{"id":7560,"date":"2021-04-07T19:01:41","date_gmt":"2021-04-07T22:01:41","guid":{"rendered":"https:\/\/www.netqual.com.ar\/netqual\/?p=7560"},"modified":"2021-07-07T11:24:13","modified_gmt":"2021-07-07T14:24:13","slug":"ciberataques-empresas-argentina","status":"publish","type":"post","link":"https:\/\/www.netqual.com.ar\/netqual\/ciberataques-empresas-argentina\/","title":{"rendered":"Ciberataques paralizan empresas en Argentina"},"content":{"rendered":"<div id=\"dslc-theme-content\"><div id=\"dslc-theme-content-inner\"><h2>Ciberataques, una realidad en Argentina<\/h2>\n<p><span style=\"font-family: Arial, sans-serif; color: #000000;\"><span style=\"font-size: small;\">Para terminar de destruir el mito que \u201cestamos lejos del mundo y no nos va a ocurrir\u201d, algunos titulares han comunicado lo siguiente:<\/span><\/span><\/p>\n<p><span style=\"font-size: small; color: #000000;\"><span style=\"font-family: Arial, sans-serif;\"><i>Cita<\/i><\/span><span style=\"font-family: Arial, sans-serif;\"><i> textual tomada del portal minutodecierre.com (31-03-2021): <\/i><\/span><\/span><\/p>\n<blockquote><p><span style=\"font-size: small; color: #ff0000;\"><span style=\"font-family: Arial, sans-serif;\"><b>\u201cGaleno sufre un ataque inform\u00e1tico de hackers, con pedido millonario de rescate y la atenci\u00f3n de salud comprometida\u00bb<\/b><\/span><\/span><\/p><\/blockquote>\n<p><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><span style=\"color: #3a3a3a;\">\u00abLa propia p\u00e1gina web de la tercera prepaga del pa\u00eds admite dificultades t\u00e9cnicas. Se habla de un ataque al estilo \u00abransomware\u00bb: encriptaci\u00f3n de datos y pedido de un rescate millonario. El problema ya afecta la atenci\u00f3n de la salud por parte de Galeno.\u201d\u00a0<\/span><\/span><\/span><em><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><span style=\"color: #3a3a3a;\">F<\/span><span style=\"color: #3a3a3a;\">in de la cita textual.<\/span><\/span><\/span><\/em><\/p>\n<h2>Esquemas de defensas, a veces no suficientes<\/h2>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Los esquemas b\u00e1sicos de seguridad se asemejan a una antigua fortaleza donde el Castillo (la red interna) tiene defensas perimetrales, un <a href=\"https:\/\/www.netqual.com.ar\/netqual\/wp-content\/uploads\/2021\/04\/castledrawing.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-7565 alignleft\" src=\"https:\/\/www.netqual.com.ar\/netqual\/wp-content\/uploads\/2021\/04\/castledrawing-300x158.jpg\" alt=\"\" width=\"300\" height=\"158\" srcset=\"https:\/\/www.netqual.com.ar\/netqual\/wp-content\/uploads\/2021\/04\/castledrawing-300x158.jpg 300w, https:\/\/www.netqual.com.ar\/netqual\/wp-content\/uploads\/2021\/04\/castledrawing.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>mecanismo de detecci\u00f3n y alerta m\u00e1s una acci\u00f3n de respuesta. <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">En el caso puntual que mencionamos al inicio, estamos frente a<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> un ataque \u201ccl\u00e1sico\u201d de <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">r<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ansomware, donde el ingreso al \u201cCastillo\u201d <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">se logra por fuerza bruta sobre<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">acceso<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">s<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> remoto<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">s,<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> por alguna \u201cpuerta trasera\u201d en alg\u00fan dispositivo \u00f3 por alg\u00fan \u201cclick\u201d indebido de un usuario desprevenido luego de una <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">actividad de <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ingenier\u00eda social <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">previa<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Pero hay algo m\u00e1s para sumar. Hace algunas semanas vivimos<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> un ataque <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">muy particular<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> a un cliente nuestro. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Espec\u00edficamente <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">a<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> su servidor de oficina dado que los <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">servicios de ERP actual<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">es<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> est\u00e1n alojados en VPSs en la nube <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y bajos los esquemas mixtos <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">de seguridad<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Es decir fue un ataque muy parcial, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que no logr\u00f3 su objetivo<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> y acotado por la segmentaci\u00f3n <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">implementada<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">E<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">l <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">cliente <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">en cuesti\u00f3n<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> observ\u00f3 algo extra\u00f1o <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">en <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">algunos <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">archivos PDFs que hab\u00edan cambiado su extensi\u00f3n. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">N<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">o d\u00e1bamos cr\u00e9dito de lo que estaba pasando. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Un<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> ataque DIRIGIDO a una Pyme, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">con el prop\u00f3sito de encriptar<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> archivos <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y extorsionar<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">P<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">rimer caso, para nosotros, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">teniendo en cuenta <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">la gran mayor\u00eda de los ataques no se inicia en forma dirigida y se encuentran rastros de intentos por \u201cfuerza bruta\u201d <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y en modalidad \u201cal voleo\u201d<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Ingresaron con una <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">p<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ass<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">word<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> de un usuario que estaba de vacaciones usando <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">el <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">v\u00ednculo de VPN <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">al primer intento<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">plantaron un script que encriptaba archivos de base de datos. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Todo <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">hecho en forma burda, en media hora de trabajo, pero efectivo. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Fracasaron en su objetivo <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">porque no accedieron al sistema actual <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">(no contaban con informaci\u00f3n actualizada)<\/span><\/span><\/span> <span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y lo poco que encriptaron fue revertido.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">En nuestros monitores, h<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ace tiempo que venimos observando cientos de ataques <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que no llegan a su objetivo<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> y en algunos casos nos llamaba la atenci\u00f3n e<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">l<\/span><\/span><\/span> <span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u201cmodus operandi\u201d. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Formas, horarios, secuencias, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">demasiado estudiadas, demasiado precisas<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Este planteo excede la<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> combinaci\u00f3n de<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> un <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">bot <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que busque vulnerabilidades<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> m\u00e1s un malware <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que haga su trabajo<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. El <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">bot <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> el <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">virus <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">son facilitadores<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">La acci\u00f3n <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">en muchos casos <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">se <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">complementa <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y completa<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> con acci\u00f3n directa; <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">en algunos casos un hacker toma el control y dirige u opera en forma directa<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Esa es nuestra premisa. <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">H<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ay otra estad\u00edstica que venimos observando; <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">qu<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ienes fueron atacados <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> pagaron el rescate, en un porcentaje muy alto, son atacados nuevamente.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Es decir, nuestro antiguo dec\u00e1logo de seguridad, publicado en otra entrada del blog, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">debe ser complementado con nuevos <a href=\"https:\/\/www.netqual.com.ar\/netqual\/wp-content\/uploads\/2021\/04\/insider-t.jpg\"><img loading=\"lazy\" class=\" wp-image-7566 alignright\" src=\"https:\/\/www.netqual.com.ar\/netqual\/wp-content\/uploads\/2021\/04\/insider-t.jpg\" alt=\"\" width=\"257\" height=\"144\" \/><\/a> conceptos de seguridad<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">E<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">l <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">concepto de<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> enemigo INTERNO <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">lleg\u00f3 a la Pyme <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y ya no se trata solamente de un usuario confundido por un email bien hecho y dirigido<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Est<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">as acciones<\/span><\/span><\/span> <span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">se ve\u00eda<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">n<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> s\u00f3lo en las grandes corporaciones <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">d<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">onde se compite por secretos industriales, patentes, licitaciones multimillonarias, clientes cautivos de servicios, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">relaciones con gobiernos<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> etc. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">No m\u00e1s; realizar un ataque es cada vez m\u00e1s econ\u00f3mico y cualquier suma de dinero es importante.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">N<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">o hay \u201c<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">castillo\u201d<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> que resista un ataque, si el frente interno es d\u00e9bil. <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Muchos puntos a observar. A<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">cceso wireless, passwords anotadas en cualquier lado, passwords \u201cprestadas\u201d; <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">es lo m\u00e1s obvio. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Pero hay mucho m\u00e1s&#8230;<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u00bfPens\u00f3 en un<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> candidato <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que se postula <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">para<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> ingresar a <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">la <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">empresa? <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Nos han comentado de casos que interceptan las comunicaciones de entrevistas laborales y ofrecen a los candidatos \u201c<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">permeables\u201d <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">mucho dinero por, por ejemplo conectar un <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">dispositivo <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">en cualquier PC interna <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">o realizar alguna acci\u00f3n espec\u00edfica <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">(piense en los casos cuando se facilita una PC \u00f3 acceso a extra\u00f1os sin tomar los recaudos de seguridad)<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Un visitante inescrupuloso,<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">un empleado que durante a\u00f1os sum\u00f3 rencores y acumul\u00f3 informaci\u00f3n <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">d<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">e su empresa \u00f3 simplemente un empleado fiel que es usado en forma inconsciente por un tercero<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Todo individuo puede <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ser <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">vector<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> de un ataque.