reputación digital 2w11j /taxonomy/term/3631 en Ciberseguridad en América Latina 5e6z70 ¿en qué rubros se debe invertir para contrastar el riesgo frente a la ciberdelincuencia? /reportajes/ciberseguridad-america-latina-riesgo-ciberdelincuencia-invertir <span class="field field--name-title field--type-string field--label-hidden">Ciberseguridad en América Latina, ¿en qué rubros se debe invertir para contrastar el riesgo frente a la ciberdelincuencia?</span> <div class="field field--name-field-subtitle field--type-string field--label-hidden field__item">Varios países han implementado leyes específicas para la protección de datos y ciberseguridad y han creado equipos y centros de respuesta a incidentes.</div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="//36" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Rosa Ramos</span></span> <span class="field field--name-created field--type-created field--label-hidden">Wed, 09/04/2025 - 01:42</span> <div class="field__item"> <img fetchpriority="high" src="/sites/default/files/2025-04/ciberseguridad.jpg" width="690" height="554" alt="El aumento de los ciberdelitos en Latinoamérica están motivados por el lucro / Unsplash, Adi Goldstein." typeof="foaf:Image" /> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p bis_size="{"x":8,"y":15,"w":849,"h":17,"abs_x":60,"abs_y":667}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":49,"w":822,"h":78,"abs_x":60,"abs_y":701}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":49,"w":822,"h":78,"abs_x":60,"abs_y":701}"><span bis_size="{"x":8,"y":49,"w":822,"h":78,"abs_x":60,"abs_y":701}" style="color:#000000"><span bis_size="{"x":8,"y":49,"w":822,"h":78,"abs_x":60,"abs_y":701}" style="font-weight:400"><span bis_size="{"x":8,"y":49,"w":822,"h":78,"abs_x":60,"abs_y":701}" style="font-style:normal"><span bis_size="{"x":8,"y":49,"w":822,"h":78,"abs_x":60,"abs_y":701}" style="text-decoration:none">En conjunto, Latinoamérica ha vivido una profunda transformación digital que, mezclada —o mejor dicho— afectada por la poca preparación que muchos de nuestros países tienen en materia digital (apenas unos pocos tienen agencias nacionales de ciberseguridad que reporten directamente a la Presidencia de la República), y la escasa inversión que los gobiernos locales inyectan a estrategias nacionales de ciberseguridad, la ha hecho particularmente vulnerable ante la ciberdelincuencia. </span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":145,"w":849,"h":103,"abs_x":60,"abs_y":797}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":147,"w":846,"h":37,"abs_x":60,"abs_y":799}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":147,"w":846,"h":37,"abs_x":60,"abs_y":799}"><span bis_size="{"x":8,"y":147,"w":846,"h":37,"abs_x":60,"abs_y":799}" style="color:#000000"><span bis_size="{"x":8,"y":147,"w":846,"h":37,"abs_x":60,"abs_y":799}" style="font-weight:400"><span bis_size="{"x":8,"y":147,"w":846,"h":37,"abs_x":60,"abs_y":799}" style="font-style:normal"><span bis_size="{"x":8,"y":147,"w":846,"h":37,"abs_x":60,"abs_y":799}" style="text-decoration:none">Esto ha convertido a Latinoamérica en una región de alto riesgo con profundas deficiencias en materia de seguridad informática y ciberdiplomacia en la que, según </span></span></span></span></span></span><a bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" href="https://www.ey.com/es_py/insights/cybersecurity/panorama-ciberseguridad-latinoamerica-riesgos-enfrentan-empresas" style="text-decoration:none" target="_blank"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" style="color:#1155cc"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" style="font-weight:400"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" style="font-style:normal"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" style="text-decoration:underline"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}"><span bis_size="{"x":226,"y":167,"w":78,"h":16,"abs_x":278,"abs_y":819}" style="text-decoration-skip-ink:none">datos de EY</span></span></span></span></span></span></span></span></a><span bis_size="{"x":8,"y":167,"w":846,"h":78,"abs_x":60,"abs_y":819}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":167,"w":846,"h":78,"abs_x":60,"abs_y":819}"><span bis_size="{"x":8,"y":167,"w":846,"h":78,"abs_x":60,"abs_y":819}" style="color:#000000"><span bis_size="{"x":8,"y":167,"w":846,"h":78,"abs_x":60,"abs_y":819}" style="font-weight:400"><span bis_size="{"x":8,"y":167,"w":846,"h":78,"abs_x":60,"abs_y":819}" style="font-style:normal"><span bis_size="{"x":8,"y":167,"w":846,"h":78,"abs_x":60,"abs_y":819}" style="text-decoration:none">, 62 % de las empresas locales han sufrido alguna filtración de datos; 91 % de las empresas locales han tenido incidentes de ciberseguridad; y 52 % de las compañías han experimentado entre una y 9 filtraciones de datos, 10 % han tenido entre 10 y 24 filtraciones y 42 % entre 25 y 49 casos. En conjunto, estos ataques cibernéticos le causaron a las empresas (en 2023) gastos de entre 1,5 millones de dólares y 50 millones de dólares.</span></span></span></span></span></span></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":403,"w":849,"h":144,"abs_x":60,"abs_y":1055}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><strong>Relacionado: <a href="/reportajes/ley-ciberseguridad-chile-impacta-empresas" hreflang="en" target="_blank">Ley de Ciberseguridad en Chile, ¿cómo impacta a las empresas?</a></strong></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":403,"w":849,"h":144,"abs_x":60,"abs_y":1055}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":265,"w":845,"h":120,"abs_x":60,"abs_y":917}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":265,"w":845,"h":120,"abs_x":60,"abs_y":917}"><span bis_size="{"x":8,"y":265,"w":845,"h":120,"abs_x":60,"abs_y":917}" style="color:#000000"><span bis_size="{"x":8,"y":265,"w":845,"h":120,"abs_x":60,"abs_y":917}" style="font-weight:400"><span bis_size="{"x":8,"y":265,"w":845,"h":120,"abs_x":60,"abs_y":917}" style="font-style:normal"><span bis_size="{"x":8,"y":265,"w":845,"h":120,"abs_x":60,"abs_y":917}" style="text-decoration:none">A finales de 2023, el Instituto para el Análisis de Relaciones Internacionales (IARI) se refirió a la tasa anual de ciberataques contra la infraestructura gubernamental de países latinoamericanos como “alarmante” y, como ya se dijo, pone de manifiesto las profundas deficiencias de la ciberseguridad en la región, entre las que destacan: una ciberdiplomacia progresiva aunque ineficaz, falta de concienciación sobre las vulnerabilidades y escasa inversión y capacitación, lo que ha derivado en que los estudios que abordan este problema son muy técnicos “y carecen de una perspectiva holística que permita una visión general de la situación”.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":403,"w":849,"h":144,"abs_x":60,"abs_y":1055}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":404,"w":847,"h":141,"abs_x":60,"abs_y":1056}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":404,"w":847,"h":141,"abs_x":60,"abs_y":1056}"><span bis_size="{"x":8,"y":404,"w":847,"h":141,"abs_x":60,"abs_y":1056}" style="color:#000000"><span bis_size="{"x":8,"y":404,"w":847,"h":141,"abs_x":60,"abs_y":1056}" style="font-weight:400"><span bis_size="{"x":8,"y":404,"w":847,"h":141,"abs_x":60,"abs_y":1056}" style="font-style:normal"><span bis_size="{"x":8,"y":404,"w":847,"h":141,"abs_x":60,"abs_y":1056}" style="text-decoration:none">Si se le pregunta a <strong>Andrea Zanusso</strong>, experta en ciberseguridad y protección de datos personales y directora de tecnología, innovación & IA de Estudio Olaechea (Lima), dónde está América Latina en materia de seguridad cibernética y qué estamos haciendo bien y qué mal, la respuesta de la abogada es directa: “Creo que todavía hay mucho camino por recorrer, prácticas por fortalecer y una fragmentación regulatoria que atender”. Para ella, ahora hay una mayor conciencia sobre los riesgos asociados a posibles filtraciones e incidentes de seguridad, y las organizaciones tienen una mayor comprensión acerca de las posibles consecuencias a las que se pueden enfrentar, lo que –cree– ha aumentado la inversión en robustecer la ciberseguridad dentro de las empresas.