{"id":21,"date":"2021-09-07T12:35:28","date_gmt":"2021-09-07T12:35:28","guid":{"rendered":"https:\/\/protegetuinformacion.com\/?page_id=21"},"modified":"2021-10-19T14:45:08","modified_gmt":"2021-10-19T14:45:08","slug":"tu-seguridad-en-internet","status":"publish","type":"page","link":"https:\/\/protegetuinformacion.com\/index.php\/te-interesa-saber\/tu-seguridad-en-internet\/","title":{"rendered":"Tu seguridad en Internet"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-container-2 wp-block-query\"><ul class=\"wp-container-1 is-flex-container columns-3 wp-block-post-template\"><li class=\"wp-block-post post-568 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-movil tag-seguridad tag-videojuegos entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/videojuegos-menores\/\" target=\"_self\" rel=\"\">Videojuegos &#8211; Menores<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/videojuegos-menores\/\"><img width=\"1920\" height=\"1277\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/game-console-g275701250_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Videojuegos &#8211; Menores\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/game-console-g275701250_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/game-console-g275701250_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/game-console-g275701250_1920-1024x681.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/game-console-g275701250_1920-768x511.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/game-console-g275701250_1920-1536x1022.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Una de las cosas m\u00e1s divertidas de los ordenadores son los videojuegos. Los hay de todos los tipos: De coches, de f\u00fatbol, militares, de plataformas\u2026 Si juegas s\u00f3lo un rato &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/videojuegos-menores\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T17:20:18+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-565 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-publicidad tag-redes-sociales tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/poner-un-anuncio-en-internet-adolescentes\/\" target=\"_self\" rel=\"\">Poner un anuncio en Internet &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/poner-un-anuncio-en-internet-adolescentes\/\"><img width=\"1920\" height=\"1203\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-g120090505_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Poner un anuncio en Internet &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-g120090505_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-g120090505_1920-300x188.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-g120090505_1920-1024x642.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-g120090505_1920-768x481.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-g120090505_1920-1536x962.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La cantidad de informaci\u00f3n que recibimos durante la navegaci\u00f3n por la Red es enorme. Por ello, es importante saber utilizar las herramientas que Internet nos ofrece para anunciar nuestros productos. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/poner-un-anuncio-en-internet-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T17:03:36+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-562 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-pendrive tag-portatil tag-redes-sociales tag-seguridad tag-usb entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/pendrives-y-discos-externos-memorias-usb-adolescentes\/\" target=\"_self\" rel=\"\">Pendrives y discos externos, memorias USB&#8230; &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/pendrives-y-discos-externos-memorias-usb-adolescentes\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/usb-g5be743fc9_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Pendrives y discos externos, memorias USB&#8230; &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/usb-g5be743fc9_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/usb-g5be743fc9_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/usb-g5be743fc9_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/usb-g5be743fc9_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/usb-g5be743fc9_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Hay ocasiones en las que necesitamos hacer uso de nuestros datos en diferentes ubicaciones y no contamos con acceso a nuestro ordenador o bien queremos facilitar acceso a un documento &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/pendrives-y-discos-externos-memorias-usb-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:57:14+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-559 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-ordenador tag-pc tag-portatil-2 tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/ordenadores-portatiles-adolescentes\/\" target=\"_self\" rel=\"\">Ordenadores port\u00e1tiles &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/ordenadores-portatiles-adolescentes\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/computer-g7bc8be2ca_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Ordenadores port\u00e1tiles &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/computer-g7bc8be2ca_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/computer-g7bc8be2ca_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/computer-g7bc8be2ca_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/computer-g7bc8be2ca_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/computer-g7bc8be2ca_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Gracias a ellos no estamos atados a nuestro hogar a la hora de finalizar un trabajo. Podemos llevarlo a nuestro parque preferido en el que hay cobertura WIFI para navegar &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/ordenadores-portatiles-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:55:04+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-556 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-adsl tag-ciberseguridad tag-internet tag-navegacion tag-peligros tag-seguridad tag-url entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/navegar-por-internet-adolescentes\/\" target=\"_self\" rel=\"\">Navegar por Internet &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/navegar-por-internet-adolescentes\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/security-gd47b23f62_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Navegar por Internet &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/security-gd47b23f62_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/security-gd47b23f62_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/security-gd47b23f62_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/security-gd47b23f62_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/security-gd47b23f62_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Internet ha supuesto la gran revoluci\u00f3n de los \u00faltimos tiempos, es el m\u00e9todo m\u00e1s complejo y eficaz jam\u00e1s creado para compartir todo tipo de informaci\u00f3n; sin embargo, no todos los &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/navegar-por-internet-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:53:07+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-553 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-musica tag-peliculas tag-redes-sociales tag-seguridad tag-spotify entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/musica-y-pelis-en-internet-menores\/\" target=\"_self\" rel=\"\">M\u00fasica y pelis en Internet &#8211; Menores<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/musica-y-pelis-en-internet-menores\/\"><img width=\"1920\" height=\"1272\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-gd6cfb4b7d_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"M\u00fasica y pelis en Internet &#8211; Menores\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-gd6cfb4b7d_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-gd6cfb4b7d_1920-300x199.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-gd6cfb4b7d_1920-1024x678.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-gd6cfb4b7d_1920-768x509.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-gd6cfb4b7d_1920-1536x1018.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">En Internet puedes encontrar de todo, tambi\u00e9n m\u00fasica, pel\u00edculas, libros, videojuegos\u2026 Ahora bien, si decides descargar archivos a tu ordenador, \u00a1debes tener mucho cuidado! Descargas ilegales En primer lugar, debes &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/musica-y-pelis-en-internet-menores\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:50:08+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-550 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-movil tag-redes-sociales tag-seguridad tag-sexting tag-telefono-movil entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/cuidado-con-el-movil-menores\/\" target=\"_self\" rel=\"\">\u00a1Cuidado con el m\u00f3vil! &#8211; Menores<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/cuidado-con-el-movil-menores\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/phone-gd939f9dca_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\u00a1Cuidado con el m\u00f3vil! &#8211; Menores\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/phone-gd939f9dca_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/phone-gd939f9dca_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/phone-gd939f9dca_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/phone-gd939f9dca_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/phone-gd939f9dca_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A lo mejor tus padres te han comprado un tel\u00e9fono m\u00f3vil. Son geniales, \u00bfverdad? Adem\u00e1s, cada vez hacen m\u00e1s cosas: Sacan fotos, se conectan a Internet, tienen videojuegos\u2026 \u00a1Pero como &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/cuidado-con-el-movil-menores\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:47:33+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-547 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-menores tag-movil tag-proteccion tag-redes-sociales tag-rrss tag-seguridad tag-sociedad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/problematica-especifica-relacionada-con-menores\/\" target=\"_self\" rel=\"\">Problem\u00e1tica espec\u00edfica relacionada con menores<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/problematica-especifica-relacionada-con-menores\/\"><img width=\"1920\" height=\"1200\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/girl-ge0ffc9e4e_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Problem\u00e1tica espec\u00edfica relacionada con menores\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/girl-ge0ffc9e4e_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/girl-ge0ffc9e4e_1920-300x188.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/girl-ge0ffc9e4e_1920-1024x640.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/girl-ge0ffc9e4e_1920-768x480.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/girl-ge0ffc9e4e_1920-1536x960.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La utilizaci\u00f3n que los menores hacen de Internet, en general, y de las redes sociales, en particular, como \u201cnativos\u201d digitales supone un reto para toda la Sociedad, pero en especial &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/problematica-especifica-relacionada-con-menores\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:31:14+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-544 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-antivirus tag-ciberseguridad tag-ordenador tag-pc tag-seguridad tag-troyano tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/los-ordenadores-menores\/\" target=\"_self\" rel=\"\">Los ordenadores &#8211; Menores<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/los-ordenadores-menores\/\"><img width=\"1920\" height=\"1275\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/child-g684820dac_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Los ordenadores &#8211; Menores\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/child-g684820dac_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/child-g684820dac_1920-300x199.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/child-g684820dac_1920-1024x680.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/child-g684820dac_1920-768x510.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/child-g684820dac_1920-1536x1020.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Los ordenadores son unas m\u00e1quinas estupendas, con las que puedes hacer un mont\u00f3n de cosas: Aprender, hacer trabajos para el cole, jugar, comunicarte con tus amigos, escuchar m\u00fasica, ver pel\u00edculas\u2026 &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/los-ordenadores-menores\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T16:24:07+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-540 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet category-uncategorized tag-ciberseguridad tag-informacion tag-seguridad tag-telefono-movil entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-telefono-movil-adolescentes\/\" target=\"_self\" rel=\"\">El tel\u00e9fono m\u00f3vil &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-telefono-movil-adolescentes\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-g03a81046c_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El tel\u00e9fono m\u00f3vil &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-g03a81046c_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-g03a81046c_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-g03a81046c_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-g03a81046c_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/smartphone-g03a81046c_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Aunque seguimos denominando tel\u00e9fono a ese peque\u00f1o dispositivo, cada vez m\u00e1s son complejos sistemas multifuncionales con los que podemos hacer fotograf\u00edas, escuchar m\u00fasica o la radio o navegar por Internet. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-telefono-movil-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T15:48:04+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-537 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-dni tag-dni-electronico tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-dni-e-adolescentes\/\" target=\"_self\" rel=\"\">El DNI-e &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-dni-e-adolescentes\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/hacking-gf4dc75461_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El DNI-e &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/hacking-gf4dc75461_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/hacking-gf4dc75461_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/hacking-gf4dc75461_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/hacking-gf4dc75461_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/hacking-gf4dc75461_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Con la evoluci\u00f3n de las nuevas tecnolog\u00edas los m\u00e9todos de identificaci\u00f3n deben seguir el mismo ritmo. El Documento Nacional de Identidad (DNI) es el documenta que acredita hace m\u00e1s de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-dni-e-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T15:20:23+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-533 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-adolescentes tag-correo-electronico tag-email tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-correo-electronico-adolescentes%ef%bf%bc\/\" target=\"_self\" rel=\"\">El correo electr\u00f3nico &#8211; Adolescentes\ufffc<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-correo-electronico-adolescentes%ef%bf%bc\/\"><img width=\"1920\" height=\"1203\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/finger-gef559418b_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El correo electr\u00f3nico &#8211; Adolescentes\ufffc\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/finger-gef559418b_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/finger-gef559418b_1920-300x188.