{"id":13456,"date":"2024-11-29T14:40:00","date_gmt":"2024-11-29T13:40:00","guid":{"rendered":"https:\/\/oti.unp.edu.pe\/?p=13456"},"modified":"2025-01-03T15:29:47","modified_gmt":"2025-01-03T14:29:47","slug":"que-pasa-si-caes-en-un-correo-de-phishing-como-evitarlo-y-mitigar-los-danos","status":"publish","type":"post","link":"https:\/\/oti.unp.edu.pe\/?p=13456","title":{"rendered":"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13456\" class=\"elementor elementor-13456\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e3d044 e-flex e-con-boxed e-con e-parent\" data-id=\"3e3d044\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2a607e elementor-widget elementor-widget-text-editor\" data-id=\"e2a607e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><em><strong>Referencia: <a href=\"https:\/\/es.digitaltrends.com\/computadoras\/que-pasa-tras-caer-en-un-correo-de-phishing-como-evitarlo-mitigar-danos\/#dt-heading-qu-es-el-phishing\" target=\"_blank\" rel=\"noopener\">Digitaltrends<\/a><\/strong><\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a79240c elementor-widget elementor-widget-text-editor\" data-id=\"a79240c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\">Caer en un\u00a0<strong>correo de phishing<\/strong>\u00a0puede sucederle a cualquiera. Aunque tratamos de ser cautelosos, nadie est\u00e1 exento de cometer un\u00a0error, considerando que recibimos miles de mensajes de spam al a\u00f1o. Pero lo importante es mantener la calma: si act\u00faas r\u00e1pido, puedes mitigar los da\u00f1os. A continuaci\u00f3n, te explicamos qu\u00e9 sucede tras caer en un ataque de phishing y qu\u00e9 medidas tomar.<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecfe119 elementor-widget elementor-widget-heading\" data-id=\"ecfe119\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es el phishing?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6064576 elementor-widget elementor-widget-text-editor\" data-id=\"6064576\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div data-testid=\"paragraph-0\">El phishing es una t\u00e9cnica de\u00a0ciberataque\u00a0en la que los estafadores intentan enga\u00f1arte para que compartas informaci\u00f3n confidencial, como contrase\u00f1as, datos bancarios o n\u00fameros de tarjetas de cr\u00e9dito. Estos suelen usar correos electr\u00f3nicos, mensajes de texto o p\u00e1ginas web falsas que imitan a entidades leg\u00edtimas, como bancos o redes sociales, para ganarse tu confianza. Por ejemplo, puedes recibir un correo que parece de tu banco pidi\u00e9ndote actualizar tu informaci\u00f3n personal o un enlace que te lleva a una p\u00e1gina falsa para iniciar sesi\u00f3n.<\/div><div data-testid=\"paragraph-0\">El objetivo del phishing es robar tus datos o instalar\u00a0malware\u00a0(software malicioso) en tu dispositivo. Por eso, es fundamental identificar se\u00f1ales de alerta y actuar con precauci\u00f3n ante cualquier mensaje sospechoso.<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d7022a elementor-widget elementor-widget-heading\" data-id=\"3d7022a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 hacer si descargu\u00e9 un archivo sospechoso?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37a7a37 elementor-widget elementor-widget-image\" data-id=\"37a7a37\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"534\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/Phishing-1024x683.jpg\" class=\"attachment-large size-large wp-image-13459\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/Phishing-1024x683.jpg 1024w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/Phishing-300x200.jpg 300w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/Phishing-768x512.jpg 768w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/Phishing.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c184431 elementor-widget elementor-widget-text-editor\" data-id=\"c184431\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p>Descargar un archivo de phishing no siempre significa que el malware se haya instalado. Si sospechas que descargaste algo malicioso, busca y elimina el archivo inmediatamente. Sin embargo, algunos malwares tienden a esconderse, as\u00ed que no te obsesiones si no lo encuentras.<\/p><p>La clave est\u00e1 en realizar un an\u00e1lisis completo con un antivirus confiable. Esto detectar\u00e1 archivos da\u00f1inos y te permitir\u00e1 eliminarlos o ponerlos en cuarentena. Si instalaste el malware, la situaci\u00f3n puede ser m\u00e1s complicada. En ese caso:<\/p><ul><li>Considera formatear tu disco duro.<\/li><li>Utiliza herramientas especializadas, como esc\u00e1neres de rootkits (software dise\u00f1ado para permitir acceso no autorizado y ocultar su presencia).