><\/path><\/svg><\/span><ul data-wp-on--focus=\"actions.openMenuOnFocus\" class=\"wp-block-navigation__submenu-container has-text-color has-palette-color-4-color has-background has-palette-color-6-background-color wp-block-navigation-submenu\"><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/wp-admin\/post.php?post=1379&#038;action=edit\"><span class=\"wp-block-navigation-item__label\">Amenazas y practicas de seguridad<\/span><\/a><\/li><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/index.php\/2024\/03\/09\/seguridad-en-identidad-digital\/\"><span class=\"wp-block-navigation-item__label\">Seguridad en Identidad Digital<\/span><\/a><\/li><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/index.php\/2024\/03\/10\/privacidad\/\"><span class=\"wp-block-navigation-item__label\">Configuraci\u00f3n De Privacidad En Linea<\/span><\/a><\/li><\/ul><\/li><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/index.php\/autoevaluacion\/\"><span class=\"wp-block-navigation-item__label\">Autoevaluaci\u00f3n<\/span><\/a><\/li><li style=\"font-size: clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\" class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/miprotectordigital.com\/index.php\/contact\/\"><span class=\"wp-block-navigation-item__label\">Mapa del Sitio<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/nav>\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-3a151ca\" data-block-id=\"3a151ca\"><style>.stk-3a151ca{height:28px !important}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-has-top-separator stk-has-bottom-separator stk-block stk-45ffa52 stk-block-background\" data-block-id=\"45ffa52\"><style>.stk-45ffa52{background-color:var(--theme-palette-color-5,#DFDFE2) !important;padding-top:80px !important;padding-bottom:80px !important}.stk-45ffa52:before{background-color:var(--theme-palette-color-5,#DFDFE2) !important}.stk-45ffa52 > .stk-separator__top svg{fill:#ff6900 !important}.stk-45ffa52 > .stk-separator__bottom svg{fill:#ff5400 !important}.stk-45ffa52 > .stk-separator__bottom .stk-separator__wrapper{transform:scaleX(1.2) !important;height:135px !important}<\/style><div class=\"stk-separator stk-separator__top\"><div class=\"stk-separator__wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1600 200\" class=\"stk-separator__layer-1\" preserveAspectRatio=\"none\" aria-hidden=\"true\"><path class=\"slant-1_svg__st2\" d=\"M-10 210h1620V.5L-10 183.9z\"><\/path><\/svg><\/div><\/div><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-45ffa52-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-26b5298\" data-v=\"4\" data-block-id=\"26b5298\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-26b5298-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-26b5298-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-690e228\" data-block-id=\"690e228\"><style>.stk-690e228-column{--stk-column-gap:48px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-690e228-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-4946378\" data-v=\"4\" data-block-id=\"4946378\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-4946378-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-4946378-inner-blocks\">\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-9299d54\" data-v=\"2\" data-block-id=\"9299d54\"><style>.stk-9299d54{margin-bottom:21px !important}<\/style><div class=\"stk-block-blockquote__content stk-container stk-9299d54-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon stk-block stk-5f54dc8\" data-block-id=\"5f54dc8\"><style>.stk-5f54dc8{top:-50px !important;left:-50px !important;position:absolute !important;opacity:0.2 !important}.stk-5f54dc8 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:200px !important;width:200px !important}.stk-5f54dc8 .stk--svg-wrapper .stk--inner-svg svg:last-child,.stk-5f54dc8 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g,path,rect,polygon,ellipse){fill:var(--theme-palette-color-3,#6e6d76) !important}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-5f54dc8\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-5-f-54-dc-8-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-5-f-54-dc-8-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M19.8 9.3C10.5 11.8 4.6 17 2.1 24.8c2.3-3.6 5.6-5.4 9.9-5.4 3.3 0 6 1.1 8.3 3.3 2.2 2.2 3.4 5 3.4 8.3 0 3.2-1.1 5.8-3.3 8-2.2 2.2-5.1 3.2-8.7 3.2-3.7 0-6.5-1.2-8.6-3.5C1 36.3 0 33.1 0 29 0 18.3 6.5 11.2 19.6 7.9l.2 1.4zm26.4 0C36.9 11.9 31 17 28.5 24.8c2.2-3.6 5.5-5.4 9.8-5.4 3.2 0 6 1.1 8.3 3.2 2.3 2.2 3.4 4.9 3.4 8.3 0 3.1-1.1 5.8-3.3 7.9-2.2 2.2-5.1 3.3-8.6 3.3-3.7 0-6.6-1.1-8.6-3.4-2.1-2.3-3.1-5.5-3.1-9.7 0-10.7 6.6-17.8 19.7-21.1l.1 1.4z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-7049d4c\" data-block-id=\"7049d4c\"><style>.stk-7049d4c{margin-bottom:36px !important}.stk-7049d4c .stk-block-text__text{font-size:41px !important;color:#ff6900 !important;font-family:\"Walter Turncoat\",Sans-serif !important}@media screen and (max-width:999px){.stk-7049d4c .stk-block-text__text{font-size:41px !important}}<\/style><p class=\"stk-block-text__text has-text-color has-text-align-center\"><br><span style=\"color: #ff6900;\" class=\"stk-highlight\">\u00a1Mantente informado y protegido en el mundo digital!