{"id":26508,"date":"2022-04-19T15:45:00","date_gmt":"2022-04-19T13:45:00","guid":{"rendered":"https:\/\/perseus.de\/incidente-cibernetico\/"},"modified":"2026-03-30T09:50:59","modified_gmt":"2026-03-30T07:50:59","slug":"incidente-cibernetico","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/incidente-cibernetico\/","title":{"rendered":"Incidente cibern\u00e9tico"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26508\" class=\"elementor elementor-26508 elementor-22198\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2e4050d e-con-full e-flex e-con e-child\" data-id=\"2e4050d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Incidente cibern\u00e9tico<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25825\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e7de6be e-flex e-con-boxed e-con e-parent\" data-id=\"5e7de6be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2da113fc e-con-full e-flex e-con e-child\" data-id=\"2da113fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Un incidente cibern\u00e9tico es cualquier evento que afecte a la informaci\u00f3n almacenada o a los recursos inform\u00e1ticos y que pueda causar da\u00f1os significativos a tu negocio. La variedad de incidentes cibern\u00e9ticos es amplia, incluyendo infecciones por malware, extorsi\u00f3n, robo de datos confidenciales y uso indebido de cuentas bancarias. <\/p><h4><span style=\"color: inherit; font-family: inherit; font-size: 1.5rem;\"> <\/span><\/h4><h4><span style=\"color: inherit; font-family: inherit; font-size: 1.5rem;\">\u00bfQu\u00e9 significa en detalle el t\u00e9rmino incidente cibern\u00e9tico?<\/span><\/h4><p><span style=\"font-size: 1rem; color: inherit; font-family: inherit;\">Seg\u00fan el Allianz Risk Barometer 2019, los ciberincidentes est\u00e1n entre los mayores riesgos empresariales a nivel mundial, al nivel de las interrupciones comerciales. Es importante recordar que los ciberincidentes tambi\u00e9n pueden provocar interrupciones en el negocio, por ejemplo, si afectan a las instalaciones de producci\u00f3n, bloquean ordenadores o eliminan servidores. Para las empresas individuales, un incidente cibern\u00e9tico puede suponer altos costes. Seg\u00fan Allianz, el da\u00f1o medio reportado en Alemania es de dos millones de euros.   <\/span><\/p><p><strong style=\"font-size: 1rem;\"> <\/strong><\/p><h4><strong style=\"font-size: 1rem;\">Los tipos comunes de incidentes cibern\u00e9ticos incluyen:<\/strong><\/h4><ul><li>Infecciones por programas que bloquean uno, varios o todos los ordenadores y exigen un rescate, tras lo cual supuestamente se revierte el candado (lo cual no siempre ocurre)<\/li><li>Infecciones por programas que eliminan informaci\u00f3n importante, como datos de clientes<\/li><li>Eliminaci\u00f3n accidental o maliciosa de tus datos por parte de empleados o exempleados<br>Phishing (correos electr\u00f3nicos fraudulentos)<\/li><li>Ingenier\u00eda social (robo de informaci\u00f3n a trav\u00e9s de la construcci\u00f3n abusiva de relaciones, a menudo con personas inventadas \u00fanicamente para este prop\u00f3sito)<\/li><\/ul><h3> <\/h3><h4>\u00bfD\u00f3nde encuentro incidentes cibern\u00e9ticos en mi trabajo diario?<\/h4><p>Desafortunadamente, puedes encontrarte con el tema de los ciberincidentes en muchas etapas de tu trabajo cotidiano. Por ejemplo: <\/p><ul><li>Tras hacer clic descuidado en un enlace de un correo electr\u00f3nico<\/li><li>Despu\u00e9s de abrir un archivo adjunto de correo electr\u00f3nico que contiene malware<\/li><li>Despu\u00e9s de conectar la memoria USB de un cliente<\/li><li>Despu\u00e9s de conectar un smartphone personal a la red Wi-Fi corporativa<\/li><li>Desafortunadamente, las consecuencias pueden ser significativas y causar un gran da\u00f1o a tu negocio.<\/li><\/ul><p> <\/p><p>Desde un punto de vista positivo, esto crea muchas oportunidades para que en tu trabajo diario protejas tu empresa de los da\u00f1os causados por incidentes cibern\u00e9ticos mediante acciones bien meditadas.<\/p><h4> <\/h4><h4>\u00bfQu\u00e9 puedo hacer para protegerme de los incidentes cibern\u00e9ticos?<\/h4><p><span style=\"font-size: 1rem; color: inherit; font-family: inherit;\">Minimizar eficazmente los distintos tipos de incidentes cibern\u00e9ticos es una tarea integral, pero cada medida ayuda. Ya sea que empiece contigo personalmente, con todo el personal, en la sala de servidores o en la red.   <\/span><\/p><p> <\/p><p><span style=\"font-size: 1rem; color: inherit; font-family: inherit;\">Por ejemplo:<\/span><\/p><ul><li>Por principio, no hagas clic en enlaces de correos electr\u00f3nicos. En su lugar, usa conscientemente el desv\u00edo a trav\u00e9s del navegador. <\/li><li>Trata los archivos adjuntos de los correos electr\u00f3nicos con mucha recela. Si es necesario, comprueba el origen de forma independiente de tu programa de correo electr\u00f3nico (por ejemplo, llamando). <\/li><li>Intenta evitar los USB externos o privados tanto como puedas<\/li><li>Configura una red Wi-Fi separada en tu empresa para dispositivos que tambi\u00e9n se usan para uso personal, como smartphones.