{"id":53318,"date":"2025-02-03T17:45:15","date_gmt":"2025-02-03T20:45:15","guid":{"rendered":"https:\/\/www.itba.edu.ar\/intranet\/ti\/?p=53318"},"modified":"2025-02-03T17:52:13","modified_gmt":"2025-02-03T20:52:13","slug":"sufri-un-ataque-de-ransomware-que-hago","status":"publish","type":"post","link":"https:\/\/www.itba.edu.ar\/intranet\/ti\/sufri-un-ataque-de-ransomware-que-hago\/","title":{"rendered":"Sufr\u00ed un ataque de ransomware: \u00bfQu\u00e9 hago?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8&#8243; background_color_gradient_end=\u00bb#0029e2&#8243; background_image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-18.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb7vw|||||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat|700|||||||\u00bb text_font_size=\u00bb30px\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb73px\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb|-98px||||\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb32px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>sufr\u00ed un ataque de ransomware.<\/h1>\n<p>\u00bfQu\u00e9 hago?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-10.png\u00bb title_text=\u00bbcyber-security-10&#8243; align=\u00bbright\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb-10vw|0vw||\u00bb custom_margin_tablet=\u00bb-2vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb border_width_all=\u00bb48px\u00bb border_color_all=\u00bbrgba(0,0,0,0)\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb0&#8243; width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbContact Form\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f1fafe\u00bb z_index=\u00bb10&#8243; custom_padding=\u00bb||1px|||\u00bb bottom_divider_height=\u00bb26vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row make_equal=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb min_height=\u00bb233.8px\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_padding=\u00bb0px|8px|0px||true|\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-size: 14px;\">El ransomware es un tipo de malware que al ejecutarse cifra toda la informaci\u00f3n que se encuentra en nuestro dispositivos, esto significa que hace ilegible todos los datos y es imposible acceder a ellos salvo que exista un decryptor que son descifradores que pueden ser gratuitos o de pago.<\/span><\/p>\n<p>Otro de los peligros es que adem\u00e1s, se puede viralizar por toda la red que estamos conectados e infectar todos los equipos que est\u00e9n utilizando la red. Por ejemplo, si una m\u00e1quina es infectada en la red ITBA puede llegar a infectar todos los equipos que se encuentran infectados si no se act\u00faa rapidamente para frenar la amenaza.\u00a0<span style=\"font-size: 14px;\"><\/span><\/p>\n<p>Existen tres clases de ransomware a continuaci\u00f3n se detallan con sus caracter\u00edsticas:<\/p>\n<ul>\n<li><b>Ransomware de Cifrado: <\/b>el malware cifra los archivos de la v\u00edctima y exige que pague una determinada cantidad de criptomonedas como rescate de los archivos.\u00a0<\/li>\n<li><b>Ransomware de bloqueo: <\/b>bloquea el dispositivo e impide al usuario acceder a la informaci\u00f3n solicitando un pago para que se brinde el acceso al dispositivo y\/o los archivos.\u00a0<br \/><b><\/b><\/li>\n<li><b>Ransomware de filtraci\u00f3n: <\/b>tambi\u00e9n llamado leakware o doxware, adem\u00e1s de bloquear el acceso a los datos los ciberdelincuentes amenazan con publicar la base de datos, los datos financieros, personales y\/o sensibles.\u00a0<\/li>\n<\/ul>\n<p><strong style=\"font-size: 14px;\">Para no ser v\u00edctima de ransomware es importante seguir los siguientes consejos y buenas pr\u00e1cticas:<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb95.8px\u00bb custom_margin=\u00bb|auto|-82px|auto||\u00bb custom_padding=\u00bb69px||49px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb z_index=\u00bb1&#8243; custom_margin=\u00bb0vw|auto|-16vw|auto||\u00bb custom_padding=\u00bb60px|60px|60px|60px|true|true\u00bb custom_padding_tablet=\u00bb|40px||40px||true\u00bb custom_padding_phone=\u00bb|20px||20px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbNo abras archivos sospechosos\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-28.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb|||13px||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Verificar la autenticidad del remitente que te env\u00eda los archivos, en caso de sospechas abr\u00ed un ticket en Ayuda TI para que te brinden asesoramiento.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbACTUALIZACIONES\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-14.png\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Tener actualizado el antivirus que provee el Departamento de TI y el sistema operativo, para minimizar el riesgo de ataque de ransomware.