{"id":9502,"date":"2022-05-17T21:33:08","date_gmt":"2022-05-18T01:33:08","guid":{"rendered":"https:\/\/ttt.com.bo\/?p=9502"},"modified":"2022-11-30T09:54:33","modified_gmt":"2022-11-30T13:54:33","slug":"dell-technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos","status":"publish","type":"post","link":"https:\/\/ttt.com.bo\/?p=9502","title":{"rendered":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos"},"content":{"rendered":"\n<p>En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.<\/p>\n\n\n\n<p>Con el tiempo han incrementado los ataques cibern\u00e9ticos y seg\u00fan el informe Digital Trust Survey 2022 m\u00e1s del 50% de los expertos encuestados espera que este a\u00f1o aumenten los ataques cibern\u00e9ticos. La encuesta es de PwC a m\u00e1s de 3.602 responsables de ciberseguridad en 66 pa\u00edses.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/ttt.com.bo\/dell-technologies-y-su-software-mejoran-el-almacenamiento-en-la-nube\/amp\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dell Technologies<\/a> <\/strong>recomienda que las estrategias de copia de seguridad deben ser m\u00e1s robustas para evitar el secuestro de datos.<\/p>\n\n\n\n<p>En el D\u00eda Mundial del Internet, Dell Technologies comparte siete tips para protegerse mejor de ataques cibern\u00e9ticos:<\/p>\n\n\n\n<p><strong>1.<\/strong> Se recomienda utilizar la soluci\u00f3n de copia de seguridad basada en disco, ya que as\u00ed se garantiza mayor velocidad. Adem\u00e1s la mayor\u00eda de las organizaciones pueden sufrir un ciberataque mucho antes de experimentar un desastre, en ese punto, no se puede ignorar la velocidad para recuperar los datos.&nbsp;<\/p>\n\n\n\n<p><strong>2.<\/strong> Tambi\u00e9n se debe realizar una copia de seguridad de todos los datos de las aplicaciones de los procesos empresariales importantes. Entre estos es posible que est\u00e9n los servicios de gesti\u00f3n y los datos almacenados en la nube p\u00fablica. Los datos deben respaldarse en entornos independientes de los sistemas de origen y del entorno de la nube que se est\u00e1 protegiendo.&nbsp;<\/p>\n\n\n\n<p><strong>3.<\/strong> Guardar las copias de seguridad durante al menos 60 d\u00edas o m\u00e1s. El objetivo es asegurar que hay margen para recuperarse de los ciberataques latentes. Al conservar las copias durante m\u00e1s tiempo, se obliga a los que quieran atacar, aumentar su tiempo de permanencia. La medida har\u00e1 m\u00e1s dif\u00edcil que permanezcan en la red sin ser advertidos.<\/p>\n\n\n\n<p><strong>4.<\/strong> Gestionar de mejor forma las contrase\u00f1as es una pr\u00e1ctica en la que se debe evitar almacenar en la misma base de datos contrase\u00f1as de los sistemas que protegen. Incluso hay que evitar almacenar las contrase\u00f1as de los sistemas de copia de seguridad en l\u00ednea.&nbsp;<\/p>\n\n\n\n<p>Es importante rotar de manera constante las contrase\u00f1as, ya que esta medida frustrar la fase final del ataque latente de un adversario.<\/p>\n\n\n\n<p><strong>5.<\/strong> Para el sistema de backup se debe imponer la inmutabilidad de las copias de seguridad, activando esta funci\u00f3n. Esto debido a que las copias de seguridad inmutables pueden garantizar que los datos no puedan ser eliminados antes de su vencimiento.&nbsp;<\/p>\n\n\n\n<p>Es importante utilizar un sistema con el nivel m\u00e1s alto de inmutabilidad, de esta manera se impedir\u00e1 hasta para los administradores varias funciones. Entre ellas pueden estar revertir una configuraci\u00f3n o borrar los datos antes de que caduquen.<\/p>\n\n\n\n<p><strong>6.<\/strong> Las caracter\u00edsticas para la funci\u00f3n de inmutabilidad de los sistemas de copia de seguridad, debe ser dif\u00edcil de evadir cambiando el reloj del sistema. Ya en ocasiones los atacantes m\u00e1s expertos pueden explotar los servidores NTP. Esto significa que pueden adelantar los relojes para superar la funci\u00f3n de inmutabilidad de un sistema de copia de seguridad.&nbsp;<\/p>\n\n\n\n<p><strong>7.<\/strong> Es importante probar el sistema de copias de seguridad ya que pueden estar incompletas o haber sido comprometidas desde su creaci\u00f3n. Hay que validar los datos y copias de seguridad de forma peri\u00f3dica.<\/p>\n\n\n\n<p>Al realizar pruebas con frecuencia se podr\u00e1 identificar y resolver los problemas antes de tiempo.&nbsp;<\/p>\n\n\n\n<p>Si te gusta nuestro contenido te invitamos a seguirnos en\u00a0<a href=\"https:\/\/marea.bio\/truetech\" target=\"_blank\" rel=\"noreferrer noopener\">nuestras redes sociales<\/a>\u00a0para descubrir m\u00e1s del mundo de la tecnolog\u00eda.