<\/span><\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-0ca3ce4\" data-block-id=\"0ca3ce4\"><style>.stk-0ca3ce4{margin-bottom:16px !important}.stk-0ca3ce4 .stk-block-text__text{font-size:20px !important;color:#000000 !important}@media screen and (max-width:999px){.stk-0ca3ce4 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text has-text-color has-text-align-justify\"><span style=\"color: var(--theme-palette-color-4, #0e0c1b);\" class=\"stk-highlight\">El uso constante de la tecnolog\u00eda en nuestra vida cotidiana abre las puertas a incre\u00edbles posibilidades, pero tambi\u00e9n conlleva riesgos que no podemos pasar por alto. <\/span><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-b3cba47\" data-block-id=\"b3cba47\"><style>.stk-b3cba47{margin-bottom:36px !important}.stk-b3cba47 .stk-block-text__text{font-size:20px !important;color:#000000 !important}@media screen and (max-width:999px){.stk-b3cba47 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text has-text-color has-text-align-justify\">Como universitarios, es crucial estar siempre alerta para evitar amenazas que puedan comprometer la seguridad de nuestros dispositivos y la privacidad de nuestros datos.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-5853afe\" data-v=\"4\" data-block-id=\"5853afe\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-5853afe-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-5853afe-inner-blocks\">\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-d83a0e2\" data-block-id=\"d83a0e2\"><style>.stk-d83a0e2{height:214px !important}<\/style><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Amenazas Digitales -Mi protector Digital\" width=\"1481\" height=\"833\" data-src=\"https:\/\/www.youtube.com\/embed\/DdLSMRf44M0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Video sobre amenazas digitales.<\/figcaption><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-c8a7688\" data-block-id=\"c8a7688\"><style>.stk-c8a7688 hr.stk-block-divider__hr{width:100% !important}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n<\/div><\/div><\/div>\n<\/div><div class=\"stk-separator stk-separator__bottom\"><div class=\"stk-separator__wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1600 200\" class=\"stk-separator__layer-1\" preserveAspectRatio=\"none\" aria-hidden=\"true\"><path d=\"M1610 210H-10V.5l1620 183.4z\"><\/path><\/svg><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-168a11f\" data-block-id=\"168a11f\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-168a11f-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-1214801\" data-v=\"4\" data-block-id=\"1214801\"><style>.stk-1214801-inner-blocks{align-items:center !important;justify-content:space-evenly !important}.stk-1214801-container{min-height:4px !important;max-width:1500px !important;padding-top:0px !important;padding-right:0px !important;padding-bottom:0px !important;padding-left:0px !important}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-1214801-container stk--no-background stk--no-padding\"><div class=\"stk--column-flex stk-block-content stk-inner-blocks stk-1214801-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-7c1cdd7\" id=\"ad\" data-block-id=\"7c1cdd7\"><style>.stk-7c1cdd7{margin-bottom:16px !important}.stk-7c1cdd7 .stk-block-heading__text{font-size:64px !important}@media screen and (max-width:999px){.stk-7c1cdd7 .stk-block-heading__text{font-size:50px !important}}<\/style><h2 class=\"stk-block-heading__text has-text-align-center\"><span style=\"color: var(--theme-palette-color-7, #FBFBFB);\" class=\"stk-highlight\"> Amenazas Digitales<\/span> <\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-b66967c\" data-block-id=\"b66967c\"><style>.stk-b66967c{margin-bottom:36px !important}.stk-b66967c .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-b66967c .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Las amenazas digitales pueden tener como objetivo varias formas de da\u00f1ar o  robar informaci\u00f3n confidencial, interrumpir servicios, da\u00f1ar la reputaci\u00f3n en l\u00ednea o realizar actividades il\u00edcitas. Actualmente, las maneras en las que se lleva a cabo la ciberdelincuencia son diversas y cada d\u00eda m\u00e1s fuertes, algunos de los m\u00e1s comunes son  el phishing, el ransomware y otros ataques cibern\u00e9ticos los cuales requieren de medidas de seguridad efectivas para prevenir o disminuir su impacto de la mejor manera posible.<\/span><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-feature-grid alignwide stk-block-feature-grid stk-block-columns stk-block stk-b2795c5 is-style-large-mid\" data-block-id=\"b2795c5\"><style>.stk-b2795c5 .stk--block-align-b2795c5{align-items:center !important}.stk-b2795c5-column{--stk-column-gap:32px !important}@media screen and (max-width:689px){.stk-b2795c5-column{row-gap:24px !important}}<\/style><div class=\"stk-row stk-inner-blocks has-text-align-center stk--block-align-b2795c5 stk-block-content stk-content-align stk-b2795c5-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-6e3d2d4\" data-v=\"4\" data-block-id=\"6e3d2d4\"><style>.stk-6e3d2d4-inner-blocks{justify-content:center !important}.stk-6e3d2d4-container{display:flex !important}@media screen and (min-width:690px){.stk-6e3d2d4{flex:var(--stk-flex-grow,1) 1 calc(33.33% - var(--stk-column-gap,0px) * 2 \/ 3 ) !important}}@media screen and (min-width:690px) and (max-width:999px){.stk-6e3d2d4{flex:var(--stk-flex-grow,1) 1 calc(100% - var(--stk-column-gap,0px) * 0 \/ 1 ) !