{"id":70278,"date":"2020-12-10T13:00:00","date_gmt":"2020-12-10T12:00:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=70278"},"modified":"2020-12-09T08:22:44","modified_gmt":"2020-12-09T07:22:44","slug":"ciberdelincuencia-tambien-en-la-crisis-no-da-una-oportunidad","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/es\/ciberdelincuencia-tambien-en-la-crisis-no-da-una-oportunidad\/","title":{"rendered":"No d\u00e9 una oportunidad a la ciberdelincuencia ni siquiera en la crisis"},"content":{"rendered":"<p>En su evaluaci\u00f3n especial de la ciberdelincuencia en la crisis de Corona, la BKA constat\u00f3 un aumento significativo de las campa\u00f1as de phishing y los ataques a conexiones remotas. Incluso sin la pandemia, los expertos en seguridad inform\u00e1tica no pod\u00edan quejarse de falta de trabajo. Seg\u00fan el Informe Federal de Situaci\u00f3n 2019 de la BKA, el n\u00famero de delitos conocidos por la polic\u00eda ha alcanzado un nuevo m\u00e1ximo. <\/p>\n\n\n\n<p>El ransomware en particular, es decir, el software de extorsi\u00f3n, puede ser una amenaza existencial para las empresas o instituciones, porque casi todas las empresas dependen ahora de las TI. La seguridad inform\u00e1tica es, por tanto, indispensable para el \u00e9xito de una empresa. Si las empresas reducen sus capacidades inform\u00e1ticas en este momento debido a la crisis, la situaci\u00f3n se vuelve r\u00e1pidamente muy peligrosa. La ya fuerte tendencia al aumento de los ciberataques contra las empresas -tanto en t\u00e9rminos de frecuencia como de intensidad y calidad de los ataques- se intensificar\u00e1 a\u00fan m\u00e1s con la crisis.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-2118317746\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-2353636563\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-2402279066\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" data-block-type=\"core\">No mostrar debilidad<\/h3>\n\n\n\n<p>Muchas empresas ya han tomado medidas para proteger mejor sus TI en los \u00faltimos a\u00f1os. Sin embargo, la mayor\u00eda de las empresas alemanas a\u00fan no est\u00e1n al nivel que deber\u00edan. Estos d\u00e9ficits se hacen a\u00fan m\u00e1s patentes con la crisis, cuando las empresas tambi\u00e9n tienen que adoptar enfoques completamente nuevos a corto plazo. <\/p>\n\n\n\n<p>Un ejemplo de ello es la oficina en casa. Lo que antes era impensable en muchas industrias es ahora a menudo la \u00fanica opci\u00f3n para mantener la producci\u00f3n. Para evitar que esto se convierta en un factor de riesgo, las empresas necesitan una supervisi\u00f3n coherente de las tecnolog\u00edas utilizadas con este fin, procesos estrechamente interrelacionados con la organizaci\u00f3n de seguridad inform\u00e1tica, pero tambi\u00e9n la correspondiente sensibilizaci\u00f3n de los empleados.<\/p>\n\n\n\n<p>\u00bfQu\u00e9 deben hacer ahora las empresas para contrarrestar la creciente amenaza? Ante todo, es importante que se adapten r\u00e1pida y profesionalmente a las nuevas condiciones marco, porque los atacantes explotan cualquier punto d\u00e9bil disponible. Especialmente ahora, deben aprovecharse los conocimientos de los expertos en seguridad inform\u00e1tica y digitalizaci\u00f3n que conocen las normas y las mejores pr\u00e1cticas actuales. Si no se dispone de ellos internamente, debe recurrirse a ayuda externa.<\/p>\n\n\n\n<p>Los aspectos t\u00e9cnicos de los ciberataques son diversos y abrumadoramente complejos. Por lo tanto, la protecci\u00f3n digital no puede limitarse \u00fanicamente a la selecci\u00f3n y configuraci\u00f3n de tecnolog\u00edas y servicios. Se trata de mucho m\u00e1s que herramientas y artilugios. Lo que se necesita es un replanteamiento de toda la cultura corporativa a trav\u00e9s de todos los l\u00edmites departamentales. Dado que los ataques digitales pueden llevarse a cabo en pr\u00e1cticamente todos los \u00e1mbitos de la empresa, la seguridad inform\u00e1tica debe garantizarse en toda la empresa.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" data-block-type=\"core\">Dificultar el trabajo a los atacantes<\/h3>\n\n\n\n<p>Si ya se ha establecido un sistema de gesti\u00f3n de la seguridad de la informaci\u00f3n, hay que revisarlo y ajustarlo. Si no es el caso, se recomienda aplicar un enfoque ascendente priorizado para mejorar la seguridad inform\u00e1tica a corto plazo. La atenci\u00f3n se centra en aquellas aplicaciones y sistemas inform\u00e1ticos que procesan informaci\u00f3n especialmente sensible o son cr\u00edticos para mantener la producci\u00f3n. Se aplica el viejo principio: \"Proteger primero y mejor lo que es m\u00e1s importante\". <\/p>\n\n\n\n<p>Adem\u00e1s, las comprobaciones ofensivas -las llamadas pruebas de penetraci\u00f3n- tambi\u00e9n son \u00fatiles para identificar posibles puntos d\u00e9biles. Cuanto m\u00e1s robusto sea el sistema, m\u00e1s dif\u00edcil le resultar\u00e1 al atacante y m\u00e1s tiempo ganar\u00e1 la defensa para neutralizarlo. El concepto adecuado de copia de seguridad de datos tambi\u00e9n ayuda contra la p\u00e9rdida de datos. Una copia de seguridad peri\u00f3dica de los datos es una de las tareas obligatorias. Es la \u00fanica manera de proteger los datos de p\u00e9rdidas y da\u00f1os.<\/p>","protected":false},"excerpt":{"rendered":"<p>Empresas repentinamente en modo remoto y la L\u00ednea de Defensa a corto plazo: \u00bfes \u00e9sta la tierra de la leche y la miel para los ciberdelincuentes? De hecho, la Oficina Federal de Polic\u00eda Criminal (BKA) est\u00e1 registrando un gran aumento de los ciberataques.<\/p>","protected":false},"author":1894,"featured_media":15608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[7,21,38353],"tags":[485,369],"coauthors":[36048],"class_list":["post-70278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-meinung","category-it-security","category-mag-20-11","tag-cyberkriminalitaet","tag-it"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2017\/03\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die Firmen pl\u00f6tzlich im Remote-Modus und die Defence Line in Kurzarbeit: Ist dies das Schlaraffenland f\u00fcr Cyberkriminelle? Tats\u00e4chlich verzeichnet das Bundeskriminalamt (BKA) eine hohe Zunahme von Cyberangriffen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/seguridad-informatica\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/mag-20-11\/\" rel=\"category tag\">MAG 20-11<\/a>","author_info_v2":{"name":"Christian Garske, Lufthansa Industry Solutions","url":"https:\/\/e3magpmp.greatsolution.dev\/es\/author\/christian-garske\/"},"comments_num_v2":"0 comentarios","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/70278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/users\/1894"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/comments?post=70278"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/70278\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media?parent=70278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/categories?post=70278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/tags?post=70278"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/coauthors?post=70278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}