{"id":17879,"date":"2020-04-15T13:36:09","date_gmt":"2020-04-15T16:36:09","guid":{"rendered":"http:\/\/nextware.com.ar\/wp-nuevo-sitio-web\/wordpress\/?p=17879"},"modified":"2021-09-07T16:56:42","modified_gmt":"2021-09-07T19:56:42","slug":"5-consejos-para-detectar-un-correo-electronico-sospechoso","status":"publish","type":"post","link":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/","title":{"rendered":"5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso"},"content":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_separator color=&#8221;#bf0026&#8243; type=&#8221;small&#8221; position=&#8221;center&#8221; up=&#8221;10&#8243; down=&#8221;10&#8243;][vc_column_text css=&#8221;.vc_custom_1581623670348{padding-top: 5% !important;padding-right: 5% !important;padding-bottom: 5% !important;padding-left: 5% !important;background-color: #eeeeee !important;border-radius: 5px !important;}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">En estos \u00faltimos meses fuimos <strong>testigos<\/strong> de nuevas formas cada vez mas <strong>ingeniosas<\/strong> de <strong>comprometer<\/strong> la <strong>seguridad de la informaci\u00f3n<\/strong> en las empresas.<\/h2>\n<p>[\/vc_column_text][vc_separator color=&#8221;#bf0026&#8243; type=&#8221;small&#8221; position=&#8221;center&#8221; up=&#8221;10&#8243; down=&#8221;10&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h4>Hoy en d\u00eda, es vital que cada empleado de su <strong>empresa<\/strong> sepa claramente como <strong>detectar<\/strong> y <strong>actuar<\/strong> ante un <strong>correo electr\u00f3nico<\/strong> <strong>sospechoso<\/strong> porque<strong> m\u00e1s vale \u201csospechar\u201d que curar<\/strong>.<\/h4>\n<p>&nbsp;<\/p>\n<h4>A continuaci\u00f3n, le dejamos un listado con 5 <strong>consejos<\/strong> muy pr\u00e1cticos que recomendamos difundir entre los colaboradores de su <strong>empresa<\/strong>:<\/h4>\n<h4>\u00a0\u2022 Si recibe un correo de alguien conocido pero su forma de redactacci\u00f3n no te suena familiar (faltas de ortograf\u00eda, muy formal, sin firma, etc.), por favor verifica que la casilla del remitente sea la correcta.<\/h4>\n<h4>\u00a0\u2022 Si una <strong>empresa<\/strong> te solicita renovar tus <strong>claves<\/strong> de acceso a su sitio web haciendo clic en un enlace del correo, debes sospechar inmediatamente.<\/h4>\n<h4>\u00a0\u2022 Si has realizado clic en el enlace de un correo y el sitio web donde te encuentras no tiene la direcci\u00f3n de Internet correcta, claramente es una web \u201cmelliza\u201d que intenta robar tus <strong>contrase\u00f1as<\/strong>.<\/h4>\n<h4>\u00a0\u2022 No entres en p\u00e1nico, si un correo dice que tus <strong>claves<\/strong> vencer\u00e1n en breve o que tu usuario se bloqueara inmediatamente, no es m\u00e1s que otro intento de enga\u00f1o.<\/h4>\n<h4>\u00a0\u2022 Mucho <strong>Cuidado<\/strong>. No creas en las Super Ofertas o los Regalos. Son muy tentadoras, pero solo conseguir\u00e1s que te roben informaci\u00f3n.<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_separator color=&#8221;#bf0026&#8243; type=&#8221;small&#8221; position=&#8221;center&#8221; up=&#8221;10&#8243; down=&#8221;10&#8243;][vc_single_image image=&#8221;17891&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221; qode_css_animation=&#8221;&#8221; qode_hover_animation=&#8221;zoom_in&#8221;][vc_separator color=&#8221;#bf0026&#8243; type=&#8221;small&#8221; position=&#8221;center&#8221; up=&#8221;10&#8243; down=&#8221;10&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h2><strong>\u00bfQU\u00c9 HACER ANTE UN CORREO SOSPECHOSO?<br \/>\n<\/strong><\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_column_text]<\/p>\n<h4>\u00a0\u2022 <strong>Nunca<\/strong> env\u00edes tus <strong>contrase\u00f1as<\/strong> por <strong>correo electr\u00f3nico<\/strong> o completando formularios desde un enlace del correo.<\/h4>\n<h4>\u00a0\u2022 <strong>Nunca<\/strong> abras ni ejecutes los <strong>archivos<\/strong> adjuntos de un correo <strong>sospechoso<\/strong>, solo lograras infectar tu computadora.