{"id":523,"date":"2026-01-08T15:26:44","date_gmt":"2026-01-08T14:26:44","guid":{"rendered":"http:\/\/10.22.1.151\/?page_id=523"},"modified":"2026-04-22T17:13:22","modified_gmt":"2026-04-22T15:13:22","slug":"recursos","status":"publish","type":"page","link":"https:\/\/protege.unq.edu.ar\/index.php\/recursos\/","title":{"rendered":"Recursos"},"content":{"rendered":"\n<section id=\"wp-block-themeisle-blocks-advanced-columns-cd72abc2\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-flex-start has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-db994772\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h1 id=\"wp-block-themeisle-blocks-advanced-heading-3fe9f830\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-3fe9f830\">Recursos <\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-fa9ff82f\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset has-dark-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-49824021\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-73921388\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-73921388\">Multimedia<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Recursos audiovisuales orientados a la concientizaci\u00f3n y difusi\u00f3n de buenas pr\u00e1cticas en Ciberseguridad, pensados para acompa\u00f1ar a la comunidad universitaria en el uso responsable de las tecnolog\u00edas digitales.<\/p>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-55b78b58\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-center ticss-c00aadba\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-d16eef57\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"Phishing: Recepci\u00f3n del mail\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/dv6mLGev5gI?list=PLtZdcJzQRTeCJ8b_bYSnzqQm0ZzNCl6u4\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-af4a6933\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-af4a6933\">Phishing: Recepci\u00f3n del mail<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Este mail, pudo haber sido una estafa. \u00a1No hagas clic en enlaces extra\u00f1os! Antes de abrir un correo, le\u00e9 atentamente el remitente.<\/p>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-bd1b0b6b\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"Redes Sociales + Estafa Telef\u00f3nica\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/SBBqi2LaWCU?list=PLtZdcJzQRTeCJ8b_bYSnzqQm0ZzNCl6u4\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-112ba0b0\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-112ba0b0\">Redes Sociales + Estafa Telef\u00f3nica<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Esta llamada, pudo haber sido una estafa. \u00a1No brindes c\u00f3digos ni datos personales a nadie!<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-b7918b7f\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-center ticss-c00aadba\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-dfc0cde3\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"Estafa Telef\u00f3nica ATM\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/IQorrdOBXvk?list=PLtZdcJzQRTeCJ8b_bYSnzqQm0ZzNCl6u4\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-3ef8aece\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-3ef8aece\">Estafa Telef\u00f3nica ATM<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Esta transferencia, pudo haber sido una estafa. \u00a1No concurras a cajeros autom\u00e1ticos por indicaciones que te dan por tel\u00e9fono!<\/p>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-8990ff57\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"Estafa en un sorteo\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/MY1wYMyPfLg?list=PLtZdcJzQRTeCJ8b_bYSnzqQm0ZzNCl6u4\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-68a7161b\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-68a7161b\">Estafa en un sorteo<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Este premio, pudo haber sido una estafa. \u00a1No le brindes datos personales a nadie! Record\u00e1 que todas nuestras redes sociales, est\u00e1n verificados con una tilde azul.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-8e5984f0\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-9757f0af\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-4714c6c4\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-4714c6c4\">Modelo de estafas y fraudes reportados por usuari@s UNQ<\/h2>\n\n\n\n<p class=\"has-text-align-center\">En esta secci\u00f3n se presentan ejemplos de correos maliciosos reportadas por integrantes de la comunidad universitaria, con el objetivo de reconocer patrones frecuentes y fortalecer la prevenci\u00f3n.<\/p>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-709fb097\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-center ticss-c00aadba\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-8748f37a\" class=\"wp-block-themeisle-blocks-advanced-column\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/phishing.pdf\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"520\" height=\"312\" src=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/imagen-phishing-1.png\" alt=\"\" class=\"wp-image-726\" style=\"width:294px;height:auto\" srcset=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/imagen-phishing-1.png 520w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/imagen-phishing-1-300x180.