{"id":33430,"date":"2023-09-21T06:00:00","date_gmt":"2023-09-21T04:00:00","guid":{"rendered":"https:\/\/entelgy.com\/asi-se-realiza-una-suplantacion-de-identidad-para-hacerse-con-tu-nomina\/"},"modified":"2024-11-19T22:41:57","modified_gmt":"2024-11-19T21:41:57","slug":"asi-se-realiza-una-suplantacion-de-identidad-para-hacerse-con-tu-nomina","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/actualidad-es\/asi-se-realiza-una-suplantacion-de-identidad-para-hacerse-con-tu-nomina\/","title":{"rendered":"As\u00ed se realiza una suplantaci\u00f3n de identidad para hacerse con tu n\u00f3mina"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\" size-full wp-image-33429\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2023\/09\/77b60186e1ca2f7f2a7edea7556fa898.jpg\" alt=\"\" width=\"900\" height=\"506\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2023\/09\/77b60186e1ca2f7f2a7edea7556fa898.jpg 900w, https:\/\/entelgy.com\/wp-content\/uploads\/2023\/09\/77b60186e1ca2f7f2a7edea7556fa898-300x169.jpg 300w, https:\/\/entelgy.com\/wp-content\/uploads\/2023\/09\/77b60186e1ca2f7f2a7edea7556fa898-768x432.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>The Firewall Mindset, la soluci\u00f3n de concienciaci\u00f3n en ciberseguridad de Entelgy, nos muestra c\u00f3mo se realiza un ciberataque basado en la suplantaci\u00f3n de identidad para hacerse con la n\u00f3mina de una persona.<\/p>\n<p><!--more--><\/p>\n<p>Tal y como el equipo de The Firewall Mindset nos relata: \u201cHace unas semanas, una de nuestra ciberagentes, Laura, de la FMA (Firewall Mindset Agency) sufri\u00f3 un intento de ciberataque. Gracias a que la compa\u00f1era de administraci\u00f3n, Carmen (y tambi\u00e9n ciberagente) aplic\u00f3 su OPDA (Observa, Piensa, Decide y Act\u00faa) a tiempo, pudo evitarse que la econom\u00eda de Laura se viera afectada.<\/p>\n<p>Para saber m\u00e1s mira el siguiente v\u00eddeo:<\/p>\n<div class=\"k2_video\">\n<div class=\"ast-oembed-container \" style=\"height: 100%;\"><iframe title=\"\u00bfC\u00f3mo identificar la suplantaci\u00f3n de identidad en un ciberataque?\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/pvMtDDlH_Gk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Firewall Mindset, la soluci\u00f3n de concienciaci\u00f3n en ciberseguridad de Entelgy, nos muestra c\u00f3mo se realiza un ciberataque basado en [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":33429,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,119],"tags":[4687,4917,7064],"class_list":["post-33430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-articulos-es","tag-entelgy-es","tag-firewall-mindset-es","tag-suplantacion-identidad-nomina-es"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/33430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=33430"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/33430\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/33429"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=33430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=33430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=33430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}