{"id":3460,"date":"2020-09-21T22:57:32","date_gmt":"2020-09-21T22:57:32","guid":{"rendered":"http:\/\/soporteti.org\/worpress\/?page_id=3460"},"modified":"2025-09-11T19:12:46","modified_gmt":"2025-09-11T19:12:46","slug":"avisos","status":"publish","type":"page","link":"https:\/\/webssti.lcred.net\/en\/avisos\/","title":{"rendered":"Avisos"},"content":{"rendered":"<div class=\"eltdf-row-grid-section-wrapper\"  ><div class=\"eltdf-row-grid-section\"><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1600728842542\" ><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"eltdf-blog-list-holder eltdf-grid-list eltdf-disable-bottom-space eltdf-bl-standard  eltdf-three-columns eltdf-large-space eltdf-bl-pag-standard-shortcodes\"  data-type=\"standard\" data-number-of-posts=\"9\" data-number-of-columns=\"three\" data-space-between-items=\"large\" data-orderby=\"date\" data-order=\"DESC\" data-image-size=\"academist_elated_image_square\" data-title-tag=\"h4\" data-excerpt-length=\"40\" data-post-info-section=\"yes\" data-post-info-image=\"yes\" data-post-info-author=\"no\" data-post-read-more=\"no\" data-post-info-date=\"no\" data-post-info-category=\"yes\" data-post-info-comments=\"no\" data-post-info-like=\"no\" data-post-info-share=\"no\" data-post-info-tag=\"no\" data-pagination-type=\"standard-shortcodes\" data-max-num-pages=\"1\" data-next-page=\"2\">\n\t<div class=\"eltdf-bl-wrapper eltdf-outer-space\">\n\t\t<ul class=\"eltdf-blog-list\">\n\t\t\t<li class=\"eltdf-bl-item eltdf-item-space\">\n\t<div class=\"eltdf-bli-inner\">\n\t\t\n\t<div class=\"eltdf-post-image\">\n\t\t\t\t\t<a itemprop=\"url\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\" title=\"These are the differences between vulnerability and threat.\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"490\" src=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800-650x490.jpg\" class=\"attachment-academist_elated_image_square size-academist_elated_image_square wp-post-image\" alt=\"\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <div class=\"eltdf-bli-content\">\n            \n\t        \n<h4 itemprop=\"name\" class=\"entry-title eltdf-post-title\" >\n            <a itemprop=\"url\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\" title=\"These are the differences between vulnerability and threat.\">\n            These are the differences between vulnerability and threat.            <\/a>\n    <\/h4>\t\n\t        <div class=\"eltdf-bli-excerpt\">\n\t\t        \t\t<div class=\"eltdf-post-excerpt-holder\">\n\t\t\t<p itemprop=\"description\" class=\"eltdf-post-excerpt\">\n\t\t\t\tThese are the differences between vulnerability and threat.\nAlthough there are many people that use them as synonyms, in reality they are two different things, related but different.\n\nPublished in Computerhoy.com by Sandra Arteaga\n\nToday, with the news related to cyber-security in all the covers, we're more...\t\t\t<\/p>\n\t\t<\/div>\n\t\n\t\t        \t        <\/div>\n\t\t\t\t\t\t\t<div class=\"eltdf-post-info-bottom clearfix\">\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-left\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-right\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"eltdf-post-info-bottom2 clearfix\">\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-left\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-right\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t        <\/div>\n\t<\/div>\n<\/li><li class=\"eltdf-bl-item eltdf-item-space\">\n\t<div class=\"eltdf-bli-inner\">\n\t\t\n\t<div class=\"eltdf-post-image\">\n\t\t\t\t\t<a itemprop=\"url\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\" title=\"5 ways to spot an email phishing, the scammers are constantly evolving.\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"490\" src=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/security800-650x490.jpg\" class=\"attachment-academist_elated_image_square size-academist_elated_image_square wp-post-image\" alt=\"\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <div class=\"eltdf-bli-content\">\n            \n\t        \n<h4 itemprop=\"name\" class=\"entry-title eltdf-post-title\" >\n            <a itemprop=\"url\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/5-formas-de-detectar-un-correo-electronico-con-pishing\/\" title=\"5 ways to spot an email phishing, the scammers are constantly evolving.\">\n            5 ways to spot an email phishing, the scammers are constantly evolving.            <\/a>\n    <\/h4>\t\n\t        <div class=\"eltdf-bli-excerpt\">\n\t\t        \t\t<div class=\"eltdf-post-excerpt-holder\">\n\t\t\t<p itemprop=\"description\" class=\"eltdf-post-excerpt\">\n\t\t\t\tThe scammers of this malware are constantly evolving, and their methods are becoming more crafty and difficult to locate.\nPublished in PCworldenespanol.com by William Pe\u00f1a\nNo one wants to believe that he is the victim of a phishing scam, but the...\t\t\t<\/p>\n\t\t<\/div>\n\t\n\t\t        \t        <\/div>\n\t\t\t\t\t\t\t<div class=\"eltdf-post-info-bottom clearfix\">\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-left\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-right\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"eltdf-post-info-bottom2 clearfix\">\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-left\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-right\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t        <\/div>\n\t<\/div>\n<\/li><li class=\"eltdf-bl-item eltdf-item-space\">\n\t<div class=\"eltdf-bli-inner\">\n\t\t\n\t<div class=\"eltdf-post-image\">\n\t\t\t\t\t<a itemprop=\"url\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/como-crear-una-contrasena-segura-segun-la-ciencia-para-protegernos\/\" title=\"How to create a secure password, according to science to protect us.