{"id":402,"date":"2024-08-23T11:32:11","date_gmt":"2024-08-23T09:32:11","guid":{"rendered":"https:\/\/enthec.com\/?page_id=402"},"modified":"2025-02-20T13:55:10","modified_gmt":"2025-02-20T12:55:10","slug":"descargables","status":"publish","type":"page","link":"https:\/\/enthec.com\/descargables\/","title":{"rendered":"Descargables"},"content":{"rendered":"
[vc_row unlock_row_content=\u00bbyes\u00bb row_height_percent=\u00bb0″ back_color=\u00bbcolor-lxmt\u00bb back_image=\u00bb105″ overlay_alpha=\u00bb50″ gutter_size=\u00bb0″ column_width_percent=\u00bb100″ shift_y=\u00bb0″ z_index=\u00bb0″ bottom_divider=\u00bbgradient\u00bb uncode_shortcode_id=\u00bb147860″ back_color_type=\u00bbuncode-palette\u00bb][vc_column column_width_percent=\u00bb100″ position_vertical=\u00bbmiddle\u00bb align_horizontal=\u00bbalign_center\u00bb gutter_size=\u00bb2″ overlay_alpha=\u00bb50″ shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/1″ uncode_shortcode_id=\u00bb149311″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ uncode_shortcode_id=\u00bb907884″ heading_custom_size=\u00bb5em\u00bb]Recursos[\/vc_custom_heading][vc_single_image media=\u00bb1033″ media_width_use_pixel=\u00bbyes\u00bb alignment=\u00bbcenter\u00bb uncode_shortcode_id=\u00bb155683″ media_width_pixel=\u00bb150″][vc_single_image media=\u00bb774″ media_width_use_pixel=\u00bbyes\u00bb alignment=\u00bbcenter\u00bb uncode_shortcode_id=\u00bb262822″ media_width_pixel=\u00bb250″][\/vc_column][\/vc_row][vc_row row_height_percent=\u00bb0″ back_color=\u00bbcolor-lxmt\u00bb overlay_alpha=\u00bb50″ gutter_size=\u00bb3″ column_width_percent=\u00bb100″ shift_y=\u00bb0″ z_index=\u00bb0″ enable_bottom_divider=\u00bbdefault\u00bb bottom_divider=\u00bbstep\u00bb shape_bottom_h_use_pixel=\u00bb\u00bb shape_bottom_height=\u00bb500″ shape_bottom_color=\u00bbcolor-xsdn\u00bb shape_bottom_opacity=\u00bb100″ shape_bottom_index=\u00bb0″ changer_back_color=\u00bbyes\u00bb uncode_shortcode_id=\u00bb185069″ back_color_type=\u00bbuncode-palette\u00bb shape_bottom_color_type=\u00bbuncode-palette\u00bb][vc_column column_width_percent=\u00bb100″ gutter_size=\u00bb2″ style=\u00bblight\u00bb back_color=\u00bbcolor-xsdn\u00bb overlay_alpha=\u00bb50″ shadow=\u00bbstd\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb10″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/1″ uncode_shortcode_id=\u00bb142181″ back_color_type=\u00bbuncode-palette\u00bb][vc_custom_heading text_size=\u00bbh4″ uncode_shortcode_id=\u00bb149038″]Descargables[\/vc_custom_heading][vc_separator sep_color=\u00bbcolor-521277″ icon_position=\u00bbleft\u00bb uncode_shortcode_id=\u00bb208572″ sep_color_type=\u00bbuncode-palette\u00bb el_width=\u00bb50px\u00bb el_height=\u00bb2px\u00bb][vc_row_inner limit_content=\u00bb\u00bb][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb183259″ border_color_type=\u00bbuncode-palette\u00bb css=\u00bb.vc_custom_1725964616223{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb][vc_single_image media=\u00bb273″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb669384″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb821283″ heading_custom_size=\u00bb1.5em\u00bb]Riesgo de Terceros[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb123301″ text_color_type=\u00bbuncode-palette\u00bb]Evaluar y gestionar el riesgo de terceros de forma precisa y efectiva durante el tiempo que dure la relaci\u00f3n comercial es crucial para garantizar la seguridad y la continuidad de las operaciones de cualquier organizaci\u00f3n. En este documento analizamos la importancia de la valoraci\u00f3n del ciberriesgo de terceros, los m\u00e9todos comunes de valoraci\u00f3n, sus d\u00e9ficits y los beneficios de introducir el enfoque XTI en la valoraci\u00f3n del riesgo de terceros.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb412953″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-Riesgo-de-Terceros.pdf|target:_blank\u00bb]Descarga Documento de Riego de Terceros[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb302036″ css=\u00bb.vc_custom_1725964605932{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb border_color_type=\u00bbuncode-palette\u00bb][vc_single_image media=\u00bb805″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb150871″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb186786″ heading_custom_size=\u00bb1.5em\u00bb]Cumplimiento de la NIS 2[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb206946″ text_color_type=\u00bbuncode-palette\u00bb]Hace ya m\u00e1s de una d\u00e9cada, la Uni\u00f3n Europea fue consciente de la necesidad de elaborar un marco legal com\u00fan sobre Ciberseguridad que estableciese la base de una estrategia compartida por los Estados miembros para luchar unidos contra la ciberdelincuencia.