{"id":20044,"date":"2021-04-20T10:46:09","date_gmt":"2021-04-20T08:46:09","guid":{"rendered":"https:\/\/www.hst.cat\/cyberseguretat\/"},"modified":"2023-09-26T12:32:43","modified_gmt":"2023-09-26T10:32:43","slug":"ciberseguridad-webminar","status":"publish","type":"page","link":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/","title":{"rendered":"Webminar Ciberseguridad"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<div class=\"column_filters\"><div class=\"blog_wrapper isotope_wrapper clearfix\"><div class=\"posts_group lm_wrapper element_classes col-2 grid hide-more\"><article class=\"post post-item isotope-item clearfix category-68 post-20441 type-post status-publish format-standard has-post-thumbnail hentry category-ciberseguridad\" style=\"\"><div class=\"date_label\">12 de julio de 2021<\/div><div class=\"image_frame post-photo-wrapper scale-with-grid image\"><div class=\"image_wrapper\"><a href=\"https:\/\/www.hst.cat\/es\/entrevistes\/\"><div class=\"mask\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"750\" src=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/radioentrevistesokcastella-FILEminimizer.jpg?resize=960%2C750&amp;ssl=1\" class=\"scale-with-grid wp-post-image\" alt=\"\" data-attachment-id=\"20443\" data-permalink=\"https:\/\/www.hst.cat\/es\/entrevistes\/radioentrevistesokcastella-fileminimizer\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/radioentrevistesokcastella-FILEminimizer.jpg?fit=1145%2C768&amp;ssl=1\" data-orig-size=\"1145,768\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"radioentrevistesokcastella (FILEminimizer)\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/radioentrevistesokcastella-FILEminimizer.jpg?fit=1024%2C687&amp;ssl=1\" \/><\/a><div class=\"image_links double\"><a class=\"zoom \"  rel=\"prettyphoto\" href=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/radioentrevistesokcastella-FILEminimizer.jpg?fit=1024%2C687&#038;ssl=1\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><circle cx=\"11.35\" cy=\"11.35\" r=\"6\" class=\"path\"><\/circle><line x1=\"15.59\" y1=\"15.59\" x2=\"20.65\" y2=\"20.65\" class=\"path\"><\/line><\/svg><\/a><a class=\"link \"  href=\"https:\/\/www.hst.cat\/es\/entrevistes\/\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><g><path d=\"M10.17,8.76l2.12-2.12a5,5,0,0,1,7.07,0h0a5,5,0,0,1,0,7.07l-2.12,2.12\" class=\"path\"><\/path><path d=\"M15.83,17.24l-2.12,2.12a5,5,0,0,1-7.07,0h0a5,5,0,0,1,0-7.07l2.12-2.12\" class=\"path\"><\/path><line x1=\"10.17\" y1=\"15.83\" x2=\"15.83\" y2=\"10.17\" class=\"path\"><\/line><\/g><\/svg><\/a><\/div><\/div><\/div><div class=\"post-desc-wrapper bg- has-custom-bg\" style=\"\"><div class=\"post-desc\"><div class=\"post-head\"><\/div><div class=\"post-title\"><h2 class=\"entry-title \" itemprop=\"headline\"><a href=\"https:\/\/www.hst.cat\/es\/entrevistes\/\">Ciclo entrevistas sobre ciberseguridad para pymes \u00abAqu\u00ed, a l&#8217;Oest\u00bb<\/a><\/h2><\/div><div class=\"post-excerpt\">En este post puede seguir el ciclo de entrevistas realizadas a Jordi Rabinat, nuestro CEO, sobre diferentes aspectos de ciberseguridad para Pymes, dentro del programa de<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/div><\/div><\/div><\/article><article class=\"post post-item isotope-item clearfix category-68 post-20098 type-post status-publish format-standard has-post-thumbnail hentry category-ciberseguridad\" style=\"\"><div class=\"date_label\">26 de abril de 2021<\/div><div class=\"image_frame post-photo-wrapper scale-with-grid image\"><div class=\"image_wrapper\"><a href=\"https:\/\/www.hst.cat\/es\/entrevista-ciberseguridad\/\"><div