{"id":4079,"date":"2023-10-03T12:31:10","date_gmt":"2023-10-03T18:31:10","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=4079"},"modified":"2024-05-09T13:49:13","modified_gmt":"2024-05-09T19:49:13","slug":"como-proteger-mi-banca","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/como-proteger-mi-banca\/","title":{"rendered":"How to protect my bank?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4079\" class=\"elementor elementor-4079\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdc83b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1bdc83b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3302f89\" data-id=\"3302f89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc496e elementor-widget elementor-widget-heading\" data-id=\"9dc496e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to protect my bank?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04dff3f elementor-widget elementor-widget-text-editor\" data-id=\"04dff3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6><span style=\"color: #7b88db;\"><strong><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Por: Isabely Mendo Hern\u00e1ndez<\/span><\/strong><\/span><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc6a5a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"cc6a5a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5dbdb7\" data-id=\"e5dbdb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d5738 elementor-widget elementor-widget-image\" data-id=\"40d5738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4-1024x577.png\" class=\"attachment-large size-large wp-image-4083\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4-1024x577.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4-768x433.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4-1536x865.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-4.png 1640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2514ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2514ebd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6ebae1\" data-id=\"f6ebae1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e378cb9 elementor-widget elementor-widget-text-editor\" data-id=\"e378cb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Nowadays we increasingly use different technological tools to carry out daily activities that previously required a significant investment of time and effort.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The Internet offers a wide range of possibilities and the platforms and services that are within our reach with just a click are variable.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Every company that wants to stay relevant and competitive in the digital age must become a technology company, and the banking industry is no exception.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Digital banking is more efficient and flexible for the benefit of users, since all those long and complicated activities that usually take a long time can be carried out in a matter of minutes, although like everything related to the web, this has its risks, since, <\/span><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">digital banking could suffer some type of cyber attack that compromises our banking details and personal information.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f46e4c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"8f46e4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80ce42e\" data-id=\"80ce42e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b2d7d3 elementor-widget elementor-widget-heading\" data-id=\"7b2d7d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-small\">My digital bank<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9f5b542 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"9f5b542\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ae15a3\" data-id=\"7ae15a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d3235d elementor-widget elementor-widget-heading\" data-id=\"0d3235d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f908cd elementor-widget elementor-widget-text-editor\" data-id=\"1f908cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #333333;\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">According to the RAE, banking is defined as <\/span><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">\u201ceconomic activity of financial operations carried out through banks\u201d and as a \u201cset of banking entities<\/span><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">\u201d.<\/span> <strong><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">(RAE, s. f.)<\/span><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e25ff5 elementor-widget elementor-widget-text-editor\" data-id=\"7e25ff5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">In other words, they are all the operations that can be carried out in a bank, such as verification of account balances, transactions or movements, bill payments, money transfers, copies of statements or bank statements, among others.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d25658e elementor-widget elementor-widget-image\" data-id=\"d25658e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-5-300x251.png\" class=\"attachment-medium size-medium wp-image-4082\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-5-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-5-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-5-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-5.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca4e6f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"ca4e6f2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bbee632\" data-id=\"bbee632\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0569cae elementor-widget elementor-widget-heading\" data-id=\"0569cae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">HOW CAN MY ACCOUNT BE STEAL?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4083fb8 elementor-widget elementor-widget-text-editor\" data-id=\"4083fb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Hoy la banca ofrece una gran variedad de servicios digitales y aunque los bancos se preocupan por construir un entorno seguro no debemos olvidar que todo lo que se liga a internet puede correr alg\u00fan riesgo tecnol\u00f3gico.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2606c6c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2606c6c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-541e5a2\" data-id=\"541e5a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-110510c elementor-widget elementor-widget-heading\" data-id=\"110510c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">PHISHING attack<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c316d10 elementor-widget elementor-widget-text-editor\" data-id=\"c316d10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">It is one of the most used methods to obtain confidential data. Cybercriminals send email messages accompanied by an alarming message and a link that supposedly directs you to your bank's portal.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">This in order to capture your <\/span><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">attention and encourage you to click on the link.<\/span><\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\"><br><\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The site will ask you to enter personal banking information such as your full name, bank account, PIN or some other information. <\/span><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Token only that instead of entering your bank you will actually be sending all your information to a server controlled by the attackers. This way, they can access your bank accounts and empty them.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ffed2d elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5ffed2d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e961a68\" data-id=\"e961a68\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-85306a6 elementor-widget elementor-widget-heading\" data-id=\"85306a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">MALWARE IN THE SYSTEM<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9efdabe elementor-widget elementor-widget-text-editor\" data-id=\"9efdabe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Esta t\u00e9cnica<\/span> <span class=\"OYPEnA text-decoration-none text-strikethrough-none\">It is used to filter some type of malware to any of your devices, such as Trojans or a Keylogger, where the attacker can collect all the keystrokes you make or spy on you through the camera of your devices.