{"id":4280,"date":"2023-10-23T09:40:49","date_gmt":"2023-10-23T14:40:49","guid":{"rendered":"https:\/\/www.asobancaria.com\/web-de-crisis\/?p=4280"},"modified":"2023-10-23T09:42:24","modified_gmt":"2023-10-23T14:42:24","slug":"ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques","status":"publish","type":"post","link":"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/","title":{"rendered":"Ingenier\u00eda social: \u00bfQu\u00e9 es y c\u00f3mo se utiliza para ejecutar ciberataques?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4280\" class=\"elementor elementor-4280\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1910364 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1910364\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e51aabc\" data-id=\"e51aabc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b883968 elementor-widget elementor-widget-text-editor\" data-id=\"b883968\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>A pesar de que la ingeniera social es una de las t\u00e9cnicas m\u00e1s eficaces en ciberataque, sigue siendo altamente desconocida.<\/p><p>Esta t\u00e9cnica de manipulaci\u00f3n psicol\u00f3gica recurre al enga\u00f1o de las personas para as\u00ed obtener informaci\u00f3n que comprometa su seguridad.<\/p><p>Dentro de las medidas que las organizaciones pueden tomar se encuentran la capacitaci\u00f3n y concientizaci\u00f3n, la verificaci\u00f3n de identidad, la gesti\u00f3n de privacidad en redes sociales y la actualizaci\u00f3n de softwares de seguridad.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e3f32e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e3f32e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e5393f\" data-id=\"6e5393f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cedd0fd elementor-align-left elementor-widget elementor-widget-button\" data-id=\"cedd0fd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/www.semana.com\/tecnologia\/articulo\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/202300\/\" target=\"_blank\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">VER ART\u00cdCULO COMPLETO AQU\u00cd<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A pesar de que la ingeniera social es una de las t\u00e9cnicas m\u00e1s eficaces en ciberataque, sigue siendo altamente desconocida. Esta t\u00e9cnica de manipulaci\u00f3n psicol\u00f3gica recurre al enga\u00f1o de las personas para as\u00ed obtener informaci\u00f3n que comprometa su seguridad. Dentro de las medidas que las organizaciones pueden tomar se encuentran la capacitaci\u00f3n y concientizaci\u00f3n, la [&hellip;]<\/p>\n","protected":false},"author":48,"featured_media":4281,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cuando se trata de gesti\u00f3n de riesgo tecnol\u00f3gico<\/title>\n<meta name=\"description\" content=\"A pesar de que la ingeniera social es una de las t\u00e9cnicas m\u00e1s eficaces en ciberataque, sigue siendo altamente desconocida. Esta t\u00e9cnica de manipulaci\u00f3n psicol\u00f3gica recurre al enga\u00f1o de las personas para as\u00ed obtener informaci\u00f3n que comprometa su seguridad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuando se trata de gesti\u00f3n de riesgo tecnol\u00f3gico\" \/>\n<meta property=\"og:description\" content=\"A pesar de que la ingeniera social es una de las t\u00e9cnicas m\u00e1s eficaces en ciberataque, sigue siendo altamente desconocida. Esta t\u00e9cnica de manipulaci\u00f3n psicol\u00f3gica recurre al enga\u00f1o de las personas para as\u00ed obtener informaci\u00f3n que comprometa su seguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/\" \/>\n<meta property=\"og:site_name\" content=\"Frentes de Seguridad\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T14:40:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T14:42:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-content\/uploads\/2023\/10\/ingenieria-social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"0 minutos\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/#website\",\"url\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/\",\"name\":\"Frentes de Seguridad\",\"description\":\"Asobancaria\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-CO\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/#primaryimage\",\"inLanguage\":\"es-CO\",\"url\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-content\/uploads\/2023\/10\/ingenieria-social.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/#webpage\",\"url\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/\",\"name\":\"Cuando se trata de gesti\\u00f3n de riesgo tecnol\\u00f3gico\",\"isPartOf\":{\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/#primaryimage\"},\"datePublished\":\"2023-10-23T14:40:49+00:00\",\"dateModified\":\"2023-10-23T14:42:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/#\/schema\/person\/a60ae698d31d91af13095809f6603592\"},\"description\":\"A pesar de que la ingeniera social es una de las t\\u00e9cnicas m\\u00e1s eficaces en ciberataque, sigue siendo altamente desconocida. Esta t\\u00e9cnica de manipulaci\\u00f3n psicol\\u00f3gica recurre al enga\\u00f1o de las personas para as\\u00ed obtener informaci\\u00f3n que comprometa su seguridad.\",\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.asobancaria.com\/web-de-crisis\/ingenieria-social-que-es-y-como-se-utiliza-para-ejecutar-ciberataques\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/#\/schema\/person\/a60ae698d31d91af13095809f6603592\",\"name\":\"Asobancaria\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.asobancaria.com\/web-de-crisis\/#personlogo\",\"inLanguage\":\"es-CO\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/641654b4229c1da9e4f34d5b7e81a796?s=96&d=mm&r=g\",\"caption\":\"Asobancaria\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","acf":[],"_links":{"self":[{"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/posts\/4280"}],"collection":[{"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/comments?post=4280"}],"version-history":[{"count":4,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/posts\/4280\/revisions"}],"predecessor-version":[{"id":4285,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/posts\/4280\/revisions\/4285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/media\/4281"}],"wp:attachment":[{"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/media?parent=4280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/categories?post=4280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asobancaria.com\/web-de-crisis\/wp-json\/wp\/v2\/tags?post=4280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}