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":563,"w":849,"h":103,"abs_x":60,"abs_y":1215}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":564,"w":845,"h":99,"abs_x":60,"abs_y":1216}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":564,"w":845,"h":99,"abs_x":60,"abs_y":1216}"><span bis_size="{"x":8,"y":564,"w":845,"h":99,"abs_x":60,"abs_y":1216}" style="color:#000000"><span bis_size="{"x":8,"y":564,"w":845,"h":99,"abs_x":60,"abs_y":1216}" style="font-weight:400"><span bis_size="{"x":8,"y":564,"w":845,"h":99,"abs_x":60,"abs_y":1216}" style="font-style:normal"><span bis_size="{"x":8,"y":564,"w":845,"h":99,"abs_x":60,"abs_y":1216}" style="text-decoration:none">Esto pone a nuestra región en una posición en la que se debe abordar la brecha del talento y generar incentivos para formar profesionales altamente capacitados en este campo, así como promover la colaboración interdisciplinaria y asegurar la formación y especialización continua para hacer frente a las amenazas emergentes en evolución, buscando el camino para fortalecer la ciberresiliencia, al tiempo que se debe seguir impulsando el fomento de una cultura de ciberseguridad (prioritaria en la agenda regional) dentro de las organizaciones, que se constituya como “un valor fundamental”. </span></span></span></span></span></span></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":1254,"w":849,"h":82,"abs_x":60,"abs_y":1906}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><strong>Sobre esto: <a href="/reportajes/proteccion-de-datos-latinoamerica" hreflang="en" target="_blank">¿Dónde está Latinoamérica en materia de protección de datos?</a></strong></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":681,"w":849,"h":124,"abs_x":60,"abs_y":1333}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":683,"w":842,"h":120,"abs_x":60,"abs_y":1335}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":683,"w":842,"h":120,"abs_x":60,"abs_y":1335}"><span bis_size="{"x":8,"y":683,"w":842,"h":120,"abs_x":60,"abs_y":1335}" style="color:#000000"><span bis_size="{"x":8,"y":683,"w":842,"h":120,"abs_x":60,"abs_y":1335}" style="font-weight:400"><span bis_size="{"x":8,"y":683,"w":842,"h":120,"abs_x":60,"abs_y":1335}" style="font-style:normal"><span bis_size="{"x":8,"y":683,"w":842,"h":120,"abs_x":60,"abs_y":1335}" style="text-decoration:none">Esto es especialmente importante si se toma en consideración que, como indica <strong>Jorge de los Ríos</strong>, socio de derecho de la competencia, protección al consumidor y protección de datos en Posse Herrera Ruiz (Bogotá), a pesar de que América Latina ha avanzado en materia de seguridad cibernética, aún enfrenta obstáculos como la falta de recursos dentro de organizaciones que no tienen suficiente capital para implementar medidas efectivas; una disparidad significativa en la preparación y capacidad de respuesta entre los diferentes países de la región y una concienciación insuficiente sobre la importancia de la ciberseguridad en muchas organizaciones.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":681,"w":849,"h":124,"abs_x":60,"abs_y":1333}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":822,"w":846,"h":141,"abs_x":60,"abs_y":1474}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":822,"w":846,"h":141,"abs_x":60,"abs_y":1474}"><span bis_size="{"x":8,"y":822,"w":846,"h":141,"abs_x":60,"abs_y":1474}" style="color:#000000"><span bis_size="{"x":8,"y":822,"w":846,"h":141,"abs_x":60,"abs_y":1474}" style="font-weight:400"><span bis_size="{"x":8,"y":822,"w":846,"h":141,"abs_x":60,"abs_y":1474}" style="font-style:normal"><span bis_size="{"x":8,"y":822,"w":846,"h":141,"abs_x":60,"abs_y":1474}" style="text-decoration:none">Aún así, estamos haciendo algo bien, apunta el experto, y es que varios países han implementado leyes y regulaciones específicas para la protección de datos y ciberseguridad, se han creado equipos y centros de respuesta a incidentes cibernéticos y hay un creciente reconocimiento de la importancia de la colaboración entre el sector público y privado. Si los gobiernos regionales deciden tener las discusiones necesarias para mejorar están deben centrarse en el fortalecimiento de la cooperación y el intercambio de información entre los países de la región, la inversión en infraestructura y capacitación en ciberseguridad, el desarrollo de capacidades locales y la formación de profesionales en ciberseguridad y la adopción de tecnologías avanzadas (como la IA) para mejorar la detección y respuesta a incidentes cibernéticos.</span></span></span></span></span></span></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":820,"w":849,"h":144,"abs_x":60,"abs_y":1472}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><strong>Más del tema: <a href="/reportajes/leyes-hackeos-ciberdelincuencia" hreflang="en" target="_blank">Hackeos y ciberdelincuencia, ¿hacia dónde deben dirigirse las leyes para proteger a s y empresas?</a></strong></span></span></span></p> <hr /> <h2 bis_size="{"x":8,"y":820,"w":849,"h":144,"abs_x":60,"abs_y":1472}" style="line-height: 1.38;"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":982,"w":138,"h":16,"abs_x":60,"abs_y":1634}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":982,"w":138,"h":16,"abs_x":60,"abs_y":1634}"><span bis_size="{"x":8,"y":982,"w":138,"h":16,"abs_x":60,"abs_y":1634}" style="color:#000000"><span bis_size="{"x":8,"y":982,"w":138,"h":16,"abs_x":60,"abs_y":1634}" style="font-weight:700"><span bis_size="{"x":8,"y":982,"w":138,"h":16,"abs_x":60,"abs_y":1634}" style="font-style:normal"><span bis_size="{"x":8,"y":982,"w":138,"h":16,"abs_x":60,"abs_y":1634}" style="text-decoration:none">El enorme peso del </span></span></span></span></span></span><span bis_size="{"x":146,"y":982,"w":86,"h":16,"abs_x":198,"abs_y":1634}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":146,"y":982,"w":86,"h":16,"abs_x":198,"abs_y":1634}"><span bis_size="{"x":146,"y":982,"w":86,"h":16,"abs_x":198,"abs_y":1634}" style="color:#000000"><span bis_size="{"x":146,"y":982,"w":86,"h":16,"abs_x":198,"abs_y":1634}" style="font-weight:700"><span bis_size="{"x":146,"y":982,"w":86,"h":16,"abs_x":198,"abs_y":1634}" style="font-style:italic"><span bis_size="{"x":146,"y":982,"w":86,"h":16,"abs_x":198,"abs_y":1634}" style="text-decoration:none">ransomware</span></span></span></span></span></span></span></span></span></h2> <p bis_size="{"x":8,"y":1016,"w":849,"h":144,"abs_x":60,"abs_y":1668}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1017,"w":647,"h":16,"abs_x":60,"abs_y":1669}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1017,"w":647,"h":16,"abs_x":60,"abs_y":1669}"><span bis_size="{"x":8,"y":1017,"w":647,"h":16,"abs_x":60,"abs_y":1669}" style="color:#000000"><span bis_size="{"x":8,"y":1017,"w":647,"h":16,"abs_x":60,"abs_y":1669}" style="font-weight:400"><span bis_size="{"x":8,"y":1017,"w":647,"h":16,"abs_x":60,"abs_y":1669}" style="font-style:normal"><span bis_size="{"x":8,"y":1017,"w":647,"h":16,"abs_x":60,"abs_y":1669}" style="text-decoration:none">De acuerdo con las estadísticas del líder mundial en ciberseguridad </span></span></span></span></span></span><a bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" href="https://www.fortinet.com/lat/corporate/about-us/newsroom/press-releases/2023/fortiguard-labs-reports-destructive-wiper-malware-increases-over-50-percent" style="text-decoration:none"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" style="color:#1155cc"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" style="font-weight:400"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" style="font-style:normal"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" style="text-decoration:underline"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}"><span bis_size="{"x":655,"y":1017,"w":49,"h":16,"abs_x":707,"abs_y":1669}" style="text-decoration-skip-ink:none">Fortinet</span></span></span></span></span></span></span></span></a>,<span bis_size="{"x":8,"y":1017,"w":823,"h":37,"abs_x":60,"abs_y":1669}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1017,"w":823,"h":37,"abs_x":60,"abs_y":1669}"><span bis_size="{"x":8,"y":1017,"w":823,"h":37,"abs_x":60,"abs_y":1669}" style="color:#000000"><span bis_size="{"x":8,"y":1017,"w":823,"h":37,"abs_x":60,"abs_y":1669}" style="font-weight:400"><span bis_size="{"x":8,"y":1017,"w":823,"h":37,"abs_x":60,"abs_y":1669}" style="font-style:normal"><span