
{"id":3706,"date":"2017-03-17T11:15:13","date_gmt":"2017-03-17T14:15:13","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=3706"},"modified":"2017-03-20T16:13:35","modified_gmt":"2017-03-20T19:13:35","slug":"vida-digital-esta-siendo-vigilada","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/","title":{"rendered":"Tu vida digital est\u00e1 siendo vigilada"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3721 alignleft\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-400x285.png\" alt=\"\" width=\"320\" height=\"228\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-400x285.png 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-300x214.png 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-768x547.png 768w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-1024x729.png 1024w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-260x185.png 260w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920.png 1920w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/>Con el uso de redes sociales, del smartphone y distintas apps,<strong> Tu vida pas\u00f3 a ser vigilada<\/strong>. Conocen todos tus movimientos, tu patr\u00f3n digital (huella digital) y tus gustos y preferencias m\u00e1s que ti mismo.<\/p>\n<p>En el caso de <strong>Facebook<\/strong>, se est\u00e1 convirtiendo en un <strong>Gran Hermano Mundial<\/strong>, por un lado interesante y por otro muy peligroso, cuando los datos son utilizados para fines no \u00e9ticos.\u00a0 Seg\u00fan\u00a0<a href=\"https:\/\/es-la.facebook.com\/help\/769828729705201\/\" target=\"_blank\" rel=\"noopener noreferrer\">explica<\/a>\u00a0la propia red social, &#8220;<em>tus preferencias de anuncios se basan en la informaci\u00f3n que compartiste con Facebook, las p\u00e1ginas que te gustan o en las que participas, los anuncios en los que haces clic, las aplicaciones que usas, los sitios web que visitas, y la informaci\u00f3n de nuestros proveedores de datos y anunciantes<\/em>&#8220;.<\/p>\n<p><em>Y esto lo sabe porque <strong>Usted se lo comparte,<\/strong> en cada publicaci\u00f3n en la red, en la forma que<strong> utiliza la plataforma<\/strong>, en los<strong> clics que realiza<\/strong>,<strong> en la forma que utiliza <\/strong>su<strong> tel\u00e9fono m\u00f3vil (huella digital)<\/strong>, <strong>mientras duerme, mientras se mueve diariamente<\/strong>, y <strong>su ubicaci\u00f3n geolocalizada<\/strong>.<\/em><\/p>\n<p>&#8220;Teniendo entre <strong>100 y 250 likes tuyos en Facebook<\/strong>, se <strong>puede predecir tu orientaci\u00f3n sexual, tu origen \u00e9tnico, tus opiniones religiosas y pol\u00edticas, tu nivel de inteligencia y de felicidad, si usas drogas, si tus pap\u00e1s son separados o no<\/strong>. Con <strong>150 likes<\/strong>, los algoritmos pueden <strong>predecir el resultado de tu test de personalidad mejor que tu pareja<\/strong>. Y con <strong>250 likes, mejor que t\u00fa mismo<\/strong>. Este estudio lo hizo Kosinski en Cambridge&#8221; fuente: <a href=\"http:\/\/www.theclinic.cl\/2017\/01\/19\/martin-hilbert-experto-redes-digitales-obama-trump-usaron-big-data-lavar-cerebros\/\">Aqu\u00ed<\/a><\/p>\n<p>Por estos motivos, vivimos en una \u00e9poca que toda<strong> est\u00e1 informaci\u00f3n esta siendo almacenada, analizada y vendida<\/strong> para usarse de diferentes formas, desde que una<strong> empresa quiere conocer<\/strong> los gustos y movimientos de sus <strong>clientes<\/strong> hasta <strong>acciones que permiten imponer una ideolog\u00eda en una sociedad<\/strong> con el fin de obtener un beneficio.<\/p>\n<p>[tw_video insert_type=&#8221;type_embed&#8221; video_m4v=&#8221;&#8221; video_thumb=&#8221;&#8221;]<iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/b9Qhl94MVFI?rel=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>[\/tw_video]<\/p>\n<p><strong>Se recomienda<\/strong> <strong>tener cuidado en el uso de las redes sociales<\/strong>, las <strong>publicaciones<\/strong>, las<strong> fotos personales y\/o familiares<\/strong>, y participaci\u00f3n de sorteos de regalos. Tambi\u00e9n en el<strong> uso de tu smarpthone<\/strong>, <strong>verificar de los permisos que requiere una aplicaci\u00f3n<\/strong> en el momento de instalar, <strong>no compartir tu ubicaci\u00f3n, no habilitar el bluetooth<\/strong> sin no es necesario, y<strong> solo descargar aplicaciones de fuentes confiables<\/strong>.<\/p>\n<p>Hasta el pr\u00f3ximo cap\u00edtulo&#8230;<\/p>\n<p>Fuente: <a href=\"https:\/\/actualidad.rt.com\/actualidad\/232936-imperio-facebook-red-social-poder\">https:\/\/actualidad.rt.com\/actualidad\/232936-imperio-facebook-red-social-poder <\/a><\/p>\n<p><strong class=\"markup--strong markup--p-strong\">Si quieres saber m\u00e1s sobre como proteger Tu negocio frente ataques inform\u00e1ticos, vis\u00edtanos en nuestro sitio de <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.talsoft.com.ar\" target=\"_blank\" rel=\"nofollow\" data-href=\"https:\/\/lateralview.co\/\"><strong class=\"markup--strong markup--p-strong\">Talsoft TS <\/strong><\/a><strong class=\"markup--strong markup--p-strong\">o subscr\u00edbete a nuestro <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/eepurl.com\/cq0c_j\" target=\"_blank\" rel=\"nofollow\" data-href=\"http:\/\/lateralview.us1.list-manage2.com\/subscribe?u=1bb89edb08b35c2b3aae6f015&amp;id=31ad94f616\"><strong class=\"markup--strong markup--p-strong\">Newsletter<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Con el uso de redes sociales, del smartphone y distintas apps, Tu vida pas\u00f3 a ser vigilada. Conocen todos tus movimientos, tu patr\u00f3n digital (huella digital) y tus gustos y preferencias m\u00e1s que ti mismo. En el caso de Facebook, se est\u00e1 convirtiendo en un Gran Hermano Mundial, por un lado interesante y por otro [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3706","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu vida digital est\u00e1 siendo vigilada<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Tu vida digital est\u00e1 siendo vigilada\",\"datePublished\":\"2017-03-17T14:15:13+00:00\",\"dateModified\":\"2017-03-20T19:13:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/\"},\"wordCount\":434,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-400x285.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu vida digital est\u00e1 siendo vigilada\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-400x285.png\",\"datePublished\":\"2017-03-17T14:15:13+00:00\",\"dateModified\":\"2017-03-20T19:13:35+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920.png\",\"width\":1920,\"height\":1367},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu vida digital est\u00e1 siendo vigilada","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Tu vida digital est\u00e1 siendo vigilada","datePublished":"2017-03-17T14:15:13+00:00","dateModified":"2017-03-20T19:13:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/"},"wordCount":434,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-400x285.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/","url":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu vida digital est\u00e1 siendo vigilada","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920-400x285.png","datePublished":"2017-03-17T14:15:13+00:00","dateModified":"2017-03-20T19:13:35+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/vida-digital-esta-siendo-vigilada\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/03\/big-data-1667212_1920.png","width":1920,"height":1367},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=3706"}],"version-history":[{"count":12,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3706\/revisions"}],"predecessor-version":[{"id":3733,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/3706\/revisions\/3733"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=3706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=3706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=3706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}