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/finger-gef559418b_1920-1024x642.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/finger-gef559418b_1920-768x481.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/finger-gef559418b_1920-1536x962.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El correo electr\u00f3nico es una herramienta indispensable para el uso personal y profesional en el d\u00eda a d\u00eda de los internautas. Por eso es necesario conocer todas sus ventajas y &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/el-correo-electronico-adolescentes%ef%bf%bc\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T15:07:22+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-530 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-copia-de-seguridad tag-informacion tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/copias-de-seguridad-adolescentes\/\" target=\"_self\" rel=\"\">Copias de seguridad &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/copias-de-seguridad-adolescentes\/\"><img width=\"1920\" height=\"997\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-gb93af035b_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Copias de seguridad &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-gb93af035b_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-gb93af035b_1920-300x156.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-gb93af035b_1920-1024x532.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-gb93af035b_1920-768x399.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/10\/internet-gb93af035b_1920-1536x798.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">\u201c\u00a1Argh! El disco de mi ordenador se ha roto y tengo que entregar un trabajo en clase que s\u00f3lo ten\u00eda en el disco duro\u201d. Quiz\u00e1 esta sea una de las &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/10\/03\/copias-de-seguridad-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-10-03T15:03:22+00:00\">octubre 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-519 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/videojuegos-en-linea\/\" target=\"_self\" rel=\"\">Videojuegos en l\u00ednea<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/videojuegos-en-linea\/\"><img width=\"1200\" height=\"499\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/video-juegos-en-linea.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Videojuegos en l\u00ednea\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/video-juegos-en-linea.jpg 1200w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/video-juegos-en-linea-300x125.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/video-juegos-en-linea-1024x426.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/video-juegos-en-linea-768x319.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Los videojuegos en l\u00ednea son el cl\u00edmax del entretenimiento en comunidad. Con posibilidades sorprendentes en mundos virtuales pero con peligros reales.\u00a0 Los videojuegos en l\u00ednea son la forma definitiva de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/videojuegos-en-linea\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-28T07:05:49+00:00\">septiembre 28, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-516 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/uso-del-bluetooth-en-el-telefono-2\/\" target=\"_self\" rel=\"\">Uso del bluetooth en el tel\u00e9fono<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/uso-del-bluetooth-en-el-telefono-2\/\"><img width=\"1200\" height=\"849\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Uso del bluetooth en el tel\u00e9fono\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth.jpg 1200w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-300x212.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-1024x724.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-768x543.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El bluetooth ha permitido dotar de dispositivos externos a nuestro peque\u00f1o ordenador de bolsillo, el tel\u00e9fono m\u00f3vil, adem\u00e1s de facilitar el intercambio de informaci\u00f3n digital entre diferentes terminales.\u00a0 Con la &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/uso-del-bluetooth-en-el-telefono-2\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-28T06:59:22+00:00\">septiembre 28, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-511 post type-post status-publish format-standard has-post-thumbnail hentry category-como-actuar category-educacion-menores category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/el-uso-del-ordenador-adolescentes\/\" target=\"_self\" rel=\"\">El uso del ordenador &#8211; Adolescentes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/el-uso-del-ordenador-adolescentes\/\"><img width=\"900\" height=\"895\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/menores-ordenador-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El uso del ordenador &#8211; Adolescentes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/menores-ordenador-1.jpg 900w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/menores-ordenador-1-300x298.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/menores-ordenador-1-150x150.jpg 150w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/menores-ordenador-1-768x764.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El ordenador es la puerta a un mundo de amistades y entretenimiento, pero tambi\u00e9n una compleja herramienta que precisa estar afinada y engrasada. \u00bfTe imaginas lo que ser\u00eda tener la &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/28\/el-uso-del-ordenador-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-28T06:48:16+00:00\">septiembre 28, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-496 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-entretenimiento tag-internet tag-juego entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/26\/internet-como-entretenimiento\/\" target=\"_self\" rel=\"\">Internet como entretenimiento<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/26\/internet-como-entretenimiento\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/pexels-alexander-kovalev-3977908-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Internet como entretenimiento\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/pexels-alexander-kovalev-3977908-1.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/pexels-alexander-kovalev-3977908-1-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/pexels-alexander-kovalev-3977908-1-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/pexels-alexander-kovalev-3977908-1-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">\u00bfCu\u00e1ndo fue la \u00faltima vez que viste ni\u00f1os jugando solos en la calle? La tendencia actual a tener los ni\u00f1os vigilados siempre les lleva a pasar mucho tiempo en casa. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/26\/internet-como-entretenimiento\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-26T12:43:48+00:00\">septiembre 26, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-489 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-cifrado tag-correo-electronico tag-informacion tag-ong tag-ordenador tag-redes tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-ong\/\" target=\"_self\" rel=\"\">Consejos ONG<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-ong\/\"><img width=\"2400\" height=\"1600\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejos ONG\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1.jpg 2400w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/headway-5QgIuuBxKwM-unsplash-1-2048x1365.jpg 2048w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las copias de seguridad son imprescindibles, una de las pocas garant\u00edas que podemos tener sobre la fiabilidad de nuestros datos. Debemos realizarlas de forma sistem\u00e1tica y, a ser posible, en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-ong\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T11:48:06+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-486 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-contrasena tag-correos tag-empresa tag-informacion tag-ordenador tag-seguridad tag-sistema-operativo tag-software entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-para-pymes-y-autonomos\/\" target=\"_self\" rel=\"\">Consejos para Pymes y aut\u00f3nomos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-para-pymes-y-autonomos\/\"><img width=\"2560\" height=\"1707\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejos para Pymes y aut\u00f3nomos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/john-schnobrich-FlPc9_VocJ4-unsplash-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">En una buena pol\u00edtica de seguridad, es imprescindible definir bien las responsabilidades. Cuando escribimos una pol\u00edtica de seguridad para nuestra organizaci\u00f3n es fundamental establecer las responsabilidades de cada una de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-para-pymes-y-autonomos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T11:44:23+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-483 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-consejos tag-informacion tag-ordenador tag-proteccion tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-para-trabajadores-y-trabajadoras-por-cuenta-ajena\/\" target=\"_self\" rel=\"\">Consejos para trabajadores y trabajadoras por cuenta ajena<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-para-trabajadores-y-trabajadoras-por-cuenta-ajena\/\"><img width=\"2560\" height=\"1920\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejos para trabajadores y trabajadoras por cuenta ajena\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-300x225.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-1024x768.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-768x576.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-1536x1152.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/regularguy-eth-eNxYF6cexYU-unsplash-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">No dejes papeles con informaci\u00f3n confidencial en tu escritorio o sitios que puedan ser p\u00fablicos o f\u00e1cilmente accesibles desde cualquier sistema de la organizaci\u00f3n o del exterior. No sabes qui\u00e9n &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/consejos-para-trabajadores-y-trabajadoras-por-cuenta-ajena\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T11:40:01+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-480 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-antivirus tag-fraude tag-informacion tag-internet tag-mail tag-mayores tag-proteccion tag-seguridad tag-software entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/ensena-a-los-mayores-a-navegar-seguros-en-internet\/\" target=\"_self\" rel=\"\">Ense\u00f1a a los mayores a navegar seguros en internet<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/ensena-a-los-mayores-a-navegar-seguros-en-internet\/\"><img width=\"2400\" height=\"1643\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Ense\u00f1a a los mayores a navegar seguros en internet\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1.jpg 2400w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1-300x205.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1-1024x701.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1-768x526.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1-1536x1052.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/beth-macdonald-V2edkaIdMP4-unsplash-1-2048x1402.jpg 2048w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Fomentar el uso de las nuevas tecnolog\u00edas por parte de las personas mayores y que lo hagan con seguridad, tranquilidad y sin complejos es el objetivo de Protege tu informaci\u00f3n. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/ensena-a-los-mayores-a-navegar-seguros-en-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T11:32:43+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-477 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-confidencialidad tag-datos tag-ong tag-proteccion tag-terceros entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/para-ong-con-actividades-politicas\/\" target=\"_self\" rel=\"\">Para ONG con actividades pol\u00edticas<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/para-ong-con-actividades-politicas\/\"><img width=\"2560\" height=\"1708\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Para ONG con actividades pol\u00edticas\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-1536x1025.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1-2048x1367.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El caso concreto de organizaciones con actividades pol\u00edticas plantea una serie de complejidades y riesgos que implican el uso de tecnolog\u00edas o t\u00e9cnicas de protecci\u00f3n de la informaci\u00f3n bastante elaboradas. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/para-ong-con-actividades-politicas\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T11:28:22+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-474 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-cifrado tag-confidencialidad tag-datos tag-informacion tag-ong tag-sistema-operativo entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/para-ong-con-actividades-sensibles\/\" target=\"_self\" rel=\"\">Para ONG con actividades sensibles<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/para-ong-con-actividades-sensibles\/\"><img width=\"2400\" height=\"1600\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Para ONG con actividades sensibles\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1.jpg 2400w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/markus-spiske-Skf7HxARcoc-unsplash-1-2048x1365.jpg 2048w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las ONG que desarrollen actividades sensibles o que traten datos que deban considerarse como tales, deben considerar como requisito, el cifrado de la informaci\u00f3n. En este caso, no como mecanismo &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/para-ong-con-actividades-sensibles\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T10:00:48+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-471 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-confidencialidad tag-ong tag-privacidad tag-proteccion tag-seguridad tag-sistema-operativo entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/privacidad-y-confidencialidad\/\" target=\"_self\" rel=\"\">Privacidad y confidencialidad<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/privacidad-y-confidencialidad\/\"><img width=\"2400\" height=\"1597\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Privacidad y confidencialidad\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2.jpg 2400w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2-1024x681.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2-768x511.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2-1536x1022.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/clint-patterson-yGPxCYPS8H4-unsplash-2-2048x1363.jpg 2048w\" sizes=\"(max-width: 2400px) 100vw, 2400px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Para determinadas ONG, los conceptos de privacidad y confidencialidad se vuelven especialmente importantes, desde el momento en que tratan problemas pol\u00edticos, tratan con enfermos o prestan labores de ayuda en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/privacidad-y-confidencialidad\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T09:57:04+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-468 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-informacion tag-internet tag-politica-de-seguridad tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/que-es-una-politica-de-seguridad-y-como-me-afecta\/\" target=\"_self\" rel=\"\">\u00bfQu\u00e9 es una pol\u00edtica de seguridad y c\u00f3mo me afecta?