{"id":31800,"date":"2026-02-24T08:00:19","date_gmt":"2026-02-24T07:00:19","guid":{"rendered":"https:\/\/mrknights.com\/?p=31800"},"modified":"2026-02-24T13:32:55","modified_gmt":"2026-02-24T12:32:55","slug":"que-hacer-si-sufres-un-ciberataque-comunicarlo-o-mantenerlo-en-secreto","status":"publish","type":"post","link":"https:\/\/mrknights.com\/es\/que-hacer-si-sufres-un-ciberataque-comunicarlo-o-mantenerlo-en-secreto\/","title":{"rendered":"Qu\u00e9 hacer si sufres un ciberataque: \u00bfComunicarlo o mantenerlo en secreto?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"31800\" class=\"elementor elementor-31800 elementor-31788\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67ee97fe e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"67ee97fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t<div class=\"elementor-element elementor-element-768c5548 e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"768c5548\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-31ff1cfc flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-template-post-title\" data-id=\"31ff1cfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-template-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"thegem-te-post-title\"> <h1 class=\"post-title \"> <span>Qu\u00e9 hacer si sufres un ciberataque: \u00bfComunicarlo o mantenerlo en secreto?<\/span> <\/h1> <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cba1fed flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-icon\" data-id=\"4cba1fed\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;thegem_elementor_preset&quot;:&quot;circle&quot;}\" data-widget_type=\"thegem-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"centered-box icon-inline-position\">\n\n\t\t\t\t<a role=\"button\" aria-label=\"Read more\">\n\n\t\t\t\t<div class=\"gem-icon gem-icon-pack-fontawesome gem-icon-size-small  gem-icon-shape-circle \">\n\n\t\t\t\t\n\t\t\t\t<div class=\"gem-icon-inner\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"padding-box-inner\">\n\t\t\t\t\n\n\t\t\t\t\t\t\t\t\t<span class=\"gem-icon-half-1\"><span class=\"back-angle\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-mdi mdi-checkbox-blank-circle\"><\/i>\t\t\t\t\t<\/span><\/span>\n\t\t\t\t\t<span class=\"gem-icon-half-2\"><span class=\"back-angle\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-mdi mdi-checkbox-blank-circle\"><\/i>\t\t\t\t\t<\/span><\/span>\n\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<\/div>\n\n\t\t\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32efc7f e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"32efc7f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41bde186 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"41bde186\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-41d6e126 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"41d6e126\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Experimentar un ciberataque ya no es un escenario excepcional. Las empresas, los profesionales independientes e incluso las administraciones p\u00fablicas se enfrentan cada vez m\u00e1s a incidentes de seguridad que pueden afectar los datos, las operaciones, la reputaci\u00f3n y la continuidad del negocio. <\/p><p>Ante esta situaci\u00f3n, surge una pregunta recurrente: \u00bfes mejor revelar el incidente o intentar gestionarlo de manera discreta?<\/p><p><span class=\"Apple-converted-space\"> <\/span><\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-729b3b13 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"729b3b13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>La respuesta es clara, tanto desde el punto de vista legal como desde la perspectiva de la gesti\u00f3n reputacional: ocultar un incidente rara vez protege a una organizaci\u00f3n y puede agravar seriamente sus consecuencias.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-720e7bb2 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"720e7bb2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef6d545 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"3ef6d545\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-3ef6d545\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Primer<\/span> <span class=\"thegem-heading-word\">paso:<\/span> <span class=\"thegem-heading-word\">Contener,<\/span> <span class=\"thegem-heading-word\">analizar<\/span> <span class=\"thegem-heading-word\">y<\/span> <span class=\"thegem-heading-word\">documentar<\/span><\/h2><style type=\"text\/css\">#thegem-heading-3ef6d545 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cab1cf e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"3cab1cf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-228702ab elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"228702ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Antes de cualquier comunicaci\u00f3n externa, la prioridad t\u00e9cnica es clara: contener el incidente, preservar las pruebas y evaluar su alcance. Esto implica aislar los sistemas afectados, activar los planes de respuesta, recopilar registros, identificar los vectores de ataque y determinar si se ha producido una exfiltraci\u00f3n de datos o un impacto operativo. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38a8de5a elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"38a8de5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>La documentaci\u00f3n precisa del incidente ser\u00e1 esencial tanto para la recuperaci\u00f3n t\u00e9cnica como para posibles auditor\u00edas regulatorias, reclamaciones legales o la activaci\u00f3n de p\u00f3lizas de seguro cibern\u00e9tico.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78494ed7 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"78494ed7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-7a604717 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"7a604717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-7a604717\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">El<\/span> <span class=\"thegem-heading-word\">marco<\/span> <span class=\"thegem-heading-word\">legal<\/span> <span class=\"thegem-heading-word\">europeo<\/span> <span class=\"thegem-heading-word\">y<\/span> <span class=\"thegem-heading-word\">franc\u00e9s<\/span> <span class=\"thegem-heading-word\">a<\/span> <span class=\"thegem-heading-word\">menudo<\/span> <span class=\"thegem-heading-word\">requiere<\/span> <span class=\"thegem-heading-word\">notificaci\u00f3n<\/span><\/h2><style type=\"text\/css\">#thegem-heading-7a604717 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5391939d e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"5391939d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-3d3c5d33 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"3d3c5d33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>En Europa, el Reglamento General de Protecci\u00f3n de Datos establece que cualquier violaci\u00f3n de datos personales que suponga un riesgo para los derechos y libertades de las personas debe ser notificada a la autoridad competente en un m\u00e1ximo de 72 horas desde que se tiene conocimiento del incidente. En Francia, esta autoridad es la CNIL. <\/p><p>Adem\u00e1s, la Directiva NIS2 y la legislaci\u00f3n francesa sobre seguridad de las redes y sistemas de informaci\u00f3n ampl\u00edan las obligaciones de notificaci\u00f3n a las empresas consideradas esenciales o importantes, incluidos los sectores de tecnolog\u00eda, salud, finanzas, energ\u00eda, transporte y los proveedores de servicios digitales.<\/p><p>El incumplimiento de estas obligaciones puede dar lugar a sanciones financieras significativas, auditor\u00edas obligatorias, restricciones operativas e incluso responsabilidad civil si se causa alg\u00fan da\u00f1o a terceros.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38b59ca2 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"38b59ca2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-2103f456 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"2103f456\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-2103f456\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Sanciones<\/span> <span class=\"thegem-heading-word\">por<\/span> <span class=\"thegem-heading-word\">ocultar<\/span> <span class=\"thegem-heading-word\">incidentes<\/span><\/h2><style type=\"text\/css\">#thegem-heading-2103f456 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e00c3f3 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"1e00c3f3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-640401db elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"640401db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Las sanciones var\u00edan seg\u00fan la gravedad y el tipo de infracci\u00f3n, pero en materia de protecci\u00f3n de datos pueden alcanzar porcentajes significativos de la facturaci\u00f3n anual global. M\u00e1s all\u00e1 de la multa en s\u00ed, ocultar un incidente suele da\u00f1ar la confianza de clientes, socios e inversores una vez que finalmente se conoce, lo cual ocurre con frecuencia. <\/p><p>Desde una perspectiva regulatoria, el intento de ocultamiento puede considerarse un factor agravante, especialmente si exist\u00eda la obligaci\u00f3n legal de informar o si la comunicaci\u00f3n se retras\u00f3 deliberadamente.