{"id":288,"date":"2022-02-11T20:00:44","date_gmt":"2022-02-11T20:00:44","guid":{"rendered":"https:\/\/kabik.mx\/blog\/?p=288"},"modified":"2022-03-24T21:07:46","modified_gmt":"2022-03-24T21:07:46","slug":"la-ciberseguridad-en-estos-ultimos-tiempos","status":"publish","type":"post","link":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/","title":{"rendered":"La ciberseguridad en estos \u00faltimos tiempos"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"background-color: rgba(255,255,255,0);background-image: url(&quot;https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2021\/10\/KAB-001-102821-Header-Blog-A.jpg&quot;);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><h2 style=\"line-height: 1.3;text-align: center\"><span style=\"color: #0097ff\"><strong><span style=\"color: #000000\">La<\/span> ciberseguridad <span style=\"color: #000000\">en<\/span><\/strong><\/span><\/h2>\n<h2 style=\"line-height: 1.3;text-align: center\"><span style=\"color: #0097ff\"><strong><span style=\"color: #000000\">estos \u00faltimos tiempos<\/span><\/strong><\/span><\/h2>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 9%;margin-top : 0%;padding-right : 0px;padding-bottom : 8%;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"background-color: rgba(255,255,255,0);background-image: url(&quot;https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2021\/10\/KAB-001-102821-Header-Blog-A.jpg&quot;);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-2\"><h2 style=\"line-height: 1.3;font-size: 18px;text-align: center\"><strong>La <\/strong><span style=\"color: #0097ff\"><strong>ciberseguridad <\/strong><\/span><strong>en<\/strong><\/h2>\n<h2 style=\"line-height: 1.3;font-size: 18px;text-align: center\"><strong>estos \u00faltimos tiempos<\/strong><\/h2>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-1{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-1 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-1{width:100% !important;order : 0;}.fusion-builder-column-1 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-1{width:100% !important;order : 0;}.fusion-builder-column-1 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-2{ padding-top : 8%;margin-top : 0%;padding-right : 0px;padding-bottom : 3%;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-3\"><h4 style=\"text-align: center\"><span style=\"color: #0097ff\"><strong>Protecci\u00f3n de Datos<\/strong><\/span><br \/>\nGran reto para las marcas de computo<\/h4>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;flex-grow:10;margin-top:10px;margin-bottom:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-4\"><p>Los acontecimientos de estos a\u00f1os han modificado nuestra forma de vivir e interactuar con otras personas, un cambio relevante fue el aislamiento y por tal motivo el incremento del trabajo en casa o como muchos lo conocen, el home office, de tal manera que la demanda de equipos port\u00e1tiles y de escritorio aument\u00f3 y con ello llegaron los retos para los fabricantes para cubrir la demanda del producto, as\u00ed como las necesidades de los usuarios, sobre todo en el rubro de la seguridad.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-2{width:100% !important;margin-top : 0px;margin-bottom : 0%;}.fusion-builder-column-2 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-2{width:100% !important;order : 0;}.fusion-builder-column-2 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-2{width:100% !important;order : 0;}.fusion-builder-column-2 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-3{ padding-top : 0px;margin-top : 5%;padding-right : 22%;padding-bottom : 0px;margin-bottom : 0%;padding-left : 22%;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;flex-grow:10;margin-top:10px;margin-bottom:10px;width:100%;max-width:10%;\"><\/div><div ><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1080\" height=\"450\" title=\"IMG_BLOG_CIBERSEGURIDAD_02\" src=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_02.png\" alt class=\"img-responsive wp-image-299\" srcset=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_02-200x83.png 200w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_02-400x167.png 400w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_02-600x250.png 600w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_02-800x333.png 800w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_02.png 1080w\" sizes=\"(max-width: 640px) 100vw, 1080px\" \/><\/span><\/div><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;flex-grow:10;margin-top:10px;margin-bottom:10px;width:100%;max-width:0px;\"><\/div><div class=\"fusion-text fusion-text-5\"><p>Todos queremos sentirnos tranquilos cuando navegamos por internet, saber que nuestra informaci\u00f3n est\u00e1 protegida de ataques externos. Fue as\u00ed que las marcas invirtieron recursos en crear equipos con m\u00e1s capas de seguridad, as\u00ed como anal\u00edticos, que le brindan al usuario gran variedad de controles tanto para acceso al internet como la optimizaci\u00f3n de los recursos.