{"id":3551,"date":"2019-06-07T09:00:00","date_gmt":"2019-06-07T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3551"},"modified":"2022-04-12T14:34:17","modified_gmt":"2022-04-12T20:34:17","slug":"la-mejor-defensa-de-los-empleados","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/employees-best-defense\/","title":{"rendered":"Empleados: \u00bfeslab\u00f3n m\u00e1s d\u00e9bil o mejor defensa?"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3551\" data-postid=\"3551\" class=\"themify_builder_content themify_builder_content-3551 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">Escuchamos bastante este fragmento de sabidur\u00eda convencional: &quot;Los empleados son el &#039;eslab\u00f3n m\u00e1s d\u00e9bil&#039; en la cadena de ciberdefensa&quot;. Entendemos por qu\u00e9 lo decimos. Diablos, hemos sido culpables de decirlo nosotros mismos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Y los hechos parecen respaldarlo. De acuerdo a <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-62\/Accenture-2017CostCybercrime-US-FINAL.pdf#zoom=50\" target=\"_blank\" rel=\"noreferrer noopener\">el informe Cost of Cybercrime 2017 del Ponemon Institute<\/a>, &quot;El sesenta y nueve por ciento de las empresas experimentaron ataques de phishing e ingenier\u00eda social&quot; en 2017, solo un uno por ciento menos que en 2016.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El phishing, la ingenier\u00eda social y los ataques internos le cuestan a las empresas estadounidenses un promedio de $2.7M, superando el costo del malware ($2.4M) y la denegaci\u00f3n de servicio ($1.6M). Dada la prevalencia y el costo de los ataques que se centran en los empleados, es comprensible por qu\u00e9 sentimos que nuestros empleados son el eslab\u00f3n d\u00e9bil.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Por qu\u00e9 las palabras importan<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Desafortunadamente, cuando nos permitimos adoptar esta mentalidad, en la que los empleados son &quot;riesgos&quot; que deben &quot;mitigarse&quot;, creamos una relaci\u00f3n de confrontaci\u00f3n entre nosotros y nuestra comunidad y, al mismo tiempo, descartamos una de las mejores oportunidades que tenemos para defendernos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Se podr\u00eda decir que solo estamos discutiendo la sem\u00e1ntica, que en realidad estamos diciendo lo mismo y solo estamos usando palabras diferentes. Lo admitiremos, hay algo de verdad en sus palabras, pero creemos que las palabras importan. Son importantes porque las palabras preparan el escenario para nuestro estado de \u00e1nimo y c\u00f3mo interactuamos con el mundo. No solo eso, sino que transmiten al mundo qu\u00e9 y c\u00f3mo pensamos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Las palabras que usamos proyectan nuestra actitud, y esa actitud puede energizar y motivar, o puede alienar y desmoralizar. Tome un empleado hipot\u00e9tico: Joe de Contabilidad. Es un empleado modelo; serio, honesto y trabajador. Es un gran contador, pero no es tan bueno con la tecnolog\u00eda, lo cual est\u00e1 bien, porque no es su trabajo ser bueno con la tecnolog\u00eda.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Joe es un objetivo principal para el phishing y el compromiso del correo electr\u00f3nico comercial. Podemos abordar a Joe como un riesgo que debe mitigarse, lo que suena razonable y apropiado. Pero si nuestra mentalidad es que Joe mismo es el problema, nuestra comunicaci\u00f3n verbal y no verbal con \u00e9l y sus colegas lo transmitir\u00e1.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Terminaremos perdiendo el coraz\u00f3n de Joe y probablemente el coraz\u00f3n de sus compa\u00f1eros de trabajo. La comunidad desarrollar\u00e1 un mal gusto por el equipo de seguridad y se ir\u00e1 pensando que somos condescendientes, demasiado impresionados con nuestra propia importancia y que vemos a todos los dem\u00e1s como \u201cel problema\u201d.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ac\u00e9rquese a los empleados como socios<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Pero, \u00bfy si en lugar de abordar a Joe como un problema, lo abordamos a \u00e9l y a sus colegas como socios? Esto no solo nos permite mitigar el riesgo inmediato, que es real, sino que tambi\u00e9n nos da la oportunidad de crear un multiplicador de fuerza. Acercarnos a nuestros empleados como nuestra mejor oportunidad para crear un entorno seguro obliga a cambiar el panorama de seguridad de toda la organizaci\u00f3n.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En alg\u00fan nivel, todos se convierten en miembros del equipo de seguridad. Todo el mundo hace preguntas y es consciente del riesgo. Se supone que los correos electr\u00f3nicos sospechosos son maliciosos en lugar de inocentes, las computadoras se bloquean cuando los empleados abandonan sus escritorios y las credenciales se deslizan al ingresar a \u00e1reas seguras.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Una de las mejores preguntas de seguridad que nos han hecho la hizo el jefe de polic\u00eda del condado de Fairfax, Virginia. Le pregunt\u00f3 a nuestra cohorte de graduados: &quot;\u00bfQui\u00e9n mantiene la ley y el orden en el condado de Fairfax?&quot; Ahora imagine una sala llena de geeks cibern\u00e9ticos y de pol\u00edticas respondiendo a esta pregunta. La conversaci\u00f3n fue din\u00e1mica y entusiasta, y nuestras respuestas estaban por todas partes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Cuando nadie brind\u00f3 una respuesta adecuada, nos dijo: \u201cT\u00fa s\u00ed. Cada uno de ustedes cuando se levantan por la ma\u00f1ana y participan en nuestra comunidad. Estoy aqu\u00ed por las excepciones; usted es responsable de la ley y el orden cotidianos\u201d.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Nos dec\u00eda que cada uno de nosotros era miembro de su equipo de seguridad. Que todos somos responsables de la seguridad de nuestro entorno. Que al cerrar nuestras casas y autos, participamos en asegurar la comunidad. Al estar alerta y reconocer el peligro antes de que ocurra, participamos en la protecci\u00f3n de nuestra comunidad.