class=\"mask\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"750\" src=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/ENTREVISTA_DIARI_DE_NIT_Moment1.jpg?resize=960%2C750&amp;ssl=1\" class=\"scale-with-grid wp-post-image\" alt=\"Entrevista Ciberseguretat\" srcset=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/ENTREVISTA_DIARI_DE_NIT_Moment1.jpg?resize=960%2C750&amp;ssl=1 960w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/ENTREVISTA_DIARI_DE_NIT_Moment1.jpg?zoom=2&amp;resize=960%2C750&amp;ssl=1 1920w\" sizes=\"auto, (max-width:767px) 480px, (max-width:960px) 100vw, 960px\" data-attachment-id=\"20096\" data-permalink=\"https:\/\/www.hst.cat\/es\/entrevista-ciberseguridad\/entrevista_diari_de_nit_moment1-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/ENTREVISTA_DIARI_DE_NIT_Moment1.jpg?fit=1920%2C1080&amp;ssl=1\" data-orig-size=\"1920,1080\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1619113413&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ENTREVISTA_DIARI_DE_NIT_Moment1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/ENTREVISTA_DIARI_DE_NIT_Moment1.jpg?fit=1024%2C576&amp;ssl=1\" \/><\/a><div class=\"image_links double\"><a class=\"zoom \"  rel=\"prettyphoto\" href=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/ENTREVISTA_DIARI_DE_NIT_Moment1.jpg?fit=1024%2C576&#038;ssl=1\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><circle cx=\"11.35\" cy=\"11.35\" r=\"6\" class=\"path\"><\/circle><line x1=\"15.59\" y1=\"15.59\" x2=\"20.65\" y2=\"20.65\" class=\"path\"><\/line><\/svg><\/a><a class=\"link \"  href=\"https:\/\/www.hst.cat\/es\/entrevista-ciberseguridad\/\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><g><path d=\"M10.17,8.76l2.12-2.12a5,5,0,0,1,7.07,0h0a5,5,0,0,1,0,7.07l-2.12,2.12\" class=\"path\"><\/path><path d=\"M15.83,17.24l-2.12,2.12a5,5,0,0,1-7.07,0h0a5,5,0,0,1,0-7.07l2.12-2.12\" class=\"path\"><\/path><line x1=\"10.17\" y1=\"15.83\" x2=\"15.83\" y2=\"10.17\" class=\"path\"><\/line><\/g><\/svg><\/a><\/div><\/div><\/div><div class=\"post-desc-wrapper bg- has-custom-bg\" style=\"\"><div class=\"post-desc\"><div class=\"post-head\"><\/div><div class=\"post-title\"><h2 class=\"entry-title \" itemprop=\"headline\"><a href=\"https:\/\/www.hst.cat\/es\/entrevista-ciberseguridad\/\">Entrevista a Jordi Rabinat, CEO de HST, a LleidaTV sobre ciberseguridad<\/a><\/h2><\/div><div class=\"post-excerpt\">Nuestro CEO, Jordi Rabinat, en una entrevista en Diari de Nit de Lleida Tv, comparti\u00f3 con todos nosotros consejos y recomendaciones de ciberseguridad dirigidos a pymes.<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/div><\/div><\/div><\/article><article class=\"post post-item isotope-item clearfix category-68 category-24 category-2 category-19 post-19655 type-post status-publish format-standard has-post-thumbnail hentry category-ciberseguridad category-general-es category-general-sin-categoria category-seguridad-informatica\" style=\"\"><div class=\"date_label\">2 de marzo de 2021<\/div><div class=\"image_frame post-photo-wrapper scale-with-grid image\"><div class=\"image_wrapper\"><a href=\"https:\/\/www.hst.cat\/es\/webinar-ciberataques-y-seguridad-informatica-para-pymes\/\"><div class=\"mask\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=960%2C540&amp;ssl=1\" class=\"scale-with-grid wp-post-image\" alt=\"Cieberatacs i seguretat inform\u00e0tica\" srcset=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=800%2C450&amp;ssl=1 800w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=260%2C146&amp;ssl=1 260w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=50%2C28&amp;ssl=1 