<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="Seguridad Laptops" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-510x287.jpg 510w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-1536x864.jpg 1536w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-320x180.jpg 320w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-640x360.jpg 640w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-360x203.jpg 360w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-720x405.jpg 720w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-1080x608.jpg 1080w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-800x450.jpg 800w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-1024x576.jpg 1024w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2020/10/1-Seguridad-Laptops-1-1280x720.jpg 1280w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad 5 consejos para mantener tu laptop segura 2 meses haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="Wireshark" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-510x287.jpg 510w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-1536x864.jpg 1536w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-320x180.jpg 320w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-640x360.jpg 640w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-360x203.jpg 360w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-720x405.jpg 720w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-1080x608.jpg 1080w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-800x450.jpg 800w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-1024x576.jpg 1024w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/04/Wireshark-Top-EM@Blog-IMG-1280x720.jpg 1280w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad ¿Qué es y para qué sirve Wireshark? 11 meses haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/01/Robo-de-identidad-1-EliezerMolinaM.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="robo de identidad" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/01/Robo-de-identidad-1-EliezerMolinaM.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/01/Robo-de-identidad-1-EliezerMolinaM-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/01/Robo-de-identidad-1-EliezerMolinaM-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2019/01/Robo-de-identidad-1-EliezerMolinaM-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Robo de Identidad: ¿Qué significa y como me afectaría? 2 años haceComenta
<img width="1024" height="569" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/10/SSL-Certificate@2x.png" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/10/SSL-Certificate@2x.png 1024w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/10/SSL-Certificate@2x-300x167.png 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/10/SSL-Certificate@2x-768x427.png 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/10/SSL-Certificate@2x-510x283.png 510w" sizes="(max-width: 1024px) 100vw, 1024px"> Cultura Digital • Noticias • Seguridad ¿Qué es y para qué sirve un certificado de seguridad SSL? 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/fotnite-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/fotnite-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/fotnite-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/fotnite-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/fotnite-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Seguridad El instalador de Fortnite tiene un serio defecto de seguridad 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/gmail-min-1.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/gmail-min-1.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/gmail-min-1-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/gmail-min-1-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/09/gmail-min-1-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Cómo borrar correo electrónico en Gmail luego de enviarlo 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ubicacion-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ubicacion-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ubicacion-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ubicacion-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ubicacion-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Google confirma que hace seguimiento de tu ubicación sin permiso 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/phishing-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/phishing-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/phishing-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/phishing-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/phishing-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Cómo prevenir el phishing empresarial 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/firewall-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/firewall-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/firewall-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/firewall-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/firewall-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Las organizaciones aún tienen problemas con la administración básica de firewall 2 años hace1 Comentario
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberseguridad-min-1.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberseguridad-min-1.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberseguridad-min-1-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberseguridad-min-1-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberseguridad-min-1-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Organizaciones luchan con los principios básicos del ciberhigiene 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/fortnite-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/fortnite-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/fortnite-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/fortnite-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/fortnite-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Noticias • Seguridad Fortnite para Android pondrá en riesgo seguridad de jugadores 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberataque-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberataque-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberataque-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberataque-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/ciberataque-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Nuevo tipo de ciberataque capta datos bancarios a través de enrutadores 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/cc-cleaner-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/cc-cleaner-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/cc-cleaner-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/cc-cleaner-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/cc-cleaner-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Seguridad Avast retira CCleaner 5.45 tras controversia de privacidad 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malwarebytes-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malwarebytes-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malwarebytes-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malwarebytes-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malwarebytes-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Noticias • Seguridad Malwarebytes lanza una nueva extensión de navegador para Chrome y Firefox 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malware-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malware-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malware-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malware-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/malware-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Las GPU ahora combaten ataques de malware 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/confianza-digital-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/confianza-digital-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/confianza-digital-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/confianza-digital-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/confianza-digital-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Las empresas sobreestiman el nivel de “confianza digital” de los consumidores 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/xompatibilidad-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/xompatibilidad-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/xompatibilidad-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/xompatibilidad-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/xompatibilidad-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Noticias • Seguridad La detección y respuesta administradas son compatibles con los equipos de seguridad interna 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/google-gmail-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/google-gmail-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/google-gmail-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/google-gmail-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/google-gmail-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad El nuevo “Modo confidencial” de Gmail es imperfecto y engañoso 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/seguridad-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/seguridad-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/seguridad-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/seguridad-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/seguridad-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Cultura Digital • Seguridad Los ataques a la cadena de suministro de software amenaza la ciberseguridad 2 años haceComenta
<img width="1920" height="1080" src="https://ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/chrome-min.jpg" class="attachment-vce-lay-b size-vce-lay-b wp-post-image" alt="" srcset="//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/chrome-min.jpg 1920w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/chrome-min-300x169.jpg 300w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/chrome-min-768x432.jpg 768w,//ik.imagekit.io/kj6cmahsf/eliezer/wp-content/uploads/2018/08/chrome-min-510x287.jpg 510w" sizes="(max-width: 1920px) 100vw, 1920px"> Seguridad Prepárate para una serie de advertencias de seguridad de Chrome 2 años haceComenta