{"id":1925,"date":"2021-12-03T09:20:25","date_gmt":"2021-12-03T09:20:25","guid":{"rendered":"https:\/\/www.all4sec.es\/blog\/?p=1925"},"modified":"2021-12-03T09:27:48","modified_gmt":"2021-12-03T09:27:48","slug":"como-protegerse-frente-a-un-ransomware","status":"publish","type":"post","link":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/","title":{"rendered":"C\u00f3mo protegerse frente a un ransomware"},"content":{"rendered":"\n<h3 class=\"has-text-align-center wp-block-heading\">Unas sencillas recomendaciones<\/h3>\n\n\n\n<p>A nadie se le escapa que el concepto de <strong><em>ransomware<\/em> <\/strong>ha adquirido un protagonismo nunca antes conocido. Se trata de un tipo de <em>malware<\/em> dise\u00f1ado para <em>denegar el acceso a un ordenador o a sus datos hasta que la v\u00edctima se ve obligada a pagar el rescate solicitado<\/em>. Un chantaje que <strong>desde hace unos a\u00f1os est\u00e1 generando importantes estragos entre particulares, empresas y organismos p\u00fablicos<\/strong>.<\/p>\n\n\n\n<p>Por eso, desde <strong>All4sec<\/strong> queremos recopilar un conjunto de <strong>sencillas recomendaciones encaminadas a implementar medidas, herramientas y recursos que puedan servir para mitigar el efecto<\/strong> de esta amenaza. No son medidas infalibles. Sin embargo, pueden contribuir a impedir o reducir su impacto.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Preparaci\u00f3n ante un ransomware<\/strong><\/h3>\n\n\n\n<p>Lo primero y m\u00e1s importante que una organizaci\u00f3n debe hacer para mantener su operatividad frente a un <em>ransomware<\/em> es <strong>disponer de una copia de seguridad, cifrada y offline, de sus elementos m\u00e1s cr\u00edticos<\/strong>. Esta es una tarea fundamental, sea cual sea, la amenaza que se presente. Las copias han de ser \u201cselectivas\u201d incluyendo datos cr\u00edticos y configuraciones de sistemas operativos y aplicaciones.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-2-switch-g0137bff06_1920-1024x684.jpg\" alt=\"\" class=\"wp-image-1929\" width=\"320\" height=\"214\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-2-switch-g0137bff06_1920-1024x684.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-2-switch-g0137bff06_1920-300x200.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-2-switch-g0137bff06_1920-768x513.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-2-switch-g0137bff06_1920-1536x1026.jpg 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-2-switch-g0137bff06_1920.jpg 1920w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/figure><\/div>\n\n\n\n<p>Resulta asimismo importante identificar y disponer de <strong>HW de respaldo<\/strong> <strong>para la recuperaci\u00f3n de los sistemas<\/strong>, teniendo en cuenta que los equipos afectados puedan quedar temporalmente inh\u00e1biles y que las configuraciones puedan variar cuando no se disponga de equipos similares.<\/p>\n\n\n\n<p>No debemos tampoco olvidarnos de definir, desarrollar y evaluar planes de recuperaci\u00f3n que contemplen <strong><a href=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/09\/10\/ciberseguridad-e-infraestructuras-criticas\/\">la comunicaci\u00f3n o la notificaci\u00f3n de la incidencia a los organismos correspondientes<\/a><\/strong>. Y, sobre todo, registrar los logs de los eventos que ocurren en los sistemas para su posterior an\u00e1lisis y seguimiento.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>An\u00e1lisis de configuraciones y vulnerabilidades<\/strong><\/h3>\n\n\n\n<p>Un primer paso indispensable para ser capaz de combatir un ataque de <em>ransomware<\/em> es <strong>inventariar todos los activos de la organizaci\u00f3n<\/strong>, as\u00ed como los flujos de informaci\u00f3n entre ellos.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-3-update-gbc532b069_1920-1024x512.jpg\" alt=\"\" class=\"wp-image-1931\" width=\"372\" height=\"186\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-3-update-gbc532b069_1920-1024x512.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-3-update-gbc532b069_1920-300x150.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-3-update-gbc532b069_1920-768x384.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-3-update-gbc532b069_1920-1536x768.jpg 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-3-update-gbc532b069_1920.jpg 1920w\" sizes=\"(max-width: 372px) 100vw, 372px\" \/><\/figure><\/div>\n\n\n\n<p>Peri\u00f3dicamente debemos escanear manual o autom\u00e1ticamente los sistemas y redes en busca de posibles de vulnerabilidades. Asimismo, debemos <strong>actualizar de forma peri\u00f3dica las aplicaciones y sistemas operativos<\/strong>.<\/p>\n\n\n\n<p>Los dispositivos deben estar configurados de forma que implementen opciones b\u00e1sicas de seguridad como <strong>la desactivaci\u00f3n de puertos y protocolos que no son necesarios<\/strong> para su uso habitual. <\/p>\n\n\n\n<p>En particular, los servicios <strong>RDP<\/strong> u otros servicios de acceso remoto requieren una atenci\u00f3n especial. Por ejemplo, estos deben configurarse con la desactivaci\u00f3n de puertos, bloqueo de cuentas tras un n\u00famero de intentos de accesos fallidos o con mecanismos de doble autenticaci\u00f3n. Tambi\u00e9n se debe revisar la (des)activaci\u00f3n del protocolo <strong>SMB<\/strong> para evitar la propagaci\u00f3n del <em>malware<\/em>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conocimiento de los vectores de ataque<\/strong><\/h3>\n\n\n\n<p>Otra recomendaci\u00f3n fundamental reside en la <strong><a href=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/11\/05\/otras-formas-de-concienciacion-en-ciberseguridad\/\">concienciaci\u00f3n de los usuarios<\/a><\/strong>. El <em>ransomware<\/em> suele propagarse a trav\u00e9s del <em>phishing<\/em>. Por tanto, es indispensable que los usuarios sean capaces de identificar y bloquear las t\u00e9cnicas de <em>phishing<\/em> m\u00e1s habituales.