bis_size="{"x":8,"y":1017,"w":823,"h":37,"abs_x":60,"abs_y":1669}" style="text-decoration:none"> en 2022, América Latina y el Caribe sufrieron más de 360.000 millones de intentos de ciberataques con métodos como el </span></span></span></span></span></span><span bis_size="{"x":676,"y":1038,"w":94,"h":16,"abs_x":728,"abs_y":1690}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":676,"y":1038,"w":94,"h":16,"abs_x":728,"abs_y":1690}"><span bis_size="{"x":676,"y":1038,"w":94,"h":16,"abs_x":728,"abs_y":1690}" style="color:#000000"><span bis_size="{"x":676,"y":1038,"w":94,"h":16,"abs_x":728,"abs_y":1690}" style="font-weight:400"><span bis_size="{"x":676,"y":1038,"w":94,"h":16,"abs_x":728,"abs_y":1690}" style="font-style:italic"><span bis_size="{"x":676,"y":1038,"w":94,"h":16,"abs_x":728,"abs_y":1690}" style="text-decoration:none">wiper malware</span></span></span></span></span></span><span bis_size="{"x":770,"y":1038,"w":23,"h":16,"abs_x":822,"abs_y":1690}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":770,"y":1038,"w":23,"h":16,"abs_x":822,"abs_y":1690}"><span bis_size="{"x":770,"y":1038,"w":23,"h":16,"abs_x":822,"abs_y":1690}" style="color:#000000"><span bis_size="{"x":770,"y":1038,"w":23,"h":16,"abs_x":822,"abs_y":1690}" style="font-weight:400"><span bis_size="{"x":770,"y":1038,"w":23,"h":16,"abs_x":822,"abs_y":1690}" style="font-style:normal"><span bis_size="{"x":770,"y":1038,"w":23,"h":16,"abs_x":822,"abs_y":1690}" style="text-decoration:none">, el </span></span></span></span></span></span><span bis_size="{"x":8,"y":1059,"w":84,"h":16,"abs_x":60,"abs_y":1711}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1059,"w":84,"h":16,"abs_x":60,"abs_y":1711}"><span bis_size="{"x":8,"y":1059,"w":84,"h":16,"abs_x":60,"abs_y":1711}" style="color:#000000"><span bis_size="{"x":8,"y":1059,"w":84,"h":16,"abs_x":60,"abs_y":1711}" style="font-weight:400"><span bis_size="{"x":8,"y":1059,"w":84,"h":16,"abs_x":60,"abs_y":1711}" style="font-style:italic"><span bis_size="{"x":8,"y":1059,"w":84,"h":16,"abs_x":60,"abs_y":1711}" style="text-decoration:none">ransomware </span></span></span></span></span></span><span bis_size="{"x":92,"y":1059,"w":374,"h":16,"abs_x":144,"abs_y":1711}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":92,"y":1059,"w":374,"h":16,"abs_x":144,"abs_y":1711}"><span bis_size="{"x":92,"y":1059,"w":374,"h":16,"abs_x":144,"abs_y":1711}" style="color:#000000"><span bis_size="{"x":92,"y":1059,"w":374,"h":16,"abs_x":144,"abs_y":1711}" style="font-weight:400"><span bis_size="{"x":92,"y":1059,"w":374,"h":16,"abs_x":144,"abs_y":1711}" style="font-style:normal"><span bis_size="{"x":92,"y":1059,"w":374,"h":16,"abs_x":144,"abs_y":1711}" style="text-decoration:none">(en niveles máximos sin evidencia de desaceleración), el </span></span></span></span></span></span><span bis_size="{"x":466,"y":1059,"w":177,"h":16,"abs_x":518,"abs_y":1711}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":466,"y":1059,"w":177,"h":16,"abs_x":518,"abs_y":1711}"><span bis_size="{"x":466,"y":1059,"w":177,"h":16,"abs_x":518,"abs_y":1711}" style="color:#000000"><span bis_size="{"x":466,"y":1059,"w":177,"h":16,"abs_x":518,"abs_y":1711}" style="font-weight:400"><span bis_size="{"x":466,"y":1059,"w":177,"h":16,"abs_x":518,"abs_y":1711}" style="font-style:italic"><span bis_size="{"x":466,"y":1059,"w":177,"h":16,"abs_x":518,"abs_y":1711}" style="text-decoration:none">Ransomware-as-a-Service </span></span></span></span></span></span><span bis_size="{"x":644,"y":1059,"w":70,"h":16,"abs_x":696,"abs_y":1711}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":644,"y":1059,"w":70,"h":16,"abs_x":696,"abs_y":1711}"><span bis_size="{"x":644,"y":1059,"w":70,"h":16,"abs_x":696,"abs_y":1711}" style="color:#000000"><span bis_size="{"x":644,"y":1059,"w":70,"h":16,"abs_x":696,"abs_y":1711}" style="font-weight:400"><span bis_size="{"x":644,"y":1059,"w":70,"h":16,"abs_x":696,"abs_y":1711}" style="font-style:normal"><span bis_size="{"x":644,"y":1059,"w":70,"h":16,"abs_x":696,"abs_y":1711}" style="text-decoration:none">(RaaS), el </span></span></span></span></span></span><span bis_size="{"x":714,"y":1059,"w":54,"h":16,"abs_x":766,"abs_y":1711}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":714,"y":1059,"w":54,"h":16,"abs_x":766,"abs_y":1711}"><span bis_size="{"x":714,"y":1059,"w":54,"h":16,"abs_x":766,"abs_y":1711}" style="color:#000000"><span bis_size="{"x":714,"y":1059,"w":54,"h":16,"abs_x":766,"abs_y":1711}" style="font-weight:400"><span bis_size="{"x":714,"y":1059,"w":54,"h":16,"abs_x":766,"abs_y":1711}" style="font-style:italic"><span bis_size="{"x":714,"y":1059,"w":54,"h":16,"abs_x":766,"abs_y":1711}" style="text-decoration:none">phishing</span></span></span></span></span></span><span bis_size="{"x":769,"y":1059,"w":87,"h":16,"abs_x":821,"abs_y":1711}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":769,"y":1059,"w":87,"h":16,"abs_x":821,"abs_y":1711}"><span bis_size="{"x":769,"y":1059,"w":87,"h":16,"abs_x":821,"abs_y":1711}" style="color:#000000"><span bis_size="{"x":769,"y":1059,"w":87,"h":16,"abs_x":821,"abs_y":1711}" style="font-weight:400"><span bis_size="{"x":769,"y":1059,"w":87,"h":16,"abs_x":821,"abs_y":1711}" style="font-style:normal"><span bis_size="{"x":769,"y":1059,"w":87,"h":16,"abs_x":821,"abs_y":1711}" style="text-decoration:none">, los ataques </span></span></span></span></span></span><span bis_size="{"x":8,"y":1080,"w":115,"h":16,"abs_x":60,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1080,"w":115,"h":16,"abs_x":60,"abs_y":1732}"><span bis_size="{"x":8,"y":1080,"w":115,"h":16,"abs_x":60,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":8,"y":1080,"w":115,"h":16,"abs_x":60,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":8,"y":1080,"w":115,"h":16,"abs_x":60,"abs_y":1732}" style="font-style:italic"><span bis_size="{"x":8,"y":1080,"w":115,"h":16,"abs_x":60,"abs_y":1732}" style="text-decoration:none">man in the middle</span></span></span></span></span></span><span bis_size="{"x":123,"y":1080,"w":23,"h":16,"abs_x":175,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":123,"y":1080,"w":23,"h":16,"abs_x":175,"abs_y":1732}"><span bis_size="{"x":123,"y":1080,"w":23,"h":16,"abs_x":175,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":123,"y":1080,"w":23,"h":16,"abs_x":175,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":123,"y":1080,"w":23,"h":16,"abs_x":175,"abs_y":1732}" style="font-style:normal"><span bis_size="{"x":123,"y":1080,"w":23,"h":16,"abs_x":175,"abs_y":1732}" style="text-decoration:none">, el </span></span></span></span></span></span><span bis_size="{"x":147,"y":1080,"w":79,"h":16,"abs_x":199,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":147,"y":1080,"w":79,"h":16,"abs_x":199,"abs_y":1732}"><span bis_size="{"x":147,"y":1080,"w":79,"h":16,"abs_x":199,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":147,"y":1080,"w":79,"h":16,"abs_x":199,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":147,"y":1080,"w":79,"h":16,"abs_x":199,"abs_y":1732}" style="font-style:italic"><span bis_size="{"x":147,"y":1080,"w":79,"h":16,"abs_x":199,"abs_y":1732}" style="text-decoration:none">identity theft</span></span></span></span></span></span><span bis_size="{"x":226,"y":1080,"w":23,"h":16,"abs_x":278,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":226,"y":1080,"w":23,"h":16,"abs_x":278,"abs_y":1732}"><span bis_size="{"x":226,"y":1080,"w":23,"h":16,"abs_x":278,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":226,"y":1080,"w":23,"h":16,"abs_x":278,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":226,"y":1080,"w":23,"h":16,"abs_x":278,"abs_y":1732}" style="font-style:normal"><span bis_size="{"x":226,"y":1080,"w":23,"h":16,"abs_x":278,"abs_y":1732}" style="text-decoration:none">, el </span></span></span></span></span></span><span bis_size="{"x":250,"y":1080,"w":185,"h":16,"abs_x":302,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":250,"y":1080,"w":185,"h":16,"abs_x":302,"abs_y":1732}"><span bis_size="{"x":250,"y":1080,"w":185,"h":16,"abs_x":302,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":250,"y":1080,"w":185,"h":16,"abs_x":302,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":250,"y":1080,"w":185,"h":16,"abs_x":302,"abs_y":1732}" style="font-style:italic"><span bis_size="{"x":250,"y":1080,"w":185,"h":16,"abs_x":302,"abs_y":1732}" style="text-decoration:none">business