{"id":76248,"date":"2025-09-16T08:00:00","date_gmt":"2025-09-16T06:00:00","guid":{"rendered":"https:\/\/entelgy.com\/?p=76248"},"modified":"2026-02-23T11:58:25","modified_gmt":"2026-02-23T10:58:25","slug":"entelgy-security-america-destaca-en-los-medios-su-conocimiento-frente-al-qrishing-y-vishing","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/actualidad-es\/entelgy-security-america-destaca-en-los-medios-su-conocimiento-frente-al-qrishing-y-vishing\/","title":{"rendered":"Entelgy Security Am\u00e9rica destaca en los medios su conocimiento frente al QRishing y Vishing\u00a0"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>La experiencia en ciberseguridad de Entelgy en Per\u00fa ha sido reconocida recientemente por medios de comunicaci\u00f3n como La Rep\u00fablica y Latina Noticias, que entrevistaron a Roger Men\u00e9ndez,&nbsp;Gerente de Operaciones y Ciberseguridad, para analizar dos amenazas que crecen con rapidez: el QRishing y el Vishing.<\/strong>&nbsp;<\/h4>\n\n\n\n<p>El <strong>QRishing<\/strong>, como explic\u00f3 Roger en <a href=\"https:\/\/larepublica.pe\/sociedad\/2025\/08\/18\/expertos-en-bioseguridad-advierten-sobre-nueva-modalidad-de-estafa-a-traves-de-codigos-qr-esta-creciendo-por-las-billeteras-digitales-evat-ntpe-897264\" target=\"_blank\" rel=\"noreferrer noopener\">La Rep\u00fablica<\/a>, consiste en el uso de c\u00f3digos QR falsos que redirigen a los usuarios hacia p\u00e1ginas fraudulentas que simulan ser portales bancarios o comercios online. Este tipo de ataque aprovecha el crecimiento del uso de billeteras digitales como Yape o Plin y representa una evoluci\u00f3n preocupante del phishing tradicional. Frente a este panorama, en Entelgy Per\u00fa subrayamos la necesidad de reforzar la educaci\u00f3n digital y la prevenci\u00f3n para proteger tanto a empresas como a ciudadanos.&nbsp;<\/p>\n\n\n\n<p>Pero a\u00fan hay mucho m\u00e1s: en una segunda entrevista publicada en La Rep\u00fablica&nbsp; y ampliada en Latina Noticias, se abord\u00f3 el incremento de casos de <strong>Vishing<\/strong>, una t\u00e9cnica de fraude telef\u00f3nico que utiliza la llamada como anzuelo. Los atacantes se hacen pasar por personal de bancos o empresas de telecomunicaciones para obtener datos sensibles o inducir la instalaci\u00f3n de software malicioso. Ante esta amenaza, desde Entelgy promovemos medidas clave como verificar siempre por canales oficiales, evitar compartir c\u00f3digos o contrase\u00f1as, y activar la autenticaci\u00f3n multifactor.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container \" style=\"height: 100%;\"><iframe title=\"Entelgy Security Am\u00e9rica | Vishing: la llamada es el gancho, tus datos el objetivo\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/lMy-YnFXVW8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<p>El equipo de Entelgy en Per\u00fa muestran un enorme conocimiento en tecnolog\u00eda de vanguardia, poniendo el foco en la concienciaci\u00f3n y la cultura preventiva, pilares esenciales para reducir el impacto del cibercrimen.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La experiencia en ciberseguridad de Entelgy en Per\u00fa ha sido reconocida recientemente por medios de comunicaci\u00f3n como La Rep\u00fablica y [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":76249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40,8331],"tags":[4857,4097],"class_list":["post-76248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad-es","category-entelgy-security-america","tag-entelgy-en-peru-es","tag-entelgy-security-america"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/76248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=76248"}],"version-history":[{"count":1,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/76248\/revisions"}],"predecessor-version":[{"id":76253,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/76248\/revisions\/76253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/76249"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=76248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=76248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=76248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}