{"id":6365,"date":"2022-09-15T10:19:02","date_gmt":"2022-09-15T13:19:02","guid":{"rendered":"https:\/\/blog.n5now.com\/phishing-tus-datos-son-tuyos\/"},"modified":"2022-09-23T10:43:02","modified_gmt":"2022-09-23T13:43:02","slug":"phishing-tus-datos-son-tuyos","status":"publish","type":"post","link":"https:\/\/blog.n5now.com\/en\/phishing-tus-datos-son-tuyos\/","title":{"rendered":"Phishing: Your data, is it yours?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is Phishing?<\/h2>\n\n\n\n<p>Phishing is a form of fraud in which an attacker impersonates a trusted entity or person in an email or other means.<\/p>\n\n\n\n<p>They create email accounts and web pages that pretend to be official for the user to enter their data (username, password, bank account and credit card data, etc.)<\/p>\n\n\n\n<p>Phishing is a popular form of cybercrime due to its effectiveness. Cybercriminals have had success using email, text, or direct messages on social media or in video games to get people to respond with their personal information.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"509\" src=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-1024x509.png\" alt=\"\" class=\"wp-image-6369\" srcset=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-1024x509.png 1024w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-300x149.png 300w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-768x382.png 768w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-150x75.png 150w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-696x346.png 696w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-1068x531.png 1068w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-845x420.png 845w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d-324x160.png 324w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329202917d.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing Attacks<\/h2>\n\n\n\n<p>The cybercriminal carries out the attack through electronic means, Mails, Messages (SMS, Whatsapp, etc.) or a phone call.<\/p>\n\n\n\n<p>Is impersonating a known public or private body or person.<\/p>\n\n\n\n<p>The objective of the cybercriminal is to obtain the greatest amount of data from his victim through this attack.<\/p>\n\n\n\n<p>95% of cybersecurity breaches are due to human error<\/p>\n\n\n\n<p>A cyberattack can not only cost a company an economic loss but also greatly damage its reputation.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"blob:https:\/\/blog.n5now.com\/e52f24e5-6efe-44ae-bc4c-c2fbcc72f1e7\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to detect a Phishing?<\/h2>\n\n\n\n<p>\u201cSender domain\u201d other than the organization it claims to belong to.<\/p>\n\n\n\n<p>\u201cUnknown sender\u201d.<\/p>\n\n\n\n<p>Mistakes of <strong>\u201cspelling\u201d <\/strong>and <strong>\u201cgrammatical\u201d errors.<\/strong><\/p>\n\n\n\n<p>The <strong>&#8220;URL&#8221;, <\/strong>links<strong> <\/strong>that<strong> <\/strong>does not match the company or organization.<\/p>\n\n\n\n<p>No entity will ask for data to be entered via email.<\/p>\n\n\n\n<p>Character of \u201curgency\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-1024x585.png\" alt=\"\" class=\"wp-image-6376\" srcset=\"https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-1024x585.png 1024w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-300x171.png 300w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-768x439.png 768w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-150x86.png 150w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-696x398.png 696w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-1068x610.png 1068w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d-735x420.png 735w, https:\/\/785-cms-cdn.azureedge.net\/n5cmsblob\/2022\/09\/image-632329e2d8d5d.png 1145w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How do I protect myself from Phishing?<\/h2>\n\n\n\n<ul><li>Be &#8220;Aware&#8221; that can happen to us.<\/li><li>Do not open links and attachments.<\/li><li>Use common sense, do not send data from corporate, bank or credit card accounts.<\/li><li>Keep the system updated.<\/li><li>URL\u201d, links that do not match the company or organization.<\/li><li>&#8220;MFA&#8221;, two-step authentication to be alert to improper access to your accounts.<\/li><li>If we were victims and entered the taos in a fraudulent website, proceed to change the password immediately.<\/li><li>&#8220;Distrust&#8221; is not paranoia<\/li><\/ul>\n\n\n\n<p>Gustavo Rold\u00e1n &#8211; SecOps<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity. In this paper you can find everything you need to know about phishing.<\/p>\n","protected":false},"author":2,"featured_media":6397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[209,212],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/posts\/6365"}],"collection":[{"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/comments?post=6365"}],"version-history":[{"count":5,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/posts\/6365\/revisions"}],"predecessor-version":[{"id":6428,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/posts\/6365\/revisions\/6428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/media\/6397"}],"wp:attachment":[{"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/media?parent=6365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/categories?post=6365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.n5now.com\/en\/wp-json\/wp\/v2\/tags?post=6365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}