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18f4a5c0 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"18f4a5c0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-2d60097f flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"2d60097f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-2d60097f\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Cuando<\/span> <span class=\"thegem-heading-word\">la<\/span> <span class=\"thegem-heading-word\">ley<\/span> <span class=\"thegem-heading-word\">exige<\/span> <span class=\"thegem-heading-word\">claramente<\/span> <span class=\"thegem-heading-word\">la<\/span> <span class=\"thegem-heading-word\">divulgaci\u00f3n<\/span><\/h2><style type=\"text\/css\">#thegem-heading-2d60097f {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5dc8769d e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"5dc8769d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-70747676 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"70747676\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>En t\u00e9rminos pr\u00e1cticos, existen tres escenarios principales en los que la notificaci\u00f3n suele ser obligatoria:<\/p><ul><li>Si se han visto comprometidos los datos personales de clientes, empleados o usuarios. Esto incluye filtraciones, accesos no autorizados o p\u00e9rdida de informaci\u00f3n sensible. <\/li><li>Si el ataque afecta a servicios esenciales o infraestructuras cr\u00edticas, o puede repercutir en la continuidad operativa de terceros.<\/li><li>Si existe un riesgo significativo para los derechos individuales, la reputaci\u00f3n corporativa o la estabilidad econ\u00f3mica como consecuencia del incidente.<\/li><\/ul><p>En estos casos, informar no es solo recomendable; es una obligaci\u00f3n legal.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e105ae9 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"7e105ae9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-200f12df flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"200f12df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-200f12df\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Cuando<\/span> <span class=\"thegem-heading-word\">puede<\/span> <span class=\"thegem-heading-word\">gestionarse<\/span> <span class=\"thegem-heading-word\">internamente<\/span><\/h2><style type=\"text\/css\">#thegem-heading-200f12df {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-297a9d2a e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"297a9d2a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-413bda69 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"413bda69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>No todos los incidentes requieren una divulgaci\u00f3n p\u00fablica o regulatoria. Por ejemplo, los intentos de intrusi\u00f3n bloqueados sin acceso efectivo, los incidentes internos sin exposici\u00f3n de datos o las fallas t\u00e9cnicas corregidas r\u00e1pidamente sin impacto externo pueden gestionarse dentro del marco de gesti\u00f3n de seguridad interna. <\/p><p>Aun as\u00ed, sigue siendo recomendable documentar el incidente, reforzar los controles y revisar las pol\u00edticas de seguridad para prevenir su recurrencia.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-691458c8 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"691458c8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-197fc30a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"197fc30a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-197fc30a\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Una<\/span> <span class=\"thegem-heading-word\">buena<\/span> <span class=\"thegem-heading-word\">comunicaci\u00f3n<\/span> <span class=\"thegem-heading-word\">protege<\/span> <span class=\"thegem-heading-word\">la<\/span> <span class=\"thegem-heading-word\">reputaci\u00f3n<\/span><\/h2><style type=\"text\/css\">#thegem-heading-197fc30a {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e638c12 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"5e638c12\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-73de996c elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"73de996c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Contrario a lo que muchas organizaciones creen, comunicar un incidente con transparencia controlada a menudo fortalece la credibilidad. Los clientes y socios comprenden que ning\u00fan sistema es invulnerable; lo que realmente eval\u00faan es c\u00f3mo se maneja la crisis. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35ec76e8 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"35ec76e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Una comunicaci\u00f3n clara, sin alarmismo pero honesta, combinada con medidas correctivas y un compromiso demostrado con la seguridad, puede convertir un incidente en una oportunidad para mostrar la madurez organizacional.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c495b91 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"2c495b91\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t<div class=\"elementor-element elementor-element-5f611e44 e-con-full thegem-e-con-layout-thegem e-flex elementor-invisible e-con e-child\" data-id=\"5f611e44\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;bounceInLeft&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-282efa22 e-con-full thegem-e-con-layout-thegem e-flex elementor-invisible e-con e-child\" data-id=\"282efa22\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;bounceInRight&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-374437a1 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"374437a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"thegem-heading thegem-animated-heading title-h4\" id=\"thegem-heading-374437a1\"><span class=\"colored\" style=\"color: #333333;\">Experiencia en ciberseguridad y redes<\/span> <\/span><style type=\"text\/css\">#thegem-heading-374437a1 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-138da701 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"138da701\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Somos una empresa de innovaci\u00f3n tecnol\u00f3gica especializada en ciberseguridad, redes inform\u00e1ticas y soluciones digitales avanzadas. A trav\u00e9s de auditor\u00edas, consultor\u00edas y dise\u00f1o, desarrollamos y gestionamos infraestructuras cr\u00edticas, combinando experiencia t\u00e9cnica, certificaciones internacionales y metodolog\u00edas de investigaci\u00f3n y desarrollo de vanguardia. <\/p><p>Nuestro equipo multidisciplinario integra ingenier\u00eda, an\u00e1lisis de riesgos, auditor\u00eda y desarrollo de sistemas para ofrecer soluciones integrales y adaptadas a entornos complejos. Cada proyecto se aborda con rigor t\u00e9cnico, precisi\u00f3n y un enfoque orientado a la resiliencia, la eficiencia y la seguridad operativa. <\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c2a848b e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"7c2a848b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-49c8acf5 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"49c8acf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-49c8acf5\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Preparaci\u00f3n<\/span> <span class=\"thegem-heading-word\">previa:<\/span> <span class=\"thegem-heading-word\">el<\/span> <span class=\"thegem-heading-word\">factor<\/span> <span class=\"thegem-heading-word\">diferenciador<\/span> <span class=\"thegem-heading-word\">clave<\/span><\/h2><style type=\"text\/css\">#thegem-heading-49c8acf5 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65426f13 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"65426f13\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-32388ea2 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"32388ea2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Las organizaciones que gestionan los ciberataques de manera m\u00e1s efectiva generalmente ya cuentan con:<\/p><ul><li>Planes formales de respuesta a incidentes<\/li><li>Protocolos legales y regulatorios definidos<\/li><li>Equipos t\u00e9cnicos preparados o socios especializados<\/li><li>Estrategia de comunicaci\u00f3n de crisis<\/li><li>Ejercicios de simulaci\u00f3n peri\u00f3dicos<\/li><\/ul><p>No se trata solo de prevenir los ataques, sino de estar preparados para responder de manera adecuada cuando ocurren.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12ad017 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"12ad017\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-b3aeba7 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-animated-heading\" data-id=\"b3aeba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thegem-animated-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"thegem-heading thegem-animated-heading title-h2 thegem-heading-animate lines-slide-up\" id=\"thegem-heading-b3aeba7\" data-animation-name=\"lines-slide-up\" data-animation-interval=\"80\"><span class=\"thegem-heading-word\">Conclusi\u00f3n<\/span><\/h2><style type=\"text\/css\">#thegem-heading-b3aeba7 {margin: 0;}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19de6b0 