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-a-mindset-change-is-needed\"><strong>Se necesita un cambio de mentalidad<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Creemos que lo mismo es cierto en cibern\u00e9tica. No podemos hacerlo solos; necesitamos que toda la comunidad a la que servimos est\u00e9 despierta y alerta. En el mundo f\u00edsico hemos perfeccionado estas habilidades durante d\u00e9cadas (o m\u00e1s) de vida. En el mundo cibern\u00e9tico, muchos de nosotros no hemos aprendido o no nos han ense\u00f1ado estas habilidades. Depende de nosotros, los expertos en ciberseguridad y seguridad, ayudar a nuestros compa\u00f1eros de trabajo a construir y desarrollar estas habilidades.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Al final del d\u00eda, tratar a los empleados como problemas socava la cultura que estamos tratando de fomentar. Los empleados no son nuestro eslab\u00f3n m\u00e1s d\u00e9bil; representan nuestra mejor oportunidad para un futuro seguro. Si les estamos pidiendo que cambien su mentalidad para incorporar la seguridad cibern\u00e9tica, es justo que estemos dispuestos a corresponder. Necesitamos cambiar nuestra mentalidad para verlos como socios y defensores, no como problemas y riesgos.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS proporciona soluciones de datos de consulta a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de la sala del tribunal. Nuestros expertos en la materia y estrategas de datos se especializan en encontrar soluciones a problemas de datos complejos, lo que garantiza que los datos se puedan aprovechar como un activo y no como un pasivo.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>We hear this piece of conventional wisdom quite a bit: \u201cEmployees are the \u2018weakest link\u2019 in the cyber defense chain.\u201d We understand why we say it. Heck, we\u2019ve been guilty of saying it ourselves. And the facts seem to back it up. According to the Ponemon Institute\u2019s 2017 Cost of Cybercrime report, \u201cSixty-nine percent of [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3553,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Employees: Weakest Link Or Best Defense? - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/la-mejor-defensa-de-los-empleados\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees: Weakest Link Or Best Defense?\" \/>\n<meta property=\"og:description\" content=\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/la-mejor-defensa-de-los-empleados\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-07T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-12T20:34:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Employees: Weakest Link Or Best Defense?\",\"datePublished\":\"2019-06-07T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:34:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"},\"wordCount\":893,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\",\"name\":\"Employees: Weakest Link Or Best Defense? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"datePublished\":\"2019-06-07T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:34:17+00:00\",\"description\":\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Employees-best-defense.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/employees-best-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Employees: Weakest Link Or Best Defense?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Empleados: \u00bfeslab\u00f3n m\u00e1s d\u00e9bil o mejor defensa? - Soluciones iDiscovery","description":"Los empleados representan nuestra mejor oportunidad en materia de ciberseguridad. Descubra por qu\u00e9 es hora de verlos como un equipo de seguridad, no como riesgos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/la-mejor-defensa-de-los-empleados\/","og_locale":"es_ES","og_type":"article","og_title":"Employees: Weakest Link Or Best Defense?","og_description":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks.","og_url":"https:\/\/idsinc.com\/es\/la-mejor-defensa-de-los-empleados\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-06-07T15:00:00+00:00","article_modified_time":"2022-04-12T20:34:17+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"iDiscovery Solutions","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/employees-best-defense\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Employees: Weakest Link Or Best Defense?","datePublished":"2019-06-07T15:00:00+00:00","dateModified":"2022-04-12T20:34:17+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/"},"wordCount":893,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/employees-best-defense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/employees-best-defense\/","url":"https:\/\/idsinc.com\/employees-best-defense\/","name":"Empleados: \u00bfeslab\u00f3n m\u00e1s d\u00e9bil o mejor defensa? - Soluciones iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","datePublished":"2019-06-07T15:00:00+00:00","dateModified":"2022-04-12T20:34:17+00:00","description":"Los empleados representan nuestra mejor oportunidad en materia de ciberseguridad. Descubra por qu\u00e9 es hora de verlos como un equipo de seguridad, no como riesgos.","breadcrumb":{"@id":"https:\/\/idsinc.com\/employees-best-defense\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/employees-best-defense\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/employees-best-defense\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Employees-best-defense.jpg","width":2500,"height":1250,"caption":"Employees represent our best chance for in cyber security. Find out why it\u2019s time to view them as a security team, not as risks."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/employees-best-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Employees: Weakest Link Or Best Defense?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Soluciones iDiscovery","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/es\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/3551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=3551"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/3551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/3553"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=3551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=3551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=3551"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}