{"id":2807,"date":"2019-09-05T09:00:28","date_gmt":"2019-09-05T15:00:28","guid":{"rendered":"https:\/\/staging2.idsinc.com\/?p=2807"},"modified":"2023-12-07T16:50:58","modified_gmt":"2023-12-07T22:50:58","slug":"se-ha-ido-phishing-2","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/gone-phishing-2\/","title":{"rendered":"Blog &#039;Gone Phishing&#039; (Parte 2)"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><a href=\"\/es\/se-ha-ido-phishing-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">En nuestra publicaci\u00f3n anterior<\/a>, analizamos qu\u00e9 son los ataques de phishing, c\u00f3mo funcionan y el impacto que pueden tener en usted y su organizaci\u00f3n. En esta entrega, nos centraremos en c\u00f3mo prevenir, detectar y recuperarnos de ataques de phishing con la formaci\u00f3n adecuada en ciberseguridad.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Con 90% de violaciones de datos que se originan con un ataque de phishing, los atacantes continuar\u00e1n lanz\u00e1ndolos. Solo en el \u00faltimo mes, los ataques de phishing provocaron que m\u00e1s de una docena de ciudades y otras agencias gubernamentales quedaran paralizadas por ransomware, por lo que es fundamental que abordemos el vector m\u00e1s com\u00fan para los atacantes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Entrenamiento, Entrenamiento, Entrenamiento<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Primero, prevenci\u00f3n.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Al igual que los agentes de bienes ra\u00edces tienen el mantra &quot;ubicaci\u00f3n, ubicaci\u00f3n, ubicaci\u00f3n&quot; para los tres factores m\u00e1s importantes en una venta exitosa de bienes ra\u00edces, su mantra cuando se trata de prevenir el phishing debe ser &quot;capacitaci\u00f3n, capacitaci\u00f3n, capacitaci\u00f3n&quot;.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ser consciente de c\u00f3mo se ejecutan las estafas por correo electr\u00f3nico de phishing es el primer paso para prevenirlas. Todos deben poder reconocer cu\u00e1les son las pistas m\u00e1s comunes en un correo electr\u00f3nico de phishing, como errores tipogr\u00e1ficos y referirse a usted como &quot;Estimado cliente&quot; en el saludo. Todos tambi\u00e9n deben comprender que abrir archivos adjuntos y hacer clic en enlaces es la causa m\u00e1s com\u00fan de compromisos de ransomware y una de las principales causas de violaciones de datos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Las organizaciones que no se toman en serio la formaci\u00f3n en ciberseguridad suelen pagar el precio. Si su programa de capacitaci\u00f3n es parte de un evento anual (o peor a\u00fan, se imparte solo una vez a los nuevos empleados), esto es un &quot;teatro de seguridad&quot;: seguir los movimientos para que alguien pueda marcar una casilla y decir: &quot;\u00a1S\u00ed, todos est\u00e1n capacitados!&quot;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">La creencia de que ingresan nuevos empleados, comienzan un nuevo trabajo, obtienen su orientaci\u00f3n, detalles sobre sus opciones de seguro m\u00e9dico e informaci\u00f3n sobre el plan 401k, completan sus formularios de impuestos, etc., E internalizan una capacitaci\u00f3n de ciberseguridad de una hora o menos. es risible<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Del mismo modo, hacer que los empleados pasen por un d\u00eda de capacitaci\u00f3n sobre cumplimiento en el que aprenden sobre acoso sexual, entrevistas de trabajo y pautas de cumplimiento de la gerencia, capacitaci\u00f3n en salud y seguridad, capacitaci\u00f3n en diversidad y capacitaci\u00f3n en concientizaci\u00f3n sobre seguridad cibern\u00e9tica tambi\u00e9n es un enfoque de &quot;marcar la casilla&quot; para la seguridad cibern\u00e9tica.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Por supuesto, cada empleado firmar\u00e1 el formulario reconociendo que ha le\u00eddo y entendido todo. Y al d\u00eda siguiente, habr\u00e1n olvidado todo lo que les has ense\u00f1ado.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">C\u00f3mo cambiar el comportamiento de forma incremental<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Un mejor enfoque es proporcionar peque\u00f1os fragmentos de capacitaci\u00f3n varias veces durante el transcurso del a\u00f1o. Cada vez debe haber un objetivo de entrenamiento limitado o incluso \u00fanico, como por ejemplo, c\u00f3mo reconocer enlaces sospechosos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El objetivo es cambiar gradualmente el comportamiento con el tiempo. Si te ense\u00f1o una sola cosa que puedas aplicar de inmediato, es m\u00e1s probable que la recuerdes. Un mes despu\u00e9s, puedo ense\u00f1arte algo m\u00e1s. Haga espuma, enjuague y repita. Si trato de ense\u00f1arte 15 cosas en el transcurso de una hora una vez al a\u00f1o, es probable que no recuerdes casi nada.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Si bien la capacitaci\u00f3n en ciberseguridad es fundamental, no es nuestra \u00fanica defensa. Deber\u00eda haber m\u00faltiples capas m\u00e1s all\u00e1 de mejorar el comportamiento del usuario. Los filtros de spam son un arma poderosa contra amplios ataques de phishing. Pueden bloquear correos electr\u00f3nicos de fuentes malas conocidas para que los usuarios no se sientan tentados a hacer algo incorrecto.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adem\u00e1s, el uso de certificados de firma de correo electr\u00f3nico tambi\u00e9n puede brindarle la seguridad de que los remitentes son leg\u00edtimos al permitirles firmar digitalmente los correos electr\u00f3nicos que le env\u00edan, lo que le brinda la posibilidad de validar esa firma.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Las extensiones del navegador, los complementos y las herramientas de configuraci\u00f3n se pueden configurar para que impidan que los usuarios vayan a la multitud de sitios web que tienen intenciones maliciosas cuando los visitantes ingresan al sitio, infectando las computadoras con malware, por ejemplo, sugiriendo que realice una &quot;escaneo de seguridad&quot; de su computadora que en realidad puede instalar malware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Otra cosa crucial en la que concentrarse es aplicar parches y actualizaciones de manera oportuna. Todos podemos recordar el ataque global de ransomware WannaCry en mayo de 2017. Inhabilit\u00f3 m\u00e1s de 200 000 sistemas en 150 pa\u00edses, con estimaciones de da\u00f1os que van desde decenas de millones hasta miles de millones de d\u00f3lares. Y esto fue dos meses DESPU\u00c9S de que Microsoft lanzara un parche que podr\u00eda haber evitado el brote.