<\/li><li>En casos extremos, podr\u00edas necesitar reemplazar tu disco duro, aunque esto es el \u00faltimo recurso.<\/li><\/ul><p>Jam\u00e1s respondas a correos de los atacantes. Algunos intentan extorsionarte mediante ransomware, pidiendo dinero para \u201cdevolver\u201d tu informaci\u00f3n. Bloquea y reporta estos contactos como fraudulentos.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8998f8c elementor-widget elementor-widget-heading\" data-id=\"8998f8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 hacer si robaron mis credenciales de inicio de sesi\u00f3n?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109ac46 elementor-widget elementor-widget-text-editor\" data-id=\"109ac46\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p>Muchos correos de phishing buscan robar tus credenciales mediante p\u00e1ginas falsas o aplicaciones fraudulentas. Si crees que tu informaci\u00f3n fue comprometida, act\u00faa r\u00e1pido:<\/p><ul><li>Cambia las contrase\u00f1as afectadas desde otro dispositivo. Si tu equipo est\u00e1 infectado, podr\u00eda tener un registrador de teclas (keyloggers) que robe todo lo que escribas.<\/li><li>Empieza por tus cuentas m\u00e1s importantes, como bancos o servicios con datos de tarjetas de cr\u00e9dito.<\/li><li>Notifica a tu banco. Si crees que tus datos financieros fueron robados, solicita la cancelaci\u00f3n de tus tarjetas. Te enviar\u00e1n las nuevas en pocos d\u00edas, y como extra, limpiar\u00e1s suscripciones olvidadas.<\/li><\/ul><p>Un gestor de contrase\u00f1as puede facilitar este proceso al generar\u00a0claves seguras\u00a0y \u00fanicas para cada cuenta.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2264aab elementor-widget elementor-widget-heading\" data-id=\"2264aab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo evitar caer en phishing en el futuro?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2d1a14 elementor-widget elementor-widget-image\" data-id=\"a2d1a14\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"720\" height=\"504\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg\" class=\"attachment-large size-large wp-image-13457\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg 720w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails-300x210.jpg 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52e1a10 elementor-widget elementor-widget-text-editor\" data-id=\"52e1a10\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p>Prevenir es la mejor defensa contra el phishing. Aunque el correo electr\u00f3nico es un medio inseguro por naturaleza, hay maneras de reducir riesgos:<\/p><ul><li>S\u00e9 esc\u00e9ptico con los correos electr\u00f3nicos. No abras enlaces directamente; verifica que las URLs sean leg\u00edtimas usando un verificador de enlaces. Lo mejor es escribir manualmente la direcci\u00f3n web en tu navegador.<\/li><li>Evita descargar archivos adjuntos sospechosos. Confirma siempre que el remitente sea confiable y que el archivo sea absolutamente necesario.<\/li><li>T\u00f3mate tu tiempo. Lee detenidamente los correos y verifica inconsistencias. Si algo parece sospechoso, opta por la acci\u00f3n menos arriesgada.<\/li><\/ul><p>Los estafadores se aprovechan de la prisa y el descuido. Mant\u00e9n la calma, s\u00e9 precavido y verifica antes de actuar. Recuerda que actuar con rapidez y atenci\u00f3n puede marcar la diferencia entre un susto y un problema grave.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Referencia: Digitaltrends Caer en un\u00a0correo de phishing\u00a0puede sucederle a cualquiera.<\/p>\n","protected":false},"author":1,"featured_media":13457,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,52,58,5],"tags":[11,9],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os - Oficina de Tecnolog\u00eda de Informaci\u00f3n<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oti.unp.edu.pe\/?p=13456\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os - Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Referencia: Digitaltrends Caer en un\u00a0correo de phishing\u00a0puede sucederle a cualquiera.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oti.unp.edu.pe\/?p=13456\" \/>\n<meta property=\"og:site_name\" content=\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-29T13:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T14:29:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#article\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\"},\"headline\":\"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os\",\"datePublished\":\"2024-11-29T13:40:00+00:00\",\"dateModified\":\"2025-01-03T14:29:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456\"},\"wordCount\":666,\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg\",\"keywords\":[\"Informaci\u00f3n\",\"O.T.I.