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-3{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-3 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-3{width:100% !important;order : 0;}.fusion-builder-column-3 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-3{width:100% !important;order : 0;}.fusion-builder-column-3 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-4{ padding-top : 0px;margin-top : 0%;padding-right : 22%;padding-bottom : 0px;margin-bottom : 0px;padding-left : 22%;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div ><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"500\" height=\"600\" title=\"IMG_BLOG_CIBERSEGURIDAD_03\" src=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03.png\" alt class=\"img-responsive wp-image-303\" srcset=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03-200x240.png 200w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03-400x480.png 400w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03.png 500w\" sizes=\"(max-width: 640px) 100vw, 500px\" \/><\/span><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-4{width:50% !important;margin-top : 0%;margin-bottom : 20px;}.fusion-builder-column-4 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 3.84%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-4{width:50% !important;order : 0;}.fusion-builder-column-4 > .fusion-column-wrapper {margin-right : 3.84%;margin-left : 3.84%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-4{width:100% !important;order : 0;}.fusion-builder-column-4 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-6\"><p>Por ejemplo, la marca<strong> Intel<\/strong> apost\u00f3 por la <strong>Plataforma VPRO<\/strong> la cual ha sido dise\u00f1ada para ofrecer beneficios empresariales en cuatro \u00e1reas principales: desempe\u00f1o, seguridad, capacidad de administraci\u00f3n y estabilidad.<\/p>\n<\/div><div class=\"fusion-text fusion-text-7\"><p>Por su parte <strong>AMD<\/strong> maneja su tecnolog\u00eda <strong>PSP (Platform Security Processor)<\/strong> la cual se ejecuta a nivel hardware y lo que hace esta tecnolog\u00eda es crear un entorno seguro que divide la CPU en dos mundos virtuales, lo que permite hacer que las tareas m\u00e1s delicadas se ejecuten en este procesador seguro, mientras que el resto se ejecutan en el mundo est\u00e1ndar. Esto ayuda a garantizar el almacenamiento y procesamiento seguro de datos delicados y aplicaciones confiables, as\u00ed como a proteger la integridad y confidencialidad de recursos clave.<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><p>Existen marcas de software como<strong> Kaspersky<\/strong> o <strong>Microsoft<\/strong> que constantemente hacen actualizaciones en sus sistemas con el objetivo ofrecer mayor protecci\u00f3n de datos a los usuarios.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-5{width:50% !important;margin-top : 0%;margin-bottom : 0%;}.fusion-builder-column-5 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 3.84%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-5{width:50% !important;order : 0;}.fusion-builder-column-5 > .fusion-column-wrapper {margin-right : 3.84%;margin-left : 3.84%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-5{width:100% !important;order : 0;}.fusion-builder-column-5 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-5{ padding-top : 0px;margin-top : 0%;padding-right : 22%;padding-bottom : 0px;margin-bottom : 0px;padding-left : 22%;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility fusion-no-large-visibility\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div ><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"500\" height=\"600\" title=\"IMG_BLOG_CIBERSEGURIDAD_03\" src=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03.png\" alt class=\"img-responsive wp-image-303\" srcset=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03-200x240.png 200w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03-400x480.png 400w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_03.png 500w\" sizes=\"(max-width: 640px) 100vw, 500px\" \/><\/span><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-6{width:50% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-6 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 3.84%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-6{width:50% !important;order : 0;}.fusion-builder-column-6 > .fusion-column-wrapper {margin-right : 3.84%;margin-left : 3.84%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-6{width:100% !important;order : 0;}.fusion-builder-column-6 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-9\"><p>Por ejemplo, la marca<strong> Intel<\/strong> apost\u00f3 por la <strong>Plataforma VPRO<\/strong> la cual ha sido dise\u00f1ada para ofrecer beneficios empresariales en cuatro \u00e1reas principales: desempe\u00f1o, seguridad, capacidad de administraci\u00f3n y estabilidad.