{"id":237613,"date":"2022-03-28T19:39:24","date_gmt":"2022-03-29T02:39:24","guid":{"rendered":"https:\/\/www.faronics.com\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"modified":"2022-04-29T15:08:39","modified_gmt":"2022-04-29T22:08:39","slug":"cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","status":"publish","type":"post","link":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","title":{"rendered":"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES"},"content":{"rendered":"<div>\n<div>\n<p><b><span lang=\"ES\">\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales?<\/span><\/b><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<p><span lang=\"ES\">La probabilidad de que esto ocurra es alta si tenemos en cuenta lo siguiente:<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Dos de cada tres empresas sufrieron un ciberataque el a\u00f1o pasado<a href=\"applewebdata:\/\/015E0B7F-3AD2-456B-8F4A-989EA0CD09D3#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><span>[1]<\/span><\/sup><\/a>.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Un hacker podr\u00eda introducirse en el 93\u00a0% de las empresas<a href=\"applewebdata:\/\/015E0B7F-3AD2-456B-8F4A-989EA0CD09D3#_ftn2\" name=\"_ftnref2\" title=\"\"><sup><span>[2]<\/span><\/sup><\/a>.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Existen m\u00e1s de 170\u00a0000 vulnerabilidades y cada a\u00f1o se descubren m\u00e1s<a href=\"applewebdata:\/\/015E0B7F-3AD2-456B-8F4A-989EA0CD09D3#_ftn3\" name=\"_ftnref3\" title=\"\"><sup><span>[3]<\/span><\/sup><\/a>.<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<h4><\/h4>\n<h4 style=\"text-align: center;\"><span lang=\"ES\">\u00bb La gesti\u00f3n de parches no solo corrige errores o mejora la usabilidad o el rendimiento, tambi\u00e9n aborda las vulnerabilidades de seguridad conocidas.\u00bb<\/span><span lang=\"ES\"><\/span><\/h4>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><b><span lang=\"ES\">\u00bfC\u00f3mo se puede proteger?<\/span><\/b><\/p>\n<p>Para proteger sus sistemas, necesita una estrategia de defensa en profundidad o en capas que incluya lo siguiente: dise\u00f1o de una arquitectura segura, gesti\u00f3n de riesgos, un plan de continuidad del negocio y seguimiento y respuesta a incidentes.<\/p>\n<p>La gesti\u00f3n de parches es una de las medidas de seguridad m\u00e1s importantes y eficaces que puede aplicar para eliminar las vulnerabilidades de sus sistemas.<\/p>\n<\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><b><span lang=\"ES\">Vulnerabilidades y parches<\/span><\/b><\/p>\n<p><span lang=\"ES\">Los ciberataques, que aprovechan las vulnerabilidades de los sistemas, pueden tener un gran impacto en la integridad, disponibilidad y confidencialidad de la informaci\u00f3n que manejan dichos sistemas. Seg\u00fan el Centro Canadiense de Ciberseguridad (CCCS), la aplicaci\u00f3n de parches en los sistemas operativos y las aplicaciones es la segunda medida de seguridad inform\u00e1tica m\u00e1s importante que puede adoptar una empresa para minimizar las intrusiones y sus repercusiones.<\/span><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup>[4]<\/sup><\/a><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div>\n<div>\n<p><span lang=\"ES\">La gesti\u00f3n de parches es un proceso de cuatro etapas:<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"624\">\n<tbody>\n<tr>\n<td width=\"200\" valign=\"top\"><a href=\"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-6\" rel=\"attachment wp-att-237576\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-8.png\" alt=\"\" width=\"282\" height=\"282\" class=\"aligncenter size-full wp-image-237583\" \/><\/a><\/td>\n<td width=\"424\" valign=\"top\">\n<div>\n<p><b><span lang=\"ES\">1) Identificar los parches:<\/span><\/b><span lang=\"ES\"> aseg\u00farese de estar al d\u00eda con las actualizaciones.<\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">2) Probar los parches:<\/span><\/b><span lang=\"ES\"> pruebe los parches antes de aplicarlos para verificar que sean compatibles con su entorno y software existentes.<\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">3) Notificar los afectados<\/span><\/b><\/p>\n<\/div>\n<div><b><span lang=\"ES\">4) Instalar los parches:<\/span><\/b><\/div>\n<div><span lang=\"ES\"> aplique los parches de seguridad lo antes posible para garantizar la seguridad de los dispositivos. Para evitar interrupciones, programe las actualizaciones y los parches fuera del horario laboral.<\/span><\/div>\n<div><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">\u00a0<\/span><\/b><b><span lang=\"ES\">Buenas pr\u00e1cticas y recomendaciones en la gesti\u00f3n de parches<\/span><\/b><\/p>\n<\/div>\n<div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Si a\u00fan no se ha explotado una vulnerabilidad, sopese cuidadosamente los riesgos de seguridad de no aplicar un parche frente a los riesgos operativos de aplicarlo sin realizar pruebas exhaustivas previamente.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Debe asegurarse de que los usuarios no puedan deshabilitar los parches, especialmente los cr\u00edticos.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">El inventario de software debe incluir no solo qu\u00e9 software est\u00e1 instalado, sino tambi\u00e9n su versi\u00f3n.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Debe equilibrar sus necesidades de seguridad con sus necesidades de usabilidad y disponibilidad.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Debe asegurarse de que la gesti\u00f3n de parches sea eficaz para evitar situaciones de sobrecarga de tareas.