{"id":52844,"date":"2024-05-20T14:31:41","date_gmt":"2024-05-20T17:31:41","guid":{"rendered":"https:\/\/www.itba.edu.ar\/intranet\/ti\/?p=52844"},"modified":"2024-10-17T11:32:09","modified_gmt":"2024-10-17T14:32:09","slug":"como-identificar-un-correo-de-phishing","status":"publish","type":"post","link":"https:\/\/www.itba.edu.ar\/intranet\/ti\/como-identificar-un-correo-de-phishing\/","title":{"rendered":"\u00bfC\u00f3mo identificar un correo de phishing?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8&#8243; background_color_gradient_end=\u00bb#0029e2&#8243; background_image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-18.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb7vw|||||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb1&#8243; custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat|500|||||||\u00bb text_font_size=\u00bb43px\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb70px\u00bb background_layout=\u00bbdark\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb32px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>\u00bfC\u00d3MO IDENTIFICAR?<\/h1>\n<p><span style=\"font-size: x-large;\">Un correo de Phishing<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-10.png\u00bb title_text=\u00bbcyber-security-10&#8243; align=\u00bbright\u00bb _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb-10vw|0vw||\u00bb custom_margin_tablet=\u00bb-2vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb border_width_all=\u00bb48px\u00bb border_color_all=\u00bbrgba(0,0,0,0)\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb0&#8243; width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb module_alignment=\u00bbcenter\u00bb min_height=\u00bb251.9px\u00bb custom_margin=\u00bb3px|0px||0px|false|false\u00bb custom_padding=\u00bb72px|60px||60px|false|false\u00bb border_radii=\u00bbon|16px|16px|16px|16px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb15px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#000000&#8243; header_font_size=\u00bb50px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||\u00bb custom_padding=\u00bb|||||\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1 style=\"text-align: center;\"><strong>\u00bfQu\u00e9 es el phishing?<\/strong><\/h1>\n<h1 style=\"text-align: center;\"><strong>\u00a0<\/strong><\/h1>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">El phishing es un ciberataque en la que terceros se hacen pasar por entidades leg\u00edtimas como bancos, servicios o personas. Tambi\u00e9n, podr\u00edan hacerse pasar por \u00e1reas, departamentos o personas del Instituto Tecnol\u00f3gico de Buenos Aires.<\/span><\/p>\n<p style=\"text-align: left;\">Este tipo de ataque lo realizan a trav\u00e9s del correo electr\u00f3nico y los atacantes suelen utilizar enga\u00f1os para que la v\u00edctima brinde sus datos personales o financieros a trav\u00e9s del correo, haga clic en un enlace donde tiene que ingresar sus datos personales y\/o credenciales o tenga que abrir un documento adjunto infectado con malware.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb3px|0px||0px|false|false\u00bb custom_padding=\u00bb72px|60px||60px|false|false\u00bb border_radii=\u00bbon|16px|16px|16px|16px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb15px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#000000&#8243; header_font_size=\u00bb50px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||\u00bb custom_padding=\u00bb|||||\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\">\n<h1 style=\"text-align: center;\"><strong>\u00bfC\u00f3mo identificarlo?<\/strong><\/h1>\n<p><strong><\/strong><\/p>\n<p style=\"text-align: left;\">A continuaci\u00f3n te indicamos varios detalles que ten\u00e9s que tener en cuenta para identificarlo:<\/p>\n<ul>\n<li style=\"text-align: left;\">Verificar la direcci\u00f3n de correo electr\u00f3nico del remitente. Puede que sea desconocida o puede que se haga pasar por una persona con correo institucional por ejemplo @itba.io.<\/li>\n<li style=\"text-align: left;\">Si recib\u00eds URLs, pasa el cursor del mouse por el enlace para verificar si la direcci\u00f3n es oficial o es una que se hace pasar por la empresa o persona de la que recib\u00eds el correo.<\/li>\n<li style=\"text-align: left;\">Los correos de suplantaci\u00f3n de identidad suelen solicitar informaci\u00f3n personal, datos sensibles o tu nombre de usuario y\/o contrase\u00f1a.<\/li>\n<li style=\"text-align: left;\">Los correos de phishing suelen tener error gramaticales y faltas de ortograf\u00eda.<\/li>\n<li style=\"text-align: left;\">Apelan al miedo o urgencias para que puedas brindar tu informaci\u00f3n por ejemplo: tu cuenta ha sido bloqueada.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb1px|auto||auto||\u00bb custom_padding=\u00bb53px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbContact Form\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f1fafe\u00bb z_index=\u00bb10&#8243; custom_padding=\u00bb||256px|||\u00bb bottom_divider_height=\u00bb26vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row make_equal=\u00bbon\u00bb _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_padding=\u00bb0px|8px|0px||true|\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat|900||on|||||\u00bb text_text_color=\u00bb#000000&#8243; text_font_size=\u00bb48px\u00bb custom_margin=\u00bb||45px|||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: center;\">Algunos consejos<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">A continuaci\u00f3n te brindamos consejos para proteger tu informaci\u00f3n personal y del Instituto Tecnol\u00f3gico de Buenos Aires ante un incidente de phishing<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00bbSeparador\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||28px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbConsejos\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb z_index=\u00bb1&#8243; custom_margin=\u00bb0vw|auto|-16vw|auto||\u00bb custom_padding=\u00bb60px|60px|60px|60px|true|true\u00bb custom_padding_tablet=\u00bb|40px||40px||true\u00bb custom_padding_phone=\u00bb|20px||20px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbNO ABRAS ENLACES SOSPECHOSOS\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-21.png\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Evit\u00e1 hacer clic o pulsar enlaces sospechosos que recibas de remitentes desconocidos o sospechosos.