50w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?resize=133%2C75&amp;ssl=1 133w\" sizes=\"auto, (max-width:767px) 480px, (max-width:960px) 100vw, 960px\" data-attachment-id=\"19653\" data-permalink=\"https:\/\/www.hst.cat\/es\/webinar-ciberataques-y-seguridad-informatica-para-pymes\/miniatura-webinar-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?fit=960%2C540&amp;ssl=1\" data-orig-size=\"960,540\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"miniatura webinar\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?fit=960%2C540&amp;ssl=1\" \/><\/a><div class=\"image_links double\"><a class=\"zoom \"  rel=\"prettyphoto\" href=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/miniatura-webinar.jpg?fit=960%2C540&#038;ssl=1\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><circle cx=\"11.35\" cy=\"11.35\" r=\"6\" class=\"path\"><\/circle><line x1=\"15.59\" y1=\"15.59\" x2=\"20.65\" y2=\"20.65\" class=\"path\"><\/line><\/svg><\/a><a class=\"link \"  href=\"https:\/\/www.hst.cat\/es\/webinar-ciberataques-y-seguridad-informatica-para-pymes\/\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><g><path d=\"M10.17,8.76l2.12-2.12a5,5,0,0,1,7.07,0h0a5,5,0,0,1,0,7.07l-2.12,2.12\" class=\"path\"><\/path><path d=\"M15.83,17.24l-2.12,2.12a5,5,0,0,1-7.07,0h0a5,5,0,0,1,0-7.07l2.12-2.12\" class=\"path\"><\/path><line x1=\"10.17\" y1=\"15.83\" x2=\"15.83\" y2=\"10.17\" class=\"path\"><\/line><\/g><\/svg><\/a><\/div><\/div><\/div><div class=\"post-desc-wrapper bg- has-custom-bg\" style=\"\"><div class=\"post-desc\"><div class=\"post-head\"><\/div><div class=\"post-title\"><h2 class=\"entry-title \" itemprop=\"headline\"><a href=\"https:\/\/www.hst.cat\/es\/webinar-ciberataques-y-seguridad-informatica-para-pymes\/\">Webinar Ciberataques y seguridad informatica para pymes<\/a><\/h2><\/div><div class=\"post-excerpt\">A HST somos conscientes de que la seguridad inform\u00e1tica es imprescindible hoy en d\u00eda en cualquier pyme. Durante este \u00faltimo a\u00f1o, a ra\u00edz del auge del<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/div><\/div><\/div><\/article><article class=\"post post-item isotope-item clearfix category-68 category-19 post-18242 type-post status-publish format-standard has-post-thumbnail hentry category-ciberseguridad category-seguridad-informatica\" style=\"\"><div class=\"date_label\">18 de diciembre de 2020<\/div><div class=\"image_frame post-photo-wrapper scale-with-grid image\"><div class=\"image_wrapper\"><a href=\"https:\/\/www.hst.cat\/es\/guia-ciberseguridad-teletrabajo-incibe\/\"><div class=\"mask\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"750\" src=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/cyber-security-1805632_1280.png?resize=960%2C750&amp;ssl=1\" class=\"scale-with-grid wp-post-image\" alt=\"Ciberseguretat\" data-attachment-id=\"18240\" data-permalink=\"https:\/\/www.hst.cat\/es\/guia-ciberseguridad-teletrabajo-incibe\/cyber-security-1805632_1280-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/cyber-security-1805632_1280.png?fit=1280%2C930&amp;ssl=1\" data-orig-size=\"1280,930\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cyber-security-1805632_1280\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/cyber-security-1805632_1280.png?fit=1024%2C744&amp;ssl=1\" \/><\/a><div class=\"image_links double\"><a class=\"zoom \"  rel=\"prettyphoto\" href=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/cyber-security-1805632_1280.png?fit=1024%2C744&#038;ssl=1\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><circle cx=\"11.35\" cy=\"11.35\" r=\"6\" class=\"path\"><\/circle><line