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb129179″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-NIS2-ESP.pdf|target:_blank\u00bb]Descarga Cumplimiento de la NIS 2[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb793437″ css=\u00bb.vc_custom_1725964619503{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb border_color_type=\u00bbuncode-palette\u00bb][vc_single_image media=\u00bb273″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb160364″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb160998″ heading_custom_size=\u00bb1.5em\u00bb]Ciberseguridad Extendida[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb120787″ text_color_type=\u00bbuncode-palette\u00bb]El CISO se enfrenta a una serie de desaf\u00edos que dificultan su capacidad para proteger a la organizaci\u00f3n y que tienen que ver con el alcance de la estrategia, la poca implicaci\u00f3n del resto de la organizaci\u00f3n y los insuficientes recursos corporativos destinados a ciberseguridad. En este documento analizamos estos desaf\u00edos y proponemos c\u00f3mo resolverlos utilizando para ello la propia estrategia de ciberseguridad corporativa basada en soluciones de ciberseguridad innovadoras.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb194157″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-CISO-Ciberseguridad-extendida.pdf|target:_blank\u00bb]Descarga Documento de Ciberseguridad Extendida[\/vc_button][\/vc_column_inner][\/vc_row_inner][vc_row_inner limit_content=\u00bb\u00bb][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb183259″ border_color_type=\u00bbuncode-palette\u00bb css=\u00bb.vc_custom_1725964616223{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb][vc_single_image media=\u00bb805″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb152349″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb600982″ heading_custom_size=\u00bb1.5em\u00bb]Ciberinteligencia de Amenazas[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb194971″ text_color_type=\u00bbuncode-palette\u00bb]Las organizaciones son hoy entidades complejas con per\u00edmetros extendidos de dif\u00edcil delimitaci\u00f3n, que necesitan, adem\u00e1s de estrategias de defensa y protecci\u00f3n, estrategias de inteligencia para gestionar la exposici\u00f3n a amenazas. En este documento comparamos las estrategias de ciberseguridad perimetral y la de ciberseguridad extendida y analizamos c\u00f3mo la IA es uno de los factores determinantes del \u00e9xito del nuevo paradigma en ciberseguridad: la ciberinteligencia de amenazas.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb192314″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-IA-Ciberinteligencia.pdf|target:_blank\u00bb]Descarga Documento de Ciberinteligencia de Amenazas[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb302036″ css=\u00bb.vc_custom_1725964605932{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb border_color_type=\u00bbuncode-palette\u00bb][vc_single_image media=\u00bb273″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb152401″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb198910″ heading_custom_size=\u00bb1.5em\u00bb]Campa\u00f1as de Phising, Fraude y Scam en RRSS[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb140809″ text_color_type=\u00bbuncode-palette\u00bb]En este documento exploramos el gran desaf\u00edo que para la marca suponen las campa\u00f1as de phishing, fraude y scam con usurpaci\u00f3n de identidad corporativa en redes sociales, las t\u00e9cnicas utilizadas, las consecuencias para las organizaciones y las estrategias de prevenci\u00f3n y protecci\u00f3n avanzadas frente a estas ciberamenazas en constante evoluci\u00f3n.