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Las grandes corporaciones y las multinacionales tienen esto claro. Las Pymes <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">y no tan Pymes como el caso inicial planteado, suelen ver estas realidades como ajenas o lejanas, ese es el error y se encuentran varios pasos detr\u00e1s.<\/span><\/span><\/span><\/p>\n<h2>Ampliando Conceptos<\/h2>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">A<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">l dec\u00e1logo de seguridad <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que planteamos hace un tiempo, donde se remarca <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">que la seguridad est\u00e1 en todos los niveles de la red principalmente:<\/span><\/span><\/span><strong><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> R<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">outer\/Firewall\/Soft de Seguridad+Antivirus\/Switches\/Accesos WiFi\/Accesos Remotos\/Terminales<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">,\/<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">VLANs\/VPNs\/Servidores <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">virtualizados en ambientes mixtos<\/span><\/span><\/span><\/strong><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">;<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">hay que sumarle nuevas acciones bajo esta perspectiva y trabajar con el <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">principio denominado&#8230;<\/span><\/span><\/span><\/p>\n<blockquote>\n<pre><strong><span style=\"color: #339966;\">\u201c<span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Seguridad de Confianza Cero\u201d<\/span><\/span><\/span><\/strong><\/pre>\n<\/blockquote>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Es decir, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">dar por sentado que un ataque puede venir tanto del exterior de la empresa como del interior, por lo tanto se elimina la relaci\u00f3n de \u201cconfianza\u201d de usuarios y dispositivos por el simple hecho de estar del lado interno <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">de la red local<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Nadie es confiable hasta que <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">se verifique<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Trabaja con dos elementos que se adicionan a los criterios antes mencionados: <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">1) <b>M<\/b><b>icrosegmentaci\u00f3n.<\/b> Es algo que ya hacemos, pero que hay que llevarlo al m\u00e1ximo. Distintos servidores y distintos sectores para distintas aplicaciones o servicios. Un acceso remoto debe ser un servicio aparte que no es el mismo que maneja el motor de bases de datos, que no es el mismo que maneja archivos, ni es el mismo que maneja las listas de accesos y no es ni cerca el mismo en que se hace backup y adem\u00e1s que los backup est\u00e9n en distintos niveles y sectores y lugares\u2026 y etc. etc. etc. Es llevar ese concepto a la m\u00e1xima expresi\u00f3n.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">2) <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><b>Validaci\u00f3n Multifactor.<\/b><\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> Todos los usuarios internos o externos, deben validar por m\u00e1s de un <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">medios su identidad. El m\u00e1s com\u00fan es con dos factores, es d<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">e<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">cir, adem\u00e1s del usuario y password, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">por ejemplo, <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">se env\u00eda un c\u00f3digo por otro medio (habitualmente el tel\u00e9fono celular registrado) que tiene una validez de pocos minutos. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Tal como<\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> hoy en d\u00eda usan muchas empresas, especialmente los Bancos. <\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Estos criterios, son aplicados tanto a usuarios externos como INTERNOS. <\/span><\/span><\/span><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">La defensa de nuestros datos es una ciencia din\u00e1mica y debe ser tratada en forma integral.<\/span><\/span><\/span><\/p>\n<pre><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><b>La informaci\u00f3n es el activo m\u00e1s valioso de una empresa y...\r\n...no se suele invertir lo necesario en cuidarlo.\r\n<\/b><\/span><\/span><\/span><\/pre>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><b>Cont\u00e1ctenos:<\/b><\/span><\/span><\/span><\/p>\n<p><span style=\"color: #3a3a3a;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><b><a href=\"https:\/\/www.netqual.com.ar\/netqual\/contacto\/\">https:\/\/www.netqual.com.ar\/netqual\/contacto\/<\/a><br \/>\n<\/b><\/span><\/span><\/span><\/p>\n<p><a href=\"http:\/\/www.netqual.biz\">http:\/\/www.netqual.biz<\/a><\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>La informaci\u00f3n es el activo m\u00e1s valioso de una empresa y no se suele invertir lo necesario en cuidarlo. Gerenciamiento de Redes y Sistemas. Seguridad Integral para la Pyme.<\/p>\n","protected":false},"author":3,"featured_media":7561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[22,10,13],"tags":[28,4,27,80,18,55],"_links":{"self":[{"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/posts\/7560"}],"collection":[{"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/comments?post=7560"}],"version-history":[{"count":8,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/posts\/7560\/revisions"}],"predecessor-version":[{"id":7564,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/posts\/7560\/revisions\/7564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/media\/7561"}],"wp:attachment":[{"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/media?parent=7560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/categories?post=7560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netqual.com.ar\/netqual\/wp-json\/wp\/v2\/tags?post=7560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}