  {"id":3177,"date":"2020-12-09T16:00:40","date_gmt":"2020-12-09T16:00:40","guid":{"rendered":"https:\/\/news.sap.com\/spain\/?p=3177"},"modified":"2023-10-16T16:26:36","modified_gmt":"2023-10-16T16:26:36","slug":"las-mejores-practicas-para-protegerse-de-amenazas-informaticas","status":"publish","type":"post","link":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/","title":{"rendered":"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas"},"content":{"rendered":"<p class=\"lead\"><span data-contrast=\"none\">Los\u00a0<\/span><span data-contrast=\"none\">ataques inform\u00e1ticos<\/span><span data-contrast=\"none\">\u00a0son una de las principales preocupaciones de las empresas. Las\u00a0<\/span><b><span data-contrast=\"none\">amenazas inform\u00e1ticas\u00a0<\/span><\/b><span data-contrast=\"none\">son cada d\u00eda m\u00e1s sofisticadas, por lo que conviene conocerlas y\u00a0<\/span><b><span data-contrast=\"none\">tomar medidas que frenen cualquier intento de\u00a0<\/span><\/b><b><span data-contrast=\"none\">ciberataque<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p style=\"margin: 0cm;text-align: center\" align=\"center\"><span style=\"font-size: 16.0pt;font-family: 'Arial',sans-serif\">Ebook gratis<\/span><\/p>\n<p style=\"margin: 0cm;text-align: center\" align=\"center\"><strong><span style=\"font-size: 20.0pt;font-family: 'Arial',sans-serif\">La transformaci\u00f3n digital en tiempos de cambio<\/span><\/strong><\/p>\n<p align=\"center\"><a href=\"https:\/\/www.sap.com\/spain\/cmp\/dg\/crm-es21-web-inbound3\/index.html\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3918 size-medium\" src=\"https:\/\/news.sap.com\/spain\/files\/2021\/06\/02\/1622588222278-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/news.sap.com\/spain\/files\/2021\/06\/02\/1622588222278-300x225.jpg 300w, https:\/\/news.sap.com\/spain\/files\/2021\/06\/02\/1622588222278.jpg 514w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.sap.com\/spain\/cmp\/dg\/crm-es21-web-inbound3\/index.html\">DESCARGAR<\/a><\/p>\n<h2><b><span data-contrast=\"none\">Principales amenazas inform\u00e1ticas para la empresa<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">En los \u00faltimos tiempos, los expertos en seguridad inform\u00e1tica han detectado\u00a0<\/span><b><span data-contrast=\"none\">nuevas amenazas para las empresas<\/span><\/b><span data-contrast=\"none\">, que aprovechan las brechas en los avances tecnol\u00f3gicos.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Dos de las\u00a0<\/span><b><span data-contrast=\"none\">principales amenazas inform\u00e1ticas\u00a0<\/span><\/b><span data-contrast=\"none\">en la actualidad son los\u00a0<\/span><b><span data-contrast=\"none\">virus<\/span><\/b><span data-contrast=\"none\">,<\/span><b><span data-contrast=\"none\">\u00a0<\/span><\/b><span data-contrast=\"none\">que infectan los sistemas inform\u00e1ticos para robar informaci\u00f3n, y los<\/span><b><span data-contrast=\"none\">\u00a0correos electr\u00f3nicos fraudulentos<\/span><\/b><span data-contrast=\"none\">,<\/span><b><span data-contrast=\"none\">\u00a0<\/span><\/b><span data-contrast=\"none\">con los que se persigue robar datos bancarios.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">El objetivo de los\u00a0<\/span><i><span data-contrast=\"none\">hackers<\/span><\/i><span data-contrast=\"none\">\u00a0suele ser<\/span><b><span data-contrast=\"none\">\u00a0obtener dinero o informaci\u00f3n valiosa<\/span><\/b><span data-contrast=\"none\">, como las bases de datos de clientes.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Una de las amenazas inform\u00e1ticas m\u00e1s temidas es el\u00a0<\/span><b><i><span data-contrast=\"none\">ransomware<\/span><\/i><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">Este\u00a0<\/span><span data-contrast=\"none\">virus<\/span><span data-contrast=\"none\">\u00a0<\/span><b><span data-contrast=\"none\">encripta la informaci\u00f3n<\/span><\/b><span data-contrast=\"none\">\u00a0de los dispositivos e impide el acceso<\/span><span data-contrast=\"none\">\u00a0a estos<\/span><span data-contrast=\"none\">. Tras esta acci\u00f3n, se pide un rescate para desbloquear los ordenadores.