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-6e3d2d4-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-6e3d2d4-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-8096f19\" data-block-id=\"8096f19\"><style>.stk-8096f19{margin-bottom:39px !important}.stk-8096f19 .stk-img-wrapper{width:80% !important;height:200px !important}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img decoding=\"async\" class=\"stk-img wp-image-1306 lazyload\" data-src=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-scaled.jpg\" width=\"1707\" height=\"2560\" data-srcset=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-scaled.jpg 1707w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-200x300.jpg 200w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-683x1024.jpg 683w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-768x1152.jpg 768w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-1024x1536.jpg 1024w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-lucas-andrade-14000464-1-1365x2048.jpg 1365w\" data-sizes=\"auto, (max-width: 1707px) 100vw, 1707px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1707px; --smush-placeholder-aspect-ratio: 1707\/2560;\" \/><\/span><\/figure><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-7cccbc3\" id=\"span-style-color-ff-6900-class-stk-highlight-malware-span\" data-block-id=\"7cccbc3\"><h3 class=\"stk-block-heading__text\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Malware<\/span><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-85d6dae\" data-block-id=\"85d6dae\"><style>.stk-85d6dae{margin-bottom:36px !important}.stk-85d6dae .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-85d6dae .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Malware o Software Malicioso, es un t\u00e9rmino  que engloba cualquier programa o c\u00f3digo malicioso con el potencial de causar da\u00f1o a los sistemas<\/span>.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-36f3621\" data-block-id=\"36f3621\"><style>.stk-36f3621{margin-bottom:36px !important}.stk-36f3621 .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-36f3621 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text has-text-align-center\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">El prop\u00f3sito del malware es obtener ganancias no legales  a expensas del usuario. Aunque no puede da\u00f1ar f\u00edsicamente el hardware de los sistemas o equipos de red, con una excepci\u00f3n conocida (consulte la secci\u00f3n Android de Google), tiene la capacidad de robar, cifrar o borrar datos, modificar o tomar el control de funciones b\u00e1sicas de la computadora, y espiar la actividad en el ordenador sin el conocimiento o permiso del usuario.<\/span><\/p><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"\u00bfQu\u00e9 es malware? Los principales tipos de ataques inform\u00e1ticos y c\u00f3mo protegernos ante ellos.\" width=\"1481\" height=\"833\" data-src=\"https:\/\/www.youtube.com\/embed\/HuasitV4lcw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Recuperado de ComputerHoy.com. (2021, 3 abril). <em>\u00bfQu\u00e9 es malware? los principales tipos de ataques inform\u00e1ticos y c\u00f3mo protegernos ante ellos.<\/em> [V\u00eddeo]. YouTube. <\/span><\/figcaption><\/figure>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-7a467df\" data-v=\"4\" data-block-id=\"7a467df\"><style>.stk-7a467df-container{padding-bottom:80px !important}@media screen and (min-width:690px){.stk-7a467df{flex:var(--stk-flex-grow,1) 1 calc(33.33% - var(--stk-column-gap,0px) * 2 \/ 3 ) !important}}@media screen and (min-width:690px) and (max-width:999px){.stk-7a467df{flex:var(--stk-flex-grow,1) 1 calc(100% - var(--stk-column-gap,0px) * 0 \/ 1 ) !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-7a467df-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-7a467df-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-2d5d376 stk-block-background\" data-block-id=\"2d5d376\"><style>.stk-2d5d376{background-color:#00000003 !important}.stk-2d5d376:before{background-color:#00000003 !important}.stk-2d5d376 .stk-img-wrapper{width:80% !important;height:200px !important}.stk-2d5d376 .stk-img-wrapper::after{background-color:var(--theme-palette-color-5,#DFDFE2) !important}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img decoding=\"async\" class=\"stk-img wp-image-1281 lazyload\" data-src=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-scaled.jpg\" width=\"2560\" height=\"1707\" data-srcset=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-scaled.jpg 2560w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-300x200.jpg 300w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-1024x683.jpg 1024w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-768x512.jpg 768w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-1536x1024.jpg 1536w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-tima-miroshnichenko-7047000-1-2048x1365.jpg 2048w\" data-sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 2560px; --smush-placeholder-aspect-ratio: 