{"id":2269,"date":"2017-04-10T23:38:57","date_gmt":"2017-04-10T21:38:57","guid":{"rendered":"https:\/\/www.hostingtg.com\/blog\/?p=2269"},"modified":"2026-01-09T13:02:23","modified_gmt":"2026-01-09T12:02:23","slug":"lidiar-ciberataque-web","status":"publish","type":"post","link":"https:\/\/www.hostingtg.com\/blog\/lidiar-ciberataque-web\/","title":{"rendered":"C\u00f3mo lidiar con un ciberataque  a tu web"},"content":{"rendered":"\n<p>Sigue en aumento los delitos cibern\u00e9ticos, las empresas est\u00e1n en la mira de los criminales modernos. La facilidad de los hackers ha crecido exponencialmente con los avances en el malware y nuevas razas de ransomware que golpean la web, estos pueden desviar el dinero o los datos de unexpecting negocio cada d\u00eda. El hecho es que se deben tomar previsiones para proteger tu sitio de ambos ataques dirigidos y software malicioso. Pero, sabes <strong>\u00bfc\u00f3mo lidiar con un ciberataque a tu web?.<\/strong><\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Evita el uso de redes de Wi-Fi p\u00fablicas o sin garant\u00eda<\/h2>\n\n\n\n<p>El uso de redes de Wi-Fi p\u00fablicas o sin garant\u00eda no es confiable, para hacer cualquier tipo de trabajo sensible, especialmente todo lo relacionado con tu negocio que requiera autenticaci\u00f3n. Todo esto <strong>debe hacerse a trav\u00e9s de una red segura<\/strong>. Si cuentas con un VPN de alg\u00fan tipo lo puedes usar, pero a\u00fan as\u00ed est\u00e1s jugando con fuego.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Presta atenci\u00f3n a cualquier actividad sospechosa<\/h2>\n\n\n\n<p>Es de vital importancia que <strong>configures alertas bancarias<\/strong> y prestes atenci\u00f3n a cualquier actividad sospechosa. No olvides comprobar tu actividad bancaria con regularidad.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Adquiere un seguro de robo de identidad y revisa tus contrase\u00f1as.<\/h2>\n\n\n\n<p>Es recomendable adquirir un seguro de robo de identidad, puedes <strong>suscribirte a un servicio que la protege<\/strong>. Por otra parte, echa un vistazo de cerca a tus contrase\u00f1as, verifica qu\u00e9 tan seguras son. Piensa que tan f\u00e1cil se le hace al atacante descifrar la informaci\u00f3n de acceso, despu\u00e9s de un tiempo.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ten un plan de recuperaci\u00f3n de desastres<\/h2>\n\n\n\n<p>Tener un plan de recuperaci\u00f3n de desastres en su lugar para cuando ocurra algo inesperado, esto te permitir\u00e1 tener <strong>seguridad adecuada durante y despu\u00e9s del ataque<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sigue en aumento los delitos cibern\u00e9ticos, las empresas est\u00e1n en la mira de los criminales modernos. La facilidad de los hackers ha crecido exponencialmente con los avances en el malware y nuevas razas de ransomware que golpean la web, estos pueden desviar el dinero o los datos de unexpecting negocio cada d\u00eda. El hecho es [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[430],"class_list":["post-2269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-ciberataque-a-tu-web"],"_links":{"self":[{"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/posts\/2269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/comments?post=2269"}],"version-history":[{"count":6,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/posts\/2269\/revisions"}],"predecessor-version":[{"id":7574,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/posts\/2269\/revisions\/7574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/media\/7573"}],"wp:attachment":[{"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/media?parent=2269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/categories?post=2269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostingtg.com\/blog\/wp-json\/wp\/v2\/tags?post=2269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}