
{"id":697,"date":"2010-04-08T09:22:30","date_gmt":"2010-04-08T12:22:30","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=697"},"modified":"2010-04-08T09:22:30","modified_gmt":"2010-04-08T12:22:30","slug":"guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/","title":{"rendered":"Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales"},"content":{"rendered":"<div>El <a href=\"http:\/\/www.inteco.es\/Seguridad\/Observatorio\">Observatorio de la  Seguridad de la Informaci\u00f3n<\/a> del <a href=\"http:\/\/www.inteco.es\/\">Instituto  Nacional de Tecnolog\u00edas de la Comunicaci\u00f3n (INTECO)<\/a> en colaboraci\u00f3n  con la Universidad Polit\u00e9cnica de Madrid (UPM) ha publicado una serie  de 12 gu\u00edas cuyo objetivo es ayudar a los usuarios a mantener la  seguridad de sus perfiles en las principales redes sociales.<\/div>\n<div><\/div>\n<div>Estas gu\u00edas analizan cada una de las redes sociales  m\u00e1s populares en Espa\u00f1a y realizan un an\u00e1lisis estructurado en base a  los tres momentos clave en los que es posible identificar riesgos para  la seguridad y privacidad en este tipo de plataformas abiertas:<\/div>\n<ul>\n<li>\n<div><strong>Alta como usuario. <\/strong><\/div>\n<\/li>\n<li>\n<div><strong>Participaci\u00f3n en la red  social. <\/strong><\/div>\n<\/li>\n<li>\n<div><strong>Baja  del servicio.<\/strong><\/div>\n<\/li>\n<\/ul>\n<div>\n<div>La informaci\u00f3n utilizada para la  elaboraci\u00f3n de estas gu\u00edas ha sido directamente obtenida en los sitios  web de cada una de las redes sociales analizadas. Su objetivo es ayudar a  los usuarios de estos servicios, sin pretender, en ning\u00fan caso,  sustituir la informaci\u00f3n y soporte ofrecidos por parte de las propias  plataformas.<\/div>\n<\/div>\n<p>Se encuentran disponibles gu\u00edas completas para <a href=\"http:\/\/www.inteco.es\/file\/nVpd_oWQO0blBIiD4wnTxQ\"><strong>Facebook<\/strong><\/a>,  <a href=\"http:\/\/www.inteco.es\/file\/nVpd_oWQO0bCI6RE5arRRg\">Flickr<\/a>, <a href=\"http:\/\/www.inteco.es\/file\/nVpd_oWQO0ZRK6a0e7iZKg\"><strong>Linkedin<\/strong><\/a>,  <a href=\"http:\/\/www.inteco.es\/file\/0GJXYRVkJXkQdxGQyRrBjQ\">Myspace<\/a>,  <a href=\"http:\/\/www.inteco.es\/file\/0GJXYRVkJXlG7-0ggHlozQ\">Tuenti<\/a>, <a href=\"http:\/\/www.inteco.es\/file\/0GJXYRVkJXnLSDCfeJCkbA\"><strong>Twitter<\/strong><\/a> y <a href=\"http:\/\/www.inteco.es\/file\/0GJXYRVkJXls6FaJU6Kqtg\">Youtube<\/a> entre otras.<\/p>\n<div><\/div>\n<div>Fuente:\u00a0 Cryptex<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El Observatorio de la Seguridad de la Informaci\u00f3n del Instituto Nacional de Tecnolog\u00edas de la Comunicaci\u00f3n (INTECO) en colaboraci\u00f3n con la Universidad Polit\u00e9cnica de Madrid (UPM) ha publicado una serie de 12 gu\u00edas cuyo objetivo es ayudar a los usuarios a mantener la seguridad de sus perfiles en las principales redes sociales. Estas gu\u00edas analizan [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-697","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales\",\"datePublished\":\"2010-04-08T12:22:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2010-04-08T12:22:30+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales","datePublished":"2010-04-08T12:22:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/"},"wordCount":207,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/","url":"https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00edas para la configuraci\u00f3n de la privacidad y seguridad de las redes sociales","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2010-04-08T12:22:30+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/guias-para-la-configuracion-de-la-privacidad-y-seguridad-de-las-redes-sociales\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=697"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/697\/revisions"}],"predecessor-version":[{"id":698,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/697\/revisions\/698"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}