x1=\"15.59\" y1=\"15.59\" x2=\"20.65\" y2=\"20.65\" class=\"path\"><\/line><\/svg><\/a><a class=\"link \"  href=\"https:\/\/www.hst.cat\/es\/guia-ciberseguridad-teletrabajo-incibe\/\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><g><path d=\"M10.17,8.76l2.12-2.12a5,5,0,0,1,7.07,0h0a5,5,0,0,1,0,7.07l-2.12,2.12\" class=\"path\"><\/path><path d=\"M15.83,17.24l-2.12,2.12a5,5,0,0,1-7.07,0h0a5,5,0,0,1,0-7.07l2.12-2.12\" class=\"path\"><\/path><line x1=\"10.17\" y1=\"15.83\" x2=\"15.83\" y2=\"10.17\" class=\"path\"><\/line><\/g><\/svg><\/a><\/div><\/div><\/div><div class=\"post-desc-wrapper bg- has-custom-bg\" style=\"\"><div class=\"post-desc\"><div class=\"post-head\"><\/div><div class=\"post-title\"><h2 class=\"entry-title \" itemprop=\"headline\"><a href=\"https:\/\/www.hst.cat\/es\/guia-ciberseguridad-teletrabajo-incibe\/\">Gu\u00eda de Ciberseguridad en el teletrabajo del INCIBE<\/a><\/h2><\/div><div class=\"post-excerpt\">Debido al aumento de empresas que se han visto obligadas a implantar el teletrabajo durante estos \u00faltimos meses, el INCIBE (Instituto Nacional de Ciberseguridad) ha publicado<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/div><\/div><\/div><\/article><article class=\"post post-item isotope-item clearfix category-68 category-19 post-18191 type-post status-publish format-standard has-post-thumbnail hentry category-ciberseguridad category-seguridad-informatica\" style=\"\"><div class=\"date_label\">17 de diciembre de 2020<\/div><div class=\"image_frame post-photo-wrapper scale-with-grid image\"><div class=\"image_wrapper\"><a href=\"https:\/\/www.hst.cat\/es\/el-fraude-del-ceo-la-estafa-de-moda\/\"><div class=\"mask\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"750\" src=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?resize=960%2C750&amp;ssl=1\" class=\"scale-with-grid wp-post-image\" alt=\"hacker, fraude del ceo\" srcset=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?resize=50%2C38&amp;ssl=1 50w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?resize=97%2C75&amp;ssl=1 97w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?resize=960%2C750&amp;ssl=1 960w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?zoom=2&amp;resize=960%2C750&amp;ssl=1 1920w\" sizes=\"auto, (max-width:767px) 480px, (max-width:960px) 100vw, 960px\" data-attachment-id=\"18194\" data-permalink=\"https:\/\/www.hst.cat\/es\/el-fraude-del-ceo-la-estafa-de-moda\/hacker-3342696_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?fit=1920%2C1477&amp;ssl=1\" data-orig-size=\"1920,1477\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"hacker-3342696_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?fit=1024%2C788&amp;ssl=1\" \/><\/a><div class=\"image_links double\"><a class=\"zoom \"  rel=\"prettyphoto\" href=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/hacker-3342696_1920.jpg?fit=1024%2C788&#038;ssl=1\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><circle cx=\"11.35\" cy=\"11.35\" r=\"6\" class=\"path\"><\/circle><line x1=\"15.59\" y1=\"15.59\" x2=\"20.65\" y2=\"20.65\" class=\"path\"><\/line><\/svg><\/a><a class=\"link \"  href=\"https:\/\/www.hst.cat\/es\/el-fraude-del-ceo-la-estafa-de-moda\/\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><g><path d=\"M10.17,8.76l2.12-2.12a5,5,0,0,1,7.07,0h0a5,5,0,0,1,0,7.07l-2.12,2.12\" class=\"path\"><\/path><path d=\"M15.83,17.24l-2.12,2.12a5,5,0,0,1-7.07,0h0a5,5,0,0,1,0-7.07l2.12-2.12\" class=\"path\"><\/path><line x1=\"10.17\" y1=\"15.83\" x2=\"15.83\" y2=\"10.17\" class=\"path\"><\/line><\/g><\/svg><\/a><\/div><\/div><\/div><div class=\"post-desc-wrapper bg- has-custom-bg\" style=\"\"><div