<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/que-es-una-politica-de-seguridad-y-como-me-afecta\/\"><img width=\"1280\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/sign-g54af64a2c_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\u00bfQu\u00e9 es una pol\u00edtica de seguridad y c\u00f3mo me afecta?\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/sign-g54af64a2c_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/sign-g54af64a2c_1280-300x300.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/sign-g54af64a2c_1280-1024x1024.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/sign-g54af64a2c_1280-150x150.png 150w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/sign-g54af64a2c_1280-768x768.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las pol\u00edticas y normas son el instrumento que adopta la empresa para definir las reglas de comportamiento aceptables. La seguridad de la informaci\u00f3n y el modo de tratarla no es &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/23\/que-es-una-politica-de-seguridad-y-como-me-afecta\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-23T09:50:47+00:00\">septiembre 23, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-461 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-ong tag-proteccion-de-datos tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/gestion-de-los-datos-personales-por-parte-de-las-ong\/\" target=\"_self\" rel=\"\">Gesti\u00f3n de los datos personales por parte de las ONG<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/gestion-de-los-datos-personales-por-parte-de-las-ong\/\"><img width=\"626\" height=\"313\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ONG-proteccion-de-datos.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Gesti\u00f3n de los datos personales por parte de las ONG\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ONG-proteccion-de-datos.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ONG-proteccion-de-datos-300x150.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las ONG pueden ser puntos de acumulaci\u00f3n de datos personales de muchas personas. Hemos de tener cuidado en el uso y almacenamiento de \u00e9stos. Es especialmente importante dedicar un apartado, &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/gestion-de-los-datos-personales-por-parte-de-las-ong\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T12:03:06+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-458 post type-post status-publish format-standard has-post-thumbnail hentry category-como-actuar category-tu-seguridad-internet tag-ciberseguridad tag-cifrado tag-internet tag-ong tag-seguridad tag-truecrypt entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/ong-en-paises-y-zonas-de-conflicto\/\" target=\"_self\" rel=\"\">ONG en pa\u00edses y zonas de conflicto<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/ong-en-paises-y-zonas-de-conflicto\/\"><img width=\"626\" height=\"442\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ong.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"ONG en pa\u00edses y zonas de conflicto\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ong.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ong-300x212.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cuando una ONG desarrolla labores en zonas de conflicto o en zonas de guerra, tiene que cuidar con mucha atenci\u00f3n los detalles de la informaci\u00f3n que viaja en equipos port\u00e1tiles. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/ong-en-paises-y-zonas-de-conflicto\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T11:53:52+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-455 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-internet tag-movil tag-seguridad tag-smartphone entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-trabajo-con-dispositivos-moviles\/\" target=\"_self\" rel=\"\">El trabajo con dispositivos m\u00f3viles<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-trabajo-con-dispositivos-moviles\/\"><img width=\"626\" height=\"417\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/smartphone.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El trabajo con dispositivos m\u00f3viles\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/smartphone.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/smartphone-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cada d\u00eda es m\u00e1s frecuente el uso de equipos m\u00f3viles tipo smartphones o PDAs. Estos dispositivos por sus caracter\u00edsticas son susceptibles de robo y otras amenazas que pueden poner en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-trabajo-con-dispositivos-moviles\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T11:48:13+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-452 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-consejos tag-fotografias tag-informacion tag-movil tag-redes-sociales entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/consejo-uso-de-redes-sociales\/\" target=\"_self\" rel=\"\">Consejo &#8211; Uso de Redes Sociales<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/consejo-uso-de-redes-sociales\/\"><img width=\"626\" height=\"417\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/redes-sociales.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejo &#8211; Uso de Redes Sociales\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/redes-sociales.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/redes-sociales-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Entienda el funcionamiento de la red social y las normas de privacidad que aplica: No todas las redes son iguales Antes de crearnos un perfil en una red social, hemos &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/consejo-uso-de-redes-sociales\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T11:42:40+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-449 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-malware tag-robo-de-credenciales tag-seguridad tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/gestiones-desde-lugares-publicos\/\" target=\"_self\" rel=\"\">Gestiones desde lugares p\u00fablicos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/gestiones-desde-lugares-publicos\/\"><img width=\"626\" height=\"478\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/robo-de-credenciales.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Gestiones desde lugares p\u00fablicos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/robo-de-credenciales.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/robo-de-credenciales-300x229.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cuando nos encontramos de viaje o necesitamos acceder a nuestra entidad financiera de forma urgente, utilizamos ordenadores p\u00fablicos o de otras personas. \u00bfEs seguro? Por muchas precauciones que tomemos para &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/gestiones-desde-lugares-publicos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T11:30:02+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-446 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-buenas-practicas tag-correo-electronico tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-factor-humano\/\" target=\"_self\" rel=\"\">El factor humano<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-factor-humano\/\"><img width=\"626\" height=\"354\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/factor-humano.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El factor humano\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/factor-humano.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/factor-humano-300x170.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">\u00bfAlguna vez te has preguntado si puedes confiar en todos tus empleados? Muchos trabajadores que conocen la importancia de nuestra organizaci\u00f3n saben perfectamente donde pueden hacernos m\u00e1s da\u00f1o. \u00bfQu\u00e9 pasar\u00eda &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-factor-humano\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T11:23:58+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-432 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-phising tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/una-plataforma-que-ensena-a-comprar-en-internet-con-seguridad\/\" target=\"_self\" rel=\"\">Una plataforma que ense\u00f1a a comprar en internet con seguridad<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/una-plataforma-que-ensena-a-comprar-en-internet-con-seguridad\/\"><img width=\"1363\" height=\"655\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ISMS.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Una plataforma que ense\u00f1a a comprar en internet con seguridad\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ISMS.png 1363w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ISMS-300x144.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ISMS-1024x492.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/ISMS-768x369.png 768w\" sizes=\"(max-width: 1363px) 100vw, 1363px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Este portal ense\u00f1a a los internautas a realizar\u00a0 transacciones econ\u00f3micas aplicando las mejores pr\u00e1cticas en materia de seguridad. La Web incorpora consejos para evitar diversos tipos de estrategias fraudulentas como &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/una-plataforma-que-ensena-a-comprar-en-internet-con-seguridad\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T10:49:06+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-429 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-banca-online tag-cajero tag-pin tag-tarjetas-de-credito entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-cajero-automatico-2\/\" target=\"_self\" rel=\"\">El cajero autom\u00e1tico<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-cajero-automatico-2\/\"><img width=\"626\" height=\"417\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/cajero-automatico.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El cajero autom\u00e1tico\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/cajero-automatico.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/cajero-automatico-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El cajero autom\u00e1tico es un elemento de uso cotidiano que tiene diversas implicaciones desde el punto de vista de seguridad. Aunque los cajeros autom\u00e1ticos no encajar\u00edan, de forma estricta, en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/el-cajero-automatico-2\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T10:39:52+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-426 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-brecha tag-comercio-electronico tag-informacion tag-legislacion tag-redes-sociales tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/la-falta-de-seguridad-coarta-el-uso-de-internet-en-espana\/\" target=\"_self\" rel=\"\">La falta de seguridad coarta el uso de internet en Espa\u00f1a<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/la-falta-de-seguridad-coarta-el-uso-de-internet-en-espana\/\"><img width=\"626\" height=\"417\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/concepto-infodemic-dispositivo_23-2148751262.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"La falta de seguridad coarta el uso de internet en Espa\u00f1a\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/concepto-infodemic-dispositivo_23-2148751262.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/concepto-infodemic-dispositivo_23-2148751262-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Aumenta la percepci\u00f3n del comercio electr\u00f3nico como medio inseguro para realizar compras. El 85% de los menores no es capaz de dar respuesta ante una situaci\u00f3n de riesgo en Internet. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/la-falta-de-seguridad-coarta-el-uso-de-internet-en-espana\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T10:16:41+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-422 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-back-up tag-copias-de-seguridad tag-ordenadores tag-redes-sociales tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/consejos-uso-de-internet\/\" target=\"_self\" rel=\"\">Consejos &#8211; uso de internet<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/consejos-uso-de-internet\/\"><img width=\"626\" height=\"251\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/consejos-bloque-adulto.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejos &#8211; uso de internet\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/consejos-bloque-adulto.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/consejos-bloque-adulto-300x120.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Usa siempre el sentido com\u00fan. Tu sentido com\u00fan es la mejor arma que tienes para defenderte de las situaciones que no conoces. Si te encuentras con una situaci\u00f3n tecnol\u00f3gica desconocida, &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/consejos-uso-de-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T09:45:44+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-419 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-autonomo tag-pyme tag-seguridad tag-seguridad-de-la-informacion tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/pymes-y-autonomos\/\" target=\"_self\" rel=\"\">Pymes y aut\u00f3nomos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/pymes-y-autonomos\/\"><img width=\"626\" height=\"318\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/PYMES1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Pymes y aut\u00f3nomos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/PYMES1.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/PYMES1-300x152.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La importancia de las PYMES y aut\u00f3nomos en la econom\u00eda espa\u00f1ola est\u00e1 fuera de toda duda. As\u00ed ha quedado plasmado en multitud de informes, noticias y estudios. El avance de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/pymes-y-autonomos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T09:23:30+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-416 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-antivirus tag-buenas-practicas-2 tag-ciberseguridad tag-internet tag-ordenador tag-pc tag-portatil tag-virus tag-web entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/uso-del-ordenador\/\" target=\"_self\" rel=\"\">Uso del ordenador<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/uso-del-ordenador\/\"><img width=\"626\" height=\"418\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/uso-de-ordenador.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Uso del ordenador\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/uso-de-ordenador.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/uso-de-ordenador-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El ordenador es una de las herramientas m\u00e1s potentes de las que disponemos. Precisamente por ello, debemos conocer sus posibilidades y limitaciones y, para nuestra tranquilidad, debemos aplicar unas medidas &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/uso-del-ordenador\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T09:16:00+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-412 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-banca tag-phising entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/acceso-a-banca-por-internet\/\" target=\"_self\" rel=\"\">Acceso a banca por Internet<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/acceso-a-banca-por-internet\/\"><img width=\"626\" height=\"417\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/banca-online.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Acceso a banca por Internet\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/banca-online.