{"id":7508,"date":"2024-09-02T17:12:43","date_gmt":"2024-09-02T22:12:43","guid":{"rendered":"https:\/?p=7508"},"modified":"2024-09-03T10:50:33","modified_gmt":"2024-09-03T15:50:33","slug":"protect-yourself-from-social-engineering-dont-be-fooled","status":"publish","type":"post","link":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/","title":{"rendered":"Protect yourself from social engineering: Don't be fooled!"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7508\" class=\"elementor elementor-7508\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b8048df elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8048df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-db2d7ee\" data-id=\"db2d7ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bcd2dab elementor-widget elementor-widget-text-editor\" data-id=\"bcd2dab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\"><span style=\"font-weight: 400;\">Written by: Miguel \u00c1ngel Blanco L\u00f3pez<\/span><\/p><p><em><strong>\"El vivo vive del bobo\" - Popular adage.<\/strong><\/em><\/p><p>We have all at some point in our lives heard the popular saying quoted above, and I hope you are not offended. I know there are no \"pacifiers\" here, but there is a lot of naivety, and for the topic I will talk about it fits perfectly.<\/p><p>In this era, we enjoy great facilities thanks to technology. Most likely, many of the activities you used to do in person are now done through a web platform or an application on your cell phone. A large percentage of people now perform tasks such as bill payments, bank transfers, and even purchases, just to mention a few, mediated by information technologies.<\/p><p>But... Are you sure that the website where you are about to enter your banking credentials is really the website of your bank? Are you sure that the platform where you are going to pay your utility bill is the one provided by the collecting agency? Are you sure that the store where I just shopped is authentic?<\/p><p>All this refers to what is known as social engineering. INCIBE (Instituto Nacional de Ciberseguridad) of Spain defines the concept as a technique used by cybercriminals to gain the trust of a user and get them to do something under their manipulation and deception, such as: execute a malicious program, provide their private passwords, or buy from fraudulent websites.<\/p><p>In my opinion, it all boils down to a scam that simply takes advantage of people's naivety and their few precautionary measures on the net. Generally, advanced computer knowledge is not required to perform a social engineering attack. As you can see, social engineering attacks do not always require password cracking or infecting devices with viruses; in social engineering attacks, we give all our valuable information to the attacker ourselves.<\/p><h2><span style=\"font-weight: 400;\">Common social engineering attacks:<\/span><\/h2><p><b>Vishing:<\/b><span style=\"font-weight: 400;\"> This technique consists of contacting the victim via phone call, impersonating a trusted entity or person, and thus manipulating the target to reveal personal information or perform actions that compromise their security and that of the computer systems and\/or devices to which they have access. Be very careful the next time you are called to tell you that you are a beneficiary of some government program, or when a supposed police patrolman calls you saying that your brother ran over someone and that they are going to give you directions to \"collaborate\" with him, because it is most likely an attempt to defraud or \"collaborate\" with him, because it is most likely an attempt to defraud you. <\/span><b>vishing<\/b><span style=\"font-weight: 400;\">.<\/span><\/p><p><b><a href=\"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/Captura-de-pantalla-2024-09-02-172359.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-7514 size-medium\" src=\"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/Captura-de-pantalla-2024-09-02-172359-297x300.png\" alt=\"\" width=\"297\" height=\"300\" srcset=\"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/Captura-de-pantalla-2024-09-02-172359-297x300.png 297w, https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/Captura-de-pantalla-2024-09-02-172359-12x12.png 12w, https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/Captura-de-pantalla-2024-09-02-172359.png 762w\" sizes=\"(max-width: 297px) 100vw, 297px\" \/><\/a>Phishing:<\/b><span style=\"font-weight: 400;\"> Have you ever received a text message from Amazon's manager himself with a job offer? Or maybe you received an email notifying you that your password was blocked or that your payment methods were rejected? Well, this is what is known as <\/span><b>phishing<\/b><span style=\"font-weight: 400;\">A social engineering technique that seeks to obtain personal information from its victim by impersonating a trusted entity or person using text messages, emails and even by impersonating web pages.<\/span><\/p><p><span style=\"font-weight: 400;\">According to ESET's security report for Latin America (2023), the Latin American countries with the highest percentage of phishing detection are: Ecuador 8.0%, Costa Rica 7.2% and Colombia 5.7%. Note that Colombia is in third place, hence the importance of being very careful and pay attention to the information we deliver by the various media.<\/span><\/p><h2><span style=\"font-weight: 400;\">How to protect yourself?<\/span><\/h2><p><span style=\"font-weight: 400;\">It is important to clarify that in the field of computer security no method or system is infallible: however, most of these types of attacks will fail if we are stricter with our security measures.<\/span><\/p><p><span style=\"font-weight: 400;\">To prevent becoming a victim of social engineering attacks, the computer security company <em>Kaspersky<\/em> recommends:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Change your passwords frequently.