{"id":76669,"date":"2026-03-19T18:00:22","date_gmt":"2026-03-19T17:00:22","guid":{"rendered":"https:\/\/www.teldat.com\/?post_type=glossary&#038;p=76669"},"modified":"2026-03-23T12:34:18","modified_gmt":"2026-03-23T11:34:18","slug":"que-es-el-phishing-tipos-tecnicas-proteccion","status":"publish","type":"glossary","link":"https:\/\/www.teldat.com\/es\/glossary\/que-es-el-phishing-tipos-tecnicas-proteccion\/","title":{"rendered":"\u00bfQu\u00e9 es el Phishing?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbGlobal CSS\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_code admin_label=\u00bbCSS + Schema\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<style>@import url('https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;600;700;800&display=swap');#btn-md span{color:#f1f6f6!important}.et-db #et-boc .et-l .et_pb_section{padding:0!important}body{font-family:'Roboto',-apple-system,BlinkMacSystemFont,sans-serif;color:#1a1625;line-height:1.75}<\/style>\n<p><script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"headline\":\"\u00bfQu\u00e9 es el Phishing? Tipos, t\u00e9cnicas y c\u00f3mo proteger tu organizaci\u00f3n\",\"description\":\"El Phishing enga\u00f1a a los usuarios para robar credenciales o instalar malware. Tipos, t\u00e9cnicas, estad\u00edsticas y protecci\u00f3n multicapa.\",\"author\":{\"@type\":\"Organization\",\"name\":\"Teldat\",\"url\":\"https:\/\/www.teldat.com\"},\"publisher\":{\"@type\":\"Organization\",\"name\":\"Teldat\",\"url\":\"https:\/\/www.teldat.com\"},\"datePublished\":\"2026-03-19\",\"dateModified\":\"2026-03-19\",\"mainEntityOfPage\":\"https:\/\/www.teldat.com\/es\/glosario\/que-es-phishing\/\",\"inLanguage\":\"es\"},{\"@type\":\"DefinedTerm\",\"name\":\"Phishing\",\"description\":\"Ingenier\u00eda social donde los atacantes enga\u00f1an para revelar credenciales o instalar malware suplantando entidades de confianza. Cibercrimen m\u00e1s reportado, 16% de brechas.\",\"inDefinedTermSet\":{\"@type\":\"DefinedTermSet\",\"name\":\"Ciberglosario Teldat\",\"url\":\"https:\/\/www.teldat.com\/es\/glosario\/\"}},{\"@type\":\"BreadcrumbList\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Teldat\",\"item\":\"https:\/\/www.teldat.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberglosario\",\"item\":\"https:\/\/www.teldat.com\/es\/glosario\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Amenazas\",\"item\":\"https:\/\/www.teldat.com\/es\/glosario\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing\",\"item\":\"https:\/\/www.teldat.com\/es\/glosario\/que-es-phishing\/\"}]},{\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"\u00bfQu\u00e9 es el Phishing?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ingenier\u00eda social suplantando entidades para robar credenciales o instalar malware. 3.400 millones de emails diarios. 16% de brechas.\"}},{\"@type\":\"Question\",\"name\":\"\u00bfTipos principales?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Email, Spear Phishing (65% \u00e9xitos), BEC (2.770M$), Vishing (+28%), Smishing (+22%), Whaling, Quishing (+25%).\"}},{\"@type\":\"Question\",\"name\":\"\u00bfC\u00f3mo evade la seguridad?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"IA, AiTM (+146%), dominios leg\u00edtimos (96%), multicanal (41%), PhaaS (+21%). 89% evaden SPF\/DKIM\/DMARC.\"}},{\"@type\":\"Question\",\"name\":\"\u00bfCu\u00e1nto cuesta?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"4,88M$ media. BEC: 2.770M$. 254 d\u00edas para identificar.\"}},{\"@type\":\"Question\",\"name\":\"\u00bfC\u00f3mo ayuda el filtrado DNS?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Bloquea phishing a nivel DNS antes de conectar. Todos los dispositivos. be.Safe essentials bloquea 95% con 84 categor\u00edas.\"}},{\"@type\":\"Question\",\"name\":\"\u00bfPhishing vs Spear Phishing?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Phishing: masivo gen\u00e9rico. Spear Phishing: dirigido y personalizado. 65% de ataques exitosos.\"}}]},{\"@type\":\"SoftwareApplication\",\"name\":\"Teldat be.Safe essentials y be.Safe Pro\",\"applicationCategory\":\"Network Security\",\"description\":\"be.Safe essentials: protecci\u00f3n DNS con 84 categor\u00edas. be.Safe Pro: NGFW con IPS, filtrado web, inspecci\u00f3n SSL para anti-phishing avanzado.