{"id":16835,"date":"2024-01-10T13:36:22","date_gmt":"2024-01-10T12:36:22","guid":{"rendered":"https:\/\/www.abd.es\/?p=16835"},"modified":"2024-01-10T13:37:40","modified_gmt":"2024-01-10T12:37:40","slug":"ciberseguridad-basica-en-pymes","status":"publish","type":"post","link":"https:\/\/www.abd.es\/en\/2024\/01\/ciberseguridad-basica-en-pymes\/","title":{"rendered":"Protect Your Business: Basic Cybersecurity Strategies for SMEs"},"content":{"rendered":"<h2><\/h2>\n<h2><b>Increase in Cyberattacks on SMEs<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p class=\"translation-block\"><span style=\"font-weight: 400\">Every month, every week, every day we hear about <\/span><b>large-scale attacks on major corporations to try to gain access to their systems<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data theft, identity usurpation, ransomware infection are surely<a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/docs\/guia-ciberataques\/osi-guia-ciberataques.pdf\" target=\"_blank\" rel=\"noopener\"> the most heard of and known cyberattacks<\/a>. These attacks that become public do so because they are more striking, affect a large number of users, and cause huge losses.\u00a0<\/span><\/p>\n<p class=\"translation-block\"><span style=\"font-weight: 400\">However, <\/span><strong>no<\/strong><b>, just because we are an SME doesn't mean we will be exempt from these attacks and attempts to steal and usurp our data and identities.<\/b><\/p>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3><b>Impact on Business Continuity<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">We all want our companies to be as productive as possible and to grow in billing and offerings to our clients, but as the company grows, it starts to attract attention for both good and bad reasons.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on various reports, it can be extrapolated that<\/span><a href=\"https:\/\/www.hiscox.es\/sites\/spain\/files\/2023-10\/22594%20-%20Cyber%20Readiness%20Report%202023%20-%20Spanish.pdf\" target=\"_blank\" rel=\"noopener\"><b> 43% of SMEs will be targets of cyberattacks and it is estimated that 60% of these attacked SMEs will have to close.<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">These are alarming figures, but no matter how small the company is, it can be a target for cybercriminals and severely affect our activity.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-16843 size-full\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web1.png\" alt=\"An\u00e1lisis de tr\u00e1fico en el firewall para fortalecer la seguridad de la PYME.\" width=\"1018\" height=\"626\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web1.png 1018w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web1-300x184.png 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web1-768x472.png 768w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web1-640x394.png 640w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>\u00a0<\/strong><\/h2>\n<h2><strong>Cybersecurity Challenges in SMEs<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Faced with this scenario, a key cybersecurity objective for SMEs is to prevent attackers from reaching the core of our company and being able to halt its operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To achieve this, we must undertake a securitization of our systems covering everything they could attack: our email, the DNS layer, devices, etc.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Risks of Excessive Accumulation of Security Technologies<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Another aspect to analyze is the issue of accumulating deployed security technologies against cyberattacks.<\/span><\/p>\n<p><strong>Sometimes quantity is not synonymous with success. Having the right tools to protect ourselves and face the attacks we may suffer is what matters.\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">An accumulation of security technologies can cause management problems and leave open gaps that cybercriminals can exploit. In addition, each new technology requires spending on personnel for its management, services and licenses, and adaptation of our company's users' work to these new measures.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-16844 size-full\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web2.png\" alt=\"Medidas de seguridad esenciales para la protecci\u00f3n completa de la red y dispositivos de la PYME\" width=\"764\" height=\"426\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web2.png 764w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web2-300x167.png 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web2-640x357.png 640w\" sizes=\"(max-width: 764px) 100vw, 764px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><b>Evolution of the Protection Scope (Remote Work, Personal Devices)<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In addition, the area to protect is becoming increasingly extensive. We work from home, use mobile devices from anywhere, and even work with devices owned by the users themselves, without clear security measures established.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another element to consider is the concept of shadow IT, that is, all those applications and connection elements that escape the security measures established by the company.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.abd.es\/en\/2023\/11\/ciberhigiene-previene-el-99-de-los-ciberataques-2\/\" target=\"_blank\" rel=\"noopener\"><em>Also read: Cyberhygiene prevents 99% of cyberattacks<\/em><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Cybersecurity Strategies for SMEs<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Faced with this scenario, the main objective is to reduce the attack surface that can be targeted by cybercriminals.