2560\/1707;\" \/><\/span><\/figure><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-39224c4\" id=\"span-style-color-ff-6900-class-stk-highlight-phishing-span\" data-block-id=\"39224c4\"><h3 class=\"stk-block-heading__text\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Phishing<\/span><\/h3><\/div>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--40);margin-bottom:0;margin-left:var(--wp--preset--spacing--40)\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Son muchas las formas de enga\u00f1o que los ciberdelincuentes pueden utilizar para enga\u00f1arte mediante enlaces maliciosos en correos electr\u00f3nicos (phishing), mensajes de texto (smishing) o incluso llamadas telef\u00f3nicas (vishing), estos ciberdelincuentes adoptan identidades falsas de organismos oficiales, empresas o entidades financieras. Fingen alertas de seguridad, fallas en cuentas bancarias, devoluciones de pagos, entre otros, con el objetivo de obtener informaci\u00f3n privada o infectar dispositivos con malware.<\/span><\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"margin-right:var(--wp--preset--spacing--40);margin-left:var(--wp--preset--spacing--40)\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Tu participaci\u00f3n siempre jugar\u00e1 un papel crucial para no ser victima de un ataque de ingenier\u00eda social.<\/span><span style=\"color: var(--theme-palette-color-4, #0e0c1b);\" class=\"stk-highlight\"> <\/span><\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-ab262e4a77cb0c8992fca64fe59c2cde\" style=\"margin-right:var(--wp--preset--spacing--40);margin-left:var(--wp--preset--spacing--40)\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Ten cuidado cuando te llamen  haci\u00e9ndose pasar por equipos de soporte t\u00e9cnico, alegando problemas o infecciones en los equipos y solicitando acceso remoto para resolver la situaci\u00f3n. En ocasiones, tambi\u00e9n han pedido instalar aplicaciones en dispositivos m\u00f3viles con la intenci\u00f3n de tomar el control y acceder a toda la informaci\u00f3n almacenada, incluyendo mensajes de texto.<\/span><\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-8ef7bf2\" data-v=\"4\" data-block-id=\"8ef7bf2\"><style>.stk-8ef7bf2-inner-blocks{justify-content:center !important}.stk-8ef7bf2-container{display:flex !important}@media screen and (min-width:690px){.stk-8ef7bf2{flex:var(--stk-flex-grow,1) 1 calc(33.33% - var(--stk-column-gap,0px) * 2 \/ 3 ) !important}}@media screen and (min-width:690px) and (max-width:999px){.stk-8ef7bf2{flex:var(--stk-flex-grow,1) 1 calc(100% - var(--stk-column-gap,0px) * 0 \/ 1 ) !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-8ef7bf2-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-8ef7bf2-inner-blocks\">\n<div class=\"wp-block-stackable-image stk-block-image stk-block stk-19632aa\" data-block-id=\"19632aa\"><style>.stk-19632aa .stk-img-wrapper{width:80% !important;height:200px !important}<\/style><figure><span class=\"stk-img-wrapper stk-image--shape-stretch\"><img decoding=\"async\" class=\"stk-img wp-image-1300 lazyload\" data-src=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-scaled.jpg\" width=\"2560\" height=\"1707\" data-srcset=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-scaled.jpg 2560w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-300x200.jpg 300w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-1024x683.jpg 1024w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-768x512.jpg 768w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-1536x1024.jpg 1536w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-andrea-piacquadio-3807738-1-2048x1365.jpg 2048w\" data-sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 2560px; --smush-placeholder-aspect-ratio: 2560\/1707;\" \/><\/span><\/figure><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-562e6f8\" id=\"span-style-color-ff-6900-class-stk-highlight-ransomware-span\" data-block-id=\"562e6f8\"><h3 class=\"stk-block-heading__text\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Ransomware<\/span><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-9ddaf17\" data-block-id=\"9ddaf17\"><style>.stk-9ddaf17{margin-bottom:26px !important}.stk-9ddaf17 .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-9ddaf17 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Su prop\u00f3sito es secuestrar  tus datos encript\u00e1ndolos y luego exigir un rescate para desencriptar la informaci\u00f3n.<\/span><\/p><\/div>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-8e631b9ed08e948d7cbbf736ec209d32\">El ransomware, tambi\u00e9n conocido como malware de rescate,  bloquea el acceso a sistemas o archivos personales, exigiendo un rescate para restaurar el acceso. Puede infectar mediante spam malicioso, que utiliza correos electr\u00f3nicos no solicitados con archivos adjuntos o enlaces enga\u00f1osos. Adem\u00e1s, la publicidad maliciosa puede distribuirse mientras los usuarios navegan por la web. <\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-9e94fdc108a75f253ca80626ce24efa8\">Hay tres tipos principales: scareware, bloqueadores de pantalla y ransomware de cifrado, siendo este \u00faltimo el m\u00e1s peligroso al cifrar archivos y exigir un rescate para su liberaci\u00f3n.