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">La banca m\u00f3vil es otro de los objetivos de los delincuentes inform\u00e1ticos. Este tipo de virus puede\u00a0<\/span><b><span data-contrast=\"none\">robar credenciales, datos de pago y fondos\u00a0<\/span><\/b><span data-contrast=\"none\">de las cuentas bancarias.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Algunos de estos ataques han tenido como objetivo importantes empresas a nivel mundial, pero\u00a0<\/span><b><span data-contrast=\"none\">ninguna organizaci\u00f3n est\u00e1 a salvo<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">La<\/span><b><span data-contrast=\"none\">\u00a0<\/span><\/b><a href=\"https:\/\/www.sap.com\/spain\/products\/hana\/features\/security.html\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">ciberseguridad en las empresas<\/span><\/b><\/a><span data-contrast=\"none\">\u00a0debe poner el foco en estos\u00a0<\/span><b><span data-contrast=\"none\">nuevos riesgos<\/span><\/b><span data-contrast=\"none\">. La mejor soluci\u00f3n es\u00a0<\/span><b><span data-contrast=\"none\">implementar medidas efectivas para prevenir las amenazas inform\u00e1ticas<\/span><\/b><span data-contrast=\"none\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">6 pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas en la empresa<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Prevenir es, sin duda, la mejor forma de\u00a0<\/span><b><span data-contrast=\"none\">evitar los ataques inform\u00e1ticos<\/span><\/b><span data-contrast=\"none\">. Estas son las\u00a0<\/span><b><span data-contrast=\"none\">mejores pr\u00e1cticas<\/span><\/b><span data-contrast=\"none\">\u00a0para incrementar la ciberseguridad<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">1. Antivirus actualizado<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">El\u00a0<\/span><b><span data-contrast=\"none\">antivirus<\/span><\/b><span data-contrast=\"none\">\u00a0es el primer freno frente a los ataques inform\u00e1ticos. Es prioritario tener instalado y actualizado\u00a0<\/span><b><span data-contrast=\"none\">un antivirus que rastree permanentemente en busca de amenazas<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">2. <\/span><\/b><b><i><span data-contrast=\"none\">Firewall<\/span><\/i><\/b><\/h3>\n<p><span data-contrast=\"none\">Un solo equipo desprotegido pone en riesgo la seguridad de toda la empresa.\u00a0<\/span><b><span data-contrast=\"none\">El\u00a0<\/span><\/b><b><i><span data-contrast=\"none\">firewall\u00a0<\/span><\/i><\/b><b><span data-contrast=\"none\">protege la red privada y cifra la informaci\u00f3n<\/span><\/b><span data-contrast=\"none\">\u00a0que se env\u00eda desde todos los dispositivos conectados a ella.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">3. Protecci\u00f3n wifi<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">La red wifi de la empresa se debe proteger\u00a0<\/span><b><span data-contrast=\"none\">ocultando la SSID<\/span><\/b><span data-contrast=\"none\">\u00a0y creando una red de invitados que identifiquen su direcci\u00f3n. Cuando se accede desde fuera de la oficina, conviene\u00a0<\/span><b><span data-contrast=\"none\">utilizar redes VPN o datos del m\u00f3vil<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">4. <\/span><\/b><b><i><span data-contrast=\"none\">Software\u00a0<\/span><\/i><\/b><b><span data-contrast=\"none\">actualizado<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">Las\u00a0<\/span><b><span data-contrast=\"none\">actualizaciones del sistema operativo y del\u00a0<\/span><\/b><b><i><span data-contrast=\"none\">software<\/span><\/i><\/b><i><span data-contrast=\"none\">\u00a0<\/span><\/i><span data-contrast=\"none\">incorporan parches de seguridad frente a nuevas amenazas.