{"id":2170,"date":"2022-03-25T11:35:08","date_gmt":"2022-03-25T11:35:08","guid":{"rendered":"https:\/\/www.all4sec.es\/blog\/?p=2170"},"modified":"2022-03-25T11:35:11","modified_gmt":"2022-03-25T11:35:11","slug":"recomendaciones-de-seguridad-en-el-uso-de-rrs","status":"publish","type":"post","link":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/","title":{"rendered":"Recomendaciones de seguridad en el uso de RRSS"},"content":{"rendered":"\n<h4 class=\"has-text-align-center wp-block-heading\">El spam, el robo de cuentas, la suplantaci\u00f3n de identidades, la explotaci\u00f3n comercial de los datos personales o la trazabilidad de nuestras actividades son situaciones m\u00e1s habituales de lo que pensamos cuando hacemos uso de las redes sociales.<\/h4>\n\n\n\n<p>Los m\u00e9todos \u201csociales\u201d utilizados habitualmente por los ciberdelincuentes para acceder a informaci\u00f3n y datos personales est\u00e1n minuciosamente estudiados porque las personas seguimos siendo el punto m\u00e1s d\u00e9bil de la ciberseguridad y ellos saben c\u00f3mo aprovecharlo.\u00a0Por eso mismo queremos hacer una r\u00e1pida revisi\u00f3n de algunas recomendaciones de seguridad en el uso de redes sociales y que resumimos en las siguientes reflexiones.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Correlaci\u00f3n de datos<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-2-scale-gc98ec45ab_1920-1024x452.png\" alt=\"\" class=\"wp-image-2178\" width=\"114\" height=\"50\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-2-scale-gc98ec45ab_1920-1024x452.png 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-2-scale-gc98ec45ab_1920-300x132.png 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-2-scale-gc98ec45ab_1920-768x339.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-2-scale-gc98ec45ab_1920-1536x678.png 1536w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-2-scale-gc98ec45ab_1920.png 1920w\" sizes=\"(max-width: 114px) 100vw, 114px\" \/><\/figure><\/div>\n\n\n\n<p><strong>La privacidad lucha por encontrar un equilibrio dentro de las redes sociales<\/strong>. Cada usuario es libre de decidir qu\u00e9 informaci\u00f3n est\u00e1 dispuesto a compartir con el resto del mundo. Ahora bien, tambi\u00e9n debe asumir que <strong>habr\u00e1 informaci\u00f3n que compartir\u00e1 sin ser consciente de ello simplemente a trav\u00e9s de la correlaci\u00f3n de datos<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Derecho al olvido<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-5-trash-g35463725e_1280-998x1024.png\" alt=\"\" class=\"wp-image-2180\" width=\"87\" height=\"89\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-5-trash-g35463725e_1280-998x1024.png 998w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-5-trash-g35463725e_1280-293x300.png 293w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-5-trash-g35463725e_1280-768x788.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-5-trash-g35463725e_1280.png 1248w\" sizes=\"(max-width: 87px) 100vw, 87px\" \/><\/figure><\/div>\n\n\n\n<p>Una vez que se publica algo en una red social <strong>ser\u00e1 pr\u00e1cticamente imposible eliminarlo por completo de ella<\/strong>. Algunos pensar\u00e1n que actualmente existe el <a href=\"https:\/\/www.aepd.es\/es\/areas-de-actuacion\/internet-y-redes-sociales\/derecho-al-olvido\">derecho al olvido<\/a>, pero la realidad es que, una vez divulgado, el control de la informaci\u00f3n publicada se habr\u00e1 perdido y, por tanto, podr\u00e1 alcanzar cualquier lugar del mundo. Por eso, antes de publicar algo en una red es relevante pararse a pensar en qu\u00e9 ser\u00e1 de ella a medio plazo.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Borrado de informaci\u00f3n<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-3-eraser-gcc8a7c2ef_1280-1024x777.png\" alt=\"\" class=\"wp-image-2179\" width=\"101\" height=\"76\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-3-eraser-gcc8a7c2ef_1280-1024x777.png 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-3-eraser-gcc8a7c2ef_1280-300x228.png 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-3-eraser-gcc8a7c2ef_1280-768x583.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-3-eraser-gcc8a7c2ef_1280.png 1280w\" sizes=\"(max-width: 101px) 100vw, 101px\" \/><\/figure><\/div>\n\n\n\n<p>Si un mensaje resulta dif\u00edcil de eliminar, <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2020\/02\/06\/los-olvidados-en-las-redes-sociales\/\">no menos dif\u00edcil ser\u00e1 eliminar una cuenta<\/a>. Los procedimientos que ofrecen las redes sociales m\u00e1s conocidas no evitan que la informaci\u00f3n publicada sea recogida por <em>crawlers<\/em> de Internet que ciertamente la conservar\u00e1n. M\u00e1s a\u00fan, peri\u00f3dicamente deber\u00edamos pensar <strong>qu\u00e9<\/strong> <strong>cuentas mantenemos en redes sociales donde apenas tenemos actividad, cuentas zombis que llegado el tiempo olvidaremos y quedar\u00e1n ah\u00ed por tiempo inmemorial<\/strong> en beneficio de qui\u00e9n sabe qui\u00e9n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Datos sensibles<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-4-fingerprint-ga3878d8a1_1280-1024x1024.png\" alt=\"\" class=\"wp-image-2182\" width=\"93\" height=\"93\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-4-fingerprint-ga3878d8a1_1280-1024x1024.png 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-4-fingerprint-ga3878d8a1_1280-300x300.png 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-4-fingerprint-ga3878d8a1_1280-150x150.png 150w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-4-fingerprint-ga3878d8a1_1280-768x768.