email compromise </span></span></span></span></span></span><span bis_size="{"x":435,"y":1080,"w":39,"h":16,"abs_x":487,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":435,"y":1080,"w":39,"h":16,"abs_x":487,"abs_y":1732}"><span bis_size="{"x":435,"y":1080,"w":39,"h":16,"abs_x":487,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":435,"y":1080,"w":39,"h":16,"abs_x":487,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":435,"y":1080,"w":39,"h":16,"abs_x":487,"abs_y":1732}" style="font-style:normal"><span bis_size="{"x":435,"y":1080,"w":39,"h":16,"abs_x":487,"abs_y":1732}" style="text-decoration:none">(BEC)</span></span></span></span></span></span><span bis_size="{"x":475,"y":1080,"w":4,"h":16,"abs_x":527,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":475,"y":1080,"w":4,"h":16,"abs_x":527,"abs_y":1732}"><span bis_size="{"x":475,"y":1080,"w":4,"h":16,"abs_x":527,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":475,"y":1080,"w":4,"h":16,"abs_x":527,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":475,"y":1080,"w":4,"h":16,"abs_x":527,"abs_y":1732}" style="font-style:italic"><span bis_size="{"x":475,"y":1080,"w":4,"h":16,"abs_x":527,"abs_y":1732}" style="text-decoration:none"> </span></span></span></span></span></span><span bis_size="{"x":479,"y":1080,"w":230,"h":16,"abs_x":531,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":479,"y":1080,"w":230,"h":16,"abs_x":531,"abs_y":1732}"><span bis_size="{"x":479,"y":1080,"w":230,"h":16,"abs_x":531,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":479,"y":1080,"w":230,"h":16,"abs_x":531,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":479,"y":1080,"w":230,"h":16,"abs_x":531,"abs_y":1732}" style="font-style:normal"><span bis_size="{"x":479,"y":1080,"w":230,"h":16,"abs_x":531,"abs_y":1732}" style="text-decoration:none">y los ataques DDoS, lo que para el </span></span></span></span></span></span><span bis_size="{"x":709,"y":1080,"w":28,"h":16,"abs_x":761,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":709,"y":1080,"w":28,"h":16,"abs_x":761,"abs_y":1732}"><span bis_size="{"x":709,"y":1080,"w":28,"h":16,"abs_x":761,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":709,"y":1080,"w":28,"h":16,"abs_x":761,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":709,"y":1080,"w":28,"h":16,"abs_x":761,"abs_y":1732}" style="font-style:italic"><span bis_size="{"x":709,"y":1080,"w":28,"h":16,"abs_x":761,"abs_y":1732}" style="text-decoration:none">hub </span></span></span></span></span></span><span bis_size="{"x":8,"y":1080,"w":848,"h":78,"abs_x":60,"abs_y":1732}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1080,"w":848,"h":78,"abs_x":60,"abs_y":1732}"><span bis_size="{"x":8,"y":1080,"w":848,"h":78,"abs_x":60,"abs_y":1732}" style="color:#000000"><span bis_size="{"x":8,"y":1080,"w":848,"h":78,"abs_x":60,"abs_y":1732}" style="font-weight:400"><span bis_size="{"x":8,"y":1080,"w":848,"h":78,"abs_x":60,"abs_y":1732}" style="font-style:normal"><span bis_size="{"x":8,"y":1080,"w":848,"h":78,"abs_x":60,"abs_y":1732}" style="text-decoration:none">estadounidense resalta la necesidad de que las organizaciones locales se centren en habilitar la inteligencia de amenazas “coordinada y procesable, impulsada por el aprendizaje automático en tiempo real en todos los dispositivos de seguridad para detectar acciones sospechosas e iniciar una mitigación coordinada.”</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":1176,"w":849,"h":63,"abs_x":60,"abs_y":1828}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1177,"w":807,"h":37,"abs_x":60,"abs_y":1829}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1177,"w":807,"h":37,"abs_x":60,"abs_y":1829}"><span bis_size="{"x":8,"y":1177,"w":807,"h":37,"abs_x":60,"abs_y":1829}" style="color:#000000"><span bis_size="{"x":8,"y":1177,"w":807,"h":37,"abs_x":60,"abs_y":1829}" style="font-weight:400"><span bis_size="{"x":8,"y":1177,"w":807,"h":37,"abs_x":60,"abs_y":1829}" style="font-style:normal"><span bis_size="{"x":8,"y":1177,"w":807,"h":37,"abs_x":60,"abs_y":1829}" style="text-decoration:none">El aumento de los ciberdelitos en la región están motivados, según el medio especializado Segurilatam, por el lucro, la denegación de servicio y el robo de datos, en el caso del crimen con intención económica, Fortinet explica que estos fueron </span></span></span></span></span></span><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}"><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}" style="color:#000000"><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}" style="background-color:#ffffff"><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}" style="font-weight:400"><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}" style="font-style:normal"><span bis_size="{"x":8,"y":1198,"w":841,"h":37,"abs_x":60,"abs_y":1850}" style="text-decoration:none">73,9 % de los incidentes e involucraron, mayoritariamente, el </span></span></span></span></span></span></span><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}"><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}" style="color:#000000"><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}" style="background-color:#ffffff"><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}" style="font-weight:400"><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}" style="font-style:italic"><span bis_size="{"x":392,"y":1219,"w":88,"h":16,"abs_x":444,"abs_y":1871}" style="text-decoration:none">ransomware </span></span></span></span></span></span></span><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}"><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}" style="color:#000000"><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}" style="background-color:#ffffff"><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}" style="font-weight:400"><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}" style="font-style:normal"><span bis_size="{"x":480,"y":1219,"w":11,"h":16,"abs_x":532,"abs_y":1871}" style="text-decoration:none">y </span></span></span></span></span></span></span><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}"><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}" style="color:#000000"><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}" style="background-color:#ffffff"><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}" style="font-weight:400"><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}" style="font-style:italic"><span bis_size="{"x":492,"y":1219,"w":48,"h":16,"abs_x":544,"abs_y":1871}" style="text-decoration:none">scripts </span></span></span></span></span></span></span><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="color:#000000"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="background-color:#ffffff"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="font-weight:400"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="font-style:normal"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="text-decoration:none">maliciosos.</span></span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":1176,"w":849,"h":63,"abs_x":60,"abs_y":1828}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="color:#000000"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="background-color:#ffffff"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="font-weight:400"><span bis_size="{"x":541,"y":1219,"w":75,"h":16,"abs_x":593,"abs_y":1871}" style="font-style:normal"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1255,"w":17,"h":16,"abs_x":60,"abs_y":1907}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1255,"w":17,"h":16,"abs_x":60,"abs_y":1907}"><span bis_size="{"x":8,"y":1255,"w":17,"h":16,"abs_x":60,"abs_y":1907}" style="color:#000000"><span bis_size="{"x":8,"y":1255,"w":17,"h":16,"abs_x":60,"abs_y":1907}" style="font-weight:400"><span bis_size="{"x":8,"y":1255,"w":17,"h":16,"abs_x":60,"abs_y":1907}" style="font-style:normal"><span bis_size="{"x":8,"y":1255,"w":17,"h":16,"abs_x":60,"abs_y":1907}" style="text-decoration:none">El </span></span></span></span></span></span><span bis_size="{"x":25,"y":1255,"w":80,"h":16,"abs_x":77,"abs_y":1907}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":25,"y":1255,"w":80,"h":16,"abs_x":77,"abs_y":1907}"><span