{"@context":"http:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/ayudaleyprotecciondatos.es\/category\/ciberseguridad\/#CollectionPage","headline":"CIBERSEGURIDAD Category","description":"","url":"https:\/\/ayudaleyprotecciondatos.es\/category\/ciberseguridad\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2024\/04\/10\/ciberseguros\/","headline":"Ciberseguros para empresas: \u00bfPor qu\u00e9 deber\u00edas contar con un ciberseguro?","url":"https:\/\/ayudaleyprotecciondatos.es\/2024\/04\/10\/ciberseguros\/","datePublished":"2024-04-10","dateModified":"2024-04-10","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2024\/04\/10\/ciberseguros\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2024\/04\/ciberseguro.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2024\/04\/ciberseguro.jpg","height":800,"width":1400},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2023\/11\/09\/como-identificar-dominios-falsos\/","headline":"C\u00f3mo identificar dominios falsos","url":"https:\/\/ayudaleyprotecciondatos.es\/2023\/11\/09\/como-identificar-dominios-falsos\/","datePublished":"2023-11-09","dateModified":"2023-11-07","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2023\/11\/09\/como-identificar-dominios-falsos\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2023\/09\/como-identificar-dominios-falsos-2.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2023\/09\/como-identificar-dominios-falsos-2.jpg","height":800,"width":1400},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/25\/buscadores-dispositivos-iot\/","headline":"Buscadores de dispositivos IoT \u00bfqu\u00e9 son?, \u00bfqu\u00e9 riesgos tienen?","url":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/25\/buscadores-dispositivos-iot\/","datePublished":"2023-05-25","dateModified":"2023-05-04","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/25\/buscadores-dispositivos-iot\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/10\/buscadores-dispositivos-iot-1.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/10\/buscadores-dispositivos-iot-1.jpg","height":800,"width":1400},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/19\/arrancar-mac-modo-seguro\/","headline":"C\u00f3mo arrancar Mac en modo seguro","url":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/19\/arrancar-mac-modo-seguro\/","datePublished":"2023-05-19","dateModified":"2023-05-04","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/19\/arrancar-mac-modo-seguro\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/01\/arrancar-mac-en-modo-seguro.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/01\/arrancar-mac-en-modo-seguro.jpg","height":1067,"width":1601},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/15\/como-saber-email-es-falso\/","headline":"C\u00f3mo saber si estamos ante un email fraudulento","url":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/15\/como-saber-email-es-falso\/","datePublished":"2023-05-15","dateModified":"2023-05-04","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/15\/como-saber-email-es-falso\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2021\/12\/como-saber-email-falso-01.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2021\/12\/como-saber-email-falso-01.jpg","height":796,"width":1600},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/04\/identificacion-autenticacion-autorizacion\/","headline":"Identificaci\u00f3n, autenticaci\u00f3n y autorizaci\u00f3n \u00bfEn qu\u00e9 se diferencian?","url":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/04\/identificacion-autenticacion-autorizacion\/","datePublished":"2023-05-04","dateModified":"2023-05-04","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2023\/05\/04\/identificacion-autenticacion-autorizacion\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2023\/04\/identificacion-autenticacion-1.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2023\/04\/identificacion-autenticacion-1.jpg","height":800,"width":1600},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2022\/08\/30\/sanitizacion-informacion\/","headline":"La sanitizaci\u00f3n de informaci\u00f3n \u00bfQu\u00e9 es? \u00bfPor qu\u00e9 debe hacerse?","url":"https:\/\/ayudaleyprotecciondatos.es\/2022\/08\/30\/sanitizacion-informacion\/","datePublished":"2022-08-30","dateModified":"2022-08-26","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2022\/08\/30\/sanitizacion-informacion\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/04\/sanitizacion-informacion-1.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/04\/sanitizacion-informacion-1.jpg","height":967,"width":1600},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2022\/08\/09\/como-proteger-cuenta-online-estafadores\/","headline":"C\u00f3mo proteger nuestra cuenta online de posibles estafadores","url":"https:\/\/ayudaleyprotecciondatos.es\/2022\/08\/09\/como-proteger-cuenta-online-estafadores\/","datePublished":"2022-08-09","dateModified":"2022-08-09","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2022\/08\/09\/como-proteger-cuenta-online-estafadores\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/#Person","name":"Helena","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/helena\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b023e7afa5522ddec000b8b3b8bf4f7c?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/08\/proteger-cuenta-online-1.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/08\/proteger-cuenta-online-1.jpg","height":750,"width":1124},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2022\/07\/11\/url-acortadas-como-saber-si-son-seguras\/","headline":"URL acortadas. \u00bfC\u00f3mo saber si son seguras?","url":"https:\/\/ayudaleyprotecciondatos.es\/2022\/07\/11\/url-acortadas-como-saber-si-son-seguras\/","datePublished":"2022-07-11","dateModified":"2022-07-11","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2022\/07\/11\/url-acortadas-como-saber-si-son-seguras\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/ferkurt21\/#Person","name":"Fernando Tablado","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/ferkurt21\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/44a22e5e73783cc104da9c4ab11587bc?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/44a22e5e73783cc104da9c4ab11587bc?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/07\/url-acortadas.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/07\/url-acortadas.jpg","height":803,"width":1399},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/ayudaleyprotecciondatos.es\/2022\/07\/04\/detectar-vulnerabilidades-empresa\/","headline":"C\u00f3mo detectar las vulnerabilidades para mejorar la ciberseguridad de la empresa","url":"https:\/\/ayudaleyprotecciondatos.es\/2022\/07\/04\/detectar-vulnerabilidades-empresa\/","datePublished":"2022-07-04","dateModified":"2022-07-04","mainEntityOfPage":"https:\/\/ayudaleyprotecciondatos.es\/2022\/07\/04\/detectar-vulnerabilidades-empresa\/","author":{"@type":"Person","@id":"https:\/\/ayudaleyprotecciondatos.es\/author\/ferkurt21\/#Person","name":"Fernando Tablado","url":"https:\/\/ayudaleyprotecciondatos.es\/author\/ferkurt21\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/44a22e5e73783cc104da9c4ab11587bc?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/44a22e5e73783cc104da9c4ab11587bc?s=96&d=blank&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"AyudaLeyProteccionDatos","logo":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2016\/01\/ayuda-ley-proteccion-datos.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/07\/detectar-vulnerabilidades.jpg","url":"https:\/\/ayudaleyprotecciondatos.es\/wp-content\/uploads\/2022\/07\/detectar-vulnerabilidades.jpg","height":933,"width":1400},"keywords":null}]}