{"id":4040,"date":"2023-10-02T15:05:00","date_gmt":"2023-10-02T21:05:00","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=4040"},"modified":"2023-10-10T12:59:48","modified_gmt":"2023-10-10T18:59:48","slug":"evita-los-7-errores-mas-comunes-en-ciberseguridad","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/evita-los-7-errores-mas-comunes-en-ciberseguridad\/","title":{"rendered":"Avoid the 7 most common mistakes in cybersecurity."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4040\" class=\"elementor elementor-4040\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdc83b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1bdc83b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3302f89\" data-id=\"3302f89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc496e elementor-widget elementor-widget-heading\" data-id=\"9dc496e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Avoid the 7 most common mistakes in cybersecurity. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc6a5a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"cc6a5a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5dbdb7\" data-id=\"e5dbdb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d5738 elementor-widget elementor-widget-image\" data-id=\"40d5738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-1024x577.png\" class=\"attachment-large size-large wp-image-4027\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-1024x577.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-768x433.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-1536x865.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post.png 1640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2514ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2514ebd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6ebae1\" data-id=\"f6ebae1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27cae4c elementor-widget elementor-widget-heading\" data-id=\"27cae4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is cybersecurity?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e378cb9 elementor-widget elementor-widget-text-editor\" data-id=\"e378cb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">These are some of the common cybersecurity mistakes people make.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f46e4c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"8f46e4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80ce42e\" data-id=\"80ce42e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b2d7d3 elementor-widget elementor-widget-heading\" data-id=\"7b2d7d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 1: Thinking it can't happen to you<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab3653 elementor-widget elementor-widget-text-editor\" data-id=\"3ab3653\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Every person, company, organization and government entity is a potential target for cybercriminals<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9f5b542 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"9f5b542\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ae15a3\" data-id=\"7ae15a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d3235d elementor-widget elementor-widget-heading\" data-id=\"0d3235d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 2: Using weak passwords<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f908cd elementor-widget elementor-widget-text-editor\" data-id=\"1f908cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Despite warnings not to do so, a large number of people still use weak passwords, such as \u201c123456\u201d or \u201cpassword.\u201d Using these types of passwords dramatically increases the risk of one of your accounts being compromised.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56f6296 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"56f6296\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8efce84\" data-id=\"8efce84\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b34b10 elementor-widget elementor-widget-heading\" data-id=\"5b34b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 3: Not using two-step authentication<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45e4a72 elementor-widget elementor-widget-text-editor\" data-id=\"45e4a72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">All major social media platforms and most major financial institutions offer some form of two-step authentication, and this can make the difference between an account being breached and one remaining secure.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19c04e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"19c04e7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-600df23\" data-id=\"600df23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28a2e8a elementor-widget elementor-widget-heading\" data-id=\"28a2e8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 4: Not having the appropriate security software<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1940aaa elementor-widget elementor-widget-text-editor\" data-id=\"1940aaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The use of antivirus increases our security against possible attacks, so it is recommended that you have one on all your devices that you and your family use.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ad26a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5ad26a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5e792c\" data-id=\"f5e792c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1bf0876 elementor-widget elementor-widget-heading\" data-id=\"1bf0876\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 5: Not keeping software updated <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-836852d elementor-widget elementor-widget-text-editor\" data-id=\"836852d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Many software and operating system updates contain fixes for security vulnerabilities discovered by researchers or hackers in previous versions. If you don't keep your software up to date, you're likely leaving your devices vulnerable to attacks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2e285d elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"c2e285d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-657a761\" data-id=\"657a761\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0c4ec8 elementor-widget elementor-widget-heading\" data-id=\"e0c4ec8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 6: Common sense<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-910e6e2 elementor-widget elementor-widget-text-editor\" data-id=\"910e6e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The weakest link in the cybersecurity chain is a human being. Be it by clicking on a link that should not have been clicked, installing an unauthorized application, downloading a pirated copy of a movie or through some other reckless action.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4460279 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"4460279\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b41f61d\" data-id=\"b41f61d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c09611 elementor-widget elementor-widget-heading\" data-id=\"7c09611\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">Mistake 7: Not learning the basics<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfbc9c0 elementor-widget elementor-widget-text-editor\" data-id=\"cfbc9c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">We live in a world surrounded by technology, it is not only necessary to learn how it is used but also to know the best practices to use it correctly and be safer when browsing the Internet.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eab04b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5eab04b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8507ec6\" data-id=\"8507ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5699edf elementor-widget elementor-widget-heading\" data-id=\"5699edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><b>bibliographic references<\/b><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-645eb12 elementor-widget elementor-widget-text-editor\" data-id=\"645eb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.alphagalileo.org\/en-gb\/Item-Display\/ItemId\/222007?returnurl=https:\/\/www.alphagalileo.org\/en-gb\/Item-Display\/ItemId\/222007\">https:\/\/www.alphagalileo.org\/en-gb\/Item-Display\/ItemId\/222007?returnurl=https:\/\/www.alphagalileo.org\/en-gb\/Item-Display\/ItemId\/222007<\/a><\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">ALTONIVEL. (7 de junio de 2022). ALTONIVEL. Obtenido de ALTONIVEL: <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.altonivel.com.mx\/opinion\/industria-4-0-y-sus-principales-desafios-de-ciberseguridad-en-mexico\/\">https:\/\/www.altonivel.com.mx\/opinion\/industria-4-0-y-sus-principales-desafios-de-ciberseguridad-en-mexico\/<\/a><\/span><\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">eSemanal. (21 de Enero de 2022). eSemanal. Obtenido de eSemanal: <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/esemanal.mx\/2022\/01\/los-cuatro-mayores-errores-de-ciberseguridad-y-como-evitarlos\/\">https:\/\/esemanal.mx\/2022\/01\/los-cuatro-mayores-errores-de-ciberseguridad-y-como-evitarlos\/<\/a><\/span><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5cfb78 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d5cfb78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374443f\" data-id=\"374443f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ab2a3 elementor-widget elementor-widget-image\" data-id=\"27ab2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png\" class=\"attachment-large size-large wp-image-3605\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-768x432.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1536x864.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312df40 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"312df40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b03bc27\" data-id=\"b03bc27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d4acee elementor-shape-circle elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"5d4acee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-7974e07\" href=\"https:\/\/www.facebook.com\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-3faa0ff\" href=\"https:\/\/www.linkedin.com\/company\/red-por-la-ciberseguridad\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-f3c2677\" href=\"https:\/\/www.youtube.com\/@redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-youtube\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitch elementor-repeater-item-5ad851c\" href=\"https:\/\/www.twitch.tv\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitch<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitch\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Evita los 7 errores m\u00e1s comunes en ciberseguridad. \u00bfQu\u00e9 es la ciberseguridad? Estos son algunos de los errores comunes de ciberseguridad que comete la gente. Error 1: Pensar que no te puede pasar a ti Cada persona, empresa, organizaci\u00f3n y entidad gubernamental es un objetivo potencial para los cibercriminales Error 2: Uso de contrase\u00f1as d\u00e9biles<\/p>","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[22],"tags":[],"class_list":["post-4040","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=4040"}],"version-history":[{"count":0,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4040\/revisions"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=4040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=4040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=4040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}