\",\"provider\":{\"@type\":\"Organization\",\"name\":\"Teldat\",\"url\":\"https:\/\/www.teldat.com\"}}]}<\/script>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHero\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbHero\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-56px|||||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<div style=\"padding: 60px 24px 48px;\">\n<p><span style=\"display: inline-flex; align-items: center; gap: 8px; padding: 6px 16px; background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 100px; font-size: 0.78rem; font-weight: 600; color: #32244a; letter-spacing: 0.05em; text-transform: uppercase; margin-bottom: 24px;\">\u25cf Ciberglosario de ciberseguridad<\/span><\/p>\n<h1 style=\"font-size: clamp(2rem,5vw,3.2rem); font-weight: 800; line-height: 1.15; letter-spacing: -0.03em; color: #32244a; margin-bottom: 24px; max-width: 900px; margin-left: auto; margin-right: auto;\">\u00bfQu\u00e9 es el <span style=\"background: linear-gradient(135deg,#32244a,#4a3570); -webkit-background-clip: text; -webkit-text-fill-color: transparent; background-clip: text;\">Phishing?<\/span><\/h1>\n<p style=\"font-size: 1.15rem; line-height: 1.8; color: #4a3f5c; max-width: 900px; margin-left: auto; margin-right: auto;\">El <span style=\"color: #bea1ff;\"><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/blog\/principales-ciberataques-ciberseguridad-para-las-pymes\/\" target=\"_blank\" rel=\"noopener\"><strong style=\"font-weight: 600;\">Phishing<\/strong><\/a><\/span> es un ataque de ingenier\u00eda social donde los criminales suplantan entidades de confianza para robar credenciales, datos financieros o instalar malware. El <strong style=\"color: #1a1625; font-weight: 600;\">cibercrimen m\u00e1s reportado <\/strong>3.400 millones de emails diarios, 16% de todas las brechas. Desde estafas por email hasta Spear Phishing con IA, BEC, Vishing y Smishing, cuesta <strong style=\"color: #1a1625; font-weight: 600;\">4,88 millones $ por brecha.<\/strong> Tipos, t\u00e9cnicas, estad\u00edsticas y protecci\u00f3n con <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/blog\/web-filtering-prevencion-de-malware-peligros-de-internet\/\" target=\"_blank\" rel=\"noopener\">filtrado DNS<\/a><\/strong><\/span><strong style=\"color: #1a1625; font-weight: 600;\">, seguridad web y NGFW.<\/strong><\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbTOC\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbTOC\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-24px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div style=\"max-width: 900px; margin: 0 auto 48px; padding: 0 24px;\">\n<div style=\"display: grid; grid-template-columns: repeat(auto-fit, minmax(280px, 1fr)); gap: 12px 20px;\"><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#definicion\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">1<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Definici\u00f3n<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#tipos\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">2<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Tipos de Phishing<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#tecnicas\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">3<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">T\u00e9cnicas de evasi\u00f3n<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#impacto\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">4<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Impacto y estad\u00edsticas<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#proteccion-dns\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">5<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Filtrado DNS + web<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#defensa\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">6<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Defensa multicapa<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#teldat-proteccion\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">7<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Teldat be.Safe<\/span><\/a><a style=\"display: flex; align-items: center; gap: 10px; padding: 12px 16px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 10px; text-decoration: none; cursor: pointer;\" href=\"#faq\"><span style=\"font-family: monospace; font-size: 0.75rem; font-weight: bold; color: #32244a; background: rgba(50,36,74,0.12); width: 24px; height: 24px; border-radius: 6px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">8<\/span><span style=\"font-size: 0.9rem; font-weight: 600; color: #1a1625;\">Preguntas frecuentes &#8211; FAQ&#8217;s<\/span><\/a><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecciones 01-02&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb01 Definici\u00f3n\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-33px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"definicion\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Definici\u00f3n y \u00bfc\u00f3mo funciona?