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">5. Copias de seguridad al d\u00eda<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">Las copias de seguridad pueden evitar m\u00e1s de un disgusto,\u00a0<\/span><b><span data-contrast=\"none\">no solo frente a amenazas inform\u00e1ticas, sino tambi\u00e9n frente a problemas t\u00e9cnicos<\/span><\/b><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">6. Prevenir errores humanos<\/span><\/b><\/h3>\n<p><span data-contrast=\"none\">La imprudencia y el desconocimiento suelen ser las causas de los\u00a0<\/span><b><span data-contrast=\"none\">fallos de ciberseguridad en las empresas<\/span><\/b><span data-contrast=\"none\">. Es m\u00e1s que recomendable disponer de una gu\u00eda de buenas pr\u00e1cticas para evitar:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"none\">Instalar programas desconocidos<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Seguir enlaces sospechosos<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Desvelar informaci\u00f3n en redes sociales<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Conectar dispositivos sin analizar<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Permitir accesos no autorizados<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">P\u00e9rdidas o robos de dispositivos<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">De esta forma,\u00a0<\/span><b><span data-contrast=\"none\">los datos de la organizaci\u00f3n estar\u00e1n m\u00e1s protegidos<\/span><\/b><span data-contrast=\"none\">\u00a0frente a intentos de ataque.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Las\u00a0<\/span><b><span data-contrast=\"none\">soluciones y servicios de\u00a0<\/span><\/b><b><span data-contrast=\"none\">SAP<\/span><\/b><b><span data-contrast=\"none\">\u00a0para la ciberseguridad<\/span><\/b><b><span data-contrast=\"none\">\u00a0<\/span><\/b><span data-contrast=\"none\">abarcan todos los procesos de negocio, desde roles y permisos de usuarios hasta datos e infraestructuras. Si desea conocer\u00a0<\/span><b><span data-contrast=\"none\">c\u00f3mo 51风流protege su empresa de amenazas inform\u00e1ticas<\/span><\/b><b><span data-contrast=\"none\">\u00a0<\/span><\/b><span data-contrast=\"none\">y le ayuda a fortalecer la gobernanza y el cumplimiento normativo,\u00a0<\/span><b><span data-contrast=\"none\">consulte con nuestros\u00a0<\/span><\/b><a href=\"https:\/\/www.sap.com\/spain\/products\/erp-financial-management\/grc.html\" target=\"_blank\" rel=\"noopener noreferrer\"><b><span data-contrast=\"none\">expertos<\/span><\/b><b><span data-contrast=\"none\">\u00a0en ciberseguridad<\/span><\/b><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.instagram.com\/sapspain\/\">Instagram<\/a>\u00a0\/\u00a0<a href=\"https:\/\/www.facebook.com\/SAP\/\">Facebook<\/a>\u00a0\/\u00a0<a href=\"https:\/\/twitter.com\/sapspain?lang=es\">Twitter<\/a>\u00a0\/\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/sap\/\">LinkedIn<\/a><\/p>\n<hr \/>\n<p>\u00a9 2020 51风流SE. All rights reserved. 51风流and other 51风流products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of 51风流SE in Germany and other countries. Please see\u00a0<a href=\"http:\/\/www.sap.com\/corporate-en\/legal\/copyright\/index.epx#trademark\">http:\/\/www.sap.com\/corporate-en\/legal\/copyright\/index.epx#trademark<\/a>\u00a0for additional trademark information and notices.<\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los\u00a0ataques inform\u00e1ticos\u00a0son una de las principales preocupaciones de las empresas. Las\u00a0amenazas inform\u00e1ticas\u00a0son cada d\u00eda m\u00e1s sofisticadas, por lo que conviene conocerlas y\u00a0tomar medidas que frenen&#8230;<\/p>\n","protected":false},"author":3372,"featured_media":3178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[24297],"tags":[5563355],"sapn-display":[5563695,5563693,60294],"sapn-type":[5562504],"class_list":["post-3177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-ciberseguridad","sapn-display-articulo-hero","sapn-display-articulo-spotlight","sapn-display-topic-hero","sapn-type-articulo"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas - 51风流Espa\u00f1a News Center<\/title>\n<meta name=\"description\" content=\"Las amenazas