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb169535″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-Campanas-Phishing-Fraude-Estafa.pdf|target:_blank\u00bb]Descarga Documento de Campa\u00f1as de Phising, Fraude y Scam en RRSS[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb793437″ css=\u00bb.vc_custom_1725964619503{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb border_color_type=\u00bbuncode-palette\u00bb][vc_single_image media=\u00bb805″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb149460″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb137264″ heading_custom_size=\u00bb1.5em\u00bb]Top 10 Vulnerabilidades en Red[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb324586″ text_color_type=\u00bbuncode-palette\u00bb]El \u00e9xito de un ciberataque radica en la cantidad de informaci\u00f3n sobre la organizaci\u00f3n atacada que los ciberdelincuentes manejan y que les
\nfacilita la preparaci\u00f3n de un ataque muy dif\u00edcil de neutralizar. En este documento analizamos las diez vulnerabilidades de seguridad corporativa m\u00e1s habituales que se encuentran en la red y que son explotadas por la ciberdelincuencia para planificar su ataque de \u00e9xito.[\/vc_column_text][vc_button button_color=\u00bbcolor-165520″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb786383″ el_id=\u00bbdescargablesqondar\u00bb link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2025%2F02%2FWP-Top-10-Vulnerabilidades.pdf|target:_blank\u00bb]Descarga Documento de Top 10 Vulnerabilidades en Red[\/vc_button][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=\u00bb0″ overlay_alpha=\u00bb50″ gutter_size=\u00bb3″ shift_y=\u00bb0″ z_index=\u00bb0″ limit_content=\u00bb\u00bb uncode_shortcode_id=\u00bb747239″][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb183259″ border_color_type=\u00bbuncode-palette\u00bb css=\u00bb.vc_custom_1725964616223{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb][vc_single_image media=\u00bb1576″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb106520″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb859676″ heading_custom_size=\u00bb1.5em\u00bb]Ciberseguridad Individual para Personas Relevantes[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb185369″ text_color_type=\u00bbuncode-palette\u00bb]En el entorno digital, la protecci\u00f3n de la informaci\u00f3n se ha convertido en una prioridad cr\u00edtica para las organizaciones. Las estrategias de ciberseguridad corporativa se dise\u00f1an pensando en asegurar los datos y sistemas de la organizaci\u00f3n y en evitar las brechas de seguridad que puedan propiciar un ataque que los ponga en riesgo.[\/vc_column_text][vc_button button_color=\u00bbcolor-363025″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb839369″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2024%2F10%2FWP-Q-Ciberseguridad-Individual-Personas-Relevantes.pdf|target:_blank\u00bb]Descarga Documento de Ciberseguridad Individual para Personas Relevantes[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb302036″ css=\u00bb.vc_custom_1725964605932{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb border_color_type=\u00bbuncode-palette\u00bb][vc_single_image media=\u00bb1578″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb183465″ media_width_pixel=\u00bb150″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ separator=\u00bbyes\u00bb uncode_shortcode_id=\u00bb113338″ heading_custom_size=\u00bb1.5em\u00bb]Inteligencia Artificial: El reto para la seguridad de las personas[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb136497″ text_color_type=\u00bbuncode-palette\u00bb]La irrupci\u00f3n de la inteligencia artificial ha revolucionado m\u00faltiples sectores ofreciendo beneficios significativos que nadie pone en duda. Sin embargo, como ocurre con cada nueva tecnolog\u00eda, su desarrollo tambi\u00e9n ha dado lugar a nuevas amenazas y vulnerabilidades.