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-4-fingerprint-ga3878d8a1_1280.png 1280w\" sizes=\"(max-width: 93px) 100vw, 93px\" \/><\/figure><\/div>\n\n\n\n<p>Los datos personales est\u00e1n protegidos por el <a href=\"https:\/\/www.boe.es\/doue\/2016\/119\/L00001-00088.pdf\">RGPD<\/a>. <strong>Hay datos que son especialmente sensibles<\/strong> (ideolog\u00eda, etnia, religi\u00f3n, vida sexual, datos gen\u00e9ticos o biom\u00e9trico, penales, etc.); estos est\u00e1n muy protegidos y no deben ser libremente divulgados. Aun as\u00ed, hay <a href=\"https:\/\/www.iberley.es\/temas\/categorias-datos-personales-62757\">otros datos que pueden ser de inter\u00e9s particular<\/a>, desde datos identificativos, acad\u00e9micos o profesionales, a caracter\u00edsticas personales, circunstancias sociales o informaci\u00f3n econ\u00f3mica o financiera. Pi\u00e9nselo mucho antes de divulgar en redes sociales cualquiera de ellos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Permisos en el uso de datos<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-6-virtual-meeting-g7aa5307c4_1280-1-1024x731.png\" alt=\"\" class=\"wp-image-2184\" width=\"100\" height=\"71\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-6-virtual-meeting-g7aa5307c4_1280-1-1024x731.png 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-6-virtual-meeting-g7aa5307c4_1280-1-300x214.png 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-6-virtual-meeting-g7aa5307c4_1280-1-768x548.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-6-virtual-meeting-g7aa5307c4_1280-1.png 1280w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/figure><\/div>\n\n\n\n<p>La seguridad de una red social no significa que el proveedor no utilice la informaci\u00f3n que dice gestionar de forma segura. <strong>Las condiciones de adhesi\u00f3n a una red social, si bien resultan tediosas y aburridas de leer, tienden a recoger la explotaci\u00f3n comercial de la informaci\u00f3n publicada<\/strong>. Sea esc\u00e9ptico y piense que nada es gratis, que cuando alguien lo presenta as\u00ed, es posible que el precio a pagar sean sus propios datos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protecci\u00f3n de acceso<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-7-key-hole-gcb8c37875_1280-1024x1024.png\" alt=\"\" class=\"wp-image-2185\" width=\"87\" height=\"87\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-7-key-hole-gcb8c37875_1280-1024x1024.png 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-7-key-hole-gcb8c37875_1280-300x300.png 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-7-key-hole-gcb8c37875_1280-150x150.png 150w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-7-key-hole-gcb8c37875_1280-768x768.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-7-key-hole-gcb8c37875_1280.png 1280w\" sizes=\"(max-width: 87px) 100vw, 87px\" \/><\/figure><\/div>\n\n\n\n<p><strong>No relaje la seguridad de sus cuentas<\/strong>, utilice <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2019\/12\/02\/contrasenas-de-autenticacion-de-usuarios\/\">contrase\u00f1as de acceso robustas<\/a>, mantenga actualizados los dispositivos con los que se conecta a las redes sociales, etc. Es posible que con ello evite algunos problemas. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ingenier\u00eda social<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-8-icon-ge0b55eb8a_1280-1024x512.png\" alt=\"\" class=\"wp-image-2187\" width=\"114\" height=\"57\" srcset=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-8-icon-ge0b55eb8a_1280-1024x512.png 1024w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-8-icon-ge0b55eb8a_1280-300x150.png 300w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-8-icon-ge0b55eb8a_1280-768x384.png 768w, https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-8-icon-ge0b55eb8a_1280.png 1280w\" sizes=\"(max-width: 114px) 100vw, 114px\" \/><\/figure><\/div>\n\n\n\n<p>Y dejamos para el final una \u00faltima recomendaci\u00f3n: mant\u00e9ngase alerta a <strong>los ataques de ingenier\u00eda social<\/strong>. Repetimos, <a href=\"https:\/\/all4sec.es\/blog\/index.php\/2018\/03\/04\/manipular-las-emociones-es-el-negocio-mas-rentable-del-siglo\/\">ataques de ingenier\u00eda socia<\/a>l. El prefijo \u201cingenier\u00eda\u201d no es balad\u00ed. \u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La explotaci\u00f3n comercial de datos personales o la trazabilidad de actividades son situaciones m\u00e1s habituales de lo que pensamos cuando hacemos uso de las redes sociales. Una r\u00e1pida revisi\u00f3n de algunas recomendaciones de seguridad al publicar informaci\u00f3n en estos entornos puede resultar de inter\u00e9s para el lector.