<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color is-style-pill-shape is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;\" class=\"wp-social-link wp-social-link-facebook has-white-color wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/tiotruetec\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;\" class=\"wp-social-link wp-social-link-instagram has-white-color wp-block-social-link\"><a href=\"https:\/\/www.instagram.com\/tiotruetec\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;\" class=\"wp-social-link wp-social-link-tiktok has-white-color wp-block-social-link\"><a href=\"https:\/\/vm.tiktok.com\/ZM8KWQemR\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 32 32\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M16.708 0.027c1.745-0.027 3.48-0.011 5.213-0.027 0.105 2.041 0.839 4.12 2.333 5.563 1.491 1.479 3.6 2.156 5.652 2.385v5.369c-1.923-0.063-3.855-0.463-5.6-1.291-0.76-0.344-1.468-0.787-2.161-1.24-0.009 3.896 0.016 7.787-0.025 11.667-0.104 1.864-0.719 3.719-1.803 5.255-1.744 2.557-4.771 4.224-7.88 4.276-1.907 0.109-3.812-0.411-5.437-1.369-2.693-1.588-4.588-4.495-4.864-7.615-0.032-0.667-0.043-1.333-0.016-1.984 0.24-2.537 1.495-4.964 3.443-6.615 2.208-1.923 5.301-2.839 8.197-2.297 0.027 1.975-0.052 3.948-0.052 5.923-1.323-0.428-2.869-0.308-4.025 0.495-0.844 0.547-1.485 1.385-1.819 2.333-0.276 0.676-0.197 1.427-0.181 2.145 0.317 2.188 2.421 4.027 4.667 3.828 1.489-0.016 2.916-0.88 3.692-2.145 0.251-0.443 0.532-0.896 0.547-1.417 0.131-2.385 0.079-4.76 0.095-7.145 0.011-5.375-0.016-10.735 0.025-16.093z\" \/><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">TikTok<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;\" class=\"wp-social-link wp-social-link-twitter has-white-color wp-block-social-link\"><a href=\"https:\/\/twitter.com\/tiotruetec\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;\" class=\"wp-social-link wp-social-link-youtube has-white-color wp-block-social-link\"><a href=\"https:\/\/www.youtube.com\/thetruetec\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M21.8,8.001c0,0-0.195-1.378-0.795-1.985c-0.76-0.797-1.613-0.801-2.004-0.847c-2.799-0.202-6.997-0.202-6.997-0.202 h-0.009c0,0-4.198,0-6.997,0.202C4.608,5.216,3.756,5.22,2.995,6.016C2.395,6.623,2.2,8.001,2.2,8.001S2,9.62,2,11.238v1.517 c0,1.618,0.2,3.237,0.2,3.237s0.195,1.378,0.795,1.985c0.761,0.797,1.76,0.771,2.205,0.855c1.6,0.153,6.8,0.201,6.8,0.201 s4.203-0.006,7.001-0.209c0.391-0.047,1.243-0.051,2.004-0.847c0.6-0.607,0.795-1.985,0.795-1.985s0.2-1.618,0.2-3.237v-1.517 C22,9.62,21.8,8.001,21.8,8.001z M9.935,14.594l-0.001-5.62l5.404,2.82L9.935,14.594z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">YouTube<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;\" class=\"wp-social-link wp-social-link-linkedin has-white-color wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/true-tech-noticias-de-tecnolog%C3%ADa\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li><\/ul>\n\n\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ttt.com.bo\/?p=14489\">Xiaomi lanza la nueva Serie 15T: potencia, dise\u00f1o premium y fotograf\u00eda profesional con Leica<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ttt.com.bo\/?p=14443\">Samsung Galaxy A07 y A17 llegan a Bolivia con m\u00e1s potencia, c\u00e1mara avanzada y hasta 6 a\u00f1os de actualizaciones<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ttt.com.bo\/?p=14423\">SKYWORTH presenta en Bolivia sus nuevos televisores AI Karaoke y Gamer QLED<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ttt.com.bo\/?p=14117\">Galaxy Unpacked 2025<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ttt.com.bo\/?p=13969\">Nothing Phone (2a) Plus: procesador y aspectos m\u00e1s destacados<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos. Con el tiempo han incrementado los ataques cibern\u00e9ticos y seg\u00fan el informe Digital Trust Survey 2022 m\u00e1s del&#8230;<\/p>\n","protected":false},"author":4,"featured_media":9503,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[459,212,41],"tags":[],"class_list":["post-9502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-educacion","category-empresas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos - True Tech Bolivia<\/title>\n<meta name=\"description\" content=\"En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ttt.com.bo\/?p=9502\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos - True Tech Bolivia\" \/>\n<meta property=\"og:description\" content=\"En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ttt.com.bo\/?p=9502\" \/>\n<meta property=\"og:site_name\" content=\"True Tech Bolivia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tioetruetech\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-18T01:33:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-30T13:54:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ttt.com.bo\/wp-content\/uploads\/2022\/05\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Irup\u00e9 