<\/p>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-link-color has-medium-font-size wp-elements-3532717a358ae157357ed7fe57e1b9b6\"> La regla principal en caso de infecci\u00f3n es no pagar el rescate, ya que esto puede fomentar m\u00e1s ataques. <\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-0b56ab2\" id=\"strong-top-de-amenazas-para-universitarios-strong\" data-block-id=\"0b56ab2\"><style>.stk-0b56ab2 .stk-block-heading__text{color:#ffffff !important;line-height:2.2em !important;font-weight:200 !important;text-transform:uppercase !important;font-family:\"Walter Turncoat\",Sans-serif !important}<\/style><h3 class=\"stk-block-heading__text has-text-color has-text-align-center\"><strong>Top de Amenazas para Universitarios<\/strong><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-has-top-separator stk-has-bottom-separator stk-block stk-3ba71ce stk-block-background\" data-block-id=\"3ba71ce\"><style>.stk-3ba71ce{background-color:#000000 !important}.stk-3ba71ce:before{background-color:#000000 !important}.stk-3ba71ce > .stk-separator__top svg{fill:#ff6900 !important}.stk-3ba71ce > .stk-separator__bottom svg{fill:#ff6900 !important}<\/style><div class=\"stk-separator stk-separator__top\"><div class=\"stk-separator__wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1600 200\" class=\"stk-separator__layer-1\" preserveAspectRatio=\"none\" aria-hidden=\"true\"><path d=\"M1610 210H-10V.5l1620 183.4z\"><\/path><\/svg><\/div><\/div><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-3ba71ce-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-28fb61d\" data-v=\"4\" data-block-id=\"28fb61d\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-28fb61d-container stk--no-background stk--no-padding\"><div class=\"has-text-align-right stk-block-content stk-inner-blocks stk-28fb61d-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-4c25de5\" id=\"span-style-color-ff-6900-class-stk-highlight-phishing-educativo-span\" data-block-id=\"4c25de5\"><style>.stk-4c25de5 .stk-block-heading__text{color:#FFFFFF !important;font-weight:200 !important;font-family:\"Walter Turncoat\",Sans-serif !important}<\/style><h2 class=\"stk-block-heading__text has-text-color has-white-color has-text-align-center\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Phishing Educativo<\/span><\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-b124277\" data-block-id=\"b124277\"><style>.stk-b124277 .stk-block-text__text{color:#FFFFFF !important}<\/style><p class=\"stk-block-text__text has-text-color has-white-color has-text-align-left\">Es una t\u00e1ctica de ingenier\u00eda social dise\u00f1ada espec\u00edficamente para enga\u00f1ar a individuos en entornos educativos, como universidades o instituciones acad\u00e9micas.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-ccfd6ce\" data-v=\"4\" data-block-id=\"ccfd6ce\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-ccfd6ce-container stk--no-background stk--no-padding\"><div class=\"has-text-align-right stk-block-content stk-inner-blocks stk-ccfd6ce-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-d0cb238\" id=\"span-style-color-ff-6900-class-stk-highlight-malware-academico-span\" data-block-id=\"d0cb238\"><style>.stk-d0cb238 .stk-block-heading__text{color:#FFFFFF !important;font-weight:200 !important;font-family:\"Walter Turncoat\",Sans-serif !important}<\/style><h2 class=\"stk-block-heading__text has-text-color has-white-color has-text-align-center\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Malware Acad\u00e9mico<\/span><\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-4ec9775\" data-block-id=\"4ec9775\"><style>.stk-4ec9775 .stk-block-text__text{color:#FFFFFF !important}<\/style><p class=\"stk-block-text__text has-text-color has-white-color has-text-align-left\">Se refiere a software malicioso dise\u00f1ado para afectar entornos acad\u00e9micos, como universidades o instituciones educativas.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-ce66edd\" data-v=\"4\" data-block-id=\"ce66edd\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-ce66edd-container stk--no-background stk--no-padding\"><div class=\"has-text-align-right stk-block-content stk-inner-blocks stk-ce66edd-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-7e76eef\" id=\"span-style-color-ff-6900-class-stk-highlight-contrasenas-debiles-span\" data-block-id=\"7e76eef\"><style>.stk-7e76eef .stk-block-heading__text{color:#FFFFFF !important;font-weight:200 !important;font-family:\"Walter Turncoat\",Sans-serif !important}<\/style><h2 class=\"stk-block-heading__text has-text-color has-white-color has-text-align-center\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Contrase\u00f1as D\u00e9biles<\/span><\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-3696c14\" data-block-id=\"3696c14\"><style>.stk-3696c14 .stk-block-text__text{color:#FFFFFF !important}<\/style><p class=\"stk-block-text__text has-text-color has-white-color has-text-align-left\">Estas contrase\u00f1as suelen ser simples, cortas o comunes, lo que las hace susceptibles a ataques de fuerza bruta o adivinaci\u00f3n por parte de hackers.