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/banca-online-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El acceso a la banca es una de las operaciones m\u00e1s comunes en Internet, ya seamos aut\u00f3nomos, una peque\u00f1a o mediana empresa, o simplemente queramos gestionar nuestros ahorros sin tener &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/acceso-a-banca-por-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T09:05:27+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-405 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-ciberseguridad tag-consejos tag-dni-electronico tag-fraude tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/bloque-banda-online-consejos\/\" target=\"_self\" rel=\"\">Consejos del uso de banca online<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/bloque-banda-online-consejos\/\"><img width=\"626\" height=\"417\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/consejos-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejos del uso de banca online\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/consejos-1.jpg 626w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/consejos-1-300x200.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A continuaci\u00f3n, encontrar\u00e9is una serie de \u00fatiles consejos a tener en cuenta en el d\u00eda a d\u00eda: Accede a la web de su entidad financiera siempre desde un ordenador de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/21\/bloque-banda-online-consejos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-21T08:09:26+00:00\">septiembre 21, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-394 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/redes-sociales-menores\/\" target=\"_self\" rel=\"\">Redes sociales &#8211; Menores\u00a0<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/redes-sociales-menores\/\"><img width=\"2159\" height=\"2560\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Redes sociales &#8211; Menores\u00a0\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-scaled.jpg 2159w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-253x300.jpg 253w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-864x1024.jpg 864w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-768x911.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-1295x1536.jpg 1295w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/wwkw_ak3m_2209052-1727x2048.jpg 1727w\" sizes=\"(max-width: 2159px) 100vw, 2159px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A lo mejor, la expresi\u00f3n \u201credes sociales\u201d no te suena demasiado. Pero si decimos \u201cTuenti\u201d o \u201cFacebook\u201d, \u00bfa que as\u00ed ya sabes a qu\u00e9 nos referimos? Cuando las utilices, debes &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/redes-sociales-menores\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-20T12:04:34+00:00\">septiembre 20, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-391 post type-post status-publish format-standard has-post-thumbnail hentry category-ciberamenazas category-como-actuar category-como-identificarla category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-phising tag-redes-sociales entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/redes-sociales-adolescentes\/\" target=\"_self\" rel=\"\">Redes Sociales &#8211; Adolescentes\u00a0<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/redes-sociales-adolescentes\/\"><img width=\"2000\" height=\"2000\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Redes Sociales &#8211; Adolescentes\u00a0\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546.jpg 2000w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546-300x300.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546-1024x1024.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546-150x150.jpg 150w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546-768x768.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/4950546-1536x1536.jpg 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Debido a las redes sociales nuestra concepci\u00f3n de las relaciones ha cambiado dr\u00e1sticamente, hemos pasado de relacionarnos con los amigos del barrio a intercambiar experiencias con cientos de personas en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/redes-sociales-adolescentes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-20T11:50:47+00:00\">septiembre 20, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-388 post type-post status-publish format-standard has-post-thumbnail hentry category-ciberamenazas category-como-actuar category-tu-seguridad-internet tag-ciberseguridad tag-empresa tag-informacion tag-internet tag-movil tag-phising tag-redes-sociales tag-seguridad tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/preparar-un-programa-de-concienciacion-y-formacion\/\" target=\"_self\" rel=\"\">Preparar un programa de concienciaci\u00f3n y formaci\u00f3n\u00a0<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/preparar-un-programa-de-concienciacion-y-formacion\/\"><img width=\"2560\" height=\"1576\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Preparar un programa de concienciaci\u00f3n y formaci\u00f3n\u00a0\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-300x185.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-1024x631.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-768x473.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-1536x946.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/Business-coach-showing-growth-graph-to-businesswoman1-2048x1261.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cuando preparamos una campa\u00f1a de concienciaci\u00f3n orientada a los empleados debemos tener presentes diferentes aspectos para garantizar que quedan claros. Aunque cualquier acci\u00f3n es positiva, es realmente interesante contar con &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/preparar-un-programa-de-concienciacion-y-formacion\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-20T11:17:43+00:00\">septiembre 20, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-381 post type-post status-publish format-standard has-post-thumbnail hentry category-ciberamenazas category-como-actuar category-como-identificarla category-educacion-menores category-tu-seguridad-internet tag-ciberseguridad tag-redes-sociales tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/robo-de-identidad-y-fraude-2\/\" target=\"_self\" rel=\"\">Robo de identidad y fraude<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/robo-de-identidad-y-fraude-2\/\"><img width=\"2560\" height=\"2169\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Robo de identidad y fraude\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-300x254.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-1024x868.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-768x651.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-1536x1302.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/20630-2048x1736.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El robo de identidad puede ser un problema muy serio en casos donde el suplantador comete delitos aparentando ser, a ojos de los terceros, otra persona que podr\u00eda tener que &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/robo-de-identidad-y-fraude-2\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-20T10:52:30+00:00\">septiembre 20, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-354 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-herramientas-utiles category-tu-seguridad-internet tag-ciberseguridad tag-informacion tag-internet tag-redes-sociales tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/la-seguridad-de-la-informacion-pasa-por-www-protegetuinformacion-com\/\" target=\"_self\" rel=\"\">LA SEGURIDAD DE LA INFORMACI\u00d3N PASA POR www.protegetuinformacion.com\u00a0\u00a0<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/la-seguridad-de-la-informacion-pasa-por-www-protegetuinformacion-com\/\"><img width=\"2560\" height=\"1707\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"LA SEGURIDAD DE LA INFORMACI\u00d3N PASA POR www.protegetuinformacion.com\u00a0\u00a0\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/animated-family-buying-online-lying-down-on-bed-at-home2-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El pasado 30 de noviembre se celebr\u00f3 en todo el mundo el D\u00eda Internacional de la Seguridad de la Informaci\u00f3n en un momento en el que la falta de seguridad &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/20\/la-seguridad-de-la-informacion-pasa-por-www-protegetuinformacion-com\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-20T08:11:42+00:00\">septiembre 20, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-339 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-internet tag-movil tag-redes-sociales tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/que-es-una-red-social-tipos-de-redes\/\" target=\"_self\" rel=\"\">\u00bfQu\u00e9 es una red social? Tipos de redes<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/que-es-una-red-social-tipos-de-redes\/\"><img width=\"1280\" height=\"968\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/social-media-icons-ge901d029c_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\u00bfQu\u00e9 es una red social? Tipos de redes\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/social-media-icons-ge901d029c_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/social-media-icons-ge901d029c_1280-300x227.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/social-media-icons-ge901d029c_1280-1024x774.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/social-media-icons-ge901d029c_1280-768x581.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Una red social se puede definir como una estructura virtual que genera relaciones entre las personas que la forman y sus contactos promoviendo la colaboraci\u00f3n y el uso compartido de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/que-es-una-red-social-tipos-de-redes\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T15:30:43+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-336 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-datos-personales tag-informacion tag-internet tag-redes-sociales tag-terceros entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/redes-de-voluntarios-manejar-informacion-de-terceros\/\" target=\"_self\" rel=\"\">Redes de voluntarios (manejar informaci\u00f3n de terceros)<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/redes-de-voluntarios-manejar-informacion-de-terceros\/\"><img width=\"1280\" height=\"1161\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/volunteer-g83d3ce1cd_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Redes de voluntarios (manejar informaci\u00f3n de terceros)\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/volunteer-g83d3ce1cd_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/volunteer-g83d3ce1cd_1280-300x272.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/volunteer-g83d3ce1cd_1280-1024x929.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/volunteer-g83d3ce1cd_1280-768x697.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las redes de voluntarios, que son ciudadanos como todo el mundo, tienen diversas implicaciones desde el punto de vista de seguridad y datos personales. Los voluntarios no renuncian a sus &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/redes-de-voluntarios-manejar-informacion-de-terceros\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T15:28:13+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-333 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-internet tag-redes-sociales entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/redes-sociales-mitos\/\" target=\"_self\" rel=\"\">Redes sociales: mitos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/redes-sociales-mitos\/\"><img width=\"2560\" height=\"1920\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Redes sociales: mitos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-300x225.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-1024x768.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-768x576.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-1536x1152.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/merakist-CNbRsQj8mHQ-unsplash-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Se ha escrito mucho sobre las redes sociales, algunas cosas m\u00e1s ciertas, otras m\u00e1s leyenda, vamos a analizar todos los detalles y tratar de explicar los riesgos y separar el &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/redes-sociales-mitos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T15:22:41+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-330 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-certificado tag-digital tag-electronico tag-firma entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/certificados-electronicos-y-firma-digital\/\" target=\"_self\" rel=\"\">Certificados electr\u00f3nicos y firma digital<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/certificados-electronicos-y-firma-digital\/\"><img width=\"2560\" height=\"1622\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Certificados electr\u00f3nicos y firma digital\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-300x190.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-1024x649.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-768x487.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-1536x973.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/lewis-keegan-XQaqV5qYcXg-unsplash-2048x1298.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Los certificados electr\u00f3nicos est\u00e1n cada vez m\u00e1s extendidos y se emplean para cada vez m\u00e1s usos. En las siguientes l\u00edneas se explican los tipos de certificados existentes y c\u00f3mo deben &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/certificados-electronicos-y-firma-digital\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T15:19:32+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-327 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-informacion tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/seguridad-de-la-informacion-para-los-trabajadores-por-cuenta-ajena\/\" target=\"_self\" rel=\"\">Seguridad de la Informaci\u00f3n para los trabajadores por cuenta ajena<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/seguridad-de-la-informacion-para-los-trabajadores-por-cuenta-ajena\/\"><img width=\"2560\" height=\"1707\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Seguridad de la Informaci\u00f3n para los trabajadores por cuenta ajena\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/alex-kotliarskyi-QBpZGqEMsKg-unsplash-1-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Desde hace ya bastante tiempo, las empresas dependen de su informaci\u00f3n y la informaci\u00f3n que sus trabajadores generan supone un activo muy importante. La seguridad es como una cadena, es &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/seguridad-de-la-informacion-para-los-trabajadores-por-cuenta-ajena\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T15:17:05+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-324 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-datos tag-proteccion tag-terceros tag-tratamiento entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/trabajar-con-datos-de-terceros\/\" target=\"_self\" rel=\"\">Trabajar con datos de terceros<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/trabajar-con-datos-de-terceros\/\"><img width=\"2560\" height=\"1562\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Trabajar con datos de terceros\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-300x183.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-1024x625.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-768x469.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-1536x937.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/stephen-phillips-hostreviews-co-uk-shr_Xn8S8QU-unsplash-1-2048x1249.