Ruiz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tiotruetech\" \/>\n<meta name=\"twitter:site\" content=\"@tiotruetech\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irup\u00e9 Ruiz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502\"},\"author\":{\"name\":\"Irup\u00e9 Ruiz\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#\\\/schema\\\/person\\\/baa03a3bb8f27aac32b2b63d87e1bf9a\"},\"headline\":\"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos\",\"datePublished\":\"2022-05-18T01:33:08+00:00\",\"dateModified\":\"2022-11-30T13:54:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502\"},\"wordCount\":588,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ttt.com.bo\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg\",\"articleSection\":[\"Blogs\",\"Educaci\u00f3n\",\"Empresas\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502\",\"url\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502\",\"name\":\"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos - True Tech Bolivia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ttt.com.bo\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg\",\"datePublished\":\"2022-05-18T01:33:08+00:00\",\"dateModified\":\"2022-11-30T13:54:33+00:00\",\"description\":\"En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ttt.com.bo\\\/?p=9502\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#primaryimage\",\"url\":\"https:\\\/\\\/ttt.com.bo\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg\",\"contentUrl\":\"https:\\\/\\\/ttt.com.bo\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg\",\"width\":1350,\"height\":650,\"caption\":\"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/?p=9502#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/ttt.com.bo\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#website\",\"url\":\"https:\\\/\\\/ttt.com.bo\\\/\",\"name\":\"True Tech Bolivia\",\"description\":\"Tecnolog\u00eda a tu alcance\",\"publisher\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ttt.com.bo\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#organization\",\"name\":\"The True Tech Bolivia\",\"url\":\"https:\\\/\\\/ttt.com.bo\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ttt.com.bo\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/LOGO-05.png\",\"contentUrl\":\"https:\\\/\\\/ttt.com.bo\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/LOGO-05.png\",\"width\":1060,\"height\":1060,\"caption\":\"The True Tech Bolivia\"},\"image\":{\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/tioetruetech\\\/\",\"https:\\\/\\\/x.com\\\/tiotruetech\",\"https:\\\/\\\/www.instagram.com\\\/tioetruetech\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCgTkcGccJ5oZANJnDq0TWwQ\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ttt.com.bo\\\/#\\\/schema\\\/person\\\/baa03a3bb8f27aac32b2b63d87e1bf9a\",\"name\":\"Irup\u00e9 Ruiz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e0796f6a8749628385c45cc5dcaae38fbaded3feb7f0ce829ff13106fd76f83?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e0796f6a8749628385c45cc5dcaae38fbaded3feb7f0ce829ff13106fd76f83?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e0796f6a8749628385c45cc5dcaae38fbaded3feb7f0ce829ff13106fd76f83?s=96&d=mm&r=g\",\"caption\":\"Irup\u00e9 Ruiz\"},\"description\":\"Creadora de contenido con habilidades comunicativas, gusto por la investigaci\u00f3n online para producir informaci\u00f3n \u00fatil y fidedigna.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/irup\u00e9-ruiz-gutierrez-67723a204\\\/\"],\"url\":\"https:\\\/\\\/ttt.com.bo\\\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos - True Tech Bolivia","description":"En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ttt.com.bo\/?p=9502","og_locale":"es_ES","og_type":"article","og_title":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos - True Tech Bolivia","og_description":"En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.","og_url":"https:\/\/ttt.com.bo\/?p=9502","og_site_name":"True Tech Bolivia","article_publisher":"https:\/\/www.facebook.com\/tioetruetech\/","article_published_time":"2022-05-18T01:33:08+00:00","article_modified_time":"2022-11-30T13:54:33+00:00","og_image":[{"width":1350,"height":650,"url":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2022\/05\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg","type":"image\/jpeg"}],"author":"Irup\u00e9 Ruiz","twitter_card":"summary_large_image","twitter_creator":"@tiotruetech","twitter_site":"@tiotruetech","twitter_misc":{"Escrito por":"Irup\u00e9 