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-152251ad\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-152251ad\">Intento de Phishing<\/h3>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-6beae16d\" class=\"wp-block-themeisle-blocks-advanced-column\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/fraude.pdf\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"322\" src=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/alerta-de-fraude-1.png\" alt=\"\" class=\"wp-image-728\" style=\"width:301px;height:auto\" srcset=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/alerta-de-fraude-1.png 518w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/alerta-de-fraude-1-300x186.png 300w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-35b0798b\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-35b0798b\">Intento de Fraude<\/h3>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-8a86b993\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-center ticss-c00aadba\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-5870e1ac\" class=\"wp-block-themeisle-blocks-advanced-column\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/extorsion.pdf\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"524\" height=\"327\" src=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/estafa-1.png\" alt=\"\" class=\"wp-image-730\" style=\"width:294px;height:auto\" srcset=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/estafa-1.png 524w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/estafa-1-300x187.png 300w\" sizes=\"auto, (max-width: 524px) 100vw, 524px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-18aeec7c\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-18aeec7c\">Extorsi\u00f3n<\/h3>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-eae0ebee\" class=\"wp-block-themeisle-blocks-advanced-column\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/virus-en-adjunto.pdf\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"522\" height=\"324\" src=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/virus-detectado-1.png\" alt=\"\" class=\"wp-image-732\" style=\"width:301px;height:auto\" srcset=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/virus-detectado-1.png 522w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/virus-detectado-1-300x186.png 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-8aab45f1\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-8aab45f1\">Virus en archivo adjunto<\/h3>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-ea506767\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset has-dark-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-edd8dde9\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-8f6612da\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-8f6612da\">Documentos y Gu\u00edas<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Material de consulta y descarga con recomendaciones y lineamientos b\u00e1sicos sobre Ciberseguridad en el \u00e1mbito universitario.<\/p>\n\n\n\n<div class=\"wp-block-columns has-nv-dark-bg-color has-text-color has-link-color wp-elements-22d7db5c0e180bb18c6e2bbe9b70bf19 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;font-size:13px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"border-style:none;border-width:0px;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;padding-top:0;padding-bottom:0\">\n<h3 class=\"wp-block-heading has-text-align-center has-nv-dark-bg-color has-text-color has-link-color wp-elements-5459e861c3de8e2150d9ca0d63fb1109\"><a href=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/Contrasenas-su-importancia-y-tips.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Creaci\u00f3n de contrase\u00f1as seguras<\/a><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-nv-c-2-color has-text-color has-link-color wp-elements-34926529e46d604ba69aa61a8f95cb0f is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center has-nv-dark-bg-color has-text-color has-link-color wp-elements-d9c8926b7f2ed8686185c501aadad5f7\"><a href=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/01\/Multiple-factor-de-autenticacion.pdf\" data-type=\"link\" data-id=\"http:\/\/10.22.1.151\/wp-content\/uploads\/2026\/01\/Gestionar-contrasenas-con-Bitwarden.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00faltiple Factor de Autenticaci\u00f3n &#8211; MFA<\/a><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center has-nv-dark-bg-color has-text-color has-link-color wp-elements-8fe9d2876ce86d75fadcd68b26e2cb12\"><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-a76333f7\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-b8a88d10\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-44854410\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-44854410\">Enlaces de Inter\u00e9s<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Enlaces a organismos e iniciativas externos que ofrecen informaci\u00f3n actualizada y confiable sobre Ciberseguridad.