{"id":14727,"date":"2019-03-22T09:41:27","date_gmt":"2019-03-22T15:41:27","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=14727"},"modified":"2019-03-22T09:42:32","modified_gmt":"2019-03-22T15:42:32","slug":"ciberriesgos-ciberseguridad-y-ciberseguros","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/","title":{"rendered":"Ciberriesgos, ciberseguridad y ciberseguros"},"content":{"rendered":"<p>Vivimos en una sociedad cada vez m\u00e1s interconectada. El salto que hemos dado en los \u00faltimos veinte a\u00f1os, en cuanto al desarrollo de las tecnolog\u00edas de la informaci\u00f3n, ha sido espectacular.<!--more--><\/p>\n<p>La evoluci\u00f3n tecnol\u00f3gica lo controla pr\u00e1cticamente todo. Nos encontramos ante un mundo nuevo, lleno de oportunidades, pero tambi\u00e9n conlleva retos y amenazas para la industria. El sector de la ciberseguridad contin\u00faa creciendo para proteger a las empresas ante posibles amenazas.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/imagenes.inese.es\/imagenes\/Infografia_ciber_2.png\" \/><\/p>\n<p>Ante este panorama, en INESE hemos convocado el\u00a0<strong>Curso Experto en Gesti\u00f3n de Ciberriesgos y Ciberseguros<\/strong>. Aprender\u00e1s a encontrar vulnerabilidades, establecer unas medidas de seguridad para los equipos y conocer\u00e1s los requisitos legales ante un ciberataque. Es decir, tendr\u00e1s todo lo que necesitas para comercializar Ciberseguros.<\/p>\n<p><strong>Fuente: Future<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vivimos en una sociedad cada vez m\u00e1s interconectada. El salto que hemos dado en los \u00faltimos veinte a\u00f1os, en cuanto al desarrollo de las tecnolog\u00edas de la informaci\u00f3n, ha sido espectacular.<\/p>\n","protected":false},"author":1,"featured_media":14728,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383],"tags":[],"class_list":["post-14727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberriesgos, ciberseguridad y ciberseguros - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberriesgos, ciberseguridad y ciberseguros - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Vivimos en una sociedad cada vez m\u00e1s interconectada. El salto que hemos dado en los \u00faltimos veinte a\u00f1os, en cuanto al desarrollo de las tecnolog\u00edas de la informaci\u00f3n, ha sido espectacular.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-22T15:41:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-22T15:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Ciberriesgos, ciberseguridad y ciberseguros\",\"datePublished\":\"2019-03-22T15:41:27+00:00\",\"dateModified\":\"2019-03-22T15:42:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\"},\"wordCount\":136,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg\",\"articleSection\":[\"Cibersegur\u00eddad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\",\"name\":\"Ciberriesgos, ciberseguridad y ciberseguros - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg\",\"datePublished\":\"2019-03-22T15:41:27+00:00\",\"dateModified\":\"2019-03-22T15:42:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberriesgos, ciberseguridad y ciberseguros\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberriesgos, ciberseguridad y ciberseguros - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/","og_locale":"en_US","og_type":"article","og_title":"Ciberriesgos, ciberseguridad y ciberseguros - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Vivimos en una sociedad cada vez m\u00e1s interconectada. El salto que hemos dado en los \u00faltimos veinte a\u00f1os, en cuanto al desarrollo de las tecnolog\u00edas de la informaci\u00f3n, ha sido espectacular.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-03-22T15:41:27+00:00","article_modified_time":"2019-03-22T15:42:32+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Ciberriesgos, ciberseguridad y ciberseguros","datePublished":"2019-03-22T15:41:27+00:00","dateModified":"2019-03-22T15:42:32+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/"},"wordCount":136,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg","articleSection":["Cibersegur\u00eddad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/","name":"Ciberriesgos, ciberseguridad y ciberseguros - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg","datePublished":"2019-03-22T15:41:27+00:00","dateModified":"2019-03-22T15:42:32+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/03\/Notic.3-12.jpg","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/ciberriesgos-ciberseguridad-y-ciberseguros\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Ciberriesgos, ciberseguridad y ciberseguros"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=14727"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14727\/revisions"}],"predecessor-version":[{"id":14729,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14727\/revisions\/14729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/14728"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=14727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=14727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=14727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}