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-7{width:50% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-7 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 3.84%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-7{width:50% !important;order : 0;}.fusion-builder-column-7 > .fusion-column-wrapper {margin-right : 3.84%;margin-left : 3.84%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-7{width:100% !important;order : 0;}.fusion-builder-column-7 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;flex-grow:10;margin-top:10px;margin-bottom:10px;width:100%;max-width:0%;\"><\/div><div class=\"fusion-text fusion-text-10\"><p>Por su parte <strong>AMD<\/strong> maneja su tecnolog\u00eda <strong>PSP (Platform Security Processor)<\/strong> la cual se ejecuta a nivel hardware y lo que hace esta tecnolog\u00eda es crear un entorno seguro que divide la CPU en dos mundos virtuales, lo que permite hacer que las tareas m\u00e1s delicadas se ejecuten en este procesador seguro, mientras que el resto se ejecutan en el mundo est\u00e1ndar. Esto ayuda a garantizar el almacenamiento y procesamiento seguro de datos delicados y aplicaciones confiables, as\u00ed como a proteger la integridad y confidencialidad de recursos clave.<\/p>\n<\/div><div class=\"fusion-text fusion-text-11\"><p>Existen marcas de software como<strong> Kaspersky<\/strong> o <strong>Microsoft<\/strong> que constantemente hacen actualizaciones en sus sistemas con el objetivo ofrecer mayor protecci\u00f3n de datos a los usuarios.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-8{width:100% !important;margin-top : 0px;margin-bottom : 0%;}.fusion-builder-column-8 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-8{width:100% !important;order : 0;}.fusion-builder-column-8 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-8{width:100% !important;order : 0;}.fusion-builder-column-8 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-6{ padding-top : 0px;margin-top : 0%;padding-right : 22%;padding-bottom : 0px;margin-bottom : 0px;padding-left : 22%;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#e2e2e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-12\"><p>Los expertos recomiendan cambiar regularmente nuestras contrase\u00f1as, no usar datos personales como fechas de cumplea\u00f1os ya sea propio o de familiares, nombres de mascotas o cualquier informaci\u00f3n que sea publica y est\u00e9 al alcance de hackers, as\u00ed mismo contar con un antivirus robusto que sea capaz de cubrir la mayor\u00eda de las vulnerabilidades que se presentan al navegar en internet.<\/p>\n<p>Y en el caso de las empresas es supervisar el uso de emails, estar alerta al tr\u00e1fico anormal, identificar conexiones sospechosas, supervisar la alteraci\u00f3n de aplicaciones, monitoreo de bases de datos entre otras.<\/p>\n<\/div><div ><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1080\" height=\"450\" title=\"IMG_BLOG_CIBERSEGURIDAD_04\" src=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_04.png\" alt class=\"img-responsive wp-image-307\" srcset=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_04-200x83.png 200w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_04-400x167.png 400w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_04-600x250.png 600w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_04-800x333.png 800w, https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_04.png 1080w\" sizes=\"(max-width: 640px) 100vw, 1080px\" \/><\/span><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-9{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-9 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-9{width:100% !important;order : 0;}.fusion-builder-column-9 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-9{width:100% !important;order : 0;}.fusion-builder-column-9 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-7{ padding-top : 0px;margin-top : 0%;padding-right : 22%;padding-bottom : 0px;margin-bottom : 0px;padding-left : 22%;}<\/style><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":316,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La ciberseguridad en estos \u00faltimos tiempos - Kabik Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La ciberseguridad en estos \u00faltimos tiempos - Kabik Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/\" \/>\n<meta