\"],\"articleSection\":[\"Actualizaci\u00f3n\",\"Mundo\",\"Seguridad Inform\u00e1tica\",\"Tecnolog\u00eda\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456\",\"url\":\"https:\/\/oti.unp.edu.pe\/?p=13456\",\"name\":\"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os - Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg\",\"datePublished\":\"2024-11-29T13:40:00+00:00\",\"dateModified\":\"2025-01-03T14:29:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/oti.unp.edu.pe\/?p=13456\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg\",\"width\":720,\"height\":504},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13456#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/oti.unp.edu.pe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/oti.unp.edu.pe\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"width\":736,\"height\":385,\"caption\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"sameAs\":[\"https:\/\/oti.unp.edu.pe\/webotiunp\"],\"url\":\"https:\/\/oti.unp.edu.pe\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os - Oficina de Tecnolog\u00eda de Informaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oti.unp.edu.pe\/?p=13456","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os - Oficina de Tecnolog\u00eda de Informaci\u00f3n","og_description":"Referencia: Digitaltrends Caer en un\u00a0correo de phishing\u00a0puede sucederle a cualquiera.","og_url":"https:\/\/oti.unp.edu.pe\/?p=13456","og_site_name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","article_published_time":"2024-11-29T13:40:00+00:00","article_modified_time":"2025-01-03T14:29:47+00:00","og_image":[{"width":720,"height":504,"url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"desarrollo","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oti.unp.edu.pe\/?p=13456#article","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13456"},"author":{"name":"desarrollo","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c"},"headline":"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os","datePublished":"2024-11-29T13:40:00+00:00","dateModified":"2025-01-03T14:29:47+00:00","mainEntityOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13456"},"wordCount":666,"publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg","keywords":["Informaci\u00f3n","O.T.I."],"articleSection":["Actualizaci\u00f3n","Mundo","Seguridad Inform\u00e1tica","Tecnolog\u00eda"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/oti.unp.edu.pe\/?p=13456","url":"https:\/\/oti.unp.edu.pe\/?p=13456","name":"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os - Oficina de Tecnolog\u00eda de Informaci\u00f3n","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg","datePublished":"2024-11-29T13:40:00+00:00","dateModified":"2025-01-03T14:29:47+00:00","breadcrumb":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13456#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oti.unp.edu.pe\/?p=13456"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/?p=13456#primaryimage","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2024\/11\/phishing-emails.jpg","width":720,"height":504},{"@type":"BreadcrumbList","@id":"https:\/\/oti.unp.edu.pe\/?p=13456#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/oti.unp.edu.pe\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 pasa si caes en un correo de phishing? C\u00f3mo evitarlo y mitigar los da\u00f1os"}]},{"@type":"WebSite","@id":"https:\/\/oti.unp.edu.pe\/#website","url":"https:\/\/oti.unp.edu.pe\/","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","description":"","publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oti.unp.edu.pe\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/oti.unp.edu.pe\/#organization","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","url":"https:\/\/oti.unp.edu.pe\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","width":736,"height":385,"caption":"Oficina de Tecnolog\u00eda de Informaci\u00f3n"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","caption":"desarrollo"},"sameAs":["https:\/\/oti.unp.edu.pe\/webotiunp"],"url":"https:\/\/oti.unp.edu.pe\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13456"}],"collection":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13456"}],"version-history":[{"count":4,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13456\/revisions"}],"predecessor-version":[{"id":13463,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13456\/revisions\/13463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/media\/13457"}],"wp:attachment":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}