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"19de6b0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-635a740 elementor-widget__width-initial elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"635a740\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Ocultar un ciberataque rara vez es la mejor opci\u00f3n. Las regulaciones europeas y francesas exigen transparencia en muchos casos, y la experiencia demuestra que una gesti\u00f3n profesional combinada con una comunicaci\u00f3n adecuada reduce los riesgos legales, financieros y reputacionales. <\/p><p>La cuesti\u00f3n ya no deber\u00eda ser si divulgar o no, sino c\u00f3mo hacerlo correctamente, cu\u00e1ndo hacerlo y bajo qu\u00e9 estrategia para proteger tanto a la organizaci\u00f3n como a las personas afectadas.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40be805 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"40be805\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4031a5fa\" data-id=\"4031a5fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-19eb13f5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"19eb13f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5016b87\" data-id=\"5016b87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-705c53c1 elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"705c53c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"title-h6 elementor-heading-title elementor-size-default\">SUSCR\u00cdBETE A NUESTRO BOLET\u00cdN INFORMATIVO<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4502e3e2 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"4502e3e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>* Los datos personales ser\u00e1n cifrados<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-153ca151\" data-id=\"153ca151\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5415c2f2 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-mailchimp\" data-id=\"5415c2f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;submit_show_icon&quot;:&quot;yes&quot;,&quot;thegem_elementor_preset&quot;:&quot;default&quot;}\" data-widget_type=\"thegem-mailchimp.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"thegem-mailchimp wpcf7-form  form-5415c2f2 label-top\">\n\t<section id=\"yikes-mailchimp-container-1\" class=\"yikes-mailchimp-container yikes-mailchimp-container-1 \">\n\t\t\t\t<form id=\"newsletter-11-1\" class=\"yikes-easy-mc-form yikes-easy-mc-form-1 yikes-mailchimp-form-inline  newsletter-11\" method=\"POST\" data-attr-form-id=\"1\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"yikes-easy-mc-form-1-EMAIL\"  class=\"label-inline EMAIL-label yikes-mailchimp-field-required \">\n\n\t\t\t\t\t\t\t\t\t\t<!-- dictate label visibility -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<!-- Description Above -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<input id=\"yikes-easy-mc-form-1-EMAIL\"  name=\"EMAIL\"  placeholder=\"Your email address\"  class=\"yikes-easy-mc-email field-no-label\"  required=\"required\" type=\"email\"  value=\"\">\n\n\t\t\t\t\t\t\t\t\t\t<!-- Description Below -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t<!-- Honeypot Trap -->\n\t\t\t\t<input type=\"hidden\" name=\"yikes-mailchimp-honeypot\" id=\"yikes-mailchimp-honeypot-1\" value=\"\">\n\n\t\t\t\t<!-- List ID -->\n\t\t\t\t<input type=\"hidden\" name=\"yikes-mailchimp-associated-list-id\" id=\"yikes-mailchimp-associated-list-id-1\" value=\"536ba249f8\">\n\n\t\t\t\t<!-- The form that is being submitted! Used to display error\/success messages above the correct form -->\n\t\t\t\t<input type=\"hidden\" name=\"yikes-mailchimp-submitted-form\" id=\"yikes-mailchimp-submitted-form-1\" value=\"1\">\n\n\t\t\t\t<!-- Submit Button -->\n\t\t\t\t<label class=\"empty-form-inline-label submit-button-inline-label\"><span class=\"empty-label labels-hidden\">&nbsp;<\/span><button type=\"submit\" class=\"yikes-easy-mc-submit-button yikes-easy-mc-submit-button-1 btn btn-primary  gem-button\"> <span class=\"yikes-mailchimp-submit-button-span-text\"> <\/span><\/button><\/label>\t\t\t\t<!-- Nonce Security Check -->\n\t\t\t\t<input type=\"hidden\" id=\"yikes_easy_mc_new_subscriber_1\" name=\"yikes_easy_mc_new_subscriber\" value=\"3b702e4352\">\n\t\t\t\t<input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/es\/wp-json\/wp\/v2\/posts\/31800\" \/>\n\t\t\t<\/form>\n\t\t\t<!