<\/h2>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">El <strong style=\"color: #1a1625; font-weight: 600;\">Phishing<\/strong> es una forma de ingenier\u00eda social donde los atacantes crean comunicaciones enga\u00f1osas emails, llamadas, SMS o sitios web falsos que aparentan proceder de una fuente leg\u00edtima para manipular a las v\u00edctimas: hacer clic en enlaces maliciosos, abrir adjuntos infectados, introducir credenciales en p\u00e1ginas falsas o transferir fondos.<\/p>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">A diferencia de ataques de fuerza bruta, el phishing <strong style=\"color: #1a1625; font-weight: 600;\">explota la confianza humana.<\/strong> M\u00e1s del 60% de las brechas involucran acciones humanas (Verizon DBIR, 2025), y el Phishing es el punto de entrada de la mayor\u00eda de campa\u00f1as de Ransomware, BEC y robo de credenciales.<\/p>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong>Mecanismo central:<\/strong> el phishing apunta al \u00fanico elemento que no se puede parchear <strong>el juicio humano.<\/strong> Un solo clic en un enlace convincente puede sortear firewalls, cifrado y MFA. La protecci\u00f3n t\u00e9cnica (filtrado DNS, seguridad web) debe complementar la formaci\u00f3n.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb02 Tipos\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-108px|||||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<div id=\"tipos\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Tipos de ataques de Phishing<\/h2>\n<div style=\"margin: 28px 0; display: flex; flex-direction: column; gap: 8px;\">\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">1<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Email Phishing<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Campa\u00f1as masivas suplantando marcas. Enlaces maliciosos (86%) o adjuntos (ZIP 62%, DOCM 16%, HTML 12%).<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">2<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Spear Phishing<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Dirigido con informaci\u00f3n personal (nombre, cargo, proyectos). 65% de todos los ataques exitosos. Investigaci\u00f3n v\u00eda LinkedIn y brechas de datos.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">3<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">BEC (Business Email Compromise)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Suplanta directivos\/proveedores. 2.770M $ p\u00e9rdidas EE.UU. (FBI 2024). 96% explot\u00f3 dominios leg\u00edtimos. 4,67M $ coste medio.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">4<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Vishing (phishing por voz)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Ataques por tel\u00e9fono con suplantaci\u00f3n de caller ID y clonaci\u00f3n de voz IA. +28% en 2024. 77% de v\u00edctimas de deepfake perdieron dinero.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">5<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Smishing (phishing por SMS)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">SMS suplantando repartos, bancos. +22% en 2024. 470M $ p\u00e9rdidas (FTC) 5\u00d7 m\u00e1s que 2020.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">6<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Whaling<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Spear Phishing dirigido a C-suite. Transferencias urgentes, documentos confidenciales. Alta autoridad = alto da\u00f1o.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">7<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Quishing (phishing por QR)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">URLs maliciosas en c\u00f3digos QR. +25% en 2024. Evade escaneo URL tradicional. El usuario no ve el destino antes de escanear.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecciones 03-04&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb03 T\u00e9cnicas\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-90px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"tecnicas\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">T\u00e9cnicas de evasi\u00f3n modernas<\/h2>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Contenido generado por IA<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">La IA crea <strong style=\"color: #1a1625; font-weight: 600;\">phishing perfecto y personalizado en segundos.<\/strong> Tiempo de creaci\u00f3n: 16 horas \u2192 5 minutos. En marzo 2025, agentes IA eran <strong style=\"color: #1a1625; font-weight: 600;\">24% m\u00e1s efectivos<\/strong> que equipos red humanos. 86% de organizaciones reportaron incidentes IA.