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-77959fa\" data-v=\"4\" data-block-id=\"77959fa\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-77959fa-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-77959fa-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-2e49dc8\" id=\"span-style-color-ff-6900-class-stk-highlight-wi-fi-publico-no-seguro-span\" data-block-id=\"2e49dc8\"><style>.stk-2e49dc8 .stk-block-heading__text{font-weight:200 !important;font-family:\"Walter Turncoat\",Sans-serif !important}<\/style><h2 class=\"stk-block-heading__text has-text-align-center\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">WiFi P\u00fablico No Seguro<\/span><\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-e0ae957\" data-block-id=\"e0ae957\"><style>.stk-e0ae957{margin-bottom:36px !important}.stk-e0ae957 .stk-block-text__text{font-size:15px !important}@media screen and (max-width:999px){.stk-e0ae957 .stk-block-text__text{font-size:15px !important}}<\/style><p class=\"stk-block-text__text has-text-align-left\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Estas redes no suelen estar cifradas, lo que significa que la informaci\u00f3n transmitida a trav\u00e9s de ellas, como contrase\u00f1as o datos personales, podr\u00eda ser f\u00e1cilmente interceptada por terceros no autorizados.<\/span><\/p><\/div>\n<\/div><\/div><\/div>\n<\/div><div class=\"stk-separator stk-separator__bottom\"><div class=\"stk-separator__wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1600 200\" class=\"stk-separator__layer-1\" preserveAspectRatio=\"none\" aria-hidden=\"true\"><path class=\"slant-1_svg__st2\" d=\"M-10 210h1620V.5L-10 183.9z\"><\/path><\/svg><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-9db321c\" data-block-id=\"9db321c\"><style>.stk-9db321c{margin-bottom:36px !important}.stk-9db321c .stk-block-text__text{font-size:32px !important;color:#ffffff !important;font-family:\"Walter Turncoat\",Sans-serif !important}@media screen and (max-width:999px){.stk-9db321c .stk-block-text__text{font-size:32px !important}}<\/style><p class=\"stk-block-text__text has-text-color has-text-align-center\"><strong><span style=\"color: #ffffff;\" class=\"stk-highlight\">Pruebas interactivas para evaluar el conocimiento y comprensi\u00f3n de las pr\u00e1cticas de seguridad<\/span><\/strong><span style=\"color: #ff6900;\" class=\"stk-highlight\"> <\/span><\/p><\/div>\n\n\n\n<marquee direction=\"Left\">\n  <p class=\"has-text-align-left has-palette-color-1-color has-text-color has-link-color has-large-font-size\"><strong>\u00a1Bienvenidos al desaf\u00edo interactivo sobre seguridad en identidad digital, dise\u00f1ado especialmente para ti! <\/strong><\/p>\n<\/marquee>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-a3b9338dc04746812092d67cf8cdc774\">En esta secci\u00f3n emocionante, te invitamos a poner a prueba tus conocimientos sobre ciberseguridad y descubrir m\u00e1s sobre las amenazas digitales que rondan en el mundo en l\u00ednea.<\/p>\n\n\n\n<p class=\"has-text-align-center has-palette-color-1-color has-text-color has-link-color has-large-font-size wp-elements-47aa2dc3ad93d6155b85eebeaa3fa171\">\u00bfEst\u00e1s listo? <\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-1cc823ec18152f9803703f06c387536a\">Este peque\u00f1o juego te proporcionar\u00e1 situaciones realistas que podr\u00edas enfrentar en tu vida digital diaria. A trav\u00e9s de desaf\u00edos y decisiones estrat\u00e9gicas, tendr\u00e1s la oportunidad de explorar amenazas como malware, phishing y ransomware, mientras fortaleces tus habilidades para reconocer y evitar posibles riesgos.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-88228265099d9d63308b0e97b328f2fa\"> Te enfrentar\u00e1s a escenarios que simulan situaciones cotidianas, desde correos electr\u00f3nicos sospechosos hasta enlaces tentadores. \u00bfPodr\u00e1s identificar la amenaza y tomar las mejores decisiones? Este juego no solo es divertido, sino que tambi\u00e9n te permitir\u00e1 aprender m\u00e1s sobre la importancia de la seguridad cibern\u00e9tica y c\u00f3mo mantener tus actividades en l\u00ednea seguras.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color has-link-color has-medium-font-size wp-elements-1ce8dadff094c76e3d3897e36061646a\">Recuerda, la ciberseguridad es una habilidad fundamental en el mundo digital actual, y con este desaf\u00edo, te convertir\u00e1s en un estudiante m\u00e1s astuto y consciente de las amenazas digitales. <\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-195f912\" data-block-id=\"195f912\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<iframe data-src=\"https:\/\/mobbyt.com\/videojuego\/educativo\/?Id=334418\" width=\"100%\" height=\"600px\" frameborder=\"0\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-681c7a0\" data-block-id=\"681c7a0\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<details class=\"wp-block-stackable-accordion stk-block-accordion stk-inner-blocks stk-block-content stk-block stk-4839231 is-style-default\" data-block-id=\"4839231\">\n<summary class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-f9aa251 stk--container-small stk-block-accordion__heading\" data-v=\"4\" data-block-id=\"f9aa251\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-f9aa251-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks stk-f9aa251-inner-blocks\">\n<div class=\"wp-block-stackable-icon-label stk-block-icon-label stk-block