-- Mailchimp Form generated by Easy Forms for Mailchimp v6.9.0 (https:\/\/wordpress.org\/plugins\/yikes-inc-easy-mailchimp-extender\/) -->\n\n\t\t\t<\/section>\n\t<i aria-hidden=\"true\" class=\"gem-elegant arrow-carrot-right\"><\/i><\/div>\n\t\t<script>\n\t\t\t(function ($) {\n\t\t\t\t$(document).ready(function () {\n\t\t\t\t\tvar icon = $('.thegem-mailchimp.form-5415c2f2 > i').first();\n\t\t\t\t\tvar icon_svg = $('.thegem-mailchimp.form-5415c2f2 > svg').first();\n\t\t\t\t\tif (icon.length) {\n\t\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2 .yikes-easy-mc-submit-button .space, .thegem-mailchimp.form-5415c2f2 .yikes-easy-mc-submit-button i').remove();\n\t\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2 .yikes-easy-mc-submit-button').prepend('<span class=\"space\"><\/span>').prepend(icon);\n\t\t\t\t\t} else if (icon_svg.length) {\n\t\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2 .yikes-easy-mc-submit-button .space, .thegem-mailchimp.form-5415c2f2 .yikes-easy-mc-submit-button svg').remove();\n\t\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2 .yikes-easy-mc-submit-button').prepend('<span class=\"space\"><\/span>').prepend(icon_svg);\n\t\t\t\t\t}\n\t\t\t\t\tvar inputs = $('.thegem-mailchimp.form-5415c2f2 .label-inline:visible').length;\n\t\t\t\t\tif (inputs > 1) {\n\t\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2').addClass('mobile-column');\n\t\t\t\t\t}\n\n\t\t\t\t\tlabelEqualWidth();\n\t\t\t\t});\n\n\t\t\t\tfunction labelEqualWidth() {\n\t\t\t\t\tvar max_width = 0;\n\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2.label-left label span').css('width', 'auto');\n\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2.label-left label span').each(function () {\n\t\t\t\t\t\tif ($(this).width() > max_width) {\n\t\t\t\t\t\t\tmax_width = $(this).width() + 1;\n\t\t\t\t\t\t}\n\t\t\t\t\t});\n\t\t\t\t\t$('.thegem-mailchimp.form-5415c2f2.label-left label span').css('width', max_width)\n\t\t\t\t}\n\n\t\t\t\t\t\t\t})(jQuery);\n\t\t<\/script>\n\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<div class=\"elementor-element elementor-element-13f1c108 elementor-shape-rounded elementor-grid-0 e-grid-align-center flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-social-icons\" data-id=\"13f1c108\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-social-facebook-circle elementor-repeater-item-405f4b4\" href=\"https:\/\/www.facebook.com\/mr.knightsfr\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Social-facebook-circle<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-elegant social-facebook-circle\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-social-instagram-circle elementor-repeater-item-edaba3e\" href=\"http:\/\/mr_knight_s\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Social-instagram-circle<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-elegant social-instagram-circle\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-4109a2f\" href=\"https:\/\/www.linkedin.com\/company\/mr-knight-s\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t<div class=\"elementor-element elementor-element-172d7beb e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"172d7beb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t<div class=\"elementor-element elementor-element-18a6b9ef e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"18a6b9ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-692ff857 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-wp-widget-recent-comments\" data-id=\"692ff857\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-recent-comments.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5>Comentarios recientes<\/h5><ul id=\"recentcomments\"><li class=\"recentcomments\"><span class=\"comment-author-link\">Douglas<\/span> en <a href=\"https:\/\/mrknights.com\/es\/tus-datos-bancarios-pueden-haber-sido-expuestos-que-ocurrio-tras-el-acceso-a-las-cuentas-ficoba-y-como-podria-afectarte\/#comment-9\">Tus datos bancarios pueden haber sido expuestos: qu\u00e9 ocurri\u00f3 tras el acceso a las cuentas FICOBA y c\u00f3mo podr\u00eda afectarte<\/a><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26209cdd e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"26209cdd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d28e455 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent\" data-id=\"4d28e455\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-66efa83a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-styled-textbox\" data-id=\"66efa83a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;thegem_elementor_preset&quot;:&quot;basic&quot;}\" data-widget_type=\"thegem-styled-textbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-textbox styled-textbox-basic\">\n\n\t\n\t\t<div class=\"gem-textbox-top gem-textbox-top-none default-fill\">\n\t\t\t\t\t<\/div>\n\t\n\t<div