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Ataques Adversary-in-the-Middle (AiTM)<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Interceptan <strong style=\"color: #1a1625; font-weight: 600;\">cookies de sesi\u00f3n y tokens MFA<\/strong> en tiempo real. Se dispar\u00f3 <strong style=\"color: #1a1625; font-weight: 600;\">146% en 2024.<\/strong> Hace el MFA tradicional insuficiente como defensa aislada.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Abuso de dominios leg\u00edtimos<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">El <strong style=\"color: #1a1625; font-weight: 600;\">96% del phishing empresarial<\/strong> explot\u00f3 SharePoint, Zoom, Google Docs. Evade filtros de reputaci\u00f3n porque el dominio es leg\u00edtimo.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Multicanal y PhaaS<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">41% involucran <strong style=\"color: #1a1625; font-weight: 600;\">email + tel\u00e9fono + SMS + QR.<\/strong> Kits PhaaS crecieron 21%, permitiendo a atacantes poco cualificados lanzar campa\u00f1as sofisticadas.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb04 Impacto\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-110px|||||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<div id=\"impacto\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Impacto y estad\u00edsticas<\/h2>\n<div style=\"overflow-x: auto; margin: 28px 0;\">\n<table style=\"width: 100%; border-collapse: collapse; font-size: 0.85rem; font-family: 'Roboto', sans-serif;\">\n<thead style=\"background: #f3f0fa;\">\n<tr>\n<th style=\"padding: 14px 10px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">M\u00e9trica<\/th>\n<th style=\"padding: 14px 10px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">Valor<\/th>\n<th style=\"padding: 14px 10px; text-align: left; font-weight: bold; color: #1a1625; border: 1px solid rgba(50,36,74,0.08);\">Fuente<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Emails diarios<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">3.400 millones<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">AAG 2025<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Cibercrimen n\u00ba 1<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">193.407 denuncias<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">FBI IC3 2024<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Coste brecha<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">4,88M $<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">IBM 2025<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">P\u00e9rdidas BEC<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">2.770M $<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">FBI 2024<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Incremento IA<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">+1.265%<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">SlashNext 2025<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">AiTM bypass MFA<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">+146%<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Microsoft 2024<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Evaden autenticaci\u00f3n<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">89%<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">Keepnet 2025<\/td>\n<\/tr>\n<tr style=\"background: #f3f0fa;\">\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\"><strong style=\"color: #1a1625;\">Tiempo identificar<\/strong><\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">254 d\u00edas<\/td>\n<td style=\"padding: 10px; border: 1px solid rgba(50,36,74,0.08); color: #4a3f5c;\">IBM 2024<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong>La era de la IA:<\/strong> <span style=\"color: #bea1ff;\"><a style=\"color: #bea1ff;\" href=\"https:\/\/www.securitymagazine.com\/articles\/100067-report-shows-1265-increase-in-phishing-emails-since-chatgpt-launched\" target=\"_blank\" rel=\"noopener\"><strong>el phishing se dispar\u00f3 1.265%<\/strong> desde la IA generativa.<\/a><\/span> En 2025, agentes IA eran m\u00e1s efectivos que humanos. Los filtros de email tradicionales no pueden seguir el ritmo. Defensa multicapa a nivel de <strong>DNS, web y red <\/strong>no solo la bandeja de entrada.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecciones 05-06&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb05 DNS\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-76px|||||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<div id=\"proteccion-dns\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Filtrado DNS y protecci\u00f3n web<\/h2>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u00bfC\u00f3mo el filtrado DNS detiene el phishing?