bis_size="{"x":25,"y":1255,"w":80,"h":16,"abs_x":77,"abs_y":1907}" style="color:#000000"><span bis_size="{"x":25,"y":1255,"w":80,"h":16,"abs_x":77,"abs_y":1907}" style="font-weight:400"><span bis_size="{"x":25,"y":1255,"w":80,"h":16,"abs_x":77,"abs_y":1907}" style="font-style:italic"><span bis_size="{"x":25,"y":1255,"w":80,"h":16,"abs_x":77,"abs_y":1907}" style="text-decoration:none">ransomware</span></span></span></span></span></span><span bis_size="{"x":8,"y":1255,"w":849,"h":78,"abs_x":60,"abs_y":1907}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1255,"w":849,"h":78,"abs_x":60,"abs_y":1907}"><span bis_size="{"x":8,"y":1255,"w":849,"h":78,"abs_x":60,"abs_y":1907}" style="color:#000000"><span bis_size="{"x":8,"y":1255,"w":849,"h":78,"abs_x":60,"abs_y":1907}" style="font-weight:400"><span bis_size="{"x":8,"y":1255,"w":849,"h":78,"abs_x":60,"abs_y":1907}" style="font-style:normal"><span bis_size="{"x":8,"y":1255,"w":849,"h":78,"abs_x":60,"abs_y":1907}" style="text-decoration:none">, apunta Jorge de los Ríos, interrumpe las operaciones de las empresas afectadas, hasta que se pague el rescate o se recupere la información; ocasiona la pérdida de datos, lo que afecta la continuidad del negocio; representa altos costos no solo por el pago del rescate, sino también por la recuperación de datos y la implementación de medidas de seguridad adicionales, y reduce la confianza de los clientes y socios comerciales de las empresas.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p> <blockquote> </blockquote> <hr /> <p bis_size="{"x":8,"y":1589,"w":849,"h":62,"abs_x":60,"abs_y":2241}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><strong>Recomendamos: <a href="/reportajes/la-pirateria-digital-equilibrio-derechos-negocio-millonario" hreflang="en" target="_blank">Piratería digital; ¿Dónde se desdibuja la línea entre equilibrio de derechos y negocio millonario?</a></strong></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":1352,"w":849,"h":103,"abs_x":60,"abs_y":2004}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1353,"w":840,"h":37,"abs_x":60,"abs_y":2005}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1353,"w":840,"h":37,"abs_x":60,"abs_y":2005}"><span bis_size="{"x":8,"y":1353,"w":840,"h":37,"abs_x":60,"abs_y":2005}" style="color:#000000"><span bis_size="{"x":8,"y":1353,"w":840,"h":37,"abs_x":60,"abs_y":2005}" style="font-weight:400"><span bis_size="{"x":8,"y":1353,"w":840,"h":37,"abs_x":60,"abs_y":2005}" style="font-style:normal"><span bis_size="{"x":8,"y":1353,"w":840,"h":37,"abs_x":60,"abs_y":2005}" style="text-decoration:none">Pero no solo esto, <strong>Andrea Zanusso</strong> (que estuvo en la última reunión IBA, como expositora en el de ciberseguridad) explica que el </span></span></span></span></span></span><span bis_size="{"x":52,"y":1374,"w":84,"h":16,"abs_x":104,"abs_y":2026}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":52,"y":1374,"w":84,"h":16,"abs_x":104,"abs_y":2026}"><span bis_size="{"x":52,"y":1374,"w":84,"h":16,"abs_x":104,"abs_y":2026}" style="color:#000000"><span bis_size="{"x":52,"y":1374,"w":84,"h":16,"abs_x":104,"abs_y":2026}" style="font-weight:400"><span bis_size="{"x":52,"y":1374,"w":84,"h":16,"abs_x":104,"abs_y":2026}" style="font-style:italic"><span bis_size="{"x":52,"y":1374,"w":84,"h":16,"abs_x":104,"abs_y":2026}" style="text-decoration:none">ransomware </span></span></span></span></span></span><span bis_size="{"x":8,"y":1374,"w":848,"h":58,"abs_x":60,"abs_y":2026}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1374,"w":848,"h":58,"abs_x":60,"abs_y":2026}"><span bis_size="{"x":8,"y":1374,"w":848,"h":58,"abs_x":60,"abs_y":2026}" style="color:#000000"><span bis_size="{"x":8,"y":1374,"w":848,"h":58,"abs_x":60,"abs_y":2026}" style="font-weight:400"><span bis_size="{"x":8,"y":1374,"w":848,"h":58,"abs_x":60,"abs_y":2026}" style="font-style:normal"><span bis_size="{"x":8,"y":1374,"w":848,"h":58,"abs_x":60,"abs_y":2026}" style="text-decoration:none">puede acarrear, además de consecuencias reputacionales, riesgos operativos y legales que, en el caso de las últimas, pueden “escalar exponencialmente” (doble y triple extorsión), teniendo en cuenta que los atacantes, además de cifrar información de la empresa (mediante el </span></span></span></span></span></span><span bis_size="{"x":269,"y":1415,"w":124,"h":16,"abs_x":321,"abs_y":2067}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":269,"y":1415,"w":124,"h":16,"abs_x":321,"abs_y":2067}"><span bis_size="{"x":269,"y":1415,"w":124,"h":16,"abs_x":321,"abs_y":2067}" style="color:#000000"><span bis_size="{"x":269,"y":1415,"w":124,"h":16,"abs_x":321,"abs_y":2067}" style="font-weight:400"><span bis_size="{"x":269,"y":1415,"w":124,"h":16,"abs_x":321,"abs_y":2067}" style="font-style:italic"><span bis_size="{"x":269,"y":1415,"w":124,"h":16,"abs_x":321,"abs_y":2067}" style="text-decoration:none">crypto ransomware</span></span></span></span></span></span><span bis_size="{"x":8,"y":1415,"w":825,"h":37,"abs_x":60,"abs_y":2067}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1415,"w":825,"h":37,"abs_x":60,"abs_y":2067}"><span bis_size="{"x":8,"y":1415,"w":825,"h":37,"abs_x":60,"abs_y":2067}" style="color:#000000"><span bis_size="{"x":8,"y":1415,"w":825,"h":37,"abs_x":60,"abs_y":2067}" style="font-weight:400"><span bis_size="{"x":8,"y":1415,"w":825,"h":37,"abs_x":60,"abs_y":2067}" style="font-style:normal"><span bis_size="{"x":8,"y":1415,"w":825,"h":37,"abs_x":60,"abs_y":2067}" style="text-decoration:none">), pueden amenazar con extorsionar a terceros relacionados con la empresa.</span></span></span></span></span></span></span></span></span></p> <blockquote> <p bis_size="{"x":8,"y":1470,"w":849,"h":103,"abs_x":60,"abs_y":2122}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;">"El rol de los abogados especialistas en temas de ciberseguridad va más allá de la interpretación de la normativa sectorial; estarán mejor posicionados si adoptan un enfoque integral que abarque los aspectos legales y que también se involucren en aspectos técnicos, en el impacto operativo de los incidentes de seguridad, en el riesgo financiero, reputacional y demás cuestiones relacionadas. Este enfoque multidisciplinario es clave para colaborar efectivamente con los equipos técnicos y alinear estrategias legales".</span></span></span></p> </blockquote> <p bis_size="{"x":8,"y":1589,"w":849,"h":62,"abs_x":60,"abs_y":2241}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1590,"w":847,"h":58,"abs_x":60,"abs_y":2242}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1590,"w":847,"h":58,"abs_x":60,"abs_y":2242}"><span bis_size="{"x":8,"y":1590,"w":847,"h":58,"abs_x":60,"abs_y":2242}" style="color:#000000"><span bis_size="{"x":8,"y":1590,"w":847,"h":58,"abs_x":60,"abs_y":2242}" style="font-weight:400"><span bis_size="{"x":8,"y":1590,"w":847,"h":58,"abs_x":60,"abs_y":2242}" style="font-style:normal"><span bis_size="{"x":8,"y":1590,"w":847,"h":58,"abs_x":60,"abs_y":2242}" style="text-decoration:none">Esto significa, añade de los Ríos, que los abogados deben prepararse para asesorar a sus clientes en cumplimiento normativo en protección de datos y ciberseguridad, planes de respuesta a incidentes cibernéticos, capacitación y concienciación continua entre los técnicos y evaluación periódica de riesgos y vulnerabilidades.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":1666,"w":849,"h":103,"abs_x":60,"abs_y":2318}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1667,"w":842,"h":99,"abs_x":60,"abs_y":2319}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1667,"w":842,"h":99,"abs_x":60,"abs_y":2319}"><span bis_size="{"x":8,"y":1667,"w":842,"h":99,"abs_x":60,"abs_y":2319}" style="color:#000000"><span bis_size="{"x":8,"y":1667,"w":842,"h":99,"abs_x":60,"abs_y":2319}" style="font-weight:400"><span bis_size="{"x":8,"y":1667,"w":842,"h":99,"abs_x":60,"abs_y":2319}" style="font-style:normal"><span bis_size="{"x":8,"y":1667,"w":842,"h":99,"abs_x":60,"abs_y":2319}" style="text-decoration:none">Así, desde el punto de vista de la asesoría jurídica, las mejores maneras de prevenir riesgos y gestionar los ataques cibernéticos se basan en el desarrollo de políticas internas de ciberseguridad y protección de datos, la inclusión de cláusulas específicas de ciberseguridad en los contratos con proveedores y socios comerciales, la realización de auditorías periódicas para evaluar el cumplimiento de las políticas de ciberseguridad, el desarrollo de planes de contingencia y recuperación ante incidentes cibernéticos y la capacitación continua en esta materia.