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-5-malicious-code-gb80e7be21_1920-1024x576.jpg\" alt=\"\" class=\"wp-image-1932\" width=\"415\" height=\"233\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-5-malicious-code-gb80e7be21_1920-1024x576.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-5-malicious-code-gb80e7be21_1920-300x169.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-5-malicious-code-gb80e7be21_1920-768x432.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-5-malicious-code-gb80e7be21_1920-1536x864.jpg 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-5-malicious-code-gb80e7be21_1920.jpg 1920w\" sizes=\"(max-width: 415px) 100vw, 415px\" \/><\/figure><\/div>\n\n\n\n<p>En muchos casos, los ataques de <em>ransomware<\/em> provienen de comunicaciones a trav\u00e9s de correos electr\u00f3nicos y <strong>resulta clave distinguir aquellos mensajes que puedan ser maliciosos<\/strong>. Por eso es necesario desplegar soluciones de <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2020\/09\/11\/estoy-harto-del-spam\/\">filtrado de correos<\/a> y <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2020\/06\/19\/hackeado\/\">habilitar mecanismos <strong>DMARC<\/strong> en los servidores de correo<\/a>. Asimismo, conviene instalar soluciones para el bloqueo de direcciones IP sospechosas a trav\u00e9s de <strong><a href=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/10\/08\/dns-el-deseado-listin-telefonico-de-internet\/\">DNS<\/a><\/strong> y <strong>firewalls<\/strong>. Y por supuesto, y no menos importante, <strong>desactivar el servicio de macros cuando se utilicen herramientas de Microsoft Office<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mecanismos de protecci\u00f3n<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-4-app-g2e312fce0_1920-1024x704.jpg\" alt=\"\" class=\"wp-image-1930\" width=\"386\" height=\"265\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-4-app-g2e312fce0_1920-1024x704.jpg 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-4-app-g2e312fce0_1920-300x206.jpg 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-4-app-g2e312fce0_1920-768x528.jpg 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-4-app-g2e312fce0_1920-1536x1056.jpg 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-4-app-g2e312fce0_1920.jpg 1920w\" sizes=\"(max-width: 386px) 100vw, 386px\" \/><\/figure><\/div>\n\n\n\n<p>Ahora bien, las organizaciones tambi\u00e9n necesitan herramientas que aporten protecci\u00f3n a sus infraestructuras. Han de disponer de <strong>IDS para detectar actividad de C&amp;C<\/strong> de posibles <em>malwares<\/em> o tener instaladas plataformas de antivirus y <em>anti-malware<\/em> (preferiblemente centralizadas) en los puestos de trabajo.<\/p>\n\n\n\n<p>Se deben utilizar <strong>listas de aplicaciones autorizadas y<a href=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/06\/22\/reticencias-a-la-autenticacion-fuerte\/\"> mecanismos de doble autenticaci\u00f3n<\/a><\/strong> all\u00ed donde sea posible, principalmente en servicios de webmail, accesos remotos o conexi\u00f3n a aplicaciones cr\u00edticas. Y en general, deben <strong>aplicar el principio del \u201cmenor privilegio posible\u201d<\/strong> que <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2020\/09\/25\/zero-trust-a-traves-del-metodo-kipling\/\">solo permita a los usuarios acceder a aquello que realmente necesitan<\/a>. Un caso particular responde al uso de herramientas como <strong>Powershell que solo deben estar habilitadas en condiciones muy controladas<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Resumen<\/strong><\/h3>\n\n\n\n<p>La siguiente tabla recoge las <strong>recomendaciones<\/strong> que hemos ido mencionado a lo largo del art\u00edculo. Ahora le toca al lector identificar <strong>cu\u00e1ntas de ellas est\u00e1 dispuesto a seguir<\/strong>.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>RECOMENDACI\u00d3N<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>SI\/NO<\/strong><\/td><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Disponer de una copia de seguridad, cifrada y offline, de sus elementos m\u00e1s cr\u00edticos<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>HW de respaldo<\/strong> <strong>para la recuperaci\u00f3n de los sistemas<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Definir, desarrollar y evaluar planes de recuperaci\u00f3n<\/strong><strong><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Inventariar todos los activos de informaci\u00f3n de la organizaci\u00f3n<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Actualizar de forma peri\u00f3dica las aplicaciones y sistemas operativos<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Desactivaci\u00f3n de puertos y protocolos que no son necesarios (RDP, SMB\u2026)<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Bloqueo de cuentas de usuarios tras un n\u00famero de intentos de acceso fallidos<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Concienciaci\u00f3n de los usuarios<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Filtrado de correos maliciosos y protecci\u00f3n de puestos de trabajo<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Desactivar el servicio de macros en herramientas de Microsoft Office<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Implantar sistemas IDS, FW, filtrado en DNS\u2026<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Evitar la instalaci\u00f3n de software no autorizado<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Implantar mecanismos de doble autenticaci\u00f3n<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Habilitar Powershell solo en condiciones muy controladas<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\">&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde  hace unos cuantos a\u00f1os, el ransomware est\u00e1 generando importantes estragos entre particulares, empresas y organismos p\u00fablicos.