<\/p>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-c3a3fba6\" class=\"wp-block-themeisle-blocks-icon-list\">\n<div id=\"wp-block-themeisle-blocks-icon-list-item-04e781ec\" class=\"wp-block-themeisle-blocks-icon-list-item\"><i class=\"fas fa-link wp-block-themeisle-blocks-icon-list-item-icon-custom\"><\/i><p class=\"wp-block-themeisle-blocks-icon-list-item-content-custom\"><a href=\"https:\/\/www.eset.com\/ar\/password-generator\/?srsltid=AfmBOoockRGTRbf_C1HYU3vX_1AWGsZkB2d2CdoJQrR8omP9kPO6oCXH\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.eset.com\/generador de contrase\u00f1a segura<\/a><\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-ec6900ef\" class=\"wp-block-themeisle-blocks-icon-list-item\"><i class=\"fas fa-link wp-block-themeisle-blocks-icon-list-item-icon-custom\"><\/i><p class=\"wp-block-themeisle-blocks-icon-list-item-content-custom\"><a href=\"https:\/\/blog.segu-info.com.ar\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/blog.segu-info.com.ar\/<\/a><\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-15e53174\" class=\"wp-block-themeisle-blocks-icon-list-item\"><i class=\"fas fa-link wp-block-themeisle-blocks-icon-list-item-icon-custom\"><\/i><p class=\"wp-block-themeisle-blocks-icon-list-item-content-custom\"><a href=\"https:\/\/www.argentina.gob.ar\/jefatura\/innovacion-ciencia-y-tecnologia\/tics\/ciberseguridad\" target=\"_blank\" rel=\"noreferrer noopener\">argentina.gob.ar\/Ciberseguridad<\/a><\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-9e9460f7\" class=\"wp-block-themeisle-blocks-icon-list-item\"><i class=\"fas fa-link wp-block-themeisle-blocks-icon-list-item-icon-custom\"><\/i><p class=\"wp-block-themeisle-blocks-icon-list-item-content-custom\"><a href=\"https:\/\/riu.edu.ar\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/riu.edu.ar\/<\/a><\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-504471ef\" class=\"wp-block-themeisle-blocks-icon-list-item\"><i class=\"fas fa-link wp-block-themeisle-blocks-icon-list-item-icon-custom\"><\/i><p class=\"wp-block-themeisle-blocks-icon-list-item-content-custom\"><a href=\"https:\/\/www.metared.org\/ar\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.metared.org<\/a><\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-cc24d52a\" class=\"wp-block-themeisle-blocks-icon-list-item\"><i class=\"fas fa-link wp-block-themeisle-blocks-icon-list-item-icon-custom\"><\/i><p class=\"wp-block-themeisle-blocks-icon-list-item-content-custom\"><a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.incibe.es\/<\/a><\/p><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-88357565\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-center ticss-c00aadba has-dark-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-65377dfd\" class=\"wp-block-themeisle-blocks-advanced-column\"><div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/04\/protege_unq_hero_1920.jpg\" alt=\"\" class=\"wp-image-876\" style=\"aspect-ratio:1;object-fit:cover\" srcset=\"https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/04\/protege_unq_hero_1920.jpg 1920w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/04\/protege_unq_hero_1920-300x169.jpg 300w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/04\/protege_unq_hero_1920-1024x576.jpg 1024w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/04\/protege_unq_hero_1920-768x432.jpg 768w, https:\/\/protege.unq.edu.ar\/wp-content\/uploads\/2026\/04\/protege_unq_hero_1920-1536x864.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-ccb43057\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<p id=\"wp-block-themeisle-blocks-advanced-heading-fa0dd853\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-fa0dd853\">La diversidad de usuari@s, el uso intensivo de tecnolog\u00edas y la interconexi\u00f3n de plataformas hacen que el entorno universitario sea especialmente vulnerable a incidentes de seguridad. Resulta fundamental contar con medidas de prevenci\u00f3n, detecci\u00f3n y respuesta que permitan reducir riesgos y proteger a toda la comunidad acad\u00e9mica.<br><strong>\u00a1 La Ciberseguridad  en UNQ es una responsabilidad COLECTIVA !<\/strong>.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"on","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-523","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/comments?post=523"}],"version-history":[{"count":156,"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/523\/revisions"}],"predecessor-version":[{"id":910,"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/523\/revisions\/910"}],"wp:attachment":[{"href":"https:\/\/protege.unq.edu.ar\/index.php\/wp-json\/wp\/v2\/media?parent=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}