class=\"post-desc\"><div class=\"post-head\"><\/div><div class=\"post-title\"><h2 class=\"entry-title \" itemprop=\"headline\"><a href=\"https:\/\/www.hst.cat\/es\/el-fraude-del-ceo-la-estafa-de-moda\/\">El Fraude del CEO, la estafa de moda<\/a><\/h2><\/div><div class=\"post-excerpt\">Las empresas tienen una nueva amenaza. Los hackers se cuelan en sus sistemas, analizan minuciosamente a sus directivos y suplantan la identidad del m\u00e1ximo ejecutivo de<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/div><\/div><\/div><\/article><article class=\"post post-item isotope-item clearfix category-68 category-19 post-2324 type-post status-publish format-image has-post-thumbnail hentry category-ciberseguridad category-seguridad-informatica post_format-post-format-image\" style=\"\"><div class=\"date_label\">17 de diciembre de 2020<\/div><div class=\"image_frame post-photo-wrapper scale-with-grid image\"><div class=\"image_wrapper\"><a href=\"https:\/\/www.hst.cat\/es\/como-proteger-nuestras-cuentas-cloud-del-pishing\/\"><div class=\"mask\"><\/div><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1920\" src=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?fit=1920%2C1920&amp;ssl=1\" class=\"scale-with-grid wp-post-image\" alt=\"pishing\" srcset=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=800%2C800&amp;ssl=1 800w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=1536%2C1536&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=146%2C146&amp;ssl=1 146w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=50%2C50&amp;ssl=1 50w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=85%2C85&amp;ssl=1 85w, https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?resize=80%2C80&amp;ssl=1 80w\" sizes=\"auto, (max-width:767px) 480px, (max-width:1920px) 100vw, 1920px\" data-attachment-id=\"18213\" data-permalink=\"https:\/\/www.hst.cat\/es\/como-proteger-nuestras-cuentas-cloud-del-pishing\/password\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?fit=1920%2C1920&amp;ssl=1\" data-orig-size=\"1920,1920\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"password\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?fit=1024%2C1024&amp;ssl=1\" \/><\/a><div class=\"image_links double\"><a class=\"zoom \"  rel=\"prettyphoto\" href=\"https:\/\/i0.wp.com\/www.hst.cat\/wp-content\/uploads\/password.jpg?fit=1024%2C1024&#038;ssl=1\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><circle cx=\"11.35\" cy=\"11.35\" r=\"6\" class=\"path\"><\/circle><line x1=\"15.59\" y1=\"15.59\" x2=\"20.65\" y2=\"20.65\" class=\"path\"><\/line><\/svg><\/a><a class=\"link \"  href=\"https:\/\/www.hst.cat\/es\/como-proteger-nuestras-cuentas-cloud-del-pishing\/\"><svg viewBox=\"0 0 26 26\"><defs><style>.path{fill:none;stroke:#333;stroke-miterlimit:10;stroke-width:1.5px;}<\/style><\/defs><g><path d=\"M10.17,8.76l2.12-2.12a5,5,0,0,1,7.07,0h0a5,5,0,0,1,0,7.07l-2.12,2.12\" class=\"path\"><\/path><path d=\"M15.83,17.24l-2.12,2.12a5,5,0,0,1-7.07,0h0a5,5,0,0,1,0-7.07l2.12-2.12\" class=\"path\"><\/path><line x1=\"10.17\" y1=\"15.83\" x2=\"15.83\" y2=\"10.17\" class=\"path\"><\/line><\/g><\/svg><\/a><\/div><\/div><\/div><div class=\"post-desc-wrapper bg- has-custom-bg\" style=\"\"><div class=\"post-desc\"><div class=\"post-head\"><\/div><div class=\"post-title\"><h2 class=\"entry-title \" itemprop=\"headline\"><a href=\"https:\/\/www.hst.cat\/es\/como-proteger-nuestras-cuentas-cloud-del-pishing\/\">\u00bfQue es el Pishing? Consejos para prevenir ciberataques<\/a><\/h2><\/div><div class=\"post-excerpt\">Cada vez m\u00e1s recibimos noticias sobre ciberataques. Y s\u00ed, es verdad, este