{"id":28154,"date":"2025-03-06T17:26:00","date_gmt":"2025-03-06T16:26:00","guid":{"rendered":"https:\/\/perseus.de\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/"},"modified":"2026-03-31T14:38:40","modified_gmt":"2026-03-31T12:38:40","slug":"en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/","title":{"rendered":"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28154\" class=\"elementor elementor-28154 elementor-23049\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Un restaurante fue informado sobre un incidente de seguridad inform\u00e1tica en un proveedor de software cuya plataforma se utiliza para pedidos, administraci\u00f3n y pagos. Los atacantes obtuvieron acceso no autorizado a datos personales de clientes, incluidos nombres, direcciones de correo electr\u00f3nico y, en algunos casos, datos de tarjetas de cr\u00e9dito. El desencadenante fue la mala conducta de una empleada contable externa que introdujo accidentalmente sus datos de acceso en una p\u00e1gina de inicio de sesi\u00f3n falsa que parec\u00eda enga\u00f1osamente similar a la plataforma original.  <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-28153\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cr\u00e9dito de la imagen: Gerd Altmann v\u00eda Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/h4><p><em>Tenga en cuenta que el presente caso se basa en un incidente real. Para proteger la identidad de las partes implicadas, se utilizan nombres ficticios para las empresas y personas implicadas. <\/em><\/p><p>Un restaurante que ofrece pedidos online fue notificado de un incidente de seguridad inform\u00e1tica en uno de sus proveedores de software. Este proveedor gestiona la plataforma QuickEatery, que el restaurante utiliza para el sistema de pedidos, la administraci\u00f3n y el pago, entre otras cosas. <\/p><p>El operador de QuickEatery descubri\u00f3 acceso no autorizado a los datos de los clientes. Informaci\u00f3n personal como nombres, direcciones de correo electr\u00f3nico y, en algunos casos, datos sensibles, incluidos los \u00faltimos cuatro d\u00edgitos de las tarjetas de cr\u00e9dito almacenadas en el sistema, se vio afectada. El proveedor de QuickEatery inform\u00f3 entonces a todos los clientes corporativos afectados, incluido el restaurante mencionado.  <\/p><p>Sin embargo, el incidente fue causado por la mala conducta de un tercero. Los delincuentes accedieron a los datos de acceso de la plataforma QuickEatery debido al comportamiento descuidado de un empleado de una firma contable externa. Este \u00faltimo intent\u00f3 iniciar sesi\u00f3n en la plataforma para comprobar los pagos y facturas recibidos para el operador de QuickEatery. Cuando esto no tuvo \u00e9xito, busc\u00f3 en internet una forma alternativa de registrarse y la encontr\u00f3.   <\/p><p>En el proceso, se top\u00f3 con una p\u00e1gina web que parec\u00eda enga\u00f1osamente similar a la original de QuickEatery, pero que hab\u00eda sido manipulada por atacantes. Las credenciales introducidas all\u00ed se transmit\u00edan directamente a los actores de la amenaza. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Descarga el estudio de caso para aprender:\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\"><li>\u00bfC\u00f3mo pod\u00edan los atacantes enga\u00f1ar a sus v\u00edctimas?<\/li><li>\u00bfCu\u00e1les son las consecuencias de ataques de este tipo?<\/li><li>\u00a1C\u00f3mo pueden las empresas prevenir estos ataques!<\/li><li> <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe style=\"display: block; margin-left: auto; margin-right: auto; max-width: 100%;\" src=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAEvcoC64soriczNQscjY1aRxkAuwVqd7Z33Rjj8IJN54iDMiOq6YI7VkkXyDENMRGT9caSYHjywYCuxevSnMXIk7SocDiQN4u-FWfCJvf1c7fmbRqfvROW1gmung1K6zZAg40lxK1nCWA8wKYMLSYDkFSN7Vs30rPjMFfnKp9O0cuGNa9Y1syA3rHhARv2h4VS2LJzB8MRP5\" width=\"540\" height=\"720\" frameborder=\"0\" scrolling=\"auto\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Un restaurante fue informado sobre un incidente de seguridad inform\u00e1tica en un proveedor de software cuya plataforma se utiliza para pedidos, administraci\u00f3n y pagos. Los atacantes obtuvieron acceso no autorizado a datos personales de clientes, incluidos nombres, direcciones de correo electr\u00f3nico y, en algunos casos, datos de tarjetas de cr\u00e9dito. El desencadenante fue la mala conducta de una empleada contable externa que introdujo accidentalmente sus datos de acceso en una p\u00e1gina de inicio de sesi\u00f3n falsa que parec\u00eda enga\u00f1osamente similar a la plataforma original.  <\/p>\n","protected":false},"author":3,"featured_media":28153,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[67],"tags":[],"class_list":["post-28154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-estudios-de-caso"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Un restaurante fue informado sobre un incidente de seguridad inform\u00e1tica en un proveedor de software cuya plataforma se utiliza para pedidos, administraci\u00f3n y pagos. Los atacantes obtuvieron acceso no autorizado a datos personales de clientes, incluidos nombres, direcciones de correo electr\u00f3nico y, en algunos casos, datos de tarjetas de cr\u00e9dito. El desencadenante fue la mala conducta de una empleada contable externa que introdujo accidentalmente sus datos de acceso en una p\u00e1gina de inicio de sesi\u00f3n falsa que parec\u00eda enga\u00f1osamente similar a la plataforma original.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-06T16:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:38:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas\",\"datePublished\":\"2025-03-06T16:26:00+00:00\",\"dateModified\":\"2026-03-31T12:38:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"articleSection\":[\"Estudios de caso\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/\",\"name\":\"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"datePublished\":\"2025-03-06T16:26:00+00:00\",\"dateModified\":\"2026-03-31T12:38:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/","og_locale":"es_ES","og_type":"article","og_title":"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas - Perseus Technologies","og_description":"Un restaurante fue informado sobre un incidente de seguridad inform\u00e1tica en un proveedor de software cuya plataforma se utiliza para pedidos, administraci\u00f3n y pagos. Los atacantes obtuvieron acceso no autorizado a datos personales de clientes, incluidos nombres, direcciones de correo electr\u00f3nico y, en algunos casos, datos de tarjetas de cr\u00e9dito. El desencadenante fue la mala conducta de una empleada contable externa que introdujo accidentalmente sus datos de acceso en una p\u00e1gina de inicio de sesi\u00f3n falsa que parec\u00eda enga\u00f1osamente similar a la plataforma original.","og_url":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/","og_site_name":"Perseus Technologies","article_published_time":"2025-03-06T16:26:00+00:00","article_modified_time":"2026-03-31T12:38:40+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas","datePublished":"2025-03-06T16:26:00+00:00","dateModified":"2026-03-31T12:38:40+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","articleSection":["Estudios de caso"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/","url":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/","name":"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","datePublished":"2025-03-06T16:26:00+00:00","dateModified":"2026-03-31T12:38:40+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/en-el-enfoque-incidente-de-seguridad-informatica-en-tres-esquinas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"En el enfoque: incidente de seguridad inform\u00e1tica en tres esquinas"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/28154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=28154"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/28154\/revisions"}],"predecessor-version":[{"id":28155,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/28154\/revisions\/28155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media\/28153"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=28154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=28154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=28154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}