</span></span></span></span></span></span></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":1938,"w":849,"h":82,"abs_x":60,"abs_y":2590}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><strong>Para leer: <a href="/reportajes/alcances-proyecto-233823-regular-inteligencia-artificial-otras-normas" hreflang="en" target="_blank">Los alcances del Proyecto de Ley 2.338/23 para regular la inteligencia artificial en Brasil y la armonización de otras normas</a></strong></span></span></span></p> <hr /> <p bis_size="{"x":8,"y":1784,"w":849,"h":20,"abs_x":60,"abs_y":2436}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1786,"w":109,"h":16,"abs_x":60,"abs_y":2438}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1786,"w":109,"h":16,"abs_x":60,"abs_y":2438}"><span bis_size="{"x":8,"y":1786,"w":109,"h":16,"abs_x":60,"abs_y":2438}" style="color:#000000"><span bis_size="{"x":8,"y":1786,"w":109,"h":16,"abs_x":60,"abs_y":2438}" style="font-weight:700"><span bis_size="{"x":8,"y":1786,"w":109,"h":16,"abs_x":60,"abs_y":2438}" style="font-style:normal"><span bis_size="{"x":8,"y":1786,"w":109,"h":16,"abs_x":60,"abs_y":2438}" style="text-decoration:none">La ruta a seguir</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":1820,"w":849,"h":103,"abs_x":60,"abs_y":2472}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1821,"w":105,"h":16,"abs_x":60,"abs_y":2473}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1821,"w":105,"h":16,"abs_x":60,"abs_y":2473}"><span bis_size="{"x":8,"y":1821,"w":105,"h":16,"abs_x":60,"abs_y":2473}" style="color:#000000"><span bis_size="{"x":8,"y":1821,"w":105,"h":16,"abs_x":60,"abs_y":2473}" style="font-weight:400"><span bis_size="{"x":8,"y":1821,"w":105,"h":16,"abs_x":60,"abs_y":2473}" style="font-style:normal"><span bis_size="{"x":8,"y":1821,"w":105,"h":16,"abs_x":60,"abs_y":2473}" style="text-decoration:none">Según el </span></span></span></span></span></span><a bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" href="https://es.weforum.org/stories/2024/05/lecciones-de-ciberseguridad-de-la-batalla-de-america-latina-contra-las-amenazas-de-ransomware/" style="text-decoration:none" target="_blank"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" style="color:#1155cc"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" style="font-weight:400"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" style="font-style:normal"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" style="text-decoration:underline"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}"><span bis_size="{"x":113,"y":1821,"w":162,"h":16,"abs_x":165,"abs_y":2473}" style="text-decoration-skip-ink:none">Foro Económico Mundial</span></span></span></span></span></span></span></span></a><span bis_size="{"x":8,"y":1821,"w":849,"h":99,"abs_x":60,"abs_y":2473}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1821,"w":849,"h":99,"abs_x":60,"abs_y":2473}"><span bis_size="{"x":8,"y":1821,"w":849,"h":99,"abs_x":60,"abs_y":2473}" style="color:#000000"><span bis_size="{"x":8,"y":1821,"w":849,"h":99,"abs_x":60,"abs_y":2473}" style="font-weight:400"><span bis_size="{"x":8,"y":1821,"w":849,"h":99,"abs_x":60,"abs_y":2473}" style="font-style:normal"><span bis_size="{"x":8,"y":1821,"w":849,"h":99,"abs_x":60,"abs_y":2473}" style="text-decoration:none">, los países latinoamericanos pueden fortalecer sus ciberdefensas y contribuir a un entorno cibernético global resiliente si adoptan marcos de gestión de riesgos (RMF) y aprovechan las tecnologías de nube pública para fortalecer sus defensas cibernéticas, que ya son iniciativas con un fuerte apoyo en América Latina, donde 72 % (en 2024) de los entes gubernamentales habían integrado un RMF en su estrategia de ciberseguridad y 78 % ya había utilizado o planeaba implementar una infraestructura de ciberseguridad basada en la nube.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":1938,"w":849,"h":82,"abs_x":60,"abs_y":2590}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":1940,"w":808,"h":78,"abs_x":60,"abs_y":2592}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":1940,"w":808,"h":78,"abs_x":60,"abs_y":2592}"><span bis_size="{"x":8,"y":1940,"w":808,"h":78,"abs_x":60,"abs_y":2592}" style="color:#000000"><span bis_size="{"x":8,"y":1940,"w":808,"h":78,"abs_x":60,"abs_y":2592}" style="font-weight:400"><span bis_size="{"x":8,"y":1940,"w":808,"h":78,"abs_x":60,"abs_y":2592}" style="font-style:normal"><span bis_size="{"x":8,"y":1940,"w":808,"h":78,"abs_x":60,"abs_y":2592}" style="text-decoration:none">Asimismo, en países sin normativas específicas de protección de datos o ciberseguridad como Venezuela, lo ideal sería, en opinión de Jorge de los Ríos, adoptar estándares internacionales de ciberseguridad como ISO/IEC 27001, fomentar la colaboración con otros países y organizaciones internacionales para compartir conocimientos y recursos y aumentar la concienciación sobre la importancia de la ciberseguridad a nivel empresarial y gubernamental.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":2036,"w":849,"h":62,"abs_x":60,"abs_y":2688}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":2038,"w":845,"h":58,"abs_x":60,"abs_y":2690}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":2038,"w":845,"h":58,"abs_x":60,"abs_y":2690}"><span bis_size="{"x":8,"y":2038,"w":845,"h":58,"abs_x":60,"abs_y":2690}" style="color:#000000"><span bis_size="{"x":8,"y":2038,"w":845,"h":58,"abs_x":60,"abs_y":2690}" style="font-weight:400"><span bis_size="{"x":8,"y":2038,"w":845,"h":58,"abs_x":60,"abs_y":2690}" style="font-style:normal"><span bis_size="{"x":8,"y":2038,"w":845,"h":58,"abs_x":60,"abs_y":2690}" style="text-decoration:none">Además de hacer que las organizaciones implementen y cuenten con estándares, políticas y protocolos documentados alineados con las prácticas internacionales para un manejo adecuado de la gestión de riesgos en ciberseguridad y también para estar preparados para las futuras regulaciones de sus países, agrega Zanusso.</span></span></span></span></span></span></span></span></span></p> <p bis_size="{"x":8,"y":2113,"w":849,"h":103,"abs_x":60,"abs_y":2765}" style="line-height:1.38"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;"><span bis_size="{"x":8,"y":2115,"w":853,"h":99,"abs_x":60,"abs_y":2767}" style="font-variant: normal; white-space: pre-wrap;"><span bis_size="{"x":8,"y":2115,"w":853,"h":99,"abs_x":60,"abs_y":2767}"><span bis_size="{"x":8,"y":2115,"w":853,"h":99,"abs_x":60,"abs_y":2767}" style="color:#000000"><span bis_size="{"x":8,"y":2115,"w":853,"h":99,"abs_x":60,"abs_y":2767}" style="font-weight:400"><span bis_size="{"x":8,"y":2115,"w":853,"h":99,"abs_x":60,"abs_y":2767}" style="font-style:normal"><span bis_size="{"x":8,"y":2115,"w":853,"h":99,"abs_x":60,"abs_y":2767}" style="text-decoration:none">El Foro Económico también comparte que mejorar la resiliencia cibernética de la región también pasa por realizar inversiones significativas en capital humano cualificado en la implementación y defensa de una cultura de ciberseguridad; establecer un marco voluntario de gestión de riesgos, que incluya una gobernanza mixta, un equipo nacional de respuesta a incidentes de ciberseguridad y bases de datos de incidentes sectoriales; invertir en infraestructura y tecnologías de ciberseguridad, y crear sistemas centralizados de gestión y notificación de amenazas cibernéticas.</span></span></span></span></span></span></span></span></span></p> <blockquote> <p bis_size="{"x":8,"y":2232,"w":849,"h":82,"abs_x":60,"abs_y":2884}"><span style="font-family:Verdana,Geneva,sans-serif;"><span style="font-size:16px;"><span style="line-height:30px;">"Ello hará el camino más ameno en caso de que la empresa sufra algún tipo de intrusión, dado que tendrá una guía clara acerca de los pasos a seguir, así como de los sistemas, redes y datos críticos a proteger y en los cuales enfocarse. Por otro lado, llevar a cabo evaluaciones periódicas en riesgos en ciberseguridad para detectar nuevas vulnerabilidades y auditorías legales son prácticas fundamentales para la prevención de riesgos legales, operativos y reputacionales", apunta Andrea Zanusso.