<\/h4>\n<h4>\u00a0\u2022 Usa el sentido com\u00fan, si algo en el texto parece <strong>sospechoso,<\/strong> mejor contacta por tel\u00e9fono al remitente para verificar tus sospechas.<\/h4>\n<h4>\u00a0\u2022 Y <strong>Siempre<\/strong> dar aviso al personal de IT responsable de garantizar la <strong>seguridad<\/strong> de la informaci\u00f3n, ellos sabr\u00e1n que hacer y nos asesorar\u00e1n de la mejor manera.<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][vc_separator color=&#8221;#bf0026&#8243; type=&#8221;small&#8221; position=&#8221;center&#8221; up=&#8221;10&#8243; down=&#8221;10&#8243;][vc_empty_space height=&#8221;10px&#8221;][vc_column_text]<\/p>\n<h4>En Nextware contamos con un equipo de expertos en <strong>seguridad inform\u00e1tica,<\/strong> disponibles para capacitar al personal de su <strong>empresa. <\/strong><\/h4>\n<h4><strong>Contar con colaboradores capacitados<\/strong> le permitir\u00e1 evitarse muchos dolores de cabeza y as\u00ed podr\u00e1 concentrarte en lo realmente importante para su negocio.<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1631038968295{background-color: #f7f7f7 !important;}&#8221;][vc_column][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\"><strong>QUIERO SABER M\u00c1S SOBRE LOS SERVICIOS GESTIONADOS DE NUBE<\/strong><\/h3>\n<p>[\/vc_column_text][vc_btn title=&#8221;ANTIVIRUS GESTIONADO&#8230;&#8221; color=&#8221;warning&#8221; align=&#8221;center&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fwww.nextware.com.ar%2Fgestion-antivirus.html&#8221;][vc_btn title=&#8221;CONSULTOR\u00cdAS &#8221; color=&#8221;warning&#8221; align=&#8221;center&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fwww.nextware.com.ar%2Fconsultorias-ciberseguridad.html&#8221;][vc_btn title=&#8221;AUDITOR\u00cdAS&#8221; color=&#8221;warning&#8221; align=&#8221;center&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fwww.nextware.com.ar%2Fauditorias-ciberseguridad.html&#8221;][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En estos \u00faltimos meses fuimos testigos de nuevas formas cada vez mas ingeniosas de comprometer la seguridad de la informaci\u00f3n en las empresas.<\/p>\n","protected":false},"author":1,"featured_media":17139,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[221],"tags":[],"class_list":["post-17879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-221","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso - Nextware - Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso - Nextware - Blog\" \/>\n<meta property=\"og:description\" content=\"En estos \u00faltimos meses fuimos testigos de nuevas formas cada vez mas ingeniosas de comprometer la seguridad de la informaci\u00f3n en las empresas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/\" \/>\n<meta property=\"og:site_name\" content=\"Nextware - Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-15T16:36:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-07T19:56:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nextware.com.ar\/blog\/wp-content\/uploads\/2019\/11\/NW-BLOG-CABECERAS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nextware\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nextware.com.ar\/blog\/#website\",\"url\":\"https:\/\/nextware.com.ar\/blog\/\",\"name\":\"Nextware - Blog\",\"description\":\"Servicios y Soluciones de Ciberseguridad, Infraestructura IT, Servicios Cloud y Transformaci\\u00f3n Digital para las Pymes Argentinas.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nextware.com.ar\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"https:\/\/nextware.com.ar\/blog\/wp-content\/uploads\/2019\/11\/NW-BLOG-CABECERAS.png\",\"contentUrl\":\"https:\/\/nextware.com.ar\/blog\/wp-content\/uploads\/2019\/11\/NW-BLOG-CABECERAS.png\",\"width\":810,\"height\":450},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#webpage\",\"url\":\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/\",\"name\":\"5 Consejos para Detectar un Correo Electr\\u00f3nico Sospechoso - Nextware - Blog\",\"isPartOf\":{\"@id\":\"https:\/\/nextware.com.ar\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#primaryimage\"},\"datePublished\":\"2020-04-15T16:36:09+00:00\",\"dateModified\":\"2021-09-07T19:56:42+00:00\",\"author\":{\"@id\":\"https:\/\/nextware.com.ar\/blog\/#\/schema\/person\/648b9af4e275eea506bc6d5fffe3b95c\"},\"breadcrumb\":{\"@id\":\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/nextware.com.ar\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Consejos para Detectar un Correo Electr\\u00f3nico Sospechoso\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nextware.com.ar\/blog\/#\/schema\/person\/648b9af4e275eea506bc6d5fffe3b95c\",\"name\":\"Nextware\",\"sameAs\":[\"http:\/\/nextware.com.ar\/blog\"],\"url\":\"https:\/\/nextware.com.ar\/blog\/author\/nextware\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso - Nextware - Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/","og_locale":"es_ES","og_type":"article","og_title":"5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso - Nextware - Blog","og_description":"En estos \u00faltimos meses fuimos testigos de nuevas formas cada vez mas ingeniosas de comprometer la seguridad de la informaci\u00f3n en las empresas.","og_url":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/","og_site_name":"Nextware - Blog","article_published_time":"2020-04-15T16:36:09+00:00","article_modified_time":"2021-09-07T19:56:42+00:00","og_image":[{"width":810,"height":450,"url":"https:\/\/nextware.com.ar\/blog\/wp-content\/uploads\/2019\/11\/NW-BLOG-CABECERAS.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Nextware","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/nextware.com.ar\/blog\/#website","url":"https:\/\/nextware.com.ar\/blog\/","name":"Nextware - Blog","description":"Servicios y Soluciones de Ciberseguridad, Infraestructura IT, Servicios Cloud y Transformaci\u00f3n Digital para las Pymes Argentinas.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nextware.com.ar\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#primaryimage","inLanguage":"es","url":"https:\/\/nextware.com.ar\/blog\/wp-content\/uploads\/2019\/11\/NW-BLOG-CABECERAS.png","contentUrl":"https:\/\/nextware.com.ar\/blog\/wp-content\/uploads\/2019\/11\/NW-BLOG-CABECERAS.png","width":810,"height":450},{"@type":"WebPage","@id":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#webpage","url":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/","name":"5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso - Nextware - Blog","isPartOf":{"@id":"https:\/\/nextware.com.ar\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#primaryimage"},"datePublished":"2020-04-15T16:36:09+00:00","dateModified":"2021-09-07T19:56:42+00:00","author":{"@id":"https:\/\/nextware.com.ar\/blog\/#\/schema\/person\/648b9af4e275eea506bc6d5fffe3b95c"},"breadcrumb":{"@id":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nextware.com.ar\/blog\/5-consejos-para-detectar-un-correo-electronico-sospechoso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/nextware.com.ar\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Consejos para Detectar un Correo Electr\u00f3nico Sospechoso"}]},{"@type":"Person","@id":"https:\/\/nextware.com.ar\/blog\/#\/schema\/person\/648b9af4e275eea506bc6d5fffe3b95c","name":"Nextware","sameAs":["http:\/\/nextware.com.ar\/blog"],"url":"https:\/\/nextware.com.ar\/blog\/author\/nextware\/"}]}},"_links":{"self":[{"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/posts\/17879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/comments?post=17879"}],"version-history":[{"count":3,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/posts\/17879\/revisions"}],"predecessor-version":[{"id":32388,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/posts\/17879\/revisions\/32388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/media\/17139"}],"wp:attachment":[{"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/media?parent=17879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/categories?post=17879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nextware.com.ar\/blog\/wp-json\/wp\/v2\/tags?post=17879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}