{"id":3292,"date":"2022-10-31T15:50:21","date_gmt":"2022-10-31T20:50:21","guid":{"rendered":"https:\/\/colombiainteligente.org\/?p=3292"},"modified":"2022-12-12T15:51:17","modified_gmt":"2022-12-12T20:51:17","slug":"guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens","status":"publish","type":"post","link":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/","title":{"rendered":"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3292\" class=\"elementor elementor-3292\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79148795 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79148795\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ece4ebf\" data-id=\"1ece4ebf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a61c7e5 elementor-widget elementor-widget-text-editor\" data-id=\"7a61c7e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Para ayudar a los usuarios p\u00fablicos y privados y a los ciudadanos a proteger sus datos frente a las crecientes amenazas de violaci\u00f3n, esta gu\u00eda presenta diversas ciberamenazas. Cubre, en particular: ataques de ingenier\u00eda social, ataques de phishing, descargas drive by, ataques Man-in-the-Middle (MITM), ataques USB drop y malware.<\/p><p>It explains how cybersecurity threats that affect an individual can in turn affect an entire organization or government, and in doing so helps the users protect themselves, their personal data and the systems in which they work.<\/p><p>Para leer m\u00e1s ingrese a:<\/p><p><a href=\"https:\/\/dcaf.ch\/guidebook-cyber-threats\">https:\/\/dcaf.ch\/guidebook-cyber-threats<\/a><\/p><p><a href=\"https:\/\/dcaf.ch\/sites\/default\/files\/publications\/documents\/GuidebookCyberThreats_EN_web.pdf\">https:\/\/dcaf.ch\/sites\/default\/files\/publications\/documents\/GuidebookCyberThreats_EN_web.pdf<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div style=\"text-align:center\" class=\"yasr-auto-insert-visitor\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Para ayudar a los usuarios p\u00fablicos y privados y a los ciudadanos a proteger sus datos frente a las crecientes amenazas de violaci\u00f3n, esta gu\u00eda presenta diversas ciberamenazas. Cubre, en particular: ataques de ingenier\u00eda social, ataques de phishing, descargas drive by, ataques Man-in-the-Middle (MITM), ataques USB drop y malware. <\/p>","protected":false},"author":23,"featured_media":3217,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[55,53],"tags":[],"class_list":["post-3292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalizacion","category-tendencias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens - Colombia Inteligente<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens - Colombia Inteligente\" \/>\n<meta property=\"og:description\" content=\"Para ayudar a los usuarios p\u00fablicos y privados y a los ciudadanos a proteger sus datos frente a las crecientes amenazas de violaci\u00f3n, esta gu\u00eda presenta diversas ciberamenazas. Cubre, en particular: ataques de ingenier\u00eda social, ataques de phishing, descargas drive by, ataques Man-in-the-Middle (MITM), ataques USB drop y malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/\" \/>\n<meta property=\"og:site_name\" content=\"Colombia Inteligente\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-31T20:50:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-12T20:51:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"280\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:site\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/\"},\"author\":{\"name\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/e207145d548b75a6d339ff1d4d3b0432\"},\"headline\":\"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens\",\"datePublished\":\"2022-10-31T20:50:21+00:00\",\"dateModified\":\"2022-12-12T20:51:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/\"},\"wordCount\":128,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg\",\"articleSection\":[\"Digitalizaci\u00f3n\",\"Tendencias\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/\",\"name\":\"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens - Colombia Inteligente\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg\",\"datePublished\":\"2022-10-31T20:50:21+00:00\",\"dateModified\":\"2022-12-12T20:51:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#primaryimage\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg\",\"width\":280,\"height\":400,\"caption\":\"Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/colombiainteligente.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"name\":\"Colombia Inteligente\",\"description\":\"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano\",\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/colombiainteligente.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\",\"name\":\"Colombia Inteligente\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"width\":588,\"height\":274,\"caption\":\"Colombia Inteligente\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/colombiaintelig\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/colombiainteligente\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/e207145d548b75a6d339ff1d4d3b0432\",\"name\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"caption\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\"},\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/es_co\\\/author\\\/difusioncolombiainteligente-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens - Colombia Inteligente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/","og_locale":"es_ES","og_type":"article","og_title":"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens - Colombia Inteligente","og_description":"Para ayudar a los usuarios p\u00fablicos y privados y a los ciudadanos a proteger sus datos frente a las crecientes amenazas de violaci\u00f3n, esta gu\u00eda presenta diversas ciberamenazas. Cubre, en particular: ataques de ingenier\u00eda social, ataques de phishing, descargas drive by, ataques Man-in-the-Middle (MITM), ataques USB drop y malware.","og_url":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/","og_site_name":"Colombia Inteligente","article_published_time":"2022-10-31T20:50:21+00:00","article_modified_time":"2022-12-12T20:51:17+00:00","og_image":[{"width":280,"height":400,"url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg","type":"image\/jpeg"}],"author":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","twitter_card":"summary_large_image","twitter_creator":"@colombiaintelig","twitter_site":"@colombiaintelig","twitter_misc":{"Escrito por":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","Tiempo estimado de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#article","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/"},"author":{"name":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/e207145d548b75a6d339ff1d4d3b0432"},"headline":"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens","datePublished":"2022-10-31T20:50:21+00:00","dateModified":"2022-12-12T20:51:17+00:00","mainEntityOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/"},"wordCount":128,"commentCount":0,"publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg","articleSection":["Digitalizaci\u00f3n","Tendencias"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/","url":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/","name":"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens - Colombia Inteligente","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#primaryimage"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg","datePublished":"2022-10-31T20:50:21+00:00","dateModified":"2022-12-12T20:51:17+00:00","breadcrumb":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#primaryimage","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg","width":280,"height":400,"caption":"Guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/colombiainteligente.org\/tendencias\/guidebook-on-cyber-threats-identifying-and-combatting-risks-to-public-and-private-sector-users-and-citizens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/colombiainteligente.org\/"},{"@type":"ListItem","position":2,"name":"Guidebook on cyber threats: identifying and combatting risks to public and private sector users and citizens"}]},{"@type":"WebSite","@id":"https:\/\/colombiainteligente.org\/#website","url":"https:\/\/colombiainteligente.org\/","name":"Colombia Inteligente","description":"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano","publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colombiainteligente.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/colombiainteligente.org\/#organization","name":"Colombia Inteligente","url":"https:\/\/colombiainteligente.org\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","width":588,"height":274,"caption":"Colombia Inteligente"},"image":{"@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/colombiaintelig","https:\/\/www.linkedin.com\/company\/colombiainteligente\/"]},{"@type":"Person","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/e207145d548b75a6d339ff1d4d3b0432","name":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","caption":"DIFUSI\u00d3N COLOMBIA INTELIGENTE"},"url":"https:\/\/colombiainteligente.org\/es_co\/author\/difusioncolombiainteligente-org\/"}]}},"yasr_visitor_votes":{"number_of_votes":0,"sum_votes":0,"stars_attributes":{"read_only":false,"span_bottom":false}},"_links":{"self":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/3292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/comments?post=3292"}],"version-history":[{"count":4,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/3292\/revisions"}],"predecessor-version":[{"id":3296,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/3292\/revisions\/3296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media\/3217"}],"wp:attachment":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media?parent=3292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/categories?post=3292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/tags?post=3292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}