<\/li><\/ul><h4> <\/h4><h4>M\u00e1s informaci\u00f3n interesante se puede encontrar en:<\/h4><ul><li><a href=\"https:\/\/polizei.brandenburg.de\/seite\/internetkriminalitaet\/2460110\">Gu\u00eda sobre el delito en Internet<\/a> de la Polic\u00eda de Brandeburgo con explicaciones y opciones de acci\u00f3n<br>P\u00e1gina tem\u00e1tica \u00ab<a href=\"http:\/\/www.sicher-im-netz.de\/it-sicherheit-am-arbeitsplatz\">Seguridad inform\u00e1tica en el lugar de trabajo<\/a>\u00bb de Deutschland sicher im Netz e. V.<\/li><li>En la web <a href=\"http:\/\/www.botfrei.de\/de\/index.html\">sin bots<\/a>, puedes encontrar consejos de seguridad, programas para revisar archivos sospechosos en l\u00ednea y programas de primeros intervinientes, como la eliminaci\u00f3n de malware<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-209c16c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"209c16c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Incidente cibern\u00e9tico Un incidente cibern\u00e9tico es cualquier evento que afecte a la informaci\u00f3n almacenada o a los recursos inform\u00e1ticos y que pueda causar da\u00f1os significativos a tu negocio. La variedad de incidentes cibern\u00e9ticos es amplia, incluyendo infecciones por malware, extorsi\u00f3n, robo de datos confidenciales y uso indebido de cuentas bancarias. \u00bfQu\u00e9 significa en detalle el [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-26508","post","type-post","status-publish","format-standard","hentry","category-ciberlexico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incidente cibern\u00e9tico - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/incidente-cibernetico\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incidente cibern\u00e9tico - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Incidente cibern\u00e9tico Un incidente cibern\u00e9tico es cualquier evento que afecte a la informaci\u00f3n almacenada o a los recursos inform\u00e1ticos y que pueda causar da\u00f1os significativos a tu negocio. La variedad de incidentes cibern\u00e9ticos es amplia, incluyendo infecciones por malware, extorsi\u00f3n, robo de datos confidenciales y uso indebido de cuentas bancarias. \u00bfQu\u00e9 significa en detalle el [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/incidente-cibernetico\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:50:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Incidente cibern\u00e9tico\",\"datePublished\":\"2022-04-19T13:45:00+00:00\",\"dateModified\":\"2026-03-30T07:50:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/\"},\"wordCount\":576,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Ciberl\u00e9xico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/\",\"name\":\"Incidente cibern\u00e9tico - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:45:00+00:00\",\"dateModified\":\"2026-03-30T07:50:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/incidente-cibernetico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incidente cibern\u00e9tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incidente cibern\u00e9tico - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/incidente-cibernetico\/","og_locale":"es_ES","og_type":"article","og_title":"Incidente cibern\u00e9tico - Perseus Technologies","og_description":"Incidente cibern\u00e9tico Un incidente cibern\u00e9tico es cualquier evento que afecte a la informaci\u00f3n almacenada o a los recursos inform\u00e1ticos y que pueda causar da\u00f1os significativos a tu negocio. La variedad de incidentes cibern\u00e9ticos es amplia, incluyendo infecciones por malware, extorsi\u00f3n, robo de datos confidenciales y uso indebido de cuentas bancarias. \u00bfQu\u00e9 significa en detalle el [&hellip;]","og_url":"https:\/\/perseus.de\/es\/incidente-cibernetico\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:45:00+00:00","article_modified_time":"2026-03-30T07:50:59+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Incidente cibern\u00e9tico","datePublished":"2022-04-19T13:45:00+00:00","dateModified":"2026-03-30T07:50:59+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/"},"wordCount":576,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Ciberl\u00e9xico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/incidente-cibernetico\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/","url":"https:\/\/perseus.de\/es\/incidente-cibernetico\/","name":"Incidente cibern\u00e9tico - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:45:00+00:00","dateModified":"2026-03-30T07:50:59+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/incidente-cibernetico\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/incidente-cibernetico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Incidente cibern\u00e9tico"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=26508"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26508\/revisions"}],"predecessor-version":[{"id":26509,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26508\/revisions\/26509"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=26508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=26508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=26508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}