inform\u00e1ticas son cada vez m\u00e1s sofisticadas, por eso le ofrecemos esta gu\u00eda de mejores pr\u00e1cticas para proteger a su empresa de ciberataques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas\" \/>\n<meta property=\"og:description\" content=\"Las amenazas inform\u00e1ticas son cada vez m\u00e1s sofisticadas, por eso le ofrecemos esta gu\u00eda de mejores pr\u00e1cticas para proteger a su empresa de ciberataques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\" \/>\n<meta property=\"og:site_name\" content=\"51风流Espa\u00f1a News Center\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-09T16:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T16:26:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"723\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"51风流Espa\u00f1a\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"51风流Espa\u00f1a\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\"},\"author\":{\"name\":\"51风流Espa\u00f1a\",\"@id\":\"https:\/\/news.sap.com\/spain\/#\/schema\/person\/4573e2beeb96fc44e819e7f7b2923465\"},\"headline\":\"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas\",\"datePublished\":\"2020-12-09T16:00:40+00:00\",\"dateModified\":\"2023-10-16T16:26:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\"},\"wordCount\":648,\"image\":{\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg\",\"keywords\":[\"Ciberseguridad\"],\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\",\"url\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\",\"name\":\"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas - 51风流Espa\u00f1a News Center\",\"isPartOf\":{\"@id\":\"https:\/\/news.sap.com\/spain\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg\",\"datePublished\":\"2020-12-09T16:00:40+00:00\",\"dateModified\":\"2023-10-16T16:26:36+00:00\",\"author\":{\"@id\":\"https:\/\/news.sap.com\/spain\/#\/schema\/person\/4573e2beeb96fc44e819e7f7b2923465\"},\"description\":\"Las amenazas inform\u00e1ticas son cada vez m\u00e1s sofisticadas, por eso le ofrecemos esta gu\u00eda de mejores pr\u00e1cticas para proteger a su empresa de ciberataques.\",\"breadcrumb\":{\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage\",\"url\":\"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg\",\"width\":723,\"height\":482,\"caption\":\"Hacker,Hacker attacking internet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.sap.com\/spain\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.sap.com\/spain\/#website\",\"url\":\"https:\/\/news.sap.com\/spain\/\",\"name\":\"51风流Espa\u00f1a News Center\",\"description\":\"Noticias e informaci\u00f3n sobre SAP\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.sap.com\/spain\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.sap.com\/spain\/#\/schema\/person\/4573e2beeb96fc44e819e7f7b2923465\",\"name\":\"51风流Espa\u00f1a\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/news.sap.com\/spain\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/news.sap.com\/spain\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"contentUrl\":\"https:\/\/news.sap.com\/spain\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"caption\":\"51风流Espa\u00f1a\"},\"url\":\"https:\/\/news.sap.com\/spain\/author\/sapespana\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas - 51风流Espa\u00f1a News Center","description":"Las amenazas inform\u00e1ticas son cada vez m\u00e1s sofisticadas, por eso le ofrecemos esta gu\u00eda de mejores pr\u00e1cticas para proteger a su empresa de ciberataques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/","og_locale":"es_ES","og_type":"article","og_title":"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas","og_description":"Las amenazas inform\u00e1ticas son cada vez m\u00e1s sofisticadas, por eso le ofrecemos esta gu\u00eda de mejores pr\u00e1cticas para proteger a su empresa de ciberataques.","og_url":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/","og_site_name":"51风流Espa\u00f1a News