class=\"gem-textbox-inner\">\n\n\t\t<div class=\"gem-textbox-content default-background icon-top gem-textbox-icon-image-wrapping-none\">\n\n\t\t\t\t\t\t\t<div class=\"gem-texbox-icon-image-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-top \">\n\t\t\t\t\t\t\t<div class=\"gem-textbox-icon\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"tgh-icon book-open\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"gem-texbox-text-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h4 class=\"gem-textbox-title title-h4 bold\">\n\t\t\t\t\t\t\tReferencias\t\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"gem-textbox-description gem-text-output\">\n\t\t\t\t\t\t\t<ol><li>Reglamento (UE) 2016\/679 del Parlamento Europeo y del Consejo. (2016). Reglamento General de Protecci\u00f3n de Datos (RGPD). Diario Oficial de la Uni\u00f3n Europea.<\/li><li>Consejo Europeo de Protecci\u00f3n de Datos. (2021). Directrices 01\/2021 sobre Ejemplos relativos a la Notificaci\u00f3n de Violaciones de Datos. CEPD. <\/li><li>Agencia de la Uni\u00f3n Europea para la Ciberseguridad (ENISA). (2021). Recomendaciones para una metodolog\u00eda de evaluaci\u00f3n de la gravedad de las violaciones de datos personales. ENISA.<\/li><li>Grupo de Trabajo del Art\u00edculo 29 sobre Protecci\u00f3n de Datos. (2018). Directrices sobre la notificaci\u00f3n de violaciones de datos personales seg\u00fan el Reglamento 2016\/679. Comisi\u00f3n Europea.<\/li><li>Directiva (UE) 2022\/2555 del Parlamento Europeo y del Consejo. (2022). Directiva sobre medidas para un alto nivel com\u00fan de ciberseguridad en toda la Uni\u00f3n (NIS2). Diario Oficial de la Uni\u00f3n Europea.<\/li><li>Agencia de la Uni\u00f3n Europea para la Ciberseguridad (ENISA). (2023). Directiva NIS2: Requisitos clave y obligaciones de notificaci\u00f3n de incidentes. ENISA.<\/li><li>Comisi\u00f3n Europea. (2022). Estrategia de Ciberseguridad y explicaci\u00f3n de la Directiva NIS2. Publicaciones de la Comisi\u00f3n Europea. <\/li><li>CNIL. (2023). Violaciones de datos personales: c\u00f3mo notificar y comunicar incidentes. Comisi\u00f3n Nacional de Inform\u00e1tica y Libertades (CNIL). <\/li><li>EDPS. (2020). Directrices sobre la protecci\u00f3n de datos personales en la gesti\u00f3n de incidentes de seguridad inform\u00e1tica. Supervisor Europeo de Protecci\u00f3n de Datos. <\/li><li>ENISA. (2024). Buenas pr\u00e1cticas para la respuesta a incidentes y la comunicaci\u00f3n de crisis en ciberseguridad. Agencia de la Uni\u00f3n Europea para la Ciberseguridad.<\/li><\/ol>\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n\t\t<div class=\"gem-textbox-bottom gem-textbox-bottom-none default-fill\">\n\t\t\t\t<\/div>\n\t\n\t\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Las grandes corporaciones, los profesionales independientes, las instituciones p\u00fablicas e incluso las peque\u00f1as empresas est\u00e1n expuestos a ciberataques. Ante esta situaci\u00f3n, surge una pregunta recurrente: \u00bfes mejor revelar el incidente o intentar gestionarlo de manera discreta? <\/p>\n","protected":false},"author":1,"featured_media":31792,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-fullwidth.php","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[121,124,749],"tags":[406,127,750,813,814,812,811,810],"class_list":{"0":"post-31800","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business-es","8":"category-ciberseguridad","9":"category-post","10":"tag-ciberataque","11":"tag-ciberseguridad","12":"tag-empresa-2","13":"tag-en-silencio","14":"tag-hacer","15":"tag-mantener","16":"tag-revelar","17":"tag-victima"},"jetpack_featured_media_url":"https:\/\/mrknights.com\/wp-content\/uploads\/2026\/02\/What-to-Do-If-You-Are-the-Victim-of-a-Cyberattack01-scaled.png","jetpack_sharing_enabled":true,"menu_order":0,"_links":{"self":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts\/31800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/comments?post=31800"}],"version-history":[{"count":8,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts\/31800\/revisions"}],"predecessor-version":[{"id":32155,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/posts\/31800\/revisions\/32155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/media\/31792"}],"wp:attachment":[{"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/media?parent=31800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/categories?post=31800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mrknights.com\/es\/wp-json\/wp\/v2\/tags?post=31800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}