<\/span> <span class=\"OYPEnA text-decoration-none text-strikethrough-none\">devices, this in order to access your bank accounts.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be9189d elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"be9189d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c2b85f6\" data-id=\"c2b85f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0aaea0e elementor-widget elementor-widget-heading\" data-id=\"0aaea0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">SECURITY FAILURES<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9326b4b elementor-widget elementor-widget-text-editor\" data-id=\"9326b4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">This happens in any application, website or device, where cybercriminals take advantage of software vulnerabilities to be able to enter the system either to steal accounts or insert some type of malware.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14c923b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"14c923b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-358582f\" data-id=\"358582f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6688d8 elementor-widget elementor-widget-heading\" data-id=\"e6688d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">ACCESS TO UNSECURE PUBLIC NETWORKS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e1c273 elementor-widget elementor-widget-text-editor\" data-id=\"4e1c273\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">The public networks that we can find in shopping centers, transportation, supermarkets or airports are not very secure, since they are being used by many users and do not have adequate protection.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f3f291 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2f3f291\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb3540f\" data-id=\"bb3540f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f833ecd elementor-widget elementor-widget-heading\" data-id=\"f833ecd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">PRACTICES TO PROTECT MY BANKING<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1636f2a elementor-widget elementor-widget-text-editor\" data-id=\"1636f2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Although we know that in the digital world it is difficult to be 100% protected against any attack, especially when dealing with important and confidential information such as bank details, there are actions that help us moderate these risks.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">For example:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-991fa28 elementor-widget elementor-widget-text-editor\" data-id=\"991fa28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Have different passwords for each of your accounts.<\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Never make a transaction or bank inquiry if you are connected to a public WiFi network.<\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Set the screen lock on any of your devices in case they are lost or stolen and they cannot access your data.<\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Adjust the number of daily transactions to proceed and the maximum amounts in each of these, thus avoiding embezzlement.<\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Download the app<\/span> <span class=\"OYPEnA text-decoration-none text-strikethrough-none\">de<\/span> <span class=\"OYPEnA text-decoration-none text-strikethrough-none\">your bank from its portal or within its facilities with the help of an executive.<\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Mant\u00e9n actualizado el sistema operativo y antivirus de tus dispositivos.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b18e63f elementor-widget elementor-widget-image\" data-id=\"b18e63f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-6-300x251.png\" class=\"attachment-medium size-medium wp-image-4081\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-6-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-6-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-6-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/Diseno-sin-titulo-6.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eab04b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5eab04b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8507ec6\" data-id=\"8507ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5699edf elementor-widget elementor-widget-heading\" data-id=\"5699edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><b>bibliographic references<\/b><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-645eb12 elementor-widget elementor-widget-text-editor\" data-id=\"645eb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">RAE. (s. f.). Definici\u00f3n banca. Diccionario Real Academia Espa\u00f1ola. Recuperado de <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/dle.rae.es\/banca\">https:\/\/dle.rae.es\/banca<\/a><\/span><\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">10 consejos para proteger tus datos en las apps bancarias. (2021, 15 diciembre). Seguro SURA Colombia. <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/segurossura.com\/co\/blog\/revista-5-sentidos\/10-consejos-para-proteger-tus-datos-en-las-apps-bancarias\/\">https:\/\/segurossura.com\/co\/blog\/revista-5-sentidos\/10-consejos-para-proteger-tus-datos-en-las-apps-bancarias\/<\/a><\/span><\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Jim\u00e9nez, J. (2022, 10 junio). Protege tus cuentas bancarias con estos consejos. Redes Zone. <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.redeszone.net\/tutoriales\/seguridad\/proteger-cuentas-bancarias-\">https:\/\/www.redeszone.net\/tutoriales\/seguridad\/proteger-cuentas-bancarias-<\/a><\/span>internet-consejos\/<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5cfb78 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d5cfb78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374443f\" data-id=\"374443f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ab2a3 elementor-widget elementor-widget-image\" data-id=\"27ab2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png\" class=\"attachment-large size-large wp-image-3605\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-768x432.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1536x864.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312df40 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"312df40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b03bc27\" data-id=\"b03bc27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d4acee elementor-shape-circle elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"5d4acee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-7974e07\" href=\"https:\/\/www.facebook.com\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-3faa0ff\" href=\"https:\/\/www.linkedin.com\/company\/red-por-la-ciberseguridad\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-f3c2677\" href=\"https:\/\/www.youtube.com\/@redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-youtube\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitch elementor-repeater-item-5ad851c\" href=\"https:\/\/www.twitch.tv\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitch<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitch\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00bfC\u00f3mo proteger mi banca? Por: Isabely Mendo Hern\u00e1ndez En la actualidad utilizamos cada vez m\u00e1s las distintas herramientas tecnol\u00f3gicas para realizar actividades cotidianas que antes requer\u00edan de una inversi\u00f3n de tiempo y esfuerzo importante. \u00a0 El internet ofrece un abanico amplio de posibilidades y son variables las plataformas y servicios que est\u00e1n a nuestro alcance<\/p>","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[22],"tags":[],"class_list":["post-4079","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=4079"}],"version-history":[{"count":3,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4079\/revisions"}],"predecessor-version":[{"id":6808,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4079\/revisions\/6808"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=4079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=4079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=4079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}