</span></span></span></p> </blockquote> </div> <section class="field field--name-comment field--type-comment field--label-hidden comment-wrapper"> <h2 class="title comment-form__title">Add new comment</h2> <drupal-render-placeholder callback="comment.lazy_builders:renderForm" arguments="0=node&1=125408&2=comment&3=comment" token="kWGa4nDm8oYVpXCjKHrnX7tbRKjbE5YOToKhzZ0moVE"></drupal-render-placeholder> </section> <span class="a2a_kit a2a_kit_size_32 addtoany_list" data-a2a-url="/reportajes/ciberseguridad-america-latina-riesgo-ciberdelincuencia-invertir" data-a2a-title="Ciberseguridad en América Latina, ¿en qué rubros se debe invertir para contrastar el riesgo frente a la ciberdelincuencia?"><p style="font-size: 16px;margin-top: 2%; font-weight: bold;">Compartir en RRSS</p><div class="a2a_kit a2a_kit_size_32 a2a_default_style"><a class="a2a_button_facebook"></a><a class="a2a_button_linkedin"></a><a class="a2a_button_twitter"><img src="/sites/default/files/media-icons/icon-twitterx-color.svg" border="0" alt="X" style="width:38px; height:38px" /></a><a class="a2a_button_whatsapp"></a></div></span><hr /><i>Para recibir nuestro boletín diario,<br /><a href="/menu-de-boletines" target="_blank">¡suscríbete aquí!</a></i> <div class="field field--name-field-empresas-involucradas field--type-entity-reference-revisions field--label-above"> <div class="field__label">Empresas involucradas</div> <div class="field__items"> <div class="field__item"><div class="paragraph-formatter"><div class="paragraph-info"></div> <div class="paragraph-summary"><div class="paragraphs-collapsed-description"></div></div> </div> </div> </div> </div> <div class="field field--name-field-operacion-secundaria field--type-boolean field--label-above"> <div class="field__label">Operacion secundaria</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-operacion-principal field--type-boolean field--label-above"> <div class="field__label">Operación Principal</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-publicacion-desde-br field--type-boolean field--label-above"> <div class="field__label">Publicacion desde el portal BR</div> <div class="field__item">Off</div> </div> <a href="/taxonomy/term/379" hreflang="en">Ciberseguridad</a>, <a href="/taxonomy/term/1020" hreflang="en">protección de datos</a>, <a href="/taxonomy/term/4242" hreflang="en">ciberataque</a>, <a href="/taxonomy/term/1520" hreflang="en">propiedad intelectual</a>, <a href="/taxonomy/term/1723" hreflang="en">Phishing</a>, <a href="/taxonomy/term/3631" hreflang="en">reputación digital</a> <div class="field field--name-field-noticia-principal field--type-boolean field--label-above"> <div class="field__label">Noticia Principal</div> <div class="field__item">On</div> </div> <div class="field field--name-field-bloque-de-4-noticias field--type-boolean field--label-above"> <div class="field__label">Bloque de 4 Noticias (debajo de la noticia principal)</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-activar-mow-player field--type-boolean field--label-above"> <div class="field__label">Activar Mow Player</div> <div class="field__item">No</div> </div> Wed, 09 Apr 2025 05:42:31 +0000 Rosa Ramos 125408 at ¿Qué es presencia online? 4q3157 /perfilplus/que-es-presencia-online <span class="field field--name-title field--type-string field--label-hidden">¿Qué es presencia online?</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span lang="" about="//8906" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Anarelys Aguirre</span></span> <span class="field field--name-created field--type-created field--label-hidden">Mon, 21/03/2022 - 19:53</span> <div class="field__item"> <img fetchpriority="high" src="/sites/default/files/2022-03/post_perfil_plus_01-01.jpg" width="690" height="554" alt="Contar con presencia online te ayuda a generar clientes potenciales. / Freepik" typeof="foaf:Image" /> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Con todos los cambios que ha traído la era digital, es realmente importante que tu firma de abogados tenga presencia online, ya que si no la tiene es como si no existiese.<br /> <br /> Pero, ¿qué es la presencia online y por qué es tan importante? La “presencia online” se refiere a tener huella en internet, bien sea en redes sociales, con página web, blog o una combinación de los tres, siempre a nombre de la firma.  <br /> <br /> Si logras equilibrar la presencia de tu firma de abogados en internet podrás obtener múltiples beneficios. Estar en la web ayudará a tu firma a llegar a una importante cantidad de personas, lo que podrá aumentar la cantidad de clientes.</span></span></span></p> <h2 class="text-align-justify"><br /> Ventajas de la presencia online</h2> <p> </p> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Presentamos algunas de las razones por las que tu firma legal debe estar en la web. Recuerda que siempre puedes combinar tus esfuerzos comunicacionales y que cada recurso online se utiliza de forma diferente.</span></span></span></p> <ul> <li> <blockquote> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:18px;"><span style="font-family:Verdana,Geneva,sans-serif;">Mayor visibilidad, tendrás una amplia cartera de potenciales clientes que podrán encontrarte más fácilmente</span></span></span></p> </blockquote> </li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Bien sea que los s estén buscando específicamente a tu firma o que necesitan servicios parecidos o iguales a los que prestas, la ventaja competitiva de la presencia online es que podrán toparse contigo de una forma rápida y confiable.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Una sencilla búsqueda en Google o cualquier otro buscador llevará a posibles s de tus servicios a comunicarse contigo o, al menos, saber de tu existencia.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Pongamos un ejemplo: un potencial cliente coloca en un buscador “asesorías legales para empresas en xxx país” y tu bufete aparece entre las primeras opciones. Seguidamente, hará clic en tu sitio web, podrá comunicarse con tu equipo de atención al cliente y. tras evaluar su situación, llegan a un acuerdo y empiezan a trabajar juntos. De esta manera, lo que parecía una consulta más, se convirtió en un nuevo cliente.</span></span></span></p> <p class="text-align-justify"> </p> <ul> <li class="text-align-justify"><span style="font-size:18px;">Gran facilidad para mostrar tus servicios</span></li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Internet te ofrece variedad de soluciones y métodos para exponer de forma sencilla cuáles son tus servicios y a los socios de tu firma de abogados.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Ya sea con un portafolio o testimonios de clientes, el mundo sabrá qué es lo que tienes para ofrecer y en qué te diferencias de tus competidores. En unos pocos clics mostrarás de lo que eres capaz y ¿lo mejor? Los potenciales clientes no tendrán que esperar a que abras tus puertas, ya que tu página web nunca duerme.</span></span></span></p> <p class="text-align-justify"> </p> <ul> <li class="text-align-justify"><span style="font-size:18px;">Podrás construir relaciones con tus clientes potenciales</span></li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Las redes sociales fueron creadas para unir a las personas virtualmente. Estar en redes le permite a tu firma tener una voz, ser más humana y cercana. Un cliente potencial podría interactuar con tu marca de una forma más directa y personal, sin asistir a tus oficinas. Abrir tus propias redes te permitirá ponerte en o con tu público objetivo.</span></span></span></p> <p class="text-align-justify"> </p> <ul> <li class="text-align-justify"><span style="font-size:18px;">Gran facilidad para comercializar tus servicios</span></li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Sí, es cierto que existen gran cantidad de bufetes en cada país, sin embargo, hacer la diferencia depende de ti, mostrar a tu público lo que te diferencia del resto solo será posible gracias a la presencia online.</span></span></span></p> <p class="text-align-justify"> </p> <p><a href="https://bit.ly/3LEOoxE" target="_blank"><img alt="Escríbenos" src="/sites/default/files/boton_wa_frases-02.png" /></a></p> <h2 class="text-align-justify">¿Puedo tener presencia online?