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Cuando un usuario hace clic en un enlace, el dispositivo env\u00eda una <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/blog\/dynamic-dns-update\/\" target=\"_blank\" rel=\"noopener\">solicitud DNS.<\/a><\/strong><\/span> El filtrado DNS <strong style=\"color: #1a1625; font-weight: 600;\">intercepta la solicitud y comprueba contra la base de inteligencia de amenazas.<\/strong> Si es phishing\/malware\/sospechoso, se bloquea antes de que cargue. El ataque se neutraliza en el punto m\u00e1s temprano.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u00bfPor qu\u00e9 es cr\u00edtico?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Funciona en <strong style=\"color: #1a1625; font-weight: 600;\">todos los dispositivos, todas las apps, todos los protocolos <\/strong>no solo email. Bloquea enlaces de SMS, QR, chat y redes sociales. Sin agentes (BYOD, IoT, invitados). Detecta dominios reci\u00e9n registrados antes que las listas de bloqueo de email.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">El filtrado web a\u00f1ade profundidad<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Inspecci\u00f3n a nivel URL bloquea p\u00e1ginas espec\u00edficas dentro de dominios permitidos. Inspecciona contenido para formularios de robo de credenciales. <strong style=\"color: #1a1625; font-weight: 600;\">DNS + web<\/strong> = defensa por capas que atrapa lo que evade el email.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text admin_label=\u00bb06 Defensa\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-114px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"defensa\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Defensa anti-Phishing multicapa<\/h2>\n<div style=\"margin: 28px 0; display: flex; flex-direction: column; gap: 8px;\">\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">1<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Filtrado DNS (primera l\u00ednea)<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Bloquea dominios de phishing antes de conectar. 95% de amenazas. Todos los dispositivos. SMS, QR, chat, redes sociales.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">2<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Filtrado web y NGFW<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Categorizaci\u00f3n URL, IPS para kits de phishing, inspecci\u00f3n SSL, control de aplicaciones.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">3<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Seguridad de email<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">SPF\/DKIM\/DMARC (89% evadidos necesario pero insuficiente). An\u00e1lisis IA, sandboxing, reescritura de enlaces.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">4<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Control de identidad y acceso<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">MFA (FIDO2 contra AiTM), ZTNA por aplicaci\u00f3n, pol\u00edticas condicionales, m\u00ednimo privilegio.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">5<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Detecci\u00f3n XDR<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Correlaciona email, endpoints, red, nube. Detecta robo de credenciales y movimiento lateral post-phishing. Revoca sesiones.<\/div>\n<\/div>\n<\/div>\n<div style=\"display: flex; align-items: flex-start; gap: 16px; padding: 18px 24px; background: #f3f0fa; border: 1px solid rgba(50,36,74,0.08); border-radius: 12px; margin-bottom: 12px;\">\n<div style=\"font-family: monospace; font-size: 0.75rem; font-weight: 600; color: #32244a; background: rgba(50,36,74,0.08); width: 32px; height: 32px; border-radius: 8px; display: flex; align-items: center; justify-content: center; flex-shrink: 0;\">6<\/div>\n<div>\n<div style=\"font-size: 0.95rem; font-weight: bold; color: #1a1625; margin-bottom: 4px;\">Formaci\u00f3n en concienciaci\u00f3n<\/div>\n<div style=\"font-size: 0.83rem; color: #6b5f7d;\">Simulaciones de phishing, cultura de reporte. Cubrir email, vishing, smishing, QR. \u00daltima y a menudo m\u00e1s importante defensa.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecci\u00f3n 07&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb07 Teldat\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-100px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"teldat-proteccion\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Protecci\u00f3n anti-Phishing de Teldat<\/h2>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/internet-seguro-navegacion-segura-para-empresas-y-organizaciones-ciberseguridad-facil-y-sencilla\/\" target=\"_blank\" rel=\"noopener\">be.Safe essentials<\/a><\/strong><\/span>: protecci\u00f3n DNS<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Seguridad a nivel DNS que <strong style=\"color: #1a1625; font-weight: 600;\">bloquea dominios de phishing antes de la conexi\u00f3n.