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Es una pr\u00e1ctica habitual de las empresas contratar servicios con otras empresas para el desarrollo de servicios profesionales especializados, gestor\u00edas, servicios de mantenimiento inform\u00e1tico, etc. que implican un acceso a &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/trabajar-con-datos-de-terceros\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T15:02:36+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-321 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-bluetooth tag-internet tag-movil tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/uso-del-bluetooth-en-el-telefono\/\" target=\"_self\" rel=\"\">Uso del bluetooth en el tel\u00e9fono<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/uso-del-bluetooth-en-el-telefono\/\"><img width=\"1280\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-g33d970b0d_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Uso del bluetooth en el tel\u00e9fono\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-g33d970b0d_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-g33d970b0d_1280-300x300.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-g33d970b0d_1280-1024x1024.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-g33d970b0d_1280-150x150.png 150w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/bluetooth-g33d970b0d_1280-768x768.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las comunicaciones mediante bluetooth permiten a los usuario de tel\u00e9fonos m\u00f3viles poder ampliar sus capacidades con dispositivos de manos libres, teclados externos o, incluso, impresoras. El bluetooth es una tecnolog\u00eda &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/uso-del-bluetooth-en-el-telefono\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T14:43:49+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-318 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-internet tag-movil tag-seguridad tag-wifi entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/uso-del-wifi-en-el-telefono\/\" target=\"_self\" rel=\"\">Uso del WiFi en el tel\u00e9fono<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/uso-del-wifi-en-el-telefono\/\"><img width=\"2560\" height=\"1920\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Uso del WiFi en el tel\u00e9fono\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-300x225.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-1024x768.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-768x576.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-1536x1152.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/franck-CAX85x-DdBk-unsplash-2048x1536.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El tel\u00e9fono m\u00f3vil puede conectarse sin problemas a redes WiFi; casi todos los terminales nuevos llevan esta opci\u00f3n. Como en todas las situaciones donde nos conectamos a un elemento del &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/uso-del-wifi-en-el-telefono\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T14:37:50+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-314 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-cifrado tag-informacion tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/utilizacion-de-certificados-digitales\/\" target=\"_self\" rel=\"\">Utilizaci\u00f3n de certificados digitales<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/utilizacion-de-certificados-digitales\/\"><img width=\"2560\" height=\"1708\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Utilizaci\u00f3n de certificados digitales\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-1536x1025.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/towfiqu-barbhuiya-FnA5pAzqhMM-unsplash-2048x1367.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Uno de los aspectos que m\u00e1s preocupa a las empresas es la protecci\u00f3n y seguridad de sus datos. Asegurar que estos datos no caigan en manos no deseadas es un &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/utilizacion-de-certificados-digitales\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T14:28:00+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-311 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-internet tag-seguridad tag-videojuegos entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/videojuegos-en-linea-en-internet\/\" target=\"_self\" rel=\"\">Videojuegos en l\u00ednea en Internet<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/videojuegos-en-linea-en-internet\/\"><img width=\"2560\" height=\"1440\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Videojuegos en l\u00ednea en Internet\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-300x169.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-1024x576.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-768x432.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-1536x864.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/09\/onur-binay-2M6qt9fzRBw-unsplash-2048x1152.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La evoluci\u00f3n natural de los videojuegos los est\u00e1 llevando a complejidades tales que, muchos de ellos, ahora mismo, requieren conexi\u00f3n a Internet para poder explorar todas sus capacidades. La industria &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/09\/19\/videojuegos-en-linea-en-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-09-19T14:20:57+00:00\">septiembre 19, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-297 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-dispositivo tag-internet tag-movil tag-red-movil tag-trabajo entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/25\/trabajar-y-viajar-seguridad-en-los-dispositivos-moviles\/\" target=\"_self\" rel=\"\">Trabajar y viajar: seguridad en los dispositivos m\u00f3viles<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/25\/trabajar-y-viajar-seguridad-en-los-dispositivos-moviles\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-mentatdgt-1346184.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Trabajar y viajar: seguridad en los dispositivos m\u00f3viles\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-mentatdgt-1346184.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-mentatdgt-1346184-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-mentatdgt-1346184-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-mentatdgt-1346184-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">\u00bfC\u00f3mo trabajar de una manera segura en un entorno m\u00f3vil? Trabajar remotamente implica que los datos est\u00e1n viajando con el trabajador, lo que los expone a un mayor riesgo de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/25\/trabajar-y-viajar-seguridad-en-los-dispositivos-moviles\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-25T15:38:53+00:00\">enero 25, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-293 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-consejos tag-teletrabajo tag-trabajo entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/consejos-de-ciberseguridad-para-el-teletrabajo\/\" target=\"_self\" rel=\"\">Consejos de ciberseguridad para el teletrabajo<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/consejos-de-ciberseguridad-para-el-teletrabajo\/\"><img width=\"1280\" height=\"720\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/telework-g6ef4ef132_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Consejos de ciberseguridad para el teletrabajo\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/telework-g6ef4ef132_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/telework-g6ef4ef132_1280-300x169.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/telework-g6ef4ef132_1280-1024x576.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/telework-g6ef4ef132_1280-768x432.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cuando se trabaja en una oficina, existen medidas de seguridad aplicadas a todos los niveles que no necesitamos conocer ni aplicar, pero al trabajar desde casa toda la infraestructura depende &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/consejos-de-ciberseguridad-para-el-teletrabajo\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-18T16:00:19+00:00\">enero 18, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-289 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-disco-externo tag-memoria-usb tag-pendrive entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/pendrives-y-discos-externos\/\" target=\"_self\" rel=\"\">Pendrives y discos externos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/pendrives-y-discos-externos\/\"><img width=\"1280\" height=\"888\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-simon-3631991.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Pendrives y discos externos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-simon-3631991.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-simon-3631991-300x208.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-simon-3631991-1024x710.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-simon-3631991-768x533.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las copias de seguridad de nuestros datos importantes son imprescindibles y si, adem\u00e1s, queremos poder llevarlos con nosotros los discos externos y memorias USB entran en juego. Actualmente, entre los &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/pendrives-y-discos-externos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-18T15:42:19+00:00\">enero 18, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-286 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-perfil tag-redes-sociales entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/quien-puede-verme-en-mis-redes-sociales\/\" target=\"_self\" rel=\"\">Qui\u00e9n puede verme en mis redes sociales<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/quien-puede-verme-en-mis-redes-sociales\/\"><img width=\"1280\" height=\"758\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/observe-g830fd255d_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Qui\u00e9n puede verme en mis redes sociales\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/observe-g830fd255d_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/observe-g830fd255d_1280-300x178.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/observe-g830fd255d_1280-1024x606.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/observe-g830fd255d_1280-768x455.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Debido a la popularidad que est\u00e1n logrando, las redes sociales se est\u00e1n convirtiendo en el vector de ataque de mayor crecimiento en la actualidad, por ello, debemos dedicar el esfuerzo &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/quien-puede-verme-en-mis-redes-sociales\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-18T15:23:23+00:00\">enero 18, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-268 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-internet tag-seguridad tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/opciones-de-seguridad-de-internet-explorer\/\" target=\"_self\" rel=\"\">Opciones de seguridad de Internet Explorer<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/opciones-de-seguridad-de-internet-explorer\/\"><img width=\"1920\" height=\"1920\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Opciones de seguridad de Internet Explorer\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920.png 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920-300x300.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920-1024x1024.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920-150x150.png 150w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920-768x768.png 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/browser-g2017f9dd9_1920-1536x1536.png 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A continuaci\u00f3n, se examinar\u00e1n las opciones que deben configurarse para aumentar laseguridad en la navegaci\u00f3n con Internet Explorer. Se dejar\u00e1n de lado otras caracter\u00edsticasque no afecten directa o indirectamente a &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/18\/opciones-de-seguridad-de-internet-explorer\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-18T11:10:16+00:00\">enero 18, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-261 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-informacion tag-internet tag-privacidad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-ocurre-con-la-informacion-que-comparto\/\" target=\"_self\" rel=\"\">Qu\u00e9 ocurre con la informaci\u00f3n que comparto<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-ocurre-con-la-informacion-que-comparto\/\"><img width=\"1280\" height=\"596\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cloud-g22f758eed_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Qu\u00e9 ocurre con la informaci\u00f3n que comparto\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cloud-g22f758eed_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cloud-g22f758eed_1280-300x140.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cloud-g22f758eed_1280-1024x477.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cloud-g22f758eed_1280-768x358.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Siempre existen dudas sobre lo que ocurre con la informaci\u00f3n que subimos a Internet, vamos a tratar de desvelar y explicar este secreto. Dado que los perfiles p\u00fablicos de las &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-ocurre-con-la-informacion-que-comparto\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T16:25:30+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-257 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-internet tag-perfil tag-redes-sociales entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-es-un-perfil-creacion-y-eliminacion\/\" target=\"_self\" rel=\"\">Qu\u00e9 es un perfil: creaci\u00f3n y eliminaci\u00f3n<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-es-un-perfil-creacion-y-eliminacion\/\"><img width=\"1280\" height=\"807\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/social-media-gdcdde12da_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Qu\u00e9 es un perfil: creaci\u00f3n y eliminaci\u00f3n\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/social-media-gdcdde12da_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/social-media-gdcdde12da_1280-300x189.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/social-media-gdcdde12da_1280-1024x646.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/social-media-gdcdde12da_1280-768x484.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El perfil es la forma en la que las redes sociales identifican a sus miembros e incorpora&nbsp; informaci\u00f3n de las personas que var\u00eda de una red a otra pero que &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-es-un-perfil-creacion-y-eliminacion\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T16:20:19+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-253 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-datos tag-empresa tag-organizacion tag-politica-de-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-aspectos-debe-incluir-una-politica-de-seguridad\/\" target=\"_self\" rel=\"\">\u00bfQu\u00e9 aspectos debe incluir una pol\u00edtica de seguridad?<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-aspectos-debe-incluir-una-politica-de-seguridad\/\"><img width=\"1280\" height=\"640\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/question-mark-g49f6ec7d4_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\u00bfQu\u00e9 aspectos debe incluir una pol\u00edtica de seguridad?\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/question-mark-g49f6ec7d4_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/question-mark-g49f6ec7d4_1280-300x150.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/question-mark-g49f6ec7d4_1280-1024x512.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/question-mark-g49f6ec7d4_1280-768x384.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El enfoque de una pol\u00edtica de seguridad puede ser variopinto. En este documento se presenta un breve gui\u00f3n que puede ser utilizado para el desarrollo de la pol\u00edtica de seguridad &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/que-aspectos-debe-incluir-una-politica-de-seguridad\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T16:15:49+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-249 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-politica-de-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/pautas-para-la-elaboracion-de-una-politica-de-seguridad\/\" target=\"_self\" rel=\"\">Pautas para la elaboraci\u00f3n de una pol\u00edtica de seguridad<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/pautas-para-la-elaboracion-de-una-politica-de-seguridad\/\"><img width=\"1280\" height=\"785\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/fingerprint-gf00168e99_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Pautas para la elaboraci\u00f3n de una pol\u00edtica de seguridad\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/fingerprint-gf00168e99_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/fingerprint-gf00168e99_1280-300x184.