[\/vc_column_text][vc_button button_color=\u00bbcolor-363025″ size=\u00bblink\u00bb btn_link_underline=\u00bbbtn-underline-in\u00bb scale_mobile=\u00bbno\u00bb button_color_type=\u00bbuncode-palette\u00bb icon=\u00bbfa fa-document\u00bb uncode_shortcode_id=\u00bb120544″ link=\u00bburl:https%3A%2F%2Fenthec.com%2Fwp-content%2Fuploads%2F2024%2F10%2FWPQ-IA-y-seguridad-individual.pdf|target:_blank\u00bb]Descarga Documento de Inteligencia Artificial: El reto para la seguridad de las personas[\/vc_button][\/vc_column_inner][vc_column_inner column_width_percent=\u00bb100″ gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ expand_height=\u00bbyes\u00bb overlay_alpha=\u00bb50″ radius=\u00bbsm\u00bb preserve_border=\u00bbyes\u00bb preserve_border_mobile=\u00bbyes\u00bb border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/3″ uncode_shortcode_id=\u00bb444235″ border_color_type=\u00bbuncode-palette\u00bb][\/vc_column_inner][\/vc_row_inner][vc_single_image media=\u00bb473″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb527928″ media_width_pixel=\u00bb35″][\/vc_column][\/vc_row][vc_row row_height_percent=\u00bb85″ back_color=\u00bbcolor-xsdn\u00bb back_image=\u00bb732″ overlay_color=\u00bbcolor-xsdn\u00bb overlay_alpha=\u00bb94″ gutter_size=\u00bb6″ column_width_percent=\u00bb100″ shift_y=\u00bb0″ z_index=\u00bb0″ enable_top_divider=\u00bbdefault\u00bb top_divider=\u00bbgradient\u00bb shape_top_h_use_pixel=\u00bb\u00bb shape_top_height=\u00bb250″ shape_top_color=\u00bbcolor-xsdn\u00bb shape_top_opacity=\u00bb100″ shape_top_index=\u00bb0″ enable_bottom_divider=\u00bbdefault\u00bb bottom_divider=\u00bbgradient\u00bb shape_bottom_h_use_pixel=\u00bb\u00bb shape_bottom_height=\u00bb250″ shape_bottom_color=\u00bbcolor-xsdn\u00bb shape_bottom_opacity=\u00bb100″ shape_bottom_index=\u00bb0″ content_parallax=\u00bb0″ uncode_shortcode_id=\u00bb131288″ back_color_type=\u00bbuncode-palette\u00bb overlay_color_type=\u00bbuncode-palette\u00bb shape_top_color_type=\u00bbuncode-palette\u00bb shape_bottom_color_type=\u00bbuncode-palette\u00bb row_name=\u00bbsectores\u00bb][vc_column column_width_percent=\u00bb100″ position_vertical=\u00bbmiddle\u00bb gutter_size=\u00bb2″ overlay_alpha=\u00bb50″ shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/2″ uncode_shortcode_id=\u00bb847664″][vc_single_image media=\u00bb1033″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb937764″ media_width_pixel=\u00bb200″][vc_custom_heading text_size=\u00bbcustom\u00bb text_weight=\u00bb700″ uncode_shortcode_id=\u00bb535473″ heading_custom_size=\u00bb2.5em\u00bb]Descargables por sectores
\n(Brouchers)[\/vc_custom_heading][vc_column_text text_lead=\u00bbsmall\u00bb text_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb164315″ text_color_type=\u00bbuncode-palette\u00bb]Si quieres conocer c\u00f3mo el Riesgo Digital supone una amenaza para la viabilidad del negocio que adem\u00e1s afecta a todos los departamentos de la organizaci\u00f3n y c\u00f3mo puede ser minimizado gracias a la Cibervigilancia XTI, te lo contamos en este documento que hemos redactado espec\u00edficamente para tu sector.[\/vc_column_text][vc_row_inner row_inner_height_percent=\u00bb0″ overlay_alpha=\u00bb50″ gutter_size=\u00bb1″ shift_y=\u00bb0″ z_index=\u00bb0″ limit_content=\u00bb\u00bb uncode_shortcode_id=\u00bb112327″][vc_column_inner width=\u00bb1\/2″][uncode_list larger=\u00bbyes\u00bb icon=\u00bbfa fa-download5″ icon_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb800709″ icon_color_type=\u00bbuncode-palette\u00bb]<\/p>\n
[\/uncode_list][\/vc_column_inner][vc_column_inner width=\u00bb1\/2″][uncode_list larger=\u00bbyes\u00bb icon=\u00bbfa fa-download5″ icon_color=\u00bbcolor-jevc\u00bb uncode_shortcode_id=\u00bb839432″ icon_color_type=\u00bbuncode-palette\u00bb]<\/p>\n
[\/uncode_list][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_width_percent=\u00bb100″ position_vertical=\u00bbmiddle\u00bb gutter_size=\u00bb2″ override_padding=\u00bbyes\u00bb column_padding=\u00bb2″ overlay_color=\u00bbcolor-xsdn\u00bb overlay_alpha=\u00bb95″ border_color=\u00bbcolor-jevc\u00bb border_style=\u00bbsolid\u00bb shift_x=\u00bb0″ shift_y=\u00bb0″ shift_y_down=\u00bb0″ z_index=\u00bb0″ medium_width=\u00bb0″ mobile_width=\u00bb0″ width=\u00bb1\/2″ uncode_shortcode_id=\u00bb388420″ overlay_color_type=\u00bbuncode-palette\u00bb css=\u00bb.vc_custom_1725894573468{border-top-width: 1px !important;border-right-width: 1px !important;border-bottom-width: 1px !important;border-left-width: 1px !important;}\u00bb border_color_type=\u00bbuncode-palette\u00bb][vc_single_image media=\u00bb1033″ media_width_use_pixel=\u00bbyes\u00bb uncode_shortcode_id=\u00bb156500″ media_width_pixel=\u00bb80″][vc_custom_heading text_size=\u00bbh4″ uncode_shortcode_id=\u00bb123917″]Ap\u00fantate a nuestra Newsletter[\/vc_custom_heading]\n
<\/p>