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un buen proceso para evaluar, probar y luego implementar parches y actualizaciones es un paso muy b\u00e1sico, pero es clave para tener un entorno seguro.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-good-backups-are-critical\">Por qu\u00e9 las buenas copias de seguridad son fundamentales<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Finalmente, ser\u00eda negligente si no mencionara las copias de seguridad. Si bien las buenas copias de seguridad no evitar\u00e1n ning\u00fan tipo de compromiso o violaci\u00f3n de datos, son una herramienta fundamental en su arsenal para minimizar el da\u00f1o. En caso de compromiso, las buenas copias de seguridad permitir\u00e1n que su organizaci\u00f3n se recupere r\u00e1pidamente y vuelva al negocio.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Su proceso de copia de seguridad y restauraci\u00f3n debe actualizarse peri\u00f3dicamente para reflejar su entorno de hardware y, lo que es m\u00e1s importante, debe probarse. Si la primera vez que &quot;prueba&quot; su proceso de restauraci\u00f3n es despu\u00e9s de un compromiso, casi puedo garantizar que descubrir\u00e1 un peque\u00f1o detalle que pas\u00f3 por alto al dise\u00f1ar el proceso que no es obvio hasta que se da cuenta de que su entorno y sus datos no se pueden recuperar.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>iDiscovery Solutions es una firma de consultor\u00eda estrat\u00e9gica, tecnolog\u00eda y servicios expertos que ofrece soluciones personalizadas de eDiscovery, desde an\u00e1lisis forense digital hasta testimonios de expertos para bufetes de abogados y corporaciones en los Estados Unidos y Europa.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>In our prior post, we discussed what phishing attacks are, how they work, and the impact they can have on you and your organization. In this installment, we\u2019ll focus on how to prevent, detect, and recover from phishing attacks with proper cybersecurity training. With 90% of data breaches originating with a phishing attack, attackers will [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2805,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"90% of data breaches start with phishing attacks. Learn to prevent, detect, &amp; recover from these attacks with proper cybersecurity training.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/se-ha-ido-phishing-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Gone Phishing\u2019 Blog (Part 2)\" \/>\n<meta property=\"og:description\" content=\"90% of data breaches start with phishing attacks. Learn to prevent, detect, &amp; recover from these attacks with proper cybersecurity training.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/se-ha-ido-phishing-2\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T15:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T22:50:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2-1024x512.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"\u2018Gone Phishing\u2019 Blog (Part 2)\",\"datePublished\":\"2019-09-05T15:00:28+00:00\",\"dateModified\":\"2023-12-07T22:50:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"},\"wordCount\":872,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\",\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 2) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"datePublished\":\"2019-09-05T15:00:28+00:00\",\"dateModified\":\"2023-12-07T22:50:58+00:00\",\"description\":\"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/gone-phishing-2.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/gone-phishing-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u2018Gone Phishing\u2019 Blog (Part 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blog &#039;Gone Phishing&#039; (Parte 2) - iDiscovery Solutions","description":"90% de violaciones de datos comienzan con ataques de phishing. Aprenda a prevenir, detectar y recuperarse de estos ataques con la formaci\u00f3n adecuada en ciberseguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/se-ha-ido-phishing-2\/","og_locale":"es_ES","og_type":"article","og_title":"\u2018Gone Phishing\u2019 Blog (Part 2)","og_description":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training.","og_url":"https:\/\/idsinc.com\/es\/se-ha-ido-phishing-2\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-09-05T15:00:28+00:00","article_modified_time":"2023-12-07T22:50:58+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2-1024x512.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Robert Kirtley","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"\u2018Gone Phishing\u2019 Blog (Part 2)","datePublished":"2019-09-05T15:00:28+00:00","dateModified":"2023-12-07T22:50:58+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/"},"wordCount":872,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/gone-phishing-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/gone-phishing-2\/","url":"https:\/\/idsinc.com\/gone-phishing-2\/","name":"Blog &#039;Gone Phishing&#039; (Parte 2) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","datePublished":"2019-09-05T15:00:28+00:00","dateModified":"2023-12-07T22:50:58+00:00","description":"90% de violaciones de datos comienzan con ataques de phishing. Aprenda a prevenir, detectar y recuperarse de estos ataques con la formaci\u00f3n adecuada en ciberseguridad.","breadcrumb":{"@id":"https:\/\/idsinc.com\/gone-phishing-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/gone-phishing-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/gone-phishing-2.jpg","width":2500,"height":1250,"caption":"90% of data breaches start with phishing attacks. Learn to prevent, detect, & recover from these attacks with proper cybersecurity training."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/gone-phishing-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"\u2018Gone Phishing\u2019 Blog (Part 2)"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Roberto Kirtley","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/es\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/2807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=2807"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/2807\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/2805"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=2807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=2807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=2807"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}