<\/p>\n","protected":false},"author":3,"featured_media":2177,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,29,17,44],"tags":[32,82,45],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Recomendaciones de seguridad en el uso de RRSS - all4sec.es<\/title>\n<meta name=\"description\" content=\"Recomendaciones de seguridad en el uso de redes sociales: explotaci\u00f3n comercial y trazabilidad de datos personales\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recomendaciones de seguridad en el uso de RRSS - all4sec.es\" \/>\n<meta property=\"og:description\" content=\"Recomendaciones de seguridad en el uso de redes sociales: explotaci\u00f3n comercial y trazabilidad de datos personales\" \/>\n<meta property=\"og:url\" content=\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/\" \/>\n<meta property=\"og:site_name\" content=\"all4sec.es\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-25T11:35:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-25T11:35:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juanjo Galan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juanjo Galan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/\",\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/\",\"name\":\"Recomendaciones de seguridad en el uso de RRSS - all4sec.es\",\"isPartOf\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg\",\"datePublished\":\"2022-03-25T11:35:08+00:00\",\"dateModified\":\"2022-03-25T11:35:11+00:00\",\"author\":{\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\"},\"description\":\"Recomendaciones de seguridad en el uso de redes sociales: explotaci\u00f3n comercial y trazabilidad de datos personales\",\"breadcrumb\":{\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#primaryimage\",\"url\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg\",\"contentUrl\":\"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg\",\"width\":1920,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/all4sec.es\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recomendaciones de seguridad en el uso de RRSS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/all4sec.es\/blog\/#website\",\"url\":\"https:\/\/all4sec.es\/blog\/\",\"name\":\"all4sec.es\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/all4sec.es\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9\",\"name\":\"Juanjo Galan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g\",\"caption\":\"Juanjo Galan\"},\"url\":\"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recomendaciones de seguridad en el uso de RRSS - all4sec.es","description":"Recomendaciones de seguridad en el uso de redes sociales: explotaci\u00f3n comercial y trazabilidad de datos personales","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/","og_locale":"es_ES","og_type":"article","og_title":"Recomendaciones de seguridad en el uso de RRSS - all4sec.es","og_description":"Recomendaciones de seguridad en el uso de redes sociales: explotaci\u00f3n comercial y trazabilidad de datos personales","og_url":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/","og_site_name":"all4sec.es","article_published_time":"2022-03-25T11:35:08+00:00","article_modified_time":"2022-03-25T11:35:11+00:00","og_image":[{"width":1920,"height":1067,"url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg","type":"image\/jpeg"}],"author":"Juanjo Galan","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Juanjo Galan","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/","url":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/","name":"Recomendaciones de seguridad en el uso de RRSS - all4sec.es","isPartOf":{"@id":"https:\/\/all4sec.es\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#primaryimage"},"image":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#primaryimage"},"thumbnailUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg","datePublished":"2022-03-25T11:35:08+00:00","dateModified":"2022-03-25T11:35:11+00:00","author":{"@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9"},"description":"Recomendaciones de seguridad en el uso de redes sociales: explotaci\u00f3n comercial y trazabilidad de datos personales","breadcrumb":{"@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#primaryimage","url":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg","contentUrl":"https:\/\/all4sec.es\/blog\/wp-content\/uploads\/2022\/03\/R-RRSS-1-jason-dent-JFk0dVyvdvw-unsplash.jpg","width":1920,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/all4sec.es\/blog\/index.php\/2022\/03\/25\/recomendaciones-de-seguridad-en-el-uso-de-rrs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/all4sec.es\/blog\/"},{"@type":"ListItem","position":2,"name":"Recomendaciones de seguridad en el uso de RRSS"}]},{"@type":"WebSite","@id":"https:\/\/all4sec.es\/blog\/#website","url":"https:\/\/all4sec.es\/blog\/","name":"all4sec.es","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/all4sec.es\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/d8839fb727b62b7c4e8598b89fdaafa9","name":"Juanjo Galan","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/all4sec.es\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3f0814447c3b2bad83feb430187bee0?s=96&d=mm&r=g","caption":"Juanjo Galan"},"url":"https:\/\/all4sec.es\/blog\/index.php\/author\/juanjo\/"}]}},"_links":{"self":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2170"}],"collection":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2170"}],"version-history":[{"count":21,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2170\/revisions"}],"predecessor-version":[{"id":2200,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2170\/revisions\/2200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media\/2177"}],"wp:attachment":[{"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/all4sec.es\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}