property=\"og:site_name\" content=\"Kabik Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T20:00:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-24T21:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"734\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rosa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kabik.mx\/blog\/#website\",\"url\":\"https:\/\/kabik.mx\/blog\/\",\"name\":\"Kabik Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kabik.mx\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_01.png\",\"contentUrl\":\"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_01.png\",\"width\":1400,\"height\":734},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#webpage\",\"url\":\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/\",\"name\":\"La ciberseguridad en estos \u00faltimos tiempos - Kabik Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kabik.mx\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#primaryimage\"},\"datePublished\":\"2022-02-11T20:00:44+00:00\",\"dateModified\":\"2022-03-24T21:07:46+00:00\",\"author\":{\"@id\":\"https:\/\/kabik.mx\/blog\/#\/schema\/person\/2f703b3f8f4ac83ccbc32d8db262f9c3\"},\"breadcrumb\":{\"@id\":\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/kabik.mx\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La ciberseguridad en estos \u00faltimos tiempos\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kabik.mx\/blog\/#\/schema\/person\/2f703b3f8f4ac83ccbc32d8db262f9c3\",\"name\":\"Rosa\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/kabik.mx\/blog\/#personlogo\",\"inLanguage\":\"es\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1a6b640243fb0b0a656b69a6ab9378062c875829c586599fa65580f17ff4525?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1a6b640243fb0b0a656b69a6ab9378062c875829c586599fa65580f17ff4525?s=96&d=mm&r=g\",\"caption\":\"Rosa\"},\"url\":\"https:\/\/kabik.mx\/blog\/index.php\/author\/rosa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La ciberseguridad en estos \u00faltimos tiempos - Kabik Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/","og_locale":"es_MX","og_type":"article","og_title":"La ciberseguridad en estos \u00faltimos tiempos - Kabik Blog","og_url":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/","og_site_name":"Kabik Blog","article_published_time":"2022-02-11T20:00:44+00:00","article_modified_time":"2022-03-24T21:07:46+00:00","og_image":[{"width":1400,"height":734,"url":"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_01.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Rosa","Tiempo de lectura":"14 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/kabik.mx\/blog\/#website","url":"https:\/\/kabik.mx\/blog\/","name":"Kabik Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kabik.mx\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#primaryimage","inLanguage":"es","url":"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_01.png","contentUrl":"https:\/\/kabik.mx\/blog\/wp-content\/uploads\/2022\/02\/IMG_BLOG_CIBERSEGURIDAD_01.png","width":1400,"height":734},{"@type":"WebPage","@id":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#webpage","url":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/","name":"La ciberseguridad en estos \u00faltimos tiempos - Kabik Blog","isPartOf":{"@id":"https:\/\/kabik.mx\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#primaryimage"},"datePublished":"2022-02-11T20:00:44+00:00","dateModified":"2022-03-24T21:07:46+00:00","author":{"@id":"https:\/\/kabik.mx\/blog\/#\/schema\/person\/2f703b3f8f4ac83ccbc32d8db262f9c3"},"breadcrumb":{"@id":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kabik.mx\/blog\/index.php\/2022\/02\/11\/la-ciberseguridad-en-estos-ultimos-tiempos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/kabik.mx\/blog\/"},{"@type":"ListItem","position":2,"name":"La ciberseguridad en estos \u00faltimos tiempos"}]},{"@type":"Person","@id":"https:\/\/kabik.mx\/blog\/#\/schema\/person\/2f703b3f8f4ac83ccbc32d8db262f9c3","name":"Rosa","image":{"@type":"ImageObject","@id":"https:\/\/kabik.mx\/blog\/#personlogo","inLanguage":"es","url":"https:\/\/secure.gravatar.com\/avatar\/d1a6b640243fb0b0a656b69a6ab9378062c875829c586599fa65580f17ff4525?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1a6b640243fb0b0a656b69a6ab9378062c875829c586599fa65580f17ff4525?s=96&d=mm&r=g","caption":"Rosa"},"url":"https:\/\/kabik.mx\/blog\/index.php\/author\/rosa\/"}]}},"_links":{"self":[{"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/posts\/288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":37,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/posts\/288\/revisions\/369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/media\/316"}],"wp:attachment":[{"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kabik.mx\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}