{"id":17816,"date":"2019-08-19T09:18:29","date_gmt":"2019-08-19T15:18:29","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=17816"},"modified":"2019-08-19T09:19:21","modified_gmt":"2019-08-19T15:19:21","slug":"en-que-consiste-el-seguro-contra-riesgos-ciberneticos","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/","title":{"rendered":"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos"},"content":{"rendered":"<p><span style=\"color: #000000;\">Vivimos en una \u00e9poca donde la\u00a0<strong>tecnolog\u00eda<\/strong>\u00a0avanza a pasos agigantados, hoy en d\u00eda todos los servicios que sol\u00edan realizarse de forma presencial ya se pueden llevar a cabo en l\u00ednea y desde la comodidad de un hogar, oficina o establecimiento con acceso a\u00a0<strong>Internet<\/strong>. Desgraciadamente la delincuencia tambi\u00e9n se manifiesta en las nuevas tecnolog\u00edas en forma de\u00a0<strong>ataques cibern\u00e9ticos<\/strong>, para evitar ser v\u00edctima de ellos, debes saber que ya es posible\u00a0<strong>contratar un seguro contra riesgos cibern\u00e9ticos<\/strong>.<!--more--><\/span><\/p>\n<p><span style=\"color: #000000;\">Los\u00a0<strong>riesgos cibern\u00e9ticos<\/strong>\u00a0son delitos relacionados con el\u00a0<strong>fraude digital<\/strong>, es decir, robo de dinero e informaci\u00f3n mediante accesos digitales. Si eres due\u00f1o de una empresa o negocio, es importante que consideres contratar este tipo de\u00a0<strong>seguro<\/strong>, pues te permitir\u00e1 proteger los datos de tu empresa y la informaci\u00f3n confidencial de tus clientes.<\/span><\/p>\n<div class=\"banner\">\n<h5><span style=\"color: #000000;\">CU\u00c1LES SON LAS CONSECUENCIAS QUE PROVOCAN LOS\u00a0RIESGOS CIBERN\u00c9TICOS:<\/span><\/h5>\n<ul>\n<li><span style=\"color: #000000;\">Interrupci\u00f3n de servicios.<\/span><\/li>\n<li><span style=\"color: #000000;\">Corrupci\u00f3n o destrucci\u00f3n de datos.<\/span><\/li>\n<li><span style=\"color: #000000;\">Actividades de extorsi\u00f3n donde solicitan dinero, acceso o secretos corporativos a las v\u00edctimas.<\/span><\/li>\n<li><span style=\"color: #000000;\">Afectaciones en la confianza de los\u00a0clientes.<\/span><\/li>\n<li><span style=\"color: #000000;\">P\u00e9rdida de ventajas competitivas.<\/span><\/li>\n<li><span style=\"color: #000000;\">p\u00e9rdida de la confianza de socios comerciales.<\/span><\/li>\n<li><span style=\"color: #000000;\">Da\u00f1o a la reputaci\u00f3n y la marca de una organizaci\u00f3n.<\/span><\/li>\n<\/ul>\n<h5><span style=\"color: #000000;\">C\u00d3MO PREVENIR LOS RIESGOS CIBERN\u00c9TICOS:<\/span><\/h5>\n<ul>\n<li><span style=\"color: #000000;\">Contar con un seguro contra riesgos cibern\u00e9ticos que minimice las p\u00e9rdidas econ\u00f3micas del negocio.<\/span><\/li>\n<li><span style=\"color: #000000;\">Es importante considerar los riesgos cibern\u00e9ticos como de primer nivel.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">La\u00a0<em>Comisi\u00f3n Nacional para la Protecci\u00f3n y Defensa de los Usuarios de Servicios Financieros<\/em>\u00a0(<a href=\"https:\/\/www.gob.mx\/condusef\" target=\"_blank\" rel=\"noopener\" style=\"color: #000000;\">Condusef<\/a>) recomienda considerar una de las siguientes cuatro opciones de aseguradoras que ofrecen seguros contra riesgos cibern\u00e9ticos.<\/span><\/p>\n<div>\n<figure class=\"image\"><span style=\"color: #000000;\"><img decoding=\"async\" alt=\"\" data-height=\"747\" data-size=\"w:1077,h:1158\" data-width=\"695\" hspace=\"5\" src=\"https:\/\/www.mibolsillo.com\/export\/sites\/debate\/img\/2019\/08\/16\/seguro_contra_riesgos_cibernxticos_crop1565973650235.jpg_975886903.jpg\" title=\"\" vspace=\"5\" \/><\/span><\/figure>\n<\/div>\n<p><span style=\"color: #000000;\">Seg\u00fan la Condusef, los ataques cibern\u00e9ticos van en aumento d\u00eda con d\u00eda, los fraudes de este tipo han provocado a las empresas mexicanas p\u00e9rdidas por m\u00e1s de 9 mil 500 millones de pesos.<\/span><\/p>\n<p><span style=\"color: #000000;\">Cabe se\u00f1alar que los\u00a0<a href=\"https:\/\/www.mibolsillo.com\/noticias\/Cifras-del-comercio-electronico-en-Mexico-en-2019-20190711-0015.html\" target=\"_blank\" rel=\"noopener\" style=\"color: #000000;\">ataques cibern\u00e9ticos van dirigidos principalmente al comercio electr\u00f3nico<\/a>\u00a0(e-commerce) que dicho sea de paso, m\u00e1s del 10 por ciento de las operaciones que involucran tarjetas de cr\u00e9dito o d\u00e9bito se realizaron bajo la modalidad del comercio electr\u00f3nico.