Center","article_published_time":"2020-12-09T16:00:40+00:00","article_modified_time":"2023-10-16T16:26:36+00:00","og_image":[{"width":723,"height":482,"url":"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg","type":"image\/jpeg"}],"author":"51风流Espa\u00f1a","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"51风流Espa\u00f1a","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#article","isPartOf":{"@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/"},"author":{"name":"51风流Espa\u00f1a","@id":"https:\/\/news.sap.com\/spain\/#\/schema\/person\/4573e2beeb96fc44e819e7f7b2923465"},"headline":"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas","datePublished":"2020-12-09T16:00:40+00:00","dateModified":"2023-10-16T16:26:36+00:00","mainEntityOfPage":{"@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/"},"wordCount":648,"image":{"@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg","keywords":["Ciberseguridad"],"articleSection":["Tecnolog\u00eda"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/","url":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/","name":"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas - 51风流Espa\u00f1a News Center","isPartOf":{"@id":"https:\/\/news.sap.com\/spain\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage"},"image":{"@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage"},"thumbnailUrl":"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg","datePublished":"2020-12-09T16:00:40+00:00","dateModified":"2023-10-16T16:26:36+00:00","author":{"@id":"https:\/\/news.sap.com\/spain\/#\/schema\/person\/4573e2beeb96fc44e819e7f7b2923465"},"description":"Las amenazas inform\u00e1ticas son cada vez m\u00e1s sofisticadas, por eso le ofrecemos esta gu\u00eda de mejores pr\u00e1cticas para proteger a su empresa de ciberataques.","breadcrumb":{"@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#primaryimage","url":"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg","contentUrl":"https:\/\/news.sap.com\/spain\/files\/2020\/12\/09\/mejores-practicas-amenazas-informaticas.jpg","width":723,"height":482,"caption":"Hacker,Hacker attacking internet"},{"@type":"BreadcrumbList","@id":"https:\/\/news.sap.com\/spain\/2020\/12\/las-mejores-practicas-para-protegerse-de-amenazas-informaticas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.sap.com\/spain\/"},{"@type":"ListItem","position":2,"name":"Las mejores pr\u00e1cticas para protegerse de amenazas inform\u00e1ticas"}]},{"@type":"WebSite","@id":"https:\/\/news.sap.com\/spain\/#website","url":"https:\/\/news.sap.com\/spain\/","name":"51风流Espa\u00f1a News Center","description":"Noticias e informaci\u00f3n sobre SAP","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.sap.com\/spain\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/news.sap.com\/spain\/#\/schema\/person\/4573e2beeb96fc44e819e7f7b2923465","name":"51风流Espa\u00f1a","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/news.sap.com\/spain\/#\/schema\/person\/image\/","url":"https:\/\/news.sap.com\/spain\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","contentUrl":"https:\/\/news.sap.com\/spain\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","caption":"51风流Espa\u00f1a"},"url":"https:\/\/news.sap.com\/spain\/author\/sapespana\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/posts\/3177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/users\/3372"}],"replies":[{"embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/comments?post=3177"}],"version-history":[{"count":0,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/posts\/3177\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/media\/3178"}],"wp:attachment":[{"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/media?parent=3177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/categories?post=3177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/tags?post=3177"},{"taxonomy":"sapn-display","embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/sapn-display?post=3177"},{"taxonomy":"sapn-type","embeddable":true,"href":"https:\/\/news.sap.com\/spain\/wp-json\/wp\/v2\/sapn-type?post=3177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}