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Try to concentrate appropriate security measures that focus on what we really want to protect: the company's data, prevent their leakage, protect user identities, and detect and respond effectively to possible cyberattacks, whatever their destination.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All this oriented toward protecting intellectual property, reducing compromised data, protecting financial assets, and preserving the company's reputation.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Effective Cybersecurity Measures for SMEs<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In short, to effectively protect our company, we can follow these measures:<\/span><\/p>\n<ul>\n<li><b>Analyze and review incoming and outgoing Firewall traffic<\/b><span style=\"font-weight: 400;\">. For this, we need qualified personnel who can interpret and understand this data.<\/span><\/li>\n<li><b>Know the new threats we face and take action against them. <\/b><span style=\"font-weight: 400;\">Stay up to date with daily publications that alert us to these updates.<\/span><\/li>\n<li><b>Keep devices and operating systems updated with security patches, as well as the security devices we use and the applications used by users.<\/b><\/li>\n<li><b>Raise user awareness about possible cyberattacks and train them to be active first-level security agents<\/b><span style=\"font-weight: 400;\">. They should be able to detect and respond to any suspicion of an attack.<\/span><\/li>\n<li><b>Have a data protection tool in case of loss during a cyberattack.<\/b><\/li>\n<li><b>Have knowledge of additional security measures that can extend security in our SME<\/b><span style=\"font-weight: 400;\"> and reduce the attack surface.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"wp-image-16845 size-full aligncenter\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web3.png\" alt=\"Seguridad B\u00e1sica en las PYMES\" width=\"905\" height=\"600\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web3.png 905w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web3-300x199.png 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web3-768x509.png 768w, https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/web3-640x424.png 640w\" sizes=\"(max-width: 905px) 100vw, 905px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2><b>Types of Network Cybersecurity Necessary for SMEs<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The above should lead us inescapably to consider the following types of network security:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Access and identity control.<\/b><span style=\"font-weight: 400;\"> It is necessary to give each user and each device access only to what they really need.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Secure applications.<\/b><span style=\"font-weight: 400;\"> Correct vulnerabilities in corporate applications by keeping them updated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Antivirus and antimalware system.<\/b><span style=\"font-weight: 400;\"> It must not only detect malware when they start working, but also be able to detect it if they remain in our systems for a time before functioning.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data security and loss prevention<\/b><span style=\"font-weight: 400;\">. Avoid, as much as possible, our users sending confidential information outside that they shouldn't. This is achieved with DLP (Data Loss Prevention) tools.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Analysis of strange behavior<\/b><span style=\"font-weight: 400;\">. Analyze and alert about behaviors that deviate from the norm.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email security<\/b><span style=\"font-weight: 400;\">. It is one of the most used means by cybercriminals to deceive users and obtain valuable information or entry points to our organization.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Presence of a Firewall.<\/b><span style=\"font-weight: 400;\"> They establish a barrier between the intranet and the internet so that incoming communication is filtered and selected through rules and access lists.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mobile device security<\/b><span style=\"font-weight: 400;\">. Having control over these devices can prevent data and identity compromise.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>VPN. <\/b><span style=\"font-weight: 400;\">Establishing a secure connection that our users make from the internet prevents unauthorized access to our network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Web security and wireless networks.<\/b><span style=\"font-weight: 400;\"> Protecting our own web and defining the security of our wireless networks are other aspects to consider.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">\u00a0<\/span><\/h3>\n<h3><b>Importance of Integrated and Appropriate Measures for SMEs<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p class=\"translation-block\"><span style=\"font-weight: 400\">As we have developed in this article, there are many aspects to take into account to protect in our network in order to <\/span><b>avoid being attacked; and in case we are, the damages caused are minimal possible. <\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is necessary to have several cybersecurity measures but always appropriate and well integrated into our systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Measures that allow users to continue their work without interruption, but that protect their data and identity, and that even if we are attacked, we can have an adequate response and the damage caused is minimal.