Ruiz","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ttt.com.bo\/?p=9502#article","isPartOf":{"@id":"https:\/\/ttt.com.bo\/?p=9502"},"author":{"name":"Irup\u00e9 Ruiz","@id":"https:\/\/ttt.com.bo\/#\/schema\/person\/baa03a3bb8f27aac32b2b63d87e1bf9a"},"headline":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos","datePublished":"2022-05-18T01:33:08+00:00","dateModified":"2022-11-30T13:54:33+00:00","mainEntityOfPage":{"@id":"https:\/\/ttt.com.bo\/?p=9502"},"wordCount":588,"commentCount":0,"publisher":{"@id":"https:\/\/ttt.com.bo\/#organization"},"image":{"@id":"https:\/\/ttt.com.bo\/?p=9502#primaryimage"},"thumbnailUrl":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2022\/05\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg","articleSection":["Blogs","Educaci\u00f3n","Empresas"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ttt.com.bo\/?p=9502#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ttt.com.bo\/?p=9502","url":"https:\/\/ttt.com.bo\/?p=9502","name":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos - True Tech Bolivia","isPartOf":{"@id":"https:\/\/ttt.com.bo\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ttt.com.bo\/?p=9502#primaryimage"},"image":{"@id":"https:\/\/ttt.com.bo\/?p=9502#primaryimage"},"thumbnailUrl":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2022\/05\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg","datePublished":"2022-05-18T01:33:08+00:00","dateModified":"2022-11-30T13:54:33+00:00","description":"En el d\u00eda del Internet Dell Technologies deja siete tips o consejos para protegerse de ataques cibern\u00e9ticos.","breadcrumb":{"@id":"https:\/\/ttt.com.bo\/?p=9502#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ttt.com.bo\/?p=9502"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ttt.com.bo\/?p=9502#primaryimage","url":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2022\/05\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg","contentUrl":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2022\/05\/Dell-Technologies-da-siete-tips-para-protegerse-de-ataques-ciberneticos.jpg","width":1350,"height":650,"caption":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos"},{"@type":"BreadcrumbList","@id":"https:\/\/ttt.com.bo\/?p=9502#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ttt.com.bo\/"},{"@type":"ListItem","position":2,"name":"Dell Technologies da siete tips para protegerse de ataques cibern\u00e9ticos"}]},{"@type":"WebSite","@id":"https:\/\/ttt.com.bo\/#website","url":"https:\/\/ttt.com.bo\/","name":"True Tech Bolivia","description":"Tecnolog\u00eda a tu alcance","publisher":{"@id":"https:\/\/ttt.com.bo\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ttt.com.bo\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ttt.com.bo\/#organization","name":"The True Tech Bolivia","url":"https:\/\/ttt.com.bo\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ttt.com.bo\/#\/schema\/logo\/image\/","url":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2020\/09\/LOGO-05.png","contentUrl":"https:\/\/ttt.com.bo\/wp-content\/uploads\/2020\/09\/LOGO-05.png","width":1060,"height":1060,"caption":"The True Tech Bolivia"},"image":{"@id":"https:\/\/ttt.com.bo\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tioetruetech\/","https:\/\/x.com\/tiotruetech","https:\/\/www.instagram.com\/tioetruetech\/","https:\/\/www.youtube.com\/channel\/UCgTkcGccJ5oZANJnDq0TWwQ\/videos"]},{"@type":"Person","@id":"https:\/\/ttt.com.bo\/#\/schema\/person\/baa03a3bb8f27aac32b2b63d87e1bf9a","name":"Irup\u00e9 Ruiz","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/7e0796f6a8749628385c45cc5dcaae38fbaded3feb7f0ce829ff13106fd76f83?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e0796f6a8749628385c45cc5dcaae38fbaded3feb7f0ce829ff13106fd76f83?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e0796f6a8749628385c45cc5dcaae38fbaded3feb7f0ce829ff13106fd76f83?s=96&d=mm&r=g","caption":"Irup\u00e9 Ruiz"},"description":"Creadora de contenido con habilidades comunicativas, gusto por la investigaci\u00f3n online para producir informaci\u00f3n \u00fatil y fidedigna.","sameAs":["https:\/\/www.linkedin.com\/in\/irup\u00e9-ruiz-gutierrez-67723a204\/"],"url":"https:\/\/ttt.com.bo\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/posts\/9502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9502"}],"version-history":[{"count":1,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/posts\/9502\/revisions"}],"predecessor-version":[{"id":9505,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/posts\/9502\/revisions\/9505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=\/wp\/v2\/media\/9503"}],"wp:attachment":[{"href":"https:\/\/ttt.com.bo\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ttt.com.bo\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}