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/fingerprint-gf00168e99_1280-1024x628.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/fingerprint-gf00168e99_1280-768x471.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">En general, al implementar medidas de seguridad es habitual centrarse en los aspectos m\u00e1s t\u00e9cnicos y no prestar atenci\u00f3n a aspectos m\u00e1s formales como desarrollar una pol\u00edtica de seguridad. No &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/pautas-para-la-elaboracion-de-una-politica-de-seguridad\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T16:12:18+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-245 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-ordenador-portatil entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/ordenadores-portatiles\/\" target=\"_self\" rel=\"\">Ordenadores port\u00e1tiles<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/ordenadores-portatiles\/\"><img width=\"1280\" height=\"856\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g9136a43f6_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Ordenadores port\u00e1tiles\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g9136a43f6_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g9136a43f6_1280-300x201.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g9136a43f6_1280-1024x685.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g9136a43f6_1280-768x514.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Los ordenadores port\u00e1tiles, netbooks y ultraportables permiten llevar todas las herramientas, incluyendo la conexi\u00f3n a Internet, a todas partes con nosotros; llevando tambi\u00e9n los riesgos asociados con ellas. Los costes &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/ordenadores-portatiles\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T16:05:16+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-242 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-dispositivo tag-ong tag-tecnologia entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/las-ong-dispositivos-y-tecnologia-en-paises-y-zonas-de-conflicto\/\" target=\"_self\" rel=\"\">Las ONG, dispositivos y tecnolog\u00eda en pa\u00edses y zonas de conflicto<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/las-ong-dispositivos-y-tecnologia-en-paises-y-zonas-de-conflicto\/\"><img width=\"1280\" height=\"960\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-energepiccom-288479.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Las ONG, dispositivos y tecnolog\u00eda en pa\u00edses y zonas de conflicto\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-energepiccom-288479.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-energepiccom-288479-300x225.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-energepiccom-288479-1024x768.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-energepiccom-288479-768x576.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cuando una ONG desarrolla labores en zonas de conflicto o en zonas de guerra, tiene que cuidar con mucha atenci\u00f3n los detalles de la informaci\u00f3n que viaja en equipos port\u00e1tiles. &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/las-ong-dispositivos-y-tecnologia-en-paises-y-zonas-de-conflicto\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T16:00:44+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-237 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-navegar entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/navegar-por-internet\/\" target=\"_self\" rel=\"\">Navegar por Internet: buenas pr\u00e1cticas en la red<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/navegar-por-internet\/\"><img width=\"1280\" height=\"792\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-40185.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Navegar por Internet: buenas pr\u00e1cticas en la red\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-40185.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-40185-300x186.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-40185-1024x634.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-40185-768x475.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Internet tiene un impacto profundo en el trabajo, el ocio y el conocimiento a nivel mundial. Gracias a la web, millones de personas tienen acceso f\u00e1cil e inmediato a una &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/17\/navegar-por-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-17T15:41:08+00:00\">enero 17, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-234 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-adultos tag-internet tag-sociedad-tecnologica tag-tecnologia entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/11\/los-adultos-en-la-sociedad-tecnologica-de-hoy\/\" target=\"_self\" rel=\"\">Los adultos en la sociedad tecnol\u00f3gica de hoy<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/11\/los-adultos-en-la-sociedad-tecnologica-de-hoy\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-shvets-production-7545342.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Los adultos en la sociedad tecnol\u00f3gica de hoy\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-shvets-production-7545342.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-shvets-production-7545342-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-shvets-production-7545342-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-shvets-production-7545342-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El uso de la tecnolog\u00eda y de Internet se han convertido en un requisito indispensable para todo adulto en la moderna sociedad de la informaci\u00f3n. Aplicar las mejores pr\u00e1cticas en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/11\/los-adultos-en-la-sociedad-tecnologica-de-hoy\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-11T13:39:14+00:00\">enero 11, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-231 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-empresa tag-politica-seguridad tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/la-importancia-de-contar-con-una-politica-de-seguridad-en-la-empresa\/\" target=\"_self\" rel=\"\">La importancia de contar con una pol\u00edtica de seguridad en la empresa<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/la-importancia-de-contar-con-una-politica-de-seguridad-en-la-empresa\/\"><img width=\"640\" height=\"426\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-fauxels-3184430.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"La importancia de contar con una pol\u00edtica de seguridad en la empresa\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-fauxels-3184430.jpg 640w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-fauxels-3184430-300x200.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">A menudo, cuando hablamos de seguridad inform\u00e1tica pensamos en grandes empresas y en gigantescas infraestructuras t\u00e9cnicas que custodian la informaci\u00f3n de las Organizaciones. Sin embargo, existen muchas actividades en relaci\u00f3n &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/la-importancia-de-contar-con-una-politica-de-seguridad-en-la-empresa\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-10T16:24:06+00:00\">enero 10, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-228 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-3g tag-internet tag-movil entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/internet-movil\/\" target=\"_self\" rel=\"\">Internet m\u00f3vil<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/internet-movil\/\"><img width=\"2560\" height=\"1883\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Internet m\u00f3vil\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-300x221.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-1024x753.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-768x565.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-1536x1130.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tyler-lastovich-699122-2048x1506.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cada d\u00eda m\u00e1s, las comunicaciones se encuentran en todas partes. El acceso a Internet es algo que ya llevamos siempre \u201cencima\u201d con tel\u00e9fonos m\u00f3viles o con accesos WiFi. Desde que &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/internet-movil\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-10T16:12:02+00:00\">enero 10, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-225 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-herramienta-ciberseguridad tag-ordenador entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/herramientas-para-proteger-tu-ordenador\/\" target=\"_self\" rel=\"\">Herramientas para proteger tu ordenador<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/herramientas-para-proteger-tu-ordenador\/\"><img width=\"2560\" height=\"1707\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Herramientas para proteger tu ordenador\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-pixabay-60504-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">De la misma manera que los veh\u00edculos cuentan con mecanismos de seguridad tales como airbags, frenos o cinturones, los ordenadores tienen a su disposici\u00f3n diversas herramientas que pueden hacer mucho &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/herramientas-para-proteger-tu-ordenador\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-10T16:07:13+00:00\">enero 10, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-222 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-hacker tag-troyano tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/gestion-de-incidencias-virus-hackers-troyanos-y-espias-en-la-oficina\/\" target=\"_self\" rel=\"\">Gesti\u00f3n de incidencias, virus, hackers, troyanos y esp\u00edas en la oficina<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/gestion-de-incidencias-virus-hackers-troyanos-y-espias-en-la-oficina\/\"><img width=\"2560\" height=\"1707\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Gesti\u00f3n de incidencias, virus, hackers, troyanos y esp\u00edas en la oficina\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-1536x1024.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-tima-miroshnichenko-5380664-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">En Internet proliferan programas de dudoso origen que son fuente de infecciones de virus. De hecho, existen personas que se dedican a recolectar informaci\u00f3n indiscriminadamente para luego hacer suplantaciones de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/10\/gestion-de-incidencias-virus-hackers-troyanos-y-espias-en-la-oficina\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-10T15:51:18+00:00\">enero 10, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-218 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-internet tag-movil tag-telefono entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/07\/el-telefono-movil\/\" target=\"_self\" rel=\"\">El tel\u00e9fono m\u00f3vil<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/07\/el-telefono-movil\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/smartphone-g1409e8782_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"El tel\u00e9fono m\u00f3vil\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/smartphone-g1409e8782_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/smartphone-g1409e8782_1280-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/smartphone-g1409e8782_1280-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/smartphone-g1409e8782_1280-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El tel\u00e9fono m\u00f3vil, como el correo electr\u00f3nico, ha sufrido un desarrollo espectacular en los \u00faltimos tiempos. Hoy en d\u00eda, casi nadie concibe la vida sin esta herramienta. Como todas las &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/07\/el-telefono-movil\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-07T12:58:43+00:00\">enero 7, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-215 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-correo entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/07\/mejores-practicas-para-tu-correo-electronico\/\" target=\"_self\" rel=\"\">Mejores pr\u00e1cticas para tu correo electr\u00f3nico<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/07\/mejores-practicas-para-tu-correo-electronico\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-torsten-dettlaff-193003.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Mejores pr\u00e1cticas para tu correo electr\u00f3nico\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-torsten-dettlaff-193003.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-torsten-dettlaff-193003-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-torsten-dettlaff-193003-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-torsten-dettlaff-193003-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El correo electr\u00f3nico, que es una de las herramientas m\u00e1s importantes en Internet, nos permite comunicarnos de forma muy r\u00e1pida y sin coste con personas de todo el mundo. Pero &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/07\/mejores-practicas-para-tu-correo-electronico\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-07T12:44:02+00:00\">enero 7, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-208 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-donacion tag-internet tag-ong entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/donaciones-online\/\" target=\"_self\" rel=\"\">Donaciones online<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/donaciones-online\/\"><img width=\"1280\" height=\"768\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/donate-g3516b0d30_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Donaciones online\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/donate-g3516b0d30_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/donate-g3516b0d30_1280-300x180.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/donate-g3516b0d30_1280-1024x614.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/donate-g3516b0d30_1280-768x461.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/donate-g3516b0d30_1280-1200x720.jpg 1200w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las ONG y asociaciones sobreviven, en muchos casos, gracias a las donaciones y aportaciones econ\u00f3micas de personas interesadas en su causa de acci\u00f3n social o actividad. Estas donaciones pueden llegar &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/donaciones-online\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T16:10:11+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-204 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-dni tag-dni-e tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/la-administracion-online-el-dni-e\/\" target=\"_self\" rel=\"\">La administraci\u00f3n online: el DNI-e<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/la-administracion-online-el-dni-e\/\"><img width=\"1280\" height=\"720\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/finger-g26801e2d2_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"La administraci\u00f3n online: el DNI-e\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/finger-g26801e2d2_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/finger-g26801e2d2_1280-300x169.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/finger-g26801e2d2_1280-1024x576.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/finger-g26801e2d2_1280-768x432.