stk-49f435d\" data-block-id=\"49f435d\"><div class=\"stk-row stk-inner-blocks stk-block-content\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-6cfb5a9\" id=\"span-style-color-ff-6900-class-stk-highlight-recomendaciones-para-saber-mas-span\" data-block-id=\"6cfb5a9\"><h4 class=\"stk-block-heading__text\"><span style=\"color: #ff6900;\" class=\"stk-highlight\">Recomendaciones para saber m\u00e1s:<\/span><\/h4><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon stk-block-icon stk-block stk-43254d6\" data-block-id=\"43254d6\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-43254d6\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-43254-d-6-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-43254-d-6-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg data-prefix=\"fas\" data-icon=\"chevron-down\" class=\"svg-inline--fa fa-chevron-down fa-w-14\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path fill=\"currentColor\" d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div><\/span><\/div>\n<\/div><\/div>\n<\/div><\/div><\/summary>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-faa7174 stk-block-accordion__content\" data-v=\"4\" data-block-id=\"faa7174\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-faa7174-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-faa7174-inner-blocks\">\n<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-dc44dd2\" data-block-id=\"dc44dd2\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-dc44dd2-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-5824be2\" data-v=\"4\" data-block-id=\"5824be2\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-5824be2-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-5824be2-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-6f966a8\" id=\"articulos\" data-block-id=\"6f966a8\"><h2 class=\"stk-block-heading__text has-text-align-center\">Art\u00edculos: <\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-18119b5\" data-block-id=\"18119b5\"><style>.stk-18119b5{margin-bottom:36px !important}.stk-18119b5 .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-18119b5 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Te recomendamos la siguiente informaci\u00f3n que te ayudara a comprender m\u00e1s sobre este tema, en este apartado encontrar\u00e1s links que te llevaran a recursos sobre art\u00edculos y mas juegos.<\/span><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-da17f23 is-style-horizontal\" data-v=\"2\" data-block-id=\"da17f23\"><style>.stk-da17f23 .stk-block-card__content{padding-left:48px !important}.stk-da17f23 .stk-block-card__image{width:500px !important}@media screen and (max-width:999px){.stk-da17f23 .stk-block-card__image{width:300px !important}}@media screen and (max-width:689px){.stk-da17f23 .stk-block-card__image{width:0px !important}}<\/style><div class=\"stk--no-padding stk-container stk-da17f23-container stk--no-background stk--no-padding\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img decoding=\"async\" class=\"stk-img wp-image-1284 lazyload\" data-src=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/Default_a_hacker_man_0-1.jpg\" width=\"768\" height=\"512\" data-srcset=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/Default_a_hacker_man_0-1.jpg 768w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/Default_a_hacker_man_0-1-300x200.jpg 300w\" data-sizes=\"auto, (max-width: 768px) 100vw, 768px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 768px; --smush-placeholder-aspect-ratio: 768\/512;\" \/><\/figure><div class=\"stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-da17f23-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-bbdc0a7\" id=\"span-style-color-ffffff-class-stk-highlight-incremento-en-fraudes-span\" data-block-id=\"bbdc0a7\"><h3 class=\"stk-block-heading__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Incremento en fraudes<\/span><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-a422631\" data-block-id=\"a422631\"><style>.stk-a422631{margin-bottom:36px !important}.stk-a422631 .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-a422631 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">En su investigaci\u00f3n Mata et&nbsp;al. (2022), menciona que el aumento significativo del uso de internet y dispositivos digitales, impulsado por la pandemia de COVID-19, ha resultado en un incremento de los fraudes cibern\u00e9ticos a nivel mundial.<\/span> <span style=\"color: #ffffff;\" class=\"stk-highlight\">Te recomiendo este interesante  articulo.<\/span>.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-1c457b4\" data-block-id=\"1c457b4\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-16e6a54 stk--has-lightbox\" data-block-id=\"16e6a54\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/dialnet.unirioja.es\/servlet\/articulo?codigo=8524233\" title=\"https:\/\/dialnet.unirioja.es\/servlet\/articulo?codigo=8524233 noreferrer noopener\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"stk-button__inner-text\">Leer mas..