{"id":63909,"date":"2020-01-16T08:00:29","date_gmt":"2020-01-16T07:00:29","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=63909"},"modified":"2020-02-07T20:03:30","modified_gmt":"2020-02-07T19:03:30","slug":"missing-resources-it","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/es\/missing-resources-it\/","title":{"rendered":"La falta de recursos complica la seguridad inform\u00e1tica"},"content":{"rendered":"<p>Las empresas alemanas reconocen desde hace tiempo que los ciberataques constituyen una grave amenaza. Sin embargo, la intensidad con la que se contrarrestan estos ataques difiere, a veces dr\u00e1sticamente, en funci\u00f3n del sector y del tama\u00f1o de la empresa.<\/p>\n<p>Esta es la conclusi\u00f3n del estudio \"Seguridad inform\u00e1tica en las PYME\" realizado por DriveLock, en el que se pregunt\u00f3 a m\u00e1s de 200 empresas de hasta 1.000 empleados sobre su seguridad inform\u00e1tica y sus experiencias con ataques anteriores. Las peque\u00f1as y medianas empresas afirmaron con frecuencia que no eran capaces de adoptar las medidas de seguridad necesarias.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-423835852\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-880483767\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-4057554889\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n<h3>Obst\u00e1culos<\/h3>\n<p>Mientras que en las empresas de hasta 49 empleados, algo menos del 40% de los encuestados asigna a la seguridad inform\u00e1tica la m\u00e1xima prioridad, esta cifra supera los dos tercios en las empresas de entre 500 y 999 empleados. Martin Mangold, vicepresidente de operaciones en la nube de DriveLock, lo explica:<\/p>\n<p><em>\"El estudio muestra claramente que el problema de los ciberataques se reconoce como tal. A la hora de aplicar las medidas de seguridad necesarias, surgen dos obst\u00e1culos concretos, especialmente para las peque\u00f1as y medianas empresas: <\/em><\/p>\n<p><em>recursos y experiencia. La raz\u00f3n es que, en estas empresas, la funci\u00f3n de liderazgo en seguridad inform\u00e1tica suele recaer en la direcci\u00f3n o en el departamento de TI. Un papel dedicado a la seguridad inform\u00e1tica ir\u00eda de la mano de m\u00e1s tiempo y conocimientos para los temas de seguridad inform\u00e1tica\".<\/em><\/p>\n<p>Esto tambi\u00e9n queda claro en el estudio. En empresas de hasta 50 empleados, por ejemplo, un responsable de TI expuesto es responsable de la seguridad s\u00f3lo en el 41% de los casos. A menudo, esta tarea sigue formando parte del \u00e1mbito de responsabilidad de la direcci\u00f3n.<\/p>\n<p><em>\"Por supuesto, el personal especializado necesario no puede sustituirse. Sin embargo, se puede dotar al departamento inform\u00e1tico de una potente herramienta para aliviarlos. La puerta de entrada m\u00e1s habitual de los ataques es el usuario interno, ya sea mediante ataques selectivos de ingenier\u00eda social o por imprudencia. <\/em><\/p>\n<p><em>Con nuestra m\u00e1xima para la seguridad de los datos \"Nunca conf\u00edes, siempre verifica\", minimizamos todos los riesgos de seguridad externos y tambi\u00e9n internos. De este modo, aliviamos de forma sostenible a los departamentos de TI y permitimos que las peque\u00f1as y medianas empresas desarrollen las estructuras de seguridad necesarias\".<\/em><\/p>\n<p>a\u00f1ade Mangold.<\/p>\n<h3>Los \"campeones ocultos\" son un objetivo popular<\/h3>\n<p>Hoy en d\u00eda, las peque\u00f1as y medianas empresas no est\u00e1n menos expuestas al riesgo de ciberataques que las grandes compa\u00f1\u00edas. Alemania es un objetivo popular para los ciberdelincuentes, en parte debido a los llamados campeones ocultos del sector de las PYME, empresas que son l\u00edderes del mercado mundial en su nicho.<\/p>\n<p>Suelen ser proveedores de grandes corporaciones y, por tanto, representan una v\u00eda m\u00e1s f\u00e1cil para que los hackers obtengan informaci\u00f3n de las grandes empresas.<\/p>\n<p>As\u00ed, el 61% de los participantes en el estudio sufrieron al menos un incidente de seguridad inform\u00e1tica en los dos \u00faltimos a\u00f1os. Especialmente para las peque\u00f1as y medianas empresas, los ataques suelen ir asociados a consecuencias que amenazan la propia existencia de la empresa.<\/p>\n<p>Sin embargo, s\u00f3lo algo menos del 40% de las empresas encuestadas tiene previsto aumentar el presupuesto destinado a la seguridad inform\u00e1tica. Muchas grandes empresas conf\u00edan en servicios gestionados basados en la nube para su protecci\u00f3n y son, en su mayor\u00eda, pioneras en este \u00e1mbito.<\/p>\n<p>Los servicios de seguridad gestionados desde la nube tambi\u00e9n son una soluci\u00f3n para las peque\u00f1as y medianas empresas. Los costes de inversi\u00f3n son bajos, los empleados de TI se ven aliviados y las empresas se benefician de una seguridad inform\u00e1tica al nivel t\u00e9cnico m\u00e1s avanzado.<\/p>\n<p>Por eso, cada vez m\u00e1s peque\u00f1as empresas est\u00e1n abiertas a los servicios de seguridad de la nube y se imaginan utiliz\u00e1ndolos en el futuro.<\/p>","protected":false},"excerpt":{"rendered":"<p>Aunque las empresas son conscientes del peligro de los ciberataques, muchas tienen pocas posibilidades de adoptar las medidas de seguridad necesarias.<\/p>","protected":false},"author":38,"featured_media":63910,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[2,36983],"tags":[369,1790,117],"coauthors":[19920],"class_list":["post-63909","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-1911","tag-it","tag-it-security","tag-sicherheit"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",400,180,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-768x346.jpg",768,346,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-100x45.jpg",100,45,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-480x216.jpg",480,216,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-640x288.jpg",640,288,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-720x324.jpg",720,324,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",1000,450,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252.jpg",600,270,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2019\/11\/shutterstock_135536252-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Obwohl Unternehmen sich der Gefahr von Cyberangriffen bewusst sind, haben viele wenig M\u00f6glichkeiten, die n\u00f6tigen Sicherheitsma\u00dfnahmen zu ergreifen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/sapanoptikum-2\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/mag-1911\/\" rel=\"category tag\">MAG 19-11<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3magpmp.greatsolution.dev\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/63909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/comments?post=63909"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/63909\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media\/63910"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media?parent=63909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/categories?post=63909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/tags?post=63909"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/coauthors?post=63909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}