<\/strong> Inteligencia de amenazas BrightCloud categorizando 90% de sitios web. <strong style=\"color: #1a1625; font-weight: 600;\">95% de amenazas bloqueadas. 84 categor\u00edas en 10 familias.<\/strong> CPE-agnostic, cloud SaaS o VM. Configurable en segundos. Ideal para pymes y organizaciones distribuidas.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/seguridad-embebida-ngfw\/\" target=\"_blank\" rel=\"noopener\">be.Safe Pro<\/a><\/strong><\/span>: NGFW anti-phishing avanzado<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Inspecci\u00f3n profunda: <strong style=\"color: #1a1625; font-weight: 600;\">84 categor\u00edas de navegaci\u00f3n,<\/strong> bloqueo en tiempo real de p\u00e1ginas de phishing con ML, <strong style=\"color: #1a1625; font-weight: 600;\">IPS (15.000+ firmas),<\/strong> inspecci\u00f3n SSL, <strong style=\"color: #1a1625; font-weight: 600;\">4.000+ decodificadores de aplicaciones.<\/strong> Embebido en routers SD-WAN con ZTP. Sin appliances separados.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">Combinado con XDR y ZTNA<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/network-detection-response-xdr-deteccion-y-respuesta-de-red\/\" target=\"_blank\" rel=\"noopener\">be.Safe XDR<\/a><\/strong><\/span> detecta robo de credenciales y movimiento lateral tras phishing. <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/ztna-control-de-acceso-en-red-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\">ZTNA<\/a><\/strong><\/span> limita lo que cuentas comprometidas pueden alcanzar. Tejido anti-phishing completo de DNS a aplicaci\u00f3n a red.<\/p>\n<div style=\"background: rgba(50,36,74,0.08); border: 1px solid rgba(50,36,74,0.12); border-radius: 12px; padding: 24px 28px; margin: 24px 0;\">\n<p style=\"color: #1a1625; font-size: 0.95rem; margin: 0;\"><strong>Dos niveles:<\/strong> <strong>be.Safe essentials<\/strong> para protecci\u00f3n DNS inmediata (95%, sin agentes, todos los dispositivos). <strong>be.Safe Pro<\/strong> para NGFW empresarial con IPS, SSL y control de apps. Ambos en <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/networking-avanzado\/solucion-de-redes-avanzada-de-tecnologia-sd-wan\/\" target=\"_blank\" rel=\"noopener\">SD-WAN de Teldat<\/a><\/strong><\/span>, consola cloud \u00fanica.<\/p>\n<\/div>\n<div style=\"text-align: center; margin-top: 28px;\"><a style=\"display: inline-flex; align-items: center; gap: 8px; padding: 14px 28px; border-radius: 10px; font-size: 0.92rem; font-weight: 600; text-decoration: none; background: #32244a; color: #fff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/internet-seguro-navegacion-segura-para-empresas-y-organizaciones-ciberseguridad-facil-y-sencilla\/\" target=\"_blank\" rel=\"noopener\">Descubre be.Safe essentials \u2192<\/a><\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSecci\u00f3n 08&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bb08 FAQ\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-59px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div id=\"faq\" style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; letter-spacing: -0.02em; margin-bottom: 20px; padding-top: 20px;\">Preguntas frecuentes &#8211; FAQ&#8217;s<\/h2>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfQu\u00e9 es el Phishing?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Ingenier\u00eda social que suplanta entidades para <strong style=\"color: #1a1625; font-weight: 600;\">robar credenciales o instalar malware.<\/strong> 3.400 millones de emails diarios. 16% de brechas.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfTipos principales?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">Email, Spear Phishing<\/strong> (65% \u00e9xitos), <strong style=\"color: #1a1625; font-weight: 600;\">BEC<\/strong> (2.770M $), <strong style=\"color: #1a1625; font-weight: 600;\">Vishing<\/strong> (+28%), <strong style=\"color: #1a1625; font-weight: 600;\">Smishing<\/strong> (+22%), <strong style=\"color: #1a1625; font-weight: 600;\">Whaling, Quishing<\/strong> (+25%).<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfC\u00f3mo evade la seguridad?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">IA, <strong style=\"color: #1a1625; font-weight: 600;\">AiTM<\/strong> (+146%), dominios leg\u00edtimos (96%), multicanal (41%), PhaaS (+21%). <strong style=\"color: #1a1625; font-weight: 600;\">89% evaden SPF\/DKIM\/DMARC.<\/strong><\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfCu\u00e1nto cuesta?