</h2> <p class="text-align-justify"> </p> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">La respuesta siempre será ¡sí! Existen múltiples formas de tener presencia online y lo mejor es que varias son gratuitas o involucran presupuestos modestos.</span></span></span></p> <p class="text-align-justify"> </p> <ul> <li class="text-align-justify"><span style="font-size:18px;">Redes sociales</span></li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Puedes optar por los perfiles en redes sociales, cuya creación es gratuita y podrás organizarlos a tu gusto, dándole la personalidad que sientas define tu marca con exactitud. Dentro de las redes tienes a tu disposición la opción de publicidad pagada, un camino que potenciará el alcance de tu trabajo.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">No obstante, te recomendamos conseguir un experto que pueda asesorarte tanto en temas de campañas para redes como creación de contenidos, interacción con potenciales clientes e incluso inversiones en ADS.</span></span></span></p> <p class="text-align-justify"> </p> <ul> <li class="text-align-justify"><span style="font-size:18px;">Páginas web</span></li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">De esta lista, las páginas web son las que requieren inversión en dominio y host, cuyos costos fluctúan dependiendo de varios factores, como cantidad de secciones, elementos gráficos, vídeos, imágenes personalizadas, entre otros.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Lo mejor de las páginas web es que son personalizables, por lo que darles la mejor experiencia a tus potenciales clientes dependerá de ti y de tu equipo de programación, en el que debes invertir para facilitar el trabajo y asegurarte de que sea el mejor.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Con tu propia página web incluso tendrás un blog y podrás crear artículos web, lo que nos lleva al siguiente punto.</span></span></span></p> <p class="text-align-justify"> </p> <ul> <li class="text-align-justify"><span style="font-size:18px;">Blogs y menciones en artículos</span></li> </ul> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Crear artículos dentro de un blog a nombre de tu bufete podrá ayudarte a informar a tus seguidores y potenciales clientes, ya que puedes utilizarlo como un medio para educar y compartir novedades acerca de temas de interés dentro de tu área de experticia, en este caso, leyes.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Puedes tratar temas de interés colectivo que normalmente generan confusión, te aseguramos que muchas personas agradecerán este tipo de contenido. Puedes aliarte con otras marcas del sector o con expertos que te ayuden a enriquecer tu material y hacer mención a tu boutique legal en sus propias páginas web y redes sociales.</span></span></span></p> <p class="text-align-justify"> </p> <h2 class="text-align-justify">Apaláncate en páginas de autoridad de abogados</h2> <p class="text-align-justify"> </p> <p class="text-align-justify"><span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Una gran forma de pisar firme en la web y aumentar tu reputación online es apalancarte en páginas de envergadura, que traten temas legales y que estén especializadas en Derecho.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Existen variedad de páginas web de este tipo, se encargan de recolectar información sobre lo que acontece en el mundo legal a nivel nacional e internacional, ofreciendo grandes posibilidades de reconocimiento en el continente. Además de crear perfiles para cada firma legal, les ayudan a obtener mayor credibilidad entre el público objetivo y darse a conocer con empresas del mismo ramo, incluso competidores directos.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">En LexLatin ofrecemos nuestro servicio PerfilPlus, que brinda a las firmas de abogados la posibilidad de tener un microsite con perfil personalizado dentro de una de las páginas con mejor posicionamiento del sector legal. En dicho perfil, las firmas pueden colocar detalles sobre su historia, equipo de trabajo, especialidades y casos de éxito. Además, los visitantes podrán consultar Ágora, la herramienta de inteligencia sobre transacciones de M&A y financiamientos más completa de América Latina (pagando una suscripción adicional).</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Perfil Plus aumentará la presencia de tu firma de abogados en el entorno digital y mejorará tu posicionamiento en el mercado legal latinoamericano. Como parte de la suscripción, PerfilPlus ofrece un paquete de contenido exclusivo, que involucra entrevistas a los abogados de tu bufete para analizar la normativa del país, ganando mayor visibilidad.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Por otro lado, la posibilidad de publicar artículos en LexLatin les dará a los potenciales clientes la posibilidad de conocer tus áreas de especialidad, al tiempo que podrán hacerse una idea de la calidad de los servicios ofrecidos.</span></span></span></p> <p class="text-align-justify"><br /> <span style="line-height:30px;"><span style="font-size:16px;"><span style="font-family:Verdana,Geneva,sans-serif;">Hoy en día tener presencia online es muy importante para que tu firma se posicione ante los potenciales clientes. Es un espacio vital para los abogados que están iniciando su camino en el mundo legal. Te recomendamos iniciar por lo más básico, tus redes sociales y <a href="https://bit.ly/3LEOoxE" target="_blank">agendar una llamada para conocer PerfilPlus</a>.</span></span></span></p> </div> <section class="field field--name-comment field--type-comment field--label-hidden comment-wrapper"> <h2 class="title comment-form__title">Add new comment</h2> <drupal-render-placeholder callback="comment.lazy_builders:renderForm" arguments="0=node&1=95049&2=comment&3=comment" token="CbPFzNaRnPntcMGMuSvKkERQDLzT4NKuImONgqSJU-E"></drupal-render-placeholder> </section> <span class="a2a_kit a2a_kit_size_32 addtoany_list" data-a2a-url="/perfilplus/que-es-presencia-online" data-a2a-title="¿Qué es presencia online?"><p style="font-size: 16px;margin-top: 2%; font-weight: bold;">Compartir en RRSS</p><div class="a2a_kit a2a_kit_size_32 a2a_default_style"><a class="a2a_button_facebook"></a><a class="a2a_button_linkedin"></a><a class="a2a_button_twitter"><img src="/sites/default/files/media-icons/icon-twitterx-color.svg" border="0" alt="X" style="width:38px; height:38px" /></a><a class="a2a_button_whatsapp"></a></div></span><hr /><i>Para recibir nuestro boletín diario,<br /><a href="/menu-de-boletines" target="_blank">¡suscríbete aquí!</a></i> <div class="field field--name-field-empresas-involucradas field--type-entity-reference-revisions field--label-above"> <div class="field__label">Empresas involucradas</div> <div class="field__items"> <div class="field__item"><div class="paragraph-formatter"><div class="paragraph-info"></div> <div class="paragraph-summary"><div class="paragraphs-collapsed-description"></div></div> </div> </div> </div> </div> <div class="field field--name-field-operacion-secundaria field--type-boolean field--label-above"> <div class="field__label">Operacion secundaria</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-operacion-principal field--type-boolean field--label-above"> <div class="field__label">Operación Principal</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-publicacion-desde-br field--type-boolean field--label-above"> <div class="field__label">Publicacion desde el portal BR</div> <div class="field__item">Off</div> </div> <a href="/taxonomy/term/3630" hreflang="en">presencia online</a>, <a href="/taxonomy/term/3631" hreflang="en">reputación digital</a>, <a href="/taxonomy/term/3632" hreflang="en">formas de abogados</a>, <a href="/taxonomy/term/2606" hreflang="en">clientes</a>, <a href="/taxonomy/term/2922" hreflang="en">redes sociales</a>, <a href="/taxonomy/term/3633" hreflang="en">Blog</a> <div class="field field--name-field-noticia-principal field--type-boolean field--label-above"> <div class="field__label">Noticia Principal</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-bloque-de-4-noticias field--type-boolean field--label-above"> <div class="field__label">Bloque de 4 Noticias (debajo de la noticia principal)</div> <div class="field__item">Off</div> </div> Mon, 21 Mar 2022 23:53:57 +0000 Anarelys Aguirre 95049 at