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>ABD's Commitment to Cybersecurity and Business Continuity<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p class=\"translation-block\"><span style=\"font-weight: 400\"><a href=\"https:\/\/www.abd.es\/en\/auditoria-seguridad-informatica\/\" target=\"_blank\" rel=\"noopener\">At ABD we know about security, and we protect the continuity of your business<\/a> so that it is not affected by a cyberattack. <\/span><\/p>\n<p class=\"translation-block\"><span style=\"font-weight: 400\">If you want more information about these concepts and how to defend yourself <a href=\"https:\/\/www.abd.es\/en\/contacto\/\" target=\"_blank\" rel=\"noopener\">don't hesitate to contact us through our usual channels and we will help you.<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Aumento de ciberataques a PYMES &nbsp; Todos los meses, todas la semanas, todos lo d\u00edas nos enteramos de ataques a gran escala a grandes corporaciones para intentar obtener acceso a los sistemas de estas empresas.\u00a0 Robo de datos, usurpaci\u00f3n de identidades, infecci\u00f3n por RansomWare seguramente sean los ciberataques m\u00e1s o\u00eddos y conocidos. Estos ataques que [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":16847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[79],"tags":[1698,1308,1327,120,861,423],"class_list":["post-16835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos","tag-ciberamenaza","tag-ciberataques","tag-ciberseguridad","tag-microsoft","tag-microsoft-365","tag-pymes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Estrategias de Ciberseguridad b\u00e1sicas para PYMES<\/title>\n<meta name=\"description\" content=\"Ciberseguridad basica en PYMES: estrategias para securizar y asegurar la continuidad del negocio ante ataques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abd.es\/en\/2024\/01\/ciberseguridad-basica-en-pymes\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estrategias de Ciberseguridad b\u00e1sicas para PYMES\" \/>\n<meta property=\"og:description\" content=\"Ciberseguridad basica en PYMES: estrategias para securizar y asegurar la continuidad del negocio ante ataques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abd.es\/en\/2024\/01\/ciberseguridad-basica-en-pymes\/\" \/>\n<meta property=\"og:site_name\" content=\"ABD Consultora Inform\u00e1tica\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/abdconsultoria\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-10T12:36:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-10T12:37:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/principal.png\" \/>\n\t<meta property=\"og:image:width\" content=\"395\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fernando Mu\u00f1oz Moreno\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mu\u00f1oz Moreno\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/\"},\"author\":{\"name\":\"Fernando Mu\u00f1oz Moreno\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/person\\\/db56eb8260452cc4eeb73bb62d8780ef\"},\"headline\":\"Protege tu empresa: Estrategias de Ciberseguridad b\u00e1sicas para PYMES\",\"datePublished\":\"2024-01-10T12:36:22+00:00\",\"dateModified\":\"2024-01-10T12:37:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/\"},\"wordCount\":1277,\"publisher\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/principal.png\",\"keywords\":[\"ciberamenaza\",\"Ciberataques\",\"Ciberseguridad\",\"Microsoft\",\"Microsoft 365\",\"Pymes\"],\"articleSection\":[\"Articulos\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/\",\"url\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/\",\"name\":\"Estrategias de Ciberseguridad b\u00e1sicas para PYMES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/principal.png\",\"datePublished\":\"2024-01-10T12:36:22+00:00\",\"dateModified\":\"2024-01-10T12:37:40+00:00\",\"description\":\"Ciberseguridad basica en PYMES: estrategias para securizar y asegurar la continuidad del negocio ante ataques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/principal.png\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/principal.png\",\"width\":395,\"height\":220,\"caption\":\"Seguridad B\u00e1sica en las PYMES\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2024\\\/01\\\/ciberseguridad-basica-en-pymes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.abd.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protege tu empresa: Estrategias de Ciberseguridad b\u00e1sicas para PYMES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#website\",\"url\":\"https:\\\/\\\/www.abd.es\\\/\",\"name\":\"ABD Consultora Inform\u00e1tica\",\"description\":\"Soluciones Empresariales | Microsoft Gold Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.abd.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\",\"name\":\"ABD Consultora Inform\u00e1tica\",\"url\":\"https:\\\/\\\/www.abd.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/cropped-consultoria-informatica-11.png\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/cropped-consultoria-informatica-11.png\",\"width\":64,\"height\":64,\"caption\":\"ABD Consultora Inform\u00e1tica\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abd-consultor-a-y-soluciones-inform-ticas\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/person\\\/db56eb8260452cc4eeb73bb62d8780ef\",\"name\":\"Fernando Mu\u00f1oz Moreno\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/185578ecae5ff5e686843da96bfc1b35.jpg?ver=1778008924\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/185578ecae5ff5e686843da96bfc1b35.jpg?ver=1778008924\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/185578ecae5ff5e686843da96bfc1b35.jpg?ver=1778008924\",\"caption\":\"Fernando Mu\u00f1oz Moreno\"},\"description\":\"Como Director de Sistemas en ABD Consultor\u00eda y Soluciones Inform\u00e1ticas, mi misi\u00f3n es brindar soluciones tecnol\u00f3gicas avanzadas y seguras para nuestros clientes. Con m\u00e1s de dos d\u00e9cadas de experiencia en ciberseguridad y certificaciones como Cybersecurity Architect Expert de Microsoft y Microsoft 365 Certified: Security Administrator Associate, estoy comprometido a garantizar la protecci\u00f3n de los datos empresariales.