
{"id":671,"date":"2010-01-28T09:17:58","date_gmt":"2010-01-28T12:17:58","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=671"},"modified":"2010-01-28T09:17:58","modified_gmt":"2010-01-28T12:17:58","slug":"10-consejos-para-asegurar-al-sector-publico","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/","title":{"rendered":"10 consejos para asegurar al sector p\u00fablico"},"content":{"rendered":"<p>Aquellos que trabajan en el sector p\u00fablico necesitan abordar problemas de seguridad claves si quieren evitar costosas brechas que impacten tanto las finanzas como la reputaci\u00f3n.<\/p>\n<p>El error humano es considerado la causa m\u00e1s probable de las brechas de seguridad, pero estas pueden evitarse si hay pol\u00edticas de seguridad y de administraci\u00f3n establecidas, y se siguen. Network Box le da 10 recomendaciones para las mejores pr\u00e1cticas en la seguridad del sector p\u00fablico.<br \/>\n<a name=\"more\"><\/a><br \/>\n1. Asegurarse que los sistemas est\u00e1n actualizados y emparchados. Tener alguna forma de monitoreo de esta funci\u00f3n cr\u00edtica para asegurarse que sucede.<\/p>\n<p>2. Recordar que la seguridad es m\u00e1s que solo el correo. El firewall, la detecci\u00f3n y prevenci\u00f3n de intrusos, las pol\u00edticas de acceso y de VPNs son todos elementos cr\u00edticos de la seguridad.<\/p>\n<p>3. Revisar que aplicaciones y sistemas son usados en la organizaci\u00f3n como parte de ISO9001 o al menos trimestralmente.<\/p>\n<p>4. Asegurarse que todos los datos son enviados a trav\u00e9s de los canales apropiados y que nada elude los sistemas de seguridad (esta es una de las causas m\u00e1s comunes de las vulnerabilidades).<\/p>\n<p>5. Educar a los empleados &#8211; mantenerlos informados respecto de su rol para mantener segura la informaci\u00f3n y limitar los permisos de acceso.<\/p>\n<p>6. Usar una VPN segura para los trabajadores remotos, de modo que la informaci\u00f3n no salga de los servidores seguros.<\/p>\n<p>7. No permitir que los empleados descarguen nada que no est\u00e9 aprobado por el equipo de seguridad, como por ejemplo programas P2P.<\/p>\n<p>8. Cifrar toda la informaci\u00f3n y usar contrase\u00f1as seguras en los dispositivos m\u00f3viles y laptops.<\/p>\n<p>9. Verificar todo lo que sale y entra para detectar posibles fugas de datos.<\/p>\n<p>10. Considerar el costo total de propiedad de ejecutar los sistemas de seguridad. Un servicio administrado por un especialista puede recudir los costos entre un 20 y un 40 por ciento.<\/p>\n<p>Simon Heron, Analista de Seguridad de Network Box, dice: &#8220;Hemos vistos varias brechas de seguridad en el sector p\u00fablico de alto perfil en los \u00faltimos a\u00f1os, la mayor\u00eda de las cuales han sido evitables. Naturalmente, el error humano nunca podr\u00e1 ser erradicado totalmente, pero se pueden fijar pautas y procedimientos para minimizar el riesgo que esto representa a la seguridad de la informaci\u00f3n. Tambi\u00e9n estamos viendo moverse al sector p\u00fablico de ser una ambiente cerrado hacia uno m\u00e1s en linea, que tiene un riesgo mayor de cibercr\u00edmen.<\/p>\n<p><strong>Traducci\u00f3n: Ra\u00fal Batista &#8211; <a href=\"http:\/\/www.segu-info.com.ar\/\">Segu-info<\/a><\/strong><br \/>\nFuente: <strong><a href=\"http:\/\/www.net-security.org\/secworld.php?id=8759\">Help Net Security<\/a>\u00a0y Segu-Info<\/strong><\/p>\n<p><a rel=\"cc:attributionURL\" href=\"http:\/\/blog.segu-info.com.ar\/\"><img decoding=\"async\" src=\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\" alt=\"Creative Commons License\" \/><\/a><br \/>\n<a rel=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.5\/ar\/\">Creative Commons Atribuci\u00f3n-No Comercial-Compartir Obras Derivadas Igual 2.5<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aquellos que trabajan en el sector p\u00fablico necesitan abordar problemas de seguridad claves si quieren evitar costosas brechas que impacten tanto las finanzas como la reputaci\u00f3n. El error humano es considerado la causa m\u00e1s probable de las brechas de seguridad, pero estas pueden evitarse si hay pol\u00edticas de seguridad y de administraci\u00f3n establecidas, y se [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-671","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - 10 consejos para asegurar al sector p\u00fablico<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"10 consejos para asegurar al sector p\u00fablico\",\"datePublished\":\"2010-01-28T12:17:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/\"},\"wordCount\":438,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - 10 consejos para asegurar al sector p\u00fablico\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"datePublished\":\"2010-01-28T12:17:58+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage\",\"url\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"contentUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 10 consejos para asegurar al sector p\u00fablico","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"10 consejos para asegurar al sector p\u00fablico","datePublished":"2010-01-28T12:17:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/"},"wordCount":438,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/","url":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 10 consejos para asegurar al sector p\u00fablico","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","datePublished":"2010-01-28T12:17:58+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/10-consejos-para-asegurar-al-sector-publico\/#primaryimage","url":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","contentUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=671"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/671\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}