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La administraci\u00f3n electr\u00f3nica y la posibilidad de realizar operaciones y gestiones oficiales desde nuestra casa, simplemente conectados a Internet, nos har\u00e1n la vida m\u00e1s c\u00f3moda. Actualmente, la administraci\u00f3n electr\u00f3nica o &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/la-administracion-online-el-dni-e\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T15:58:35+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-201 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-disco-recuperacion entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/discos-de-recuperacion\/\" target=\"_self\" rel=\"\">Discos de recuperaci\u00f3n<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/discos-de-recuperacion\/\"><img width=\"1280\" height=\"851\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/memory-g8d71ec799_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Discos de recuperaci\u00f3n\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/memory-g8d71ec799_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/memory-g8d71ec799_1280-300x199.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/memory-g8d71ec799_1280-1024x681.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/memory-g8d71ec799_1280-768x511.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Es importante crear discos de recuperaci\u00f3n de nuestra instalaci\u00f3n de sistema, ya que nos ahorrar\u00e1n mucho tiempo y problemas si nos vemos obligados a reinstalar. Una vez tengamos el sistema &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/discos-de-recuperacion\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T15:53:15+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-198 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-descargas tag-internet tag-p2p tag-red entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/descargas-p2p\/\" target=\"_self\" rel=\"\">Descargas P2P<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/descargas-p2p\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-cottonbro-5053847.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Descargas P2P\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-cottonbro-5053847.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-cottonbro-5053847-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-cottonbro-5053847-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-cottonbro-5053847-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las redes de descargas de ficheros tienen sus ventajas y sus inconvenientes: nos dan acceso a muchos ficheros y documentos compartidos por otras personas, pero, por otro lado, nos exponen &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/descargas-p2p\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T15:47:29+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-195 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-internet tag-ley tag-ordenador tag-programas entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/derechos-y-obligaciones-relacionados-con-el-equipo-informatico-del-trabajo\/\" target=\"_self\" rel=\"\">Derechos y obligaciones relacionados con el equipo inform\u00e1tico del trabajo<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/derechos-y-obligaciones-relacionados-con-el-equipo-informatico-del-trabajo\/\"><img width=\"2560\" height=\"1716\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Derechos y obligaciones relacionados con el equipo inform\u00e1tico del trabajo\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-300x201.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-1024x687.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-768x515.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-1536x1030.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-jeshoots-238118-2048x1373.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">\u00bfA qui\u00e9n pertenece el ordenador personal asignado al trabajador? \u00bfY la informaci\u00f3n que contiene? Estos puntos son de vital importancia y todo el mundo debe comprender todas las dimensiones y &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/derechos-y-obligaciones-relacionados-con-el-equipo-informatico-del-trabajo\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T15:39:40+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-192 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-cortafuegos tag-herramientas entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/proteccion-e-higiene-los-cortafuegos\/\" target=\"_self\" rel=\"\">Protecci\u00f3n e higiene: los cortafuegos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/proteccion-e-higiene-los-cortafuegos\/\"><img width=\"1280\" height=\"745\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g61008ecd2_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Protecci\u00f3n e higiene: los cortafuegos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g61008ecd2_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g61008ecd2_1280-300x175.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g61008ecd2_1280-1024x596.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/laptop-g61008ecd2_1280-768x447.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">De la misma manera que los veh\u00edculos cuentan con mecanismos de seguridad tales como airbags, frenos o cinturones, los ordenadores tienen a su disposici\u00f3n diversas herramientas que pueden hacer mucho &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/proteccion-e-higiene-los-cortafuegos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T15:31:50+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-189 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-copias-de-seguridad tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/copias-de-seguridad-ii\/\" target=\"_self\" rel=\"\">Copias de seguridad (II)<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/copias-de-seguridad-ii\/\"><img width=\"1280\" height=\"977\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/statistic-g9fbec4193_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Copias de seguridad (II)\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/statistic-g9fbec4193_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/statistic-g9fbec4193_1280-300x229.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/statistic-g9fbec4193_1280-1024x782.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/statistic-g9fbec4193_1280-768x586.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las copias de seguridad son la herramienta m\u00e1s b\u00e1sica para evitar la p\u00e9rdida irrecuperable de informaci\u00f3n. No todos los sistemas est\u00e1n automatizados, por lo tanto, los usuarios debemos ser conscientes &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/copias-de-seguridad-ii\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T13:42:29+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-186 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-copia-de-seguridad tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/copias-de-seguridad-i\/\" target=\"_self\" rel=\"\">Copias de seguridad (I)<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/copias-de-seguridad-i\/\"><img width=\"1280\" height=\"865\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/email-gb5572a9e4_1280.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Copias de seguridad (I)\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/email-gb5572a9e4_1280.png 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/email-gb5572a9e4_1280-300x203.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/email-gb5572a9e4_1280-1024x692.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/email-gb5572a9e4_1280-768x519.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Como reza el dicho, es mejor prevenir que curar. La copia de seguridad debe ser una de nuestras tareas diarias en lo que a nuestros datos importantes se refiere. No &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/copias-de-seguridad-i\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T13:36:17+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-183 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-contrasena tag-internet tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/contrasenas-usos-y-recomendaciones\/\" target=\"_self\" rel=\"\">Contrase\u00f1as: usos y recomendaciones<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/contrasenas-usos-y-recomendaciones\/\"><img width=\"2560\" height=\"1702\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Contrase\u00f1as: usos y recomendaciones\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-300x199.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-1024x681.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-768x511.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-1536x1021.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-2882630-2048x1362.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La gesti\u00f3n adecuada de las contrase\u00f1as es esencial para la protecci\u00f3n de la informaci\u00f3n tratada en la empresa. Las contrase\u00f1as son el principal mecanismo de autenticaci\u00f3n utilizado por el personal &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/contrasenas-usos-y-recomendaciones\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T13:21:34+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-179 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-consejos entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/diez-consejos-para-la-proteccion-de-tu-negocio\/\" target=\"_self\" rel=\"\">Diez consejos para la protecci\u00f3n de tu negocio<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/diez-consejos-para-la-proteccion-de-tu-negocio\/\"><img width=\"1280\" height=\"561\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/feedback-g54413a481_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Diez consejos para la protecci\u00f3n de tu negocio\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/feedback-g54413a481_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/feedback-g54413a481_1280-300x131.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/feedback-g54413a481_1280-1024x449.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/feedback-g54413a481_1280-768x337.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Nuestros negocios dependen m\u00e1s cada d\u00eda de los sistemas inform\u00e1ticos, por eso, contar con medidas de seguridad adecuadas en los mismos es un hito esencial para todas aquellas empresas que &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/diez-consejos-para-la-proteccion-de-tu-negocio\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T13:16:37+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-176 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-empresa tag-sistema-de-informacion entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/conozco-mi-empresa-y-sus-sistemas-de-informacion\/\" target=\"_self\" rel=\"\">\u00bfConozco mi Empresa y sus sistemas de informaci\u00f3n?<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/conozco-mi-empresa-y-sus-sistemas-de-informacion\/\"><img width=\"1280\" height=\"854\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/despaired-gede4e37c6_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\u00bfConozco mi Empresa y sus sistemas de informaci\u00f3n?\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/despaired-gede4e37c6_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/despaired-gede4e37c6_1280-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/despaired-gede4e37c6_1280-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/despaired-gede4e37c6_1280-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">En este art\u00edculo encontrar\u00e1s recomendaciones sobre lo que debe conocer de los sistemas de informaci\u00f3n de su empresa y, si no se lo han comunicado claramente, c\u00f3mo puede averiguarlo por &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/conozco-mi-empresa-y-sus-sistemas-de-informacion\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T13:01:16+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-173 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-asociacion tag-ciberseguridad tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/herramientas-de-seguridad-de-bajo-coste-para-asociaciones\/\" target=\"_self\" rel=\"\">Herramientas de seguridad de bajo coste para asociaciones<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/herramientas-de-seguridad-de-bajo-coste-para-asociaciones\/\"><img width=\"1280\" height=\"853\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cyber-g8caf9972f_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Herramientas de seguridad de bajo coste para asociaciones\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cyber-g8caf9972f_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cyber-g8caf9972f_1280-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cyber-g8caf9972f_1280-1024x682.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/cyber-g8caf9972f_1280-768x512.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Uno de los bloqueos principales de las organizaciones que cuentan con presupuesto limitado es el del coste de la seguridad. No existe tal coste y, si sabemos gestionar bien nuestras &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/herramientas-de-seguridad-de-bajo-coste-para-asociaciones\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T12:56:18+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-170 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-empresa entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/como-proteger-los-datos-de-mi-empresa\/\" target=\"_self\" rel=\"\">C\u00f3mo proteger los datos de mi empresa<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/como-proteger-los-datos-de-mi-empresa\/\"><img width=\"1280\" height=\"782\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/office-gaf2cd0055_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"C\u00f3mo proteger los datos de mi empresa\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/office-gaf2cd0055_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/office-gaf2cd0055_1280-300x183.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/office-gaf2cd0055_1280-1024x626.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/office-gaf2cd0055_1280-768x469.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Habitualmente, las personas a las que se les ha encargado la custodia de un objeto perteneciente a la empresa tienen cuidado de no deteriorar el mismo y que se mantenga &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/05\/como-proteger-los-datos-de-mi-empresa\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-05T12:45:01+00:00\">enero 5, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-167 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-cifrar tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/cifrar-documentos\/\" target=\"_self\" rel=\"\">Cifrar documentos<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/cifrar-documentos\/\"><img width=\"1280\" height=\"837\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/computer-g468dffae9_1280.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Cifrar documentos\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/computer-g468dffae9_1280.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/computer-g468dffae9_1280-300x196.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/computer-g468dffae9_1280-1024x670.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/computer-g468dffae9_1280-768x502.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/computer-g468dffae9_1280-765x500.jpg 765w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El cifrado es la principal herramienta a nuestro servicio para evitar que los documentos sean accedidos por terceros no autorizados. En este cap\u00edtulo se explican someramente los distintos tipos de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/cifrar-documentos\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-03T16:27:58+00:00\">enero 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-164 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-chat tag-ciberseguridad tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/chats-online\/\" target=\"_self\" rel=\"\">Chats online<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/chats-online\/\"><img width=\"1280\" height=\"851\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-1111368.