{"id":2844,"date":"2024-11-28T06:34:39","date_gmt":"2024-11-28T09:34:39","guid":{"rendered":"https:\/\/ciberseguridad.uncoma.edu.ar\/?p=2844"},"modified":"2024-11-28T06:35:25","modified_gmt":"2024-11-28T09:35:25","slug":"30-de-noviembre-dia-internacional-de-la-seguridad-de-la-informacion","status":"publish","type":"post","link":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/30-de-noviembre-dia-internacional-de-la-seguridad-de-la-informacion\/","title":{"rendered":"30 de noviembre D\u00eda internacional de la seguridad de la informacio\u0301n"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2844\" class=\"elementor elementor-2844\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b83c29 e-flex e-con-boxed e-con e-parent\" data-id=\"5b83c29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa86c63 elementor-widget elementor-widget-text-editor\" data-id=\"aa86c63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">En este 30 de noviembre, conmemoramos el D\u00eda Internacional de la Seguridad de la Informaci\u00f3n, una fecha clave para reflexionar sobre c\u00f3mo protegemos nuestra informaci\u00f3n personal y profesional. <\/span><\/span><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">\ud83d\udcc5\ud83d\udd12 <\/span><\/span><\/p><p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">En este video, te explicamos de forma sencilla y pr\u00e1ctica el concepto de la Autenticaci\u00f3n Multifactor (MFA), una de las herramientas m\u00e1s efectivas para garantizar la seguridad en el acceso a nuestras cuentas y plataformas. \ud83c\udfaf \ud83d\udca1<\/span><\/span><\/p><p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"> \u00bfQu\u00e9 es MFA? Es un mecanismo que combina dos o m\u00e1s m\u00e9todos de verificaci\u00f3n para confirmar nuestra identidad: <\/span><\/span><\/p><p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">\u00a0 \u00a0 \u00a0 \u00a0\u2705 Algo que sabes (como tu contrase\u00f1a).<\/span><\/span><\/p><p><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">\u00a0 \u00a0 \u00a0 \u00a0\u2705 Algo que tienes (como tu tel\u00e9fono o un token). <\/span><\/p><p><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">\u00a0 \u00a0 \u00a0 \u00a0\u2705 Algo que eres (como tu huella digital). <\/span><\/p><p><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">En las universidades nacionales, proteger los sistemas de informaci\u00f3n no es solo una necesidad t\u00e9cnica, sino tambi\u00e9n una responsabilidad de toda la comunidad universitaria. MFA nos ayuda a prevenir accesos no autorizados y a reducir el riesgo de ciberataques. \ud83d\udea8 <\/span><\/p><p><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">\ud83d\udcbb<\/span><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"> \u00danete al cambio! Adopta medidas de seguridad como MFA y contribuye a crear un entorno digital m\u00e1s seguro para todos. Comparte este video y ay\u00fadanos a concientizar a m\u00e1s personas. \u00a1La seguridad de la informaci\u00f3n es tarea de todos! \ud83d\ude4c <\/span><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"><a class=\"yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color\" tabindex=\"0\" href=\"https:\/\/www.youtube.com\/hashtag\/ciberseguridad\" target=\"\">#Ciberseguridad<\/a><\/span> <span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"><a class=\"yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color\" tabindex=\"0\" href=\"https:\/\/www.youtube.com\/hashtag\/seguridaddelainformaci%C3%B3n\" target=\"\">#SeguridadDeLaInformaci\u00f3n<\/a><\/span> <span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"><a class=\"yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color\" tabindex=\"0\" href=\"https:\/\/www.youtube.com\/hashtag\/mfa\" target=\"\">#MFA<\/a><\/span> <span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"><a class=\"yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color\" tabindex=\"0\" href=\"https:\/\/www.youtube.com\/hashtag\/universidades\" target=\"\">#Universidades<\/a><\/span> <span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"><a class=\"yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color\" tabindex=\"0\" href=\"https:\/\/www.youtube.com\/hashtag\/concienciadigital\" target=\"\">#ConcienciaDigital<\/a><\/span> <span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"><a class=\"yt-core-attributed-string__link yt-core-attributed-string__link--call-to-action-color\" tabindex=\"0\" href=\"https:\/\/www.youtube.com\/hashtag\/30denoviembre\" target=\"\">#30DeNoviembre #Subco\u00a0<\/a><\/span><\/p><div id=\"snippet\" class=\"style-scope ytd-text-inline-expander\">\u00a0<\/div><div class=\"style-scope ytd-watch-metadata\"><div id=\"items\" class=\"style-scope ytd-structured-description-content-renderer\"><div id=\"header-container\" class=\"style-scope ytd-horizontal-card-list-renderer\"><div class=\"title-row style-scope ytd-rich-list-header-renderer\"><div id=\"avatar\" class=\"style-scope ytd-rich-list-header-renderer\">\u00a0<\/div><div id=\"title-text\" class=\"style-scope ytd-rich-list-header-renderer\">\u00a0<\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24f4fa0 e-flex e-con-boxed e-con e-parent\" data-id=\"24f4fa0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfb89a9 elementor-widget elementor-widget-image\" data-id=\"cfb89a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/2aebd4ca-588d-4a92-a1df-23fa76e14ced-1-1024x1024.jpeg\" class=\"attachment-large size-large wp-image-2845\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/2aebd4ca-588d-4a92-a1df-23fa76e14ced-1-1024x1024.jpeg 1024w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/2aebd4ca-588d-4a92-a1df-23fa76e14ced-1-300x300.jpeg 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/2aebd4ca-588d-4a92-a1df-23fa76e14ced-1-150x150.jpeg 150w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/2aebd4ca-588d-4a92-a1df-23fa76e14ced-1-768x768.jpeg 768w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/2aebd4ca-588d-4a92-a1df-23fa76e14ced-1.jpeg 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19b5f72 e-flex e-con-boxed e-con e-parent\" data-id=\"19b5f72\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d65434 elementor-widget elementor-widget-video\" data-id=\"7d65434\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=L1vwqFYkvOQ&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>En este 30 de noviembre, conmemoramos el D\u00eda Internacional de la Seguridad de la Informaci\u00f3n, una fecha clave para reflexionar sobre c\u00f3mo protegemos nuestra informaci\u00f3n personal y profesional. \ud83d\udcc5\ud83d\udd12 En este video, te explicamos de forma sencilla y pr\u00e1ctica el concepto de la Autenticaci\u00f3n Multifactor (MFA), una de las herramientas m\u00e1s efectivas para garantizar la [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1861,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,57,22],"tags":[36,38,58],"class_list":["post-2844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-campana","category-mfa","category-recomendaciones","tag-campana","tag-cin","tag-mfa"],"_links":{"self":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/2844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/comments?post=2844"}],"version-history":[{"count":7,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/2844\/revisions"}],"predecessor-version":[{"id":2854,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/2844\/revisions\/2854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media\/1861"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media?parent=2844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/categories?post=2844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/tags?post=2844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}