<\/span><\/p>\n<div>\n<figure class=\"image\"><span style=\"color: #000000;\"><a href=\"https:\/\/news.google.com\/publications\/CAAqBwgKMLmJhgsw9NeDAw?hl=es-419&amp;gl=MX&amp;ceid=MX%3Aes-419\" target=\"_blank\" rel=\"noopener\" style=\"color: #000000;\"><img decoding=\"async\" alt=\"\" data-height=\"125\" data-size=\"w:728,h:131\" data-width=\"695\" hspace=\"5\" src=\"https:\/\/www.mibolsillo.com\/export\/sites\/debate\/img\/2019\/08\/16\/mi_bolsillo_2.jpg_2065047037.jpg\" title=\"\" vspace=\"5\" \/><\/a><\/span><\/figure>\n<\/div>\n<p><span style=\"color: #000000;\"><a href=\"https:\/\/www.mibolsillo.com\/educacion\/Faltaran-en-Mexico-3-millones-de-expertos-en-ciberseguridad-20190514-0009.html\" target=\"_blank\" rel=\"noopener\" style=\"color: #000000;\">M\u00e9xico es uno de los pa\u00edses con la peor tasa de ocupaci\u00f3n en el sector de la ciberseguridad<\/a>, el pa\u00eds se encuentra rezagado debido a la escasez de especialistas.<\/span><\/p>\n<p><span style=\"color: #000000;\">Se prev\u00e9 que para el a\u00f1o 2021, en M\u00e9xico habr\u00e1 m\u00e1s de 3.5 millones de vacantes disponibles para laborar en el ramo de la ciberseguridad, por lo que no es mala idea que los j\u00f3venes consideren estudiar esta carrera.<\/span><\/p>\n<p><strong>Fuente:<\/strong><\/p>\n<p><em>MI BOLSILLO. (2019, 16 agosto). En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos. Recuperado 19 agosto, 2019, de https:\/\/www.mibolsillo.com\/seguros\/En-que-consiste-el-seguro-contra-riesgos-ciberneticos-20190816-0005.html<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Vivimos en una \u00e9poca donde la\u00a0tecnolog\u00eda\u00a0avanza a pasos agigantados, hoy en d\u00eda todos los servicios que sol\u00edan realizarse de forma presencial ya se pueden llevar a cabo en l\u00ednea y desde la comodidad de un hogar, oficina o establecimiento con acceso a\u00a0Internet. Desgraciadamente la delincuencia tambi\u00e9n se manifiesta en las nuevas tecnolog\u00edas en forma de\u00a0ataques [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17817,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383],"tags":[],"class_list":["post-17816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Vivimos en una \u00e9poca donde la\u00a0tecnolog\u00eda\u00a0avanza a pasos agigantados, hoy en d\u00eda todos los servicios que sol\u00edan realizarse de forma presencial ya se pueden llevar a cabo en l\u00ednea y desde la comodidad de un hogar, oficina o establecimiento con acceso a\u00a0Internet. Desgraciadamente la delincuencia tambi\u00e9n se manifiesta en las nuevas tecnolog\u00edas en forma de\u00a0ataques [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-19T15:18:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-19T15:19:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos\",\"datePublished\":\"2019-08-19T15:18:29+00:00\",\"dateModified\":\"2019-08-19T15:19:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\"},\"wordCount\":474,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg\",\"articleSection\":[\"Cibersegur\u00eddad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\",\"name\":\"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg\",\"datePublished\":\"2019-08-19T15:18:29+00:00\",\"dateModified\":\"2019-08-19T15:19:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/","og_locale":"en_US","og_type":"article","og_title":"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Vivimos en una \u00e9poca donde la\u00a0tecnolog\u00eda\u00a0avanza a pasos agigantados, hoy en d\u00eda todos los servicios que sol\u00edan realizarse de forma presencial ya se pueden llevar a cabo en l\u00ednea y desde la comodidad de un hogar, oficina o establecimiento con acceso a\u00a0Internet. Desgraciadamente la delincuencia tambi\u00e9n se manifiesta en las nuevas tecnolog\u00edas en forma de\u00a0ataques [&hellip;]","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-08-19T15:18:29+00:00","article_modified_time":"2019-08-19T15:19:21+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos","datePublished":"2019-08-19T15:18:29+00:00","dateModified":"2019-08-19T15:19:21+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/"},"wordCount":474,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg","articleSection":["Cibersegur\u00eddad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/","name":"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg","datePublished":"2019-08-19T15:18:29+00:00","dateModified":"2019-08-19T15:19:21+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.7-10.jpg","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/en-que-consiste-el-seguro-contra-riesgos-ciberneticos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"En qu\u00e9 consiste el seguro contra riesgos cibern\u00e9ticos"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=17816"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17816\/revisions"}],"predecessor-version":[{"id":17818,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17816\/revisions\/17818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/17817"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=17816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=17816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=17816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}