<br \/>\nEn All4sec hemos querido recopilar un conjunto de sencillas recomendaciones encaminadas a implementar medidas, herramientas y recursos que puedan servir para mitigar el efecto de esta amenaza. No son medidas infalibles. Sin embargo, pueden contribuir a impedir o reducir su impacto.<\/p>\n","protected":false},"author":3,"featured_media":1928,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,28],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>C\u00f3mo protegerse frente a un ransomware - all4sec.es<\/title>\n<meta name=\"description\" content=\"C\u00f3mo protegerse frente a un ransomware. Recomendaciones, herramientas y recursos que puedan servir para mitigar su impacto.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00f3mo protegerse frente a un ransomware - all4sec.es\" \/>\n<meta property=\"og:description\" content=\"C\u00f3mo protegerse frente a un ransomware. Recomendaciones, herramientas y recursos que puedan servir para mitigar su impacto.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"all4sec.es\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-03T09:20:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-03T09:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juanjo Galan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juanjo Galan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/\",\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/\",\"name\":\"C\u00f3mo protegerse frente a un ransomware - all4sec.es\",\"isPartOf\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg\",\"datePublished\":\"2021-12-03T09:20:25+00:00\",\"dateModified\":\"2021-12-03T09:27:48+00:00\",\"author\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\"},\"description\":\"C\u00f3mo protegerse frente a un ransomware. Recomendaciones, herramientas y recursos que puedan servir para mitigar su impacto.\",\"breadcrumb\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#primaryimage\",\"url\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg\",\"contentUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/all4sec.es\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00f3mo protegerse frente a un ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/all4sec.es\/blog\/#website\",\"url\":\"https:\/\/all4sec.es\/blog\/\",\"name\":\"all4sec.es\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/all4sec.es\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\",\"name\":\"Juanjo Galan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"caption\":\"Juanjo Galan\"},\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00f3mo protegerse frente a un ransomware - all4sec.es","description":"C\u00f3mo protegerse frente a un ransomware. Recomendaciones, herramientas y recursos que puedan servir para mitigar su impacto.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/","og_locale":"es_ES","og_type":"article","og_title":"C\u00f3mo protegerse frente a un ransomware - all4sec.es","og_description":"C\u00f3mo protegerse frente a un ransomware. Recomendaciones, herramientas y recursos que puedan servir para mitigar su impacto.","og_url":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/","og_site_name":"all4sec.es","article_published_time":"2021-12-03T09:20:25+00:00","article_modified_time":"2021-12-03T09:27:48+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg","type":"image\/jpeg"}],"author":"Juanjo Galan","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Juanjo Galan","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/","url":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/","name":"C\u00f3mo protegerse frente a un ransomware - all4sec.es","isPartOf":{"@id":"https:\/\/all4sec.es\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg","datePublished":"2021-12-03T09:20:25+00:00","dateModified":"2021-12-03T09:27:48+00:00","author":{"@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9"},"description":"C\u00f3mo protegerse frente a un ransomware. Recomendaciones, herramientas y recursos que puedan servir para mitigar su impacto.","breadcrumb":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#primaryimage","url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg","contentUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2021\/12\/R-1-ransomware-g5fee0aa97_1920.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/all4sec.es\/blog\/index.php\/2021\/12\/03\/como-protegerse-frente-a-un-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/all4sec.es\/blog\/"},{"@type":"ListItem","position":2,"name":"C\u00f3mo protegerse frente a un ransomware"}]},{"@type":"WebSite","@id":"https:\/\/all4sec.es\/blog\/#website","url":"https:\/\/all4sec.es\/blog\/","name":"all4sec.es","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/all4sec.es\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9","name":"Juanjo Galan","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","caption":"Juanjo Galan"},"url":"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/"}]}},"_links":{"self":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1925"}],"collection":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":17,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1925\/revisions"}],"predecessor-version":[{"id":1948,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1925\/revisions\/1948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media\/1928"}],"wp:attachment":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}