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbno pagar rescate\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-18.png\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Es importante entender que a pesar de que se pueda perder la informaci\u00f3n no hay que realizar un pago del rescate, no hay garant\u00eda de devoluci\u00f3n de los datos y de la informaci\u00f3n.\u00a0<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbRevisar las URLs\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-6.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Para verificar que sea leg\u00edtimo el remitente tener le costumbre de revisar las URLs que nos llegan de desconocidos por diferentes medios antes de ingresar.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbtener un backup\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-13.png\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Si los archivos se encontraban en la laptop es importante seguir los lineamientos de la Pol\u00edtica de Backup ITBA. Es recomendable almacenar archivos institucionales en la nube de Google.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbCONTACTAR A LA MESA DE AYUDA TI\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-29.png\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">En caso de incidente de seguridad, desconectarse de la red y por otro medio contactarse con la Mesa de Ayuda TI.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183&#8243; background_color_gradient_end=\u00bb#001f4c\u00bb custom_margin=\u00bb||-47vw|||\u00bb custom_padding=\u00bb0vw||6vw||false|\u00bb top_divider_height=\u00bb27vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_height=\u00bb27vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||170px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_cta title=\u00bb\u00bfDonde PUEDO DENUNCIAR UN INCIDENTE DE SEGURIDAD?\u00bb button_url=\u00bbhttps:\/\/www.itba.edu.ar\/intranet\/ti\/reporta-un-incidente-informatico\/\u00bb button_text=\u00bbReport\u00e1 un incidente inform\u00e1tico\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb38px\u00bb body_font=\u00bbOverpass||||||||\u00bb body_font_size=\u00bb18px\u00bb background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-44e89228-3a3c-46af-8196-5047e9ac16fe\u00bb button_border_width=\u00bb12px\u00bb button_border_radius=\u00bb50px\u00bb button_font=\u00bbMontserrat|700|||||||\u00bb background_layout=\u00bblight\u00bb border_radii=\u00bbon|8px|8px|8px|8px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{%22gcid-44e89228-3a3c-46af-8196-5047e9ac16fe%22:%91%22button_bg_color%22%93}\u00bb button_border_radius__hover_enabled=\u00bbon|desktop\u00bb button_border_radius__hover=\u00bb50px\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Complet\u00e1 el formulario indicando el tipo de incidente de seguridad con toda la informaci\u00f3n posible sobre el caso, acompa\u00f1a con archivos complementarios como capturas o videos para dar una soluci\u00f3n m\u00e1s r\u00e1pida.<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb12px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#2d2d2d\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_font_size=\u00bb21px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_color=\u00bb#f7f7f7&#8243; text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px|0px|0px||false|false\u00bb custom_padding=\u00bb22px|0px|0px||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_horizontal=\u00bb4px\u00bb box_shadow_blur=\u00bb20px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Si tenes dudas o consultas comunicate con la Mesa de ayuda de TI<\/p>\n<p>\u00a0<a href=\"mailto:ayuda@itba.edu.ar\">ayudati@itba.edu.ar<\/a><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>sufr\u00ed un ataque de ransomware. \u00bfQu\u00e9 hago?El ransomware es un tipo de malware que al ejecutarse cifra toda la informaci\u00f3n que se encuentra en nuestro dispositivos, esto significa que hace ilegible todos los datos y es imposible acceder a ellos salvo que exista un decryptor que son descifradores que pueden ser gratuitos o de pago. [&hellip;]<\/p>\n","protected":false},"author":5198,"featured_media":53327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[31],"tags":[],"class_list":["post-53318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-de-la-info"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/users\/5198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/comments?post=53318"}],"version-history":[{"count":8,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53318\/revisions"}],"predecessor-version":[{"id":53336,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53318\/revisions\/53336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media\/53327"}],"wp:attachment":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media?parent=53318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/categories?post=53318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/tags?post=53318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}