<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<p><a href=\"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-7\" rel=\"attachment wp-att-237584\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-9.png\" alt=\"\" width=\"400\" height=\"242\" class=\"aligncenter wp-image-237591\" \/><\/a><\/p>\n<\/div>\n<div>\n<div>\n<p><span>Para obtener m\u00e1s informaci\u00f3n, <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=nekxxBdpzqM\">vea nuestro seminario web publicado en Youtube<\/a><span>.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div id=\"ftn1\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[1]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/safeatlast.co\/blog\/cybercrime-statistics\/<\/span><\/p>\n<\/div>\n<div id=\"ftn2\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref2\" name=\"_ftn2\" title=\"\"><sup><span lang=\"ES\"><span>[2]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.ptsecurity.com\/ww-en\/analytics\/external-pentests-results-2020\/<\/span><\/p>\n<\/div>\n<div id=\"ftn3\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref3\" name=\"_ftn3\" title=\"\"><sup><span lang=\"ES\"><span>[3]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.cvedetails.com\/browse-by-date.php<\/span><\/p>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[4]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/cyber.gc.ca\/en\/guidance\/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div>\n<div>\n<p>\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales?<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<p>La probabilidad de que esto ocurra es alta si tenemos en cuenta lo siguiente:<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Dos de cada tres empresas sufrieron un ciberataque el a\u00f1o pasado<a href=\"applewebdata:\/\/015E0B7F-3AD2-456B-8F4A-989EA0CD09D3#_ftn1\" name=\"_ftnref1\" title=\"\">[1]<\/a>.<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Un hacker podr\u00eda introducirse en el 93\u00a0% de las empresas<a href=\"applewebdata:\/\/015E0B7F-3AD2-456B-8F4A-989EA0CD09D3#_ftn2\" name=\"_ftnref2\" title=\"\">[2]<\/a>.<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Existen m\u00e1s de 170\u00a0000 vulnerabilidades y cada a\u00f1o se descubren m\u00e1s<a href=\"applewebdata:\/\/015E0B7F-3AD2-456B-8F4A-989EA0CD09D3#_ftn3\" name=\"_ftnref3\" title=\"\">[3]<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div> \u00bb La gesti\u00f3n de parches no solo corrige errores o mejora la usabilidad o el rendimiento, tambi\u00e9n aborda las vulnerabilidades de seguridad conocidas.\u00bb <\/p>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>\u00bfC\u00f3mo se puede proteger?<\/p>\n<p>Para proteger sus sistemas, necesita una estrategia de defensa en profundidad o en capas que incluya lo siguiente: dise\u00f1o de una arquitectura segura, gesti\u00f3n de riesgos, un plan de continuidad del negocio y seguimiento y respuesta a incidentes.<\/p>\n<p>La gesti\u00f3n de parches es una de las medidas de seguridad m\u00e1s importantes y eficaces que puede aplicar para eliminar las vulnerabilidades de sus sistemas.<\/p>\n<\/p><\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>Vulnerabilidades y parches<\/p>\n<p>Los ciberataques, que aprovechan las vulnerabilidades de los sistemas, pueden tener un gran impacto en la integridad, disponibilidad y confidencialidad de la informaci\u00f3n que manejan dichos sistemas. Seg\u00fan el Centro Canadiense de Ciberseguridad (CCCS), la aplicaci\u00f3n de parches en los sistemas operativos y las aplicaciones es la segunda <\/p>\n<div class=\"more\"><a href=\"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\">Continue Reading&#8230;<\/a><\/div>\n","protected":false},"author":151,"featured_media":237601,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-237613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES - Faronics<\/title>\n<meta name=\"description\" content=\"\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales? La\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES\" \/>\n<meta property=\"og:description\" content=\"\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales? La\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:site_name\" content=\"Faronics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/faronics\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T02:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-29T22:08:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"1332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jorge Ojeda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@faronics\" \/>\n<meta name=\"twitter:site\" content=\"@faronics\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jorge Ojeda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"author\":{\"name\":\"Jorge Ojeda\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\"},\"headline\":\"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2022-04-29T22:08:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"wordCount\":481,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"name\":\"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES - Faronics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2022-04-29T22:08:39+00:00\",\"description\":\"\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales? La\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"width\":1999,\"height\":1332,\"caption\":\"Update Software Computer Program Upgrade Business technology Internet Concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/es\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/es\\\/ciberataques-vulnerabilidades-y-como-puede-ayudarle-la-gestion-de-parches\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#website\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/es\",\"name\":\"Faronics\",\"description\":\"Creadores de Deep Freeze y de otras soluciones de Seguridad por Capas\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faronics.com\\\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#organization\",\"name\":\"Faronics\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"width\":155,\"height\":44,\"caption\":\"Faronics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/faronics\",\"https:\\\/\\\/x.com\\\/faronics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/es#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\",\"name\":\"Jorge Ojeda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"caption\":\"Jorge Ojeda\"},\"description\":\"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.\",\"sameAs\":[\"https:\\\/\\\/www.faronics.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES - Faronics","description":"\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales? La","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_locale":"es_ES","og_type":"article","og_title":"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES","og_description":"\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales? La","og_url":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_site_name":"Faronics","article_publisher":"https:\/\/www.facebook.com\/faronics","article_published_time":"2022-03-29T02:39:24+00:00","article_modified_time":"2022-04-29T22:08:39+00:00","og_image":[{"width":1999,"height":1332,"url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","type":"image\/jpeg"}],"author":"Jorge Ojeda","twitter_card":"summary_large_image","twitter_creator":"@faronics","twitter_site":"@faronics","twitter_misc":{"Escrito por":"Jorge Ojeda","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article","isPartOf":{"@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"author":{"name":"Jorge Ojeda","@id":"https:\/\/www.faronics.com\/es#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c"},"headline":"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2022-04-29T22:08:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"wordCount":481,"commentCount":0,"publisher":{"@id":"https:\/\/www.faronics.com\/es#organization"},"image":{"@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","url":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","name":"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES - Faronics","isPartOf":{"@id":"https:\/\/www.faronics.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"image":{"@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2022-04-29T22:08:39+00:00","description":"\u00bfQu\u00e9 pasar\u00eda si un hacker irrumpiera en sus sistemas, alterara o robara su informaci\u00f3n, o dejara a sus usuarios sin acceso a servicios esenciales? La","breadcrumb":{"@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage","url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","contentUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","width":1999,"height":1332,"caption":"Update Software Computer Program Upgrade Business technology Internet Concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.faronics.com\/es\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.faronics.com\/es"},{"@type":"ListItem","position":2,"name":"CIBERATAQUES, VULNERABILIDADES Y C\u00d3MO PUEDE AYUDARLE LA GESTI\u00d3N DE PARCHES","item":"https:\/\/www.faronics.com\/es\/ciberataques-vulnerabilidades-y-como-puede-ayudarle-la-gestion-de-parches\/"}]},{"@type":"WebSite","@id":"https:\/\/www.faronics.com\/es#website","url":"https:\/\/www.faronics.com\/es","name":"Faronics","description":"Creadores de Deep Freeze y de otras soluciones de Seguridad por Capas","publisher":{"@id":"https:\/\/www.faronics.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faronics.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.faronics.com\/es#organization","name":"Faronics","url":"https:\/\/www.faronics.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.faronics.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","contentUrl":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","width":155,"height":44,"caption":"Faronics"},"image":{"@id":"https:\/\/www.faronics.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/faronics","https:\/\/x.com\/faronics"]},{"@type":"Person","@id":"https:\/\/www.faronics.com\/es#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c","name":"Jorge Ojeda","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","url":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","contentUrl":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","caption":"Jorge Ojeda"},"description":"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.","sameAs":["https:\/\/www.faronics.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/posts\/237613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/comments?post=237613"}],"version-history":[{"count":1,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/posts\/237613\/revisions"}],"predecessor-version":[{"id":238515,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/posts\/237613\/revisions\/238515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/media\/237601"}],"wp:attachment":[{"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/media?parent=237613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/categories?post=237613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.faronics.com\/es\/wp-json\/wp\/v2\/tags?post=237613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}