{"id":1031,"date":"2022-11-30T16:21:39","date_gmt":"2022-11-30T16:21:39","guid":{"rendered":"https:\/\/www.cidaut.es\/acelerapyme\/?p=1031"},"modified":"2022-11-30T16:21:40","modified_gmt":"2022-11-30T16:21:40","slug":"5-tacticas-que-emplean-los-ciberdelincuentes","status":"publish","type":"post","link":"https:\/\/www.cidaut.es\/acelerapyme\/5-tacticas-que-emplean-los-ciberdelincuentes\/","title":{"rendered":"5 t\u00e1cticas que emplean los ciberdelincuentes"},"content":{"rendered":"\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cidaut.es\/acelerapyme\/wp-content\/uploads\/2022\/11\/ciberdelincuentes.jpg\" alt=\"\" class=\"wp-image-1011\" width=\"700\" height=\"400\"\/><\/figure>\n\n\n\n<p>Nos encontramos en una \u00e9poca del a\u00f1o en la que los ciberdelincuentes se emplean a fondo para captar&nbsp;datos personales de los usuarios m\u00e1s vulnerables. En este contexto,&nbsp;Fortinet, empresa dedicada al mundo de la ciberseguridad, quiere alertar a los consumidores digitales de las t\u00e1cticas m\u00e1s comunes que emplean los ciberdelincuentes para&nbsp;extraer informaci\u00f3n sensible de los usuarios, y tambi\u00e9n ha proporcionado una serie de consejos para evitar este problema.<\/p>\n\n\n\n<p class=\"has-cyan-bluish-gray-color has-text-color\">Silicon<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-color has-text-color wp-element-button\" href=\"https:\/\/www.silicon.es\/5-tacticas-emplean-ciberdelincuentes-2468106\" style=\"border-radius:10px\">Leer<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nos encontramos en una \u00e9poca del a\u00f1o en la que los ciberdelincuentes se emplean a fondo para captar&nbsp;datos personales de los usuarios m\u00e1s vulnerables. En este contexto,&nbsp;Fortinet, empresa dedicada al mundo de la ciberseguridad, quiere alertar a los consumidores digitales de las t\u00e1cticas m\u00e1s comunes que emplean los ciberdelincuentes para&nbsp;extraer informaci\u00f3n sensible de los usuarios, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-1031","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/posts\/1031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/comments?post=1031"}],"version-history":[{"count":2,"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/posts\/1031\/revisions"}],"predecessor-version":[{"id":1053,"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/posts\/1031\/revisions\/1053"}],"wp:attachment":[{"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/media?parent=1031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/categories?post=1031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cidaut.es\/acelerapyme\/wp-json\/wp\/v2\/tags?post=1031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}