
{"id":3629,"date":"2017-02-12T21:00:09","date_gmt":"2017-02-13T00:00:09","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=3629"},"modified":"2017-02-12T21:00:09","modified_gmt":"2017-02-13T00:00:09","slug":"realizar-hacking-etico-empresa","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/","title":{"rendered":"\u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?"},"content":{"rendered":"<p>En esta oportunidad quer\u00eda compartir una de las tantas <strong>experiencias<\/strong> que nos llegan de cada cliente. En este caso, un cliente nos contact\u00f3 muy preocupado, sobre la<strong> situaci\u00f3n en la que su empresa<\/strong> se encontraba, porque estaba <strong>perdiendo dinero, clientes y imagen<\/strong>.<\/p>\n<p>[tw_video insert_type=&#8221;type_embed&#8221; video_m4v=&#8221;&#8221; video_thumb=&#8221;&#8221;]<iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/p8Z26U9tU1o?rel=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>[\/tw_video]<\/p>\n<p>Cuando conversamos en dos oportunidades, detectamos que su negocio en Internet<strong> se encontraba bajo un ataque cibern\u00e9tico que imped\u00eda<\/strong> <strong>que su negocio siga adelante<\/strong>. Por este motivo, coordinamos para poder ayudar a resolver su problema.<\/p>\n<p>Luego de firmar un<strong> convenio de confidencialidad y otros documentos legales<\/strong>, le ofrecimos 10 d\u00edas para poder realizar un ataque a su sistema en forma \u00e9tica y autorizada. Al finalizar el tiempo de auditor\u00eda<strong> detectamos todos los problemas de su negocio y le dimos recomendaciones exactas<\/strong> para que su \u00e1rea de desarrollo pueda corregir cada uno de los mismos. Posteriormente realizamos una nueva auditoria para confirmar que los problemas encontrados se hayan solucionado en forma correcta, para dar por concluido la nivelaci\u00f3n de la seguridad.<\/p>\n<p>Con este servicio <strong>el cliente pudo solucionar sus problemas<\/strong>, <strong>gener\u00f3 la conciencia<\/strong> que la <strong>seguridad inform\u00e1tica es un tema primordial en los negocios en Internet<\/strong> y las <strong>recomendaciones le ayudaron al \u00e1rea de desarrollo<\/strong> a generar sistemas en base a un an\u00e1lisis, dise\u00f1o, implementaci\u00f3n y auditor\u00eda en seguridad inform\u00e1tica para cada m\u00f3dulo de los posteriores sistemas.<\/p>\n<p>Mas Informaci\u00f3n: <a href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\">Aqu\u00ed<\/a><\/p>\n<p>Art\u00edculo de inter\u00e9s: \u201c<a href=\"https:\/\/www.talsoft-security.com\/site\/principios-defensa-informatica-empresa\/\">Principios de Defensa Inform\u00e1tica para Tu Empresa<\/a>\u201d<\/p>\n<p id=\"d812\" class=\"graf graf--p graf-after--p graf--last\"><strong class=\"markup--strong markup--p-strong\">Si quieres saber m\u00e1s sobre como proteger Tu negocio frente ataques inform\u00e1ticos, vis\u00edtanos en nuestro sitio de <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.talsoft.com.ar\" target=\"_blank\" rel=\"nofollow\" data-href=\"https:\/\/lateralview.co\/\"><strong class=\"markup--strong markup--p-strong\">Talsoft TS <\/strong><\/a><strong class=\"markup--strong markup--p-strong\">o subscr\u00edbete a nuestro <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/eepurl.com\/cq0c_j\" target=\"_blank\" rel=\"nofollow\" data-href=\"http:\/\/lateralview.us1.list-manage2.com\/subscribe?u=1bb89edb08b35c2b3aae6f015&amp;id=31ad94f616\"><strong class=\"markup--strong markup--p-strong\">Newsletter<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En esta oportunidad quer\u00eda compartir una de las tantas experiencias que nos llegan de cada cliente. En este caso, un cliente nos contact\u00f3 muy preocupado, sobre la situaci\u00f3n en la que su empresa se encontraba, porque estaba perdiendo dinero, clientes y imagen. [tw_video insert_type=&#8221;type_embed&#8221; video_m4v=&#8221;&#8221; video_thumb=&#8221;&#8221;][\/tw_video] Cuando conversamos en dos oportunidades, detectamos que su negocio [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3629","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?\",\"datePublished\":\"2017-02-13T00:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/\"},\"wordCount\":297,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2017-02-13T00:00:09+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?","datePublished":"2017-02-13T00:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/"},"wordCount":297,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/","url":"https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfPorque realizar un Hacking \u00e9tico para Tu empresa?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2017-02-13T00:00:09+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/realizar-hacking-etico-empresa\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=3629"}],"version-history":[{"count":4,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3629\/revisions"}],"predecessor-version":[{"id":3633,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3629\/revisions\/3633"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=3629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=3629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=3629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}