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\"><strong style=\"color: #1a1625; font-weight: 600;\">4,88M $<\/strong> de media. BEC: 2.770M $. <strong style=\"color: #1a1625; font-weight: 600;\">254 d\u00edas<\/strong> para identificar.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfC\u00f3mo ayuda el filtrado DNS?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Bloquea phishing a <strong style=\"color: #1a1625; font-weight: 600;\">nivel DNS antes de conectar.<\/strong> Todos los dispositivos, todas las apps. be.Safe essentials bloquea <strong style=\"color: #1a1625; font-weight: 600;\">95% de amenazas<\/strong> con 84 categor\u00edas.<\/p>\n<h3 style=\"font-size: 1.2rem; font-weight: bold; color: #1a1625; margin: 32px 0 12px;\">\u276f \u00bfPhishing vs Spear Phishing?<\/h3>\n<p style=\"color: #4a3f5c; margin-bottom: 16px;\">Phishing: <strong style=\"color: #1a1625; font-weight: 600;\">mensajes gen\u00e9ricos masivos.<\/strong> Spear Phishing: <strong style=\"color: #1a1625; font-weight: 600;\">dirigido y personalizado.<\/strong> 65% de ataques exitosos.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbCTA\u00bb _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_text admin_label=\u00bbCTA\u00bb _builder_version=\u00bb4.27.5&#8243; custom_margin=\u00bb-56px|||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<div style=\"max-width: 900px; margin: 0 auto; padding: 0 24px 64px;\">\n<div style=\"background: linear-gradient(135deg, #f3f0fa, rgba(50,36,74,0.04)); border: 1px solid rgba(50,36,74,0.08); border-radius: 20px; padding: 48px 40px; text-align: center;\">\n<h2 style=\"font-size: 1.65rem; font-weight: 800; color: #32244a; margin-bottom: 12px;\">Protege tu organizaci\u00f3n del Phishing<\/h2>\n<p style=\"max-width: 560px; margin: 0 auto 28px; color: #4a3f5c;\">be.Safe essentials bloquea phishing a nivel DNS. <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/seguridad-embebida-ngfw\/\" target=\"_blank\" rel=\"noopener\">be.Safe Pro<\/a><\/strong><\/span> a\u00f1ade <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/pasarela-web-segura-firewall-nueva-generacion-digitalizacion\/\" target=\"_blank\" rel=\"noopener\">NGFW<\/a><\/strong><\/span> con IPS, inspecci\u00f3n <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/blog\/cifrado-de-trafico-seguridad-de-las-comunicaciones-y-descifrado-ssl\/\" target=\"_blank\" rel=\"noopener\">SSL<\/a><\/strong><\/span> y filtrado web. Ambos se despliegan en minutos sobre <span style=\"color: #bea1ff;\"><strong><a style=\"color: #bea1ff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/networking-avanzado\/solucion-de-redes-avanzada-de-tecnologia-sd-wan\/\" target=\"_blank\" rel=\"noopener\">SD-WAN de Teldat.<\/a><\/strong><\/span><\/p>\n<div style=\"display: flex; justify-content: center; gap: 16px; flex-wrap: wrap;\"><a style=\"display: inline-flex; align-items: center; gap: 8px; padding: 14px 28px; border-radius: 10px; font-size: 0.92rem; font-weight: 600; text-decoration: none; background: #32244a; color: #fff;\" href=\"https:\/\/www.teldat.com\/es\/soluciones\/seguridad-de-red-saas-ciberseguridad\/internet-seguro-navegacion-segura-para-empresas-y-organizaciones-ciberseguridad-facil-y-sencilla\/\" target=\"_blank\" rel=\"noopener\">Descubre be.Safe essentials \u2192<\/a><a style=\"display: inline-flex; align-items: center; gap: 8px; padding: 14px 28px; border-radius: 10px; font-size: 0.92rem; font-weight: 600; text-decoration: none; background: transparent; color: #1a1625; border: 1px solid rgba(50,36,74,0.12);\" href=\"https:\/\/go.teldat.com\/contacto\" target=\"_blank\" rel=\"noopener\">Cont\u00e1ctanos \u2192<\/a><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Phishing enga\u00f1a a los usuarios para robar credenciales por email, tel\u00e9fono o SMS.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"glossary_category":[],"class_list":["post-76669","glossary","type-glossary","status-publish","hentry"],"acf":[],"wpml_current_locale":"es_ES","wpml_translations":[],"_links":{"self":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary\/76669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/types\/glossary"}],"version-history":[{"count":8,"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary\/76669\/revisions"}],"predecessor-version":[{"id":76843,"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary\/76669\/revisions\/76843"}],"wp:attachment":[{"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/media?parent=76669"}],"wp:term":[{"taxonomy":"glossary_category","embeddable":true,"href":"https:\/\/www.teldat.com\/es\/wp-json\/wp\/v2\/glossary_category?post=76669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}