auge de teletrabajo nos ha ayudado mucho. Cada d\u00eda utilizamos m\u00e1s servicios alojados en<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/div><\/div><\/div><\/article><\/div><\/div>\n<\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-20044","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webminar Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webminar Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/\" \/>\n<meta property=\"og:site_name\" content=\"Inform\u00e0tica Lleida HST\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-26T10:32:43+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hst.cat\\\/es\\\/ciberseguridad-webminar\\\/\",\"url\":\"https:\\\/\\\/www.hst.cat\\\/es\\\/ciberseguridad-webminar\\\/\",\"name\":\"Webminar Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hst.cat\\\/#website\"},\"datePublished\":\"2021-04-20T08:46:09+00:00\",\"dateModified\":\"2023-09-26T10:32:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hst.cat\\\/es\\\/ciberseguridad-webminar\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hst.cat\\\/es\\\/ciberseguridad-webminar\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hst.cat\\\/es\\\/ciberseguridad-webminar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.hst.cat\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webminar Ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hst.cat\\\/#website\",\"url\":\"https:\\\/\\\/www.hst.cat\\\/\",\"name\":\"Inform\u00e0tica Lleida HST\",\"description\":\"Oferim serveis d\u2019inform\u00e0tica i noves tecnologies per empreses. Servei t\u00e8cnic, Web, Soft Gesti\u00f3, Xarxes, Consultoria\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hst.cat\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webminar Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/","og_locale":"es_ES","og_type":"article","og_title":"Webminar Ciberseguridad","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row]","og_url":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/","og_site_name":"Inform\u00e0tica Lleida HST","article_modified_time":"2023-09-26T10:32:43+00:00","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/","url":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/","name":"Webminar Ciberseguridad","isPartOf":{"@id":"https:\/\/www.hst.cat\/#website"},"datePublished":"2021-04-20T08:46:09+00:00","dateModified":"2023-09-26T10:32:43+00:00","breadcrumb":{"@id":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hst.cat\/es\/ciberseguridad-webminar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.hst.cat\/es\/"},{"@type":"ListItem","position":2,"name":"Webminar Ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/www.hst.cat\/#website","url":"https:\/\/www.hst.cat\/","name":"Inform\u00e0tica Lleida HST","description":"Oferim serveis d\u2019inform\u00e0tica i noves tecnologies per empreses. Servei t\u00e8cnic, Web, Soft Gesti\u00f3, Xarxes, Consultoria","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hst.cat\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"jetpack_shortlink":"https:\/\/wp.me\/P7Yfwy-5di","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/pages\/20044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/comments?post=20044"}],"version-history":[{"count":6,"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/pages\/20044\/revisions"}],"predecessor-version":[{"id":22938,"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/pages\/20044\/revisions\/22938"}],"wp:attachment":[{"href":"https:\/\/www.hst.cat\/es\/wp-json\/wp\/v2\/media?parent=20044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}