\",\"sameAs\":[\"https:\\\/\\\/www.abd.es\\\/\",\"https:\\\/\\\/www.facebook.com\\\/abdconsultoria\",\"linkedin.com\\\/in\\\/fernando-mu\u00f1oz-moreno-b0835a4b\"],\"url\":\"https:\\\/\\\/www.abd.es\\\/en\\\/author\\\/fernandomm\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estrategias de Ciberseguridad b\u00e1sicas para PYMES","description":"Ciberseguridad basica en PYMES: estrategias para securizar y asegurar la continuidad del negocio ante ataques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abd.es\/en\/2024\/01\/ciberseguridad-basica-en-pymes\/","og_locale":"en_GB","og_type":"article","og_title":"Estrategias de Ciberseguridad b\u00e1sicas para PYMES","og_description":"Ciberseguridad basica en PYMES: estrategias para securizar y asegurar la continuidad del negocio ante ataques.","og_url":"https:\/\/www.abd.es\/en\/2024\/01\/ciberseguridad-basica-en-pymes\/","og_site_name":"ABD Consultora Inform\u00e1tica","article_author":"https:\/\/www.facebook.com\/abdconsultoria","article_published_time":"2024-01-10T12:36:22+00:00","article_modified_time":"2024-01-10T12:37:40+00:00","og_image":[{"width":395,"height":220,"url":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/principal.png","type":"image\/png"}],"author":"Fernando Mu\u00f1oz Moreno","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mu\u00f1oz Moreno","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#article","isPartOf":{"@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/"},"author":{"name":"Fernando Mu\u00f1oz Moreno","@id":"https:\/\/www.abd.es\/#\/schema\/person\/db56eb8260452cc4eeb73bb62d8780ef"},"headline":"Protege tu empresa: Estrategias de Ciberseguridad b\u00e1sicas para PYMES","datePublished":"2024-01-10T12:36:22+00:00","dateModified":"2024-01-10T12:37:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/"},"wordCount":1277,"publisher":{"@id":"https:\/\/www.abd.es\/#organization"},"image":{"@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/principal.png","keywords":["ciberamenaza","Ciberataques","Ciberseguridad","Microsoft","Microsoft 365","Pymes"],"articleSection":["Articulos"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/","url":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/","name":"Estrategias de Ciberseguridad b\u00e1sicas para PYMES","isPartOf":{"@id":"https:\/\/www.abd.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#primaryimage"},"image":{"@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/principal.png","datePublished":"2024-01-10T12:36:22+00:00","dateModified":"2024-01-10T12:37:40+00:00","description":"Ciberseguridad basica en PYMES: estrategias para securizar y asegurar la continuidad del negocio ante ataques.","breadcrumb":{"@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#primaryimage","url":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/principal.png","contentUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/01\/principal.png","width":395,"height":220,"caption":"Seguridad B\u00e1sica en las PYMES"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abd.es\/2024\/01\/ciberseguridad-basica-en-pymes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.abd.es\/"},{"@type":"ListItem","position":2,"name":"Protege tu empresa: Estrategias de Ciberseguridad b\u00e1sicas para PYMES"}]},{"@type":"WebSite","@id":"https:\/\/www.abd.es\/#website","url":"https:\/\/www.abd.es\/","name":"ABD IT Consulting","description":"Business Solutions | Microsoft Gold Partner","publisher":{"@id":"https:\/\/www.abd.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abd.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.abd.es\/#organization","name":"ABD IT Consulting","url":"https:\/\/www.abd.es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.abd.es\/wp-content\/uploads\/2023\/09\/cropped-consultoria-informatica-11.png","contentUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2023\/09\/cropped-consultoria-informatica-11.png","width":64,"height":64,"caption":"ABD Consultora Inform\u00e1tica"},"image":{"@id":"https:\/\/www.abd.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/abd-consultor-a-y-soluciones-inform-ticas\/"]},{"@type":"Person","@id":"https:\/\/www.abd.es\/#\/schema\/person\/db56eb8260452cc4eeb73bb62d8780ef","name":"Fernando Mu\u00f1oz Moreno","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/185578ecae5ff5e686843da96bfc1b35.jpg?ver=1778008924","url":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/185578ecae5ff5e686843da96bfc1b35.jpg?ver=1778008924","contentUrl":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/185578ecae5ff5e686843da96bfc1b35.jpg?ver=1778008924","caption":"Fernando Mu\u00f1oz Moreno"},"description":"As the Systems Director at ABD Consulting and IT Solutions, my mission is to deliver advanced and secure technological solutions for our clients. With more than two decades of experience in cybersecurity and certifications such as Microsoft Cybersecurity Architect Expert and Microsoft 365 Certified: Security Administrator Associate, I am committed to ensuring the protection of corporate data.","sameAs":["https:\/\/www.abd.es\/","https:\/\/www.facebook.com\/abdconsultoria","linkedin.com\/in\/fernando-mu\u00f1oz-moreno-b0835a4b"],"url":"https:\/\/www.abd.es\/en\/author\/fernandomm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/16835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/comments?post=16835"}],"version-history":[{"count":0,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/16835\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/media\/16847"}],"wp:attachment":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/media?parent=16835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/categories?post=16835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/tags?post=16835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}