\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"490\" src=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2018\/07\/data800-650x490.jpg\" class=\"attachment-academist_elated_image_square size-academist_elated_image_square wp-post-image\" alt=\"\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <div class=\"eltdf-bli-content\">\n            \n\t        \n<h4 itemprop=\"name\" class=\"entry-title eltdf-post-title\" >\n            <a itemprop=\"url\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/como-crear-una-contrasena-segura-segun-la-ciencia-para-protegernos\/\" title=\"How to create a secure password, according to science to protect us.\">\n            How to create a secure password, according to science to protect us.            <\/a>\n    <\/h4>\t\n\t        <div class=\"eltdf-bli-excerpt\">\n\t\t        \t\t<div class=\"eltdf-post-excerpt-holder\">\n\t\t\t<p itemprop=\"description\" class=\"eltdf-post-excerpt\">\n\t\t\t\tEvery precaution is little to prevent us from stealing the account in the social networks, email, and other services and applications.\nPublished in Computerhoy.com by Sandra Arteaga\nEvery precaution is little to prevent us from stealing...\t\t\t<\/p>\n\t\t<\/div>\n\t\n\t\t        \t        <\/div>\n\t\t\t\t\t\t\t<div class=\"eltdf-post-info-bottom clearfix\">\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-left\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-right\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"eltdf-post-info-bottom2 clearfix\">\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-left\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"eltdf-post-info-bottom-right\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t        <\/div>\n\t<\/div>\n<\/li>\t\t<\/ul>\n\t<\/div>\n\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"Toda precauci\u00f3n es poca para evitar que nos roben la cuenta en las redes sociales, el correo electr\u00f3nico y otros servicios y aplicaciones. Publicado en [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"footnotes":""},"class_list":["post-3460","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Avisos | SSTI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webssti.lcred.net\/en\/avisos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avisos | SSTI\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webssti.lcred.net\/en\/avisos\/\" \/>\n<meta property=\"og:site_name\" content=\"SSTI\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-11T19:12:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/12\/fb-ssti.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webssti.lcred.net\/avisos\/\",\"url\":\"https:\/\/webssti.lcred.net\/avisos\/\",\"name\":\"Avisos | SSTI\",\"isPartOf\":{\"@id\":\"https:\/\/webssti.lcred.net\/#website\"},\"datePublished\":\"2020-09-21T22:57:32+00:00\",\"dateModified\":\"2025-09-11T19:12:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/webssti.lcred.net\/avisos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webssti.lcred.net\/avisos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webssti.lcred.net\/avisos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/webssti.lcred.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avisos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webssti.lcred.net\/#website\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"name\":\"SSTI\",\"description\":\"Contamos con un grupo de expertos\",\"publisher\":{\"@id\":\"https:\/\/webssti.lcred.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webssti.lcred.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webssti.lcred.net\/#organization\",\"name\":\"SSTI\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"contentUrl\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"width\":171,\"height\":50,\"caption\":\"SSTI\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avisos | SSTI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webssti.lcred.net\/en\/avisos\/","og_locale":"en_US","og_type":"article","og_title":"Avisos | SSTI","og_url":"https:\/\/webssti.lcred.net\/en\/avisos\/","og_site_name":"SSTI","article_modified_time":"2025-09-11T19:12:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/12\/fb-ssti.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/webssti.lcred.net\/avisos\/","url":"https:\/\/webssti.lcred.net\/avisos\/","name":"Avisos | SSTI","isPartOf":{"@id":"https:\/\/webssti.lcred.net\/#website"},"datePublished":"2020-09-21T22:57:32+00:00","dateModified":"2025-09-11T19:12:46+00:00","breadcrumb":{"@id":"https:\/\/webssti.lcred.net\/avisos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webssti.lcred.net\/avisos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/webssti.lcred.net\/avisos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/webssti.lcred.net\/"},{"@type":"ListItem","position":2,"name":"Avisos"}]},{"@type":"WebSite","@id":"https:\/\/webssti.lcred.net\/#website","url":"https:\/\/webssti.lcred.net\/","name":"SSTI","description":"Contamos con un grupo de expertos","publisher":{"@id":"https:\/\/webssti.lcred.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webssti.lcred.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webssti.lcred.net\/#organization","name":"SSTI","url":"https:\/\/webssti.lcred.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/","url":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","contentUrl":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","width":171,"height":50,"caption":"SSTI"},"image":{"@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/pages\/3460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/comments?post=3460"}],"version-history":[{"count":0,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/pages\/3460\/revisions"}],"wp:attachment":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/media?parent=3460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}