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbCUIDADO CON EL SPEARPHISHING\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-14.png\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Son casos de phishing dirigidos, usan tu nombre y apellido para obtener datos personales o credenciales.\u00a0<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbVERIFIC\u00c1 LA DIRECCI\u00d3N DE CORREO\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-36.png\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Verific\u00e1 la direcci\u00f3n de la persona o empresa que te est\u00e1 enviando el correo electr\u00f3nico, puede ser falsa.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbNO ABRAS ARCHIVOS ADJUNTOS\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-21.png\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Si desconoces a la persona o empresa que te env\u00eda el correo no abras los archivos adjuntos, puede ser malware.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbDENUNCI\u00c1 CASOS DE PHISHING\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2024\/05\/denuncia-01.png\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Para evitar que los casos de phishing se sigan viralizando denuncialos en la Mesa de Ayuda de TI y desde gmail.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbMANTEN\u00c9 ACTUALIZADOS TUS DISPOSITIVOS\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-20.png\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Manten\u00e9 actualizado el antivirus y el sistema operativo instalado en tus dispositivos ITBA y personales.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=\u00bbSeparador\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||28px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183&#8243; background_color_gradient_end=\u00bb#001f4c\u00bb custom_margin=\u00bb||-47vw|||\u00bb custom_padding=\u00bb0vw||6vw||false|\u00bb top_divider_height=\u00bb27vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_height=\u00bb27vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||34px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_cta title=\u00bbTENGO UN INCIDENTE INFORM\u00c1TICO \u00bfDonde puedo denunciarlo?\u00bb button_url=\u00bbhttps:\/\/www.itba.edu.ar\/intranet\/ti\/reporta-un-incidente-informatico\/\u00bb button_text=\u00bbReport\u00e1 un incidente inform\u00e1tico\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb38px\u00bb body_font=\u00bbOverpass||||||||\u00bb body_font_size=\u00bb18px\u00bb background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-44e89228-3a3c-46af-8196-5047e9ac16fe\u00bb button_border_width=\u00bb12px\u00bb button_border_radius=\u00bb50px\u00bb button_font=\u00bbMontserrat|700|||||||\u00bb background_layout=\u00bblight\u00bb border_radii=\u00bbon|8px|8px|8px|8px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{%22gcid-44e89228-3a3c-46af-8196-5047e9ac16fe%22:%91%22button_bg_color%22%93}\u00bb button_border_radius__hover_enabled=\u00bbon|desktop\u00bb button_border_radius__hover=\u00bb50px\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Complet\u00e1 el formulario para que puedan investigar sobre el caso y bloquear la cuenta de correo electr\u00f3nico desde donde est\u00e1s recibiendo el phishing. Tambi\u00e9n, pod\u00e9s marcarlo como spam desde tu cuenta institucional.\u00a0<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb12px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#2d2d2d\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_font_size=\u00bb21px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_color=\u00bb#f7f7f7&#8243; text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px|0px|0px||false|false\u00bb custom_padding=\u00bb22px|0px|0px||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_horizontal=\u00bb4px\u00bb box_shadow_blur=\u00bb20px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Si tenes dudas o consultas comunicate con la Mesa de ayuda de TI<\/p>\n<p>\u00a0<a href=\"mailto:ayuda@itba.edu.ar\">ayudati@itba.edu.ar<\/a><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfC\u00d3MO IDENTIFICAR? Un correo de Phishing\u00bfQu\u00e9 es el phishing? \u00a0 El phishing es un ciberataque en la que terceros se hacen pasar por entidades leg\u00edtimas como bancos, servicios o personas. Tambi\u00e9n, podr\u00edan hacerse pasar por \u00e1reas, departamentos o personas del Instituto Tecnol\u00f3gico de Buenos Aires. Este tipo de ataque lo realizan a trav\u00e9s del correo [&hellip;]<\/p>\n","protected":false},"author":5198,"featured_media":52973,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[31],"tags":[],"class_list":["post-52844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-de-la-info"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/52844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/users\/5198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/comments?post=52844"}],"version-history":[{"count":32,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/52844\/revisions"}],"predecessor-version":[{"id":53261,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/52844\/revisions\/53261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media\/52973"}],"wp:attachment":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media?parent=52844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/categories?post=52844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/tags?post=52844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}