<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-e9f556f is-style-horizontal\" data-v=\"2\" data-block-id=\"e9f556f\"><style>.stk-e9f556f .stk-block-card__content{padding-left:48px !important}.stk-e9f556f .stk-block-card__image{width:500px !important}@media screen and (max-width:999px){.stk-e9f556f .stk-block-card__image{width:300px !important}}@media screen and (max-width:689px){.stk-e9f556f .stk-block-card__image{width:0px !important}}<\/style><div class=\"stk--no-padding stk-container stk-e9f556f-container stk--no-background stk--no-padding\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img decoding=\"async\" class=\"stk-img wp-image-1307 lazyload\" data-src=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-scaled.jpg\" width=\"2560\" height=\"1707\" data-srcset=\"https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-scaled.jpg 2560w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-300x200.jpg 300w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-1024x683.jpg 1024w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-768x512.jpg 768w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-1536x1024.jpg 1536w, https:\/\/miprotectordigital.com\/wp-content\/uploads\/2024\/02\/pexels-marek-levak-2265488-2-2048x1365.jpg 2048w\" data-sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 2560px; --smush-placeholder-aspect-ratio: 2560\/1707;\" \/><\/figure><div class=\"stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-e9f556f-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-cf0de8a\" id=\"span-style-color-ffffff-class-stk-highlight-gestion-en-seguridad-informatica-span\" data-block-id=\"cf0de8a\"><h3 class=\"stk-block-heading__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Gesti\u00f3n en seguridad inform\u00e1tica<\/span><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-14e3a22\" data-block-id=\"14e3a22\"><style>.stk-14e3a22{margin-bottom:36px !important}.stk-14e3a22 .stk-block-text__text{font-size:20px !important}@media screen and (max-width:999px){.stk-14e3a22 .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Los especialistas sugieren la urgencia de realizar alfabetizaciones digitales para cerrar estas brechas, ya que las deficiencias en el \u00e1mbito digital ampl\u00edan las vulnerabilidades en las redes inform\u00e1ticas escolares, afectando la seguridad inform\u00e1tica.<\/span><\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-99e2daf\" data-block-id=\"99e2daf\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-71966ed\" data-block-id=\"71966ed\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/www.proquest.com\/openview\/1f29f74f4cdb6807b3ee1246f95400f8\/1?pq-origsite=gscholar&amp;cbl=1006393\"><span class=\"stk-button__inner-text\">Leer m\u00e1s&#8230;<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-67c18a9\" data-block-id=\"67c18a9\"><style>.stk-67c18a9 hr.stk-block-divider__hr{width:100% !important}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-f1e6557\" id=\"juegos-recomendados\" data-block-id=\"f1e6557\"><h2 class=\"stk-block-heading__text has-text-align-center\">Juegos Recomendados<\/h2><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Como recomendaci\u00f3n especial, te invitamos a descubrir el emocionante juego de cartas de ciberseguridad creado por el Instituto Nacional de Ciberseguridad de Espa\u00f1a (INCIBE). Este recurso educativo \u00fanico te sumerge en el mundo de las amenazas digitales, permiti\u00e9ndote aprender de manera interactiva y entretenida.<\/span><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">Tambi\u00e9n puedes visitar su p\u00e1gina web<\/span>&nbsp;;&nbsp;<a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.incibe.es\/<\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><span style=\"color: #ffffff;\" class=\"stk-highlight\">O si deseas jugar DATOS BLINDADOS  vis\u00edtalo: <\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/c15_rp_datos_blindados_cartas_troquel_1.0.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.incibe.es\/sites\/default\/files\/c15_rp_datos_blindados_cartas_troquel_1.0.pdf<\/a><\/p>\n<\/div><\/div><\/div>\n<\/details>\n<\/div>\n\n\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>\u00a1Mantente informado y protegido en el mundo digital! El uso constante de la tecnolog\u00eda en nuestra vida cotidiana abre las puertas a incre\u00edbles posibilidades, pero tambi\u00e9n conlleva riesgos que no podemos pasar por alto. Como universitarios, es crucial estar siempre alerta para evitar amenazas que puedan comprometer la seguridad de nuestros dispositivos y la privacidad [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[19],"class_list":["post-1379","post","type-post","status-publish","format-standard","hentry","category-recursos","tag-amenazas-digitales"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/posts\/1379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/comments?post=1379"}],"version-history":[{"count":50,"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/posts\/1379\/revisions"}],"predecessor-version":[{"id":2262,"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/posts\/1379\/revisions\/2262"}],"wp:attachment":[{"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/media?parent=1379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/categories?post=1379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/miprotectordigital.com\/index.php\/wp-json\/wp\/v2\/tags?post=1379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}