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Chats online\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-1111368.jpg 1280w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-1111368-300x199.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-1111368-1024x681.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-miguel-a-padrinan-1111368-768x511.jpg 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Los chats o sistemas de conversaci\u00f3n en Internet deben considerarse como una extensi\u00f3n de nuestras conversaciones del d\u00eda a d\u00eda, con la peculiaridad de que muchas veces nuestro interlocutor se &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/chats-online\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-03T16:19:13+00:00\">enero 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-161 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-blog tag-ciberseguridad tag-internet tag-pagina-web entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/blogs-y-paginas-personales-seguras\/\" target=\"_self\" rel=\"\">Blogs y p\u00e1ginas personales seguras<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/blogs-y-paginas-personales-seguras\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/wordpress-g979bbac26_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Blogs y p\u00e1ginas personales seguras\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/wordpress-g979bbac26_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/wordpress-g979bbac26_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/wordpress-g979bbac26_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/wordpress-g979bbac26_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/wordpress-g979bbac26_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Tener presencia en Internet, con un blog o una p\u00e1gina personal, nos permite comunicarnos con el mundo y que otros puedan leer nuestras opiniones y tener visibilidad sobre lo que &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/blogs-y-paginas-personales-seguras\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-03T16:09:09+00:00\">enero 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-158 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-conexion tag-internet tag-red tag-wifi entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/acceso-wifi-en-zonas-publicas\/\" target=\"_self\" rel=\"\">Acceso WiFi en zonas p\u00fablicas<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/acceso-wifi-en-zonas-publicas\/\"><img width=\"2560\" height=\"1696\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Acceso WiFi en zonas p\u00fablicas\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-300x199.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-1024x679.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-768x509.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-1536x1018.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2022\/01\/pexels-nohk-1755792-2048x1357.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Cada vez m\u00e1s, las ciudades cuentan con cobertura WiFi en m\u00e1s \u00e1reas y los ciudadanos pueden acceder a Internet sin necesidad de cables. Conectarse desde puntos de los que no &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2022\/01\/03\/acceso-wifi-en-zonas-publicas\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-01-03T16:00:07+00:00\">enero 3, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-134 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-banco tag-fraude tag-pharming tag-phising entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/24\/fraude-en-el-en-acceso-a-tu-banco\/\" target=\"_self\" rel=\"\">Fraude en el en acceso a tu banco<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/24\/fraude-en-el-en-acceso-a-tu-banco\/\"><img width=\"1920\" height=\"1196\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/fraud-prevention-gea185aa73_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Fraude en el en acceso a tu banco\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/fraud-prevention-gea185aa73_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/fraud-prevention-gea185aa73_1920-300x187.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/fraud-prevention-gea185aa73_1920-1024x638.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/fraud-prevention-gea185aa73_1920-768x478.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/fraud-prevention-gea185aa73_1920-1536x957.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Phishing, pharming, o troyanos, son t\u00e9rminos que cada vez son m\u00e1s comunes de encontrar en Internet. Pero, \u00bfqu\u00e9 son realmente y c\u00f3mo nos pueden afectar? Los intentos de fraude m\u00e1s &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/24\/fraude-en-el-en-acceso-a-tu-banco\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-12-24T09:33:52+00:00\">diciembre 24, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-111 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-buenas-practicas tag-consejos tag-red-social tag-redes-sociales entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/16\/las-redes-sociales-guia-de-buenas-practicas\/\" target=\"_self\" rel=\"\">Las redes sociales: gu\u00eda de buenas pr\u00e1cticas<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/16\/las-redes-sociales-guia-de-buenas-practicas\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/technology-g8f32ae725_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Las redes sociales: gu\u00eda de buenas pr\u00e1cticas\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/technology-g8f32ae725_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/technology-g8f32ae725_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/technology-g8f32ae725_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/technology-g8f32ae725_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/technology-g8f32ae725_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Las redes sociales nos permiten estar en contacto con multitud de amigos en tiempo real, compartir fotograf\u00edas o comentarios con ellos. Por otro lado, cuentan con muchos puntos oscuros, en &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/16\/las-redes-sociales-guia-de-buenas-practicas\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-12-16T15:43:16+00:00\">diciembre 16, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-108 post type-post status-publish format-standard has-post-thumbnail hentry category-ciberamenazas category-te-interesa category-tu-seguridad-internet tag-hacker tag-malware tag-pharming tag-phising tag-troyano tag-virus entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/16\/recomendaciones-para-prevenir-incidentes-con-virus-y-hackers\/\" target=\"_self\" rel=\"\">Recomendaciones para prevenir incidentes con virus y hackers<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/16\/recomendaciones-para-prevenir-incidentes-con-virus-y-hackers\/\"><img width=\"1920\" height=\"1227\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/anonymous-g78764f50a_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Recomendaciones para prevenir incidentes con virus y hackers\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/anonymous-g78764f50a_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/anonymous-g78764f50a_1920-300x192.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/anonymous-g78764f50a_1920-1024x654.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/anonymous-g78764f50a_1920-768x491.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/12\/anonymous-g78764f50a_1920-1536x982.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Para prevenir y minimizar el impacto de una infecci\u00f3n de virus o prevenir el ataque de un hacker, hay acciones que puede realizar usted mismo. El malware es un programa &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/12\/16\/recomendaciones-para-prevenir-incidentes-con-virus-y-hackers\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-12-16T15:27:12+00:00\">diciembre 16, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-100 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-anuncio tag-compra-online tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/11\/08\/poner-un-anuncio-en-internet\/\" target=\"_self\" rel=\"\">Poner un anuncio en Internet<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/11\/08\/poner-un-anuncio-en-internet\/\"><img width=\"2560\" height=\"1683\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Poner un anuncio en Internet\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-scaled.jpg 2560w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-300x197.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-1024x673.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-768x505.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-1536x1010.jpg 1536w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/11\/esta-2048x1347.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Internet es el escaparate m\u00e1s grande del mundo ahora mismo. Un anuncio publicado en \u00e9l, puede ser visto por millones de personas, lo que nos puede dar muchas garant\u00edas de &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/11\/08\/poner-un-anuncio-en-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-11-08T18:41:30+00:00\">noviembre 8, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-94 post type-post status-publish format-standard has-post-thumbnail hentry category-tu-seguridad-internet tag-decalogo tag-normas tag-redes tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/22\/decalogo-de-normas-de-seguridad-para-redes-sociales\/\" target=\"_self\" rel=\"\">Dec\u00e1logo de normas de seguridad para redes sociales<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/22\/decalogo-de-normas-de-seguridad-para-redes-sociales\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/phone-g39c2aba45_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Dec\u00e1logo de normas de seguridad para redes sociales\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/phone-g39c2aba45_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/phone-g39c2aba45_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/phone-g39c2aba45_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/phone-g39c2aba45_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/phone-g39c2aba45_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Se plantea un dec\u00e1logo de normas de seguridad para redes sociales, a fines de tomar ciertas precauciones a la hora de usar este tipo de sitios. A continuaci\u00f3n listamos las &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/22\/decalogo-de-normas-de-seguridad-para-redes-sociales\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-10-22T08:56:55+00:00\">octubre 22, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-91 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-seguridad tag-wifi entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/22\/las-wifis-publicas\/\" target=\"_self\" rel=\"\">Las WiFis p\u00fablicas<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/22\/las-wifis-publicas\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/wifi-g704af1b53_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Las WiFis p\u00fablicas\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/wifi-g704af1b53_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/wifi-g704af1b53_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/wifi-g704af1b53_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/wifi-g704af1b53_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/wifi-g704af1b53_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">El uso exhaustivo que hacemos de las herramientas de Internet hace que encontrar estasredes abiertas sean percibidas como una gran suerte porque nos permiten hacer uso de lasmismas all\u00ed donde &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/22\/las-wifis-publicas\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-10-22T08:33:08+00:00\">octubre 22, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-88 post type-post status-publish format-standard has-post-thumbnail hentry category-educacion-menores category-tu-seguridad-internet tag-internet tag-ninos tag-seguridad entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/21\/la-seguridad-de-los-ninos-en-internet-s21sec-te-aconseja-como-lograrla\/\" target=\"_self\" rel=\"\">La seguridad de los ni\u00f1os en internet: S21sec te aconseja c\u00f3mo lograrla<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/21\/la-seguridad-de-los-ninos-en-internet-s21sec-te-aconseja-como-lograrla\/\"><img width=\"1920\" height=\"1280\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/telework-gc2e6b8fc1_1920.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"La seguridad de los ni\u00f1os en internet: S21sec te aconseja c\u00f3mo lograrla\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/telework-gc2e6b8fc1_1920.jpg 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/telework-gc2e6b8fc1_1920-300x200.jpg 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/telework-gc2e6b8fc1_1920-1024x683.jpg 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/telework-gc2e6b8fc1_1920-768x512.jpg 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/telework-gc2e6b8fc1_1920-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">La mensajer\u00eda es uno de los medios de comunicaci\u00f3n l\u00edderes entre los j\u00f3venes, recu\u00e9rdale que si no es alguien conocido no debe agregar a esa persona, ni hablar con \u00e9l &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/21\/la-seguridad-de-los-ninos-en-internet-s21sec-te-aconseja-como-lograrla\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-10-21T11:54:46+00:00\">octubre 21, 2021<\/time><\/div>\n<\/li><li class=\"wp-block-post post-85 post type-post status-publish format-standard has-post-thumbnail hentry category-te-interesa category-tu-seguridad-internet tag-ciberseguridad tag-compra-online tag-internet entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/20\/compras-en-internet\/\" target=\"_self\" rel=\"\">Compras en Internet<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/20\/compras-en-internet\/\"><img width=\"1920\" height=\"1920\" src=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Compras en Internet\" loading=\"lazy\" srcset=\"https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920.png 1920w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920-300x300.png 300w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920-1024x1024.png 1024w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920-150x150.png 150w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920-768x768.png 768w, https:\/\/protegetuinformacion.com\/wp-content\/uploads\/2021\/10\/ecommerce-gf88c59a2b_1920-1536x1536.png 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Internet es un medio ideal para comprar productos a bajo precio con la ventaja de poder hacerlo desde nuestra casa y recibi\u00e9ndolos c\u00f3modamente en ella. Por otro lado, las compras &hellip; <a href=\"https:\/\/protegetuinformacion.com\/index.php\/2021\/10\/20\/compras-en-internet\/\" class=\"more-link\">Leer m\u00e1s<\/a> <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2021-10-20T16:13:58+00:00\">octubre 20, 2021<\/time><\/div>\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":13,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/21"}],"collection":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":5,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":69,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/21\/revisions\/69"}],"up":[{"embeddable":true,"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/pages\/13"}],"wp:attachment":[{"href":"https:\/\/protegetuinformacion.com\/index.php\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}