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enable multifactor authentication whenever available.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Always type the web address you want to visit, do not do it through the search engine results.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not expose your personal and\/or family information.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not allow strangers to connect to your main wifi network.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not leave your devices unprotected in public.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use VPN (if available).<br \/><br \/><\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">Additionally, I would like to share my personal security socks, because as I mentioned before, it is not only through an application or technological device that our information can be stolen:<\/span><\/p><ul><li aria-level=\"1\"><b>Don't be lazy:<\/b><span style=\"font-weight: 400;\"> Close sessions of applications you are not using, avoid using autocomplete of web browsers, destroy information that is no longer relevant to you.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Pay attention to details:<\/b><span style=\"font-weight: 400;\"> In the emails and text messages you receive, always validate the senders, analyze the coherence of the content and avoid leaving sensitive information in any web form.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Always validate the environment and context:<\/b><span style=\"font-weight: 400;\"> If you are in a public place be careful what you say, you do not know who may be next to you. If you receive calls from unknown numbers, pay special attention to the sounds you hear in the background and the way the caller expresses himself.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Be wary of everything and everyone:<\/b><span style=\"font-weight: 400;\"> Always question who is asking for what information and why. Before posting that selfie or picture of the walk you like so much on your favorite social network, check that nothing that should not be exposed in it (valuables, location, other people, among others). And avoid having valuable information in view.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Avoid using public or open networks.<\/b><\/li><\/ul><ul><li aria-level=\"1\"><b>Check what you throw away:<\/b><span style=\"font-weight: 400;\"> Someone interested may know a lot about you if they check your trash can The item you bought from an online store and received at your home comes with the carrier's tracking document. Before discarding it, make sure that the information contained in it is irretrievable. Remember that one man's trash is another man's treasure.<\/span><\/li><\/ul><ul><li aria-level=\"1\"><b>Work on controlling your emotions<\/b><span style=\"font-weight: 400;\">Try to always remain calm and composed when making important decisions, as attackers will often seek to generate panic and take advantage of your vulnerable state.<br \/><br \/><\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">As you have seen, social engineering attacks are very common and are on the rise year after year. They are usually the gateway to higher impact attacks. For this reason we must be very careful and reserved with the information we give out. If you take care of your information, you are taking care of your whole social circle, since you may not fall into these scams, but through you they can reach a family member, a friend, a co-worker, and maybe this person will be successfully attacked.<br \/><br \/><\/span><\/p><hr \/><p><span style=\"font-weight: 400;\"><br \/>Sources:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.incibe.es\/aprendeciberseguridad\/ingenieria-social\"><span style=\"font-weight: 400;\">Social Engineering - INCIBE<\/span><\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ESET Security Report Latin America 2023.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The ABC of computer security, a practical guide to understand digital security. Computer security for dummies - Oscar Arango G\u00f3mez.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/latam.kaspersky.com\/resource-center\/definitions\/what-is-social-engineering?srsltid=AfmBOoorM-Xy_YdvJ8R7GhJcVYwBib06ogijzlIhimSsSa6-5JbyJoCj\"><span style=\"font-weight: 400;\">What is social engineering?<\/span><\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>We have all at some point in our lives heard the popular saying quoted above, and I hope you are not offended.<\/p>","protected":false},"author":1,"featured_media":7509,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"categories":[22,26],"tags":[],"class_list":["post-7508","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-opinion"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar! - Cidenet<\/title>\n<meta name=\"description\" content=\"Todos en alg\u00fan momento de nuestras vidas hemos escuchado el dicho popular citado anteriormente, y espero que no se sienta ofendido.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar!\" \/>\n<meta property=\"og:description\" content=\"Todos en alg\u00fan momento de nuestras vidas hemos escuchado el dicho popular citado anteriormente, y espero que no se sienta ofendido.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/\" \/>\n<meta property=\"og:site_name\" content=\"Cidenet\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cidenet\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T22:12:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-03T15:50:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/2150794778.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"cidenetadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cidenetadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/\"},\"author\":{\"name\":\"cidenetadmin\",\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#\\\/schema\\\/person\\\/2a56133fd7fb18ba5c9520590ee7c87d\"},\"headline\":\"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar!\",\"datePublished\":\"2024-09-02T22:12:43+00:00\",\"dateModified\":\"2024-09-03T15:50:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/\"},\"wordCount\":1259,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cidenet.com.co\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/2150794778.webp\",\"articleSection\":[\"Blog\",\"Opini\u00f3n\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/\",\"url\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/\",\"name\":\"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar! - Cidenet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cidenet.com.co\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/2150794778.webp\",\"datePublished\":\"2024-09-02T22:12:43+00:00\",\"dateModified\":\"2024-09-03T15:50:33+00:00\",\"description\":\"Todos en alg\u00fan momento de nuestras vidas hemos escuchado el dicho popular citado anteriormente, y espero que no se sienta ofendido.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cidenet.com.co\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/2150794778.webp\",\"contentUrl\":\"https:\\\/\\\/cidenet.com.co\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/2150794778.webp\",\"width\":1000,\"height\":707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/protect-yourself-from-social-engineering-dont-be-fooled\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/cidenet.com.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.cidenet.net\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/\",\"name\":\"Cidenet\",\"description\":\"Desarrollamos Software a la Medida\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#organization\",\"name\":\"Cidenet | Desarrollamos Software a la Medida\",\"url\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cidenet.com.co\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Logos-cidenet-NEGATIVO.png\",\"contentUrl\":\"https:\\\/\\\/cidenet.com.co\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Logos-cidenet-NEGATIVO.png\",\"width\":305,\"height\":68,\"caption\":\"Cidenet | Desarrollamos Software a la Medida\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cidenet\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cidenet-s-a-s-\",\"https:\\\/\\\/www.instagram.com\\\/cidenet\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@CidenetSAS\\\/featured\"],\"publishingPrinciples\":\"https:\\\/\\\/cidenet.com.co\\\/politica-de-proteccion-de-datos-personales\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cidenet.com.co\\\/en\\\/#\\\/schema\\\/person\\\/2a56133fd7fb18ba5c9520590ee7c87d\",\"name\":\"cidenetadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/793beefefd2315b34c5d5ce6a652df6efd8061b6e091c506c9d2cb29ac0ff364?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/793beefefd2315b34c5d5ce6a652df6efd8061b6e091c506c9d2cb29ac0ff364?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/793beefefd2315b34c5d5ce6a652df6efd8061b6e091c506c9d2cb29ac0ff364?s=96&d=mm&r=g\",\"caption\":\"cidenetadmin\"},\"sameAs\":[\"https:\"],\"url\":\"https:\\\/\\\/cidenet.com.co\\\/en\\\/author\\\/cidenetadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protect yourself from social engineering: Don't be fooled! - Cidenet","description":"We have all at some point in our lives heard the popular saying quoted above, and I hope you are not offended.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/","og_locale":"en_US","og_type":"article","og_title":"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar!","og_description":"Todos en alg\u00fan momento de nuestras vidas hemos escuchado el dicho popular citado anteriormente, y espero que no se sienta ofendido.","og_url":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/","og_site_name":"Cidenet","article_publisher":"https:\/\/www.facebook.com\/Cidenet","article_published_time":"2024-09-02T22:12:43+00:00","article_modified_time":"2024-09-03T15:50:33+00:00","og_image":[{"width":1000,"height":707,"url":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/2150794778.webp","type":"image\/webp"}],"author":"cidenetadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cidenetadmin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#article","isPartOf":{"@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/"},"author":{"name":"cidenetadmin","@id":"https:\/\/www.cidenet.com.co\/en\/#\/schema\/person\/2a56133fd7fb18ba5c9520590ee7c87d"},"headline":"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar!","datePublished":"2024-09-02T22:12:43+00:00","dateModified":"2024-09-03T15:50:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/"},"wordCount":1259,"publisher":{"@id":"https:\/\/www.cidenet.com.co\/en\/#organization"},"image":{"@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#primaryimage"},"thumbnailUrl":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/2150794778.webp","articleSection":["Blog","Opini\u00f3n"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/","url":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/","name":"Protect yourself from social engineering: Don't be fooled! - Cidenet","isPartOf":{"@id":"https:\/\/www.cidenet.com.co\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#primaryimage"},"image":{"@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#primaryimage"},"thumbnailUrl":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/2150794778.webp","datePublished":"2024-09-02T22:12:43+00:00","dateModified":"2024-09-03T15:50:33+00:00","description":"We have all at some point in our lives heard the popular saying quoted above, and I hope you are not offended.","breadcrumb":{"@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#primaryimage","url":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/2150794778.webp","contentUrl":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2024\/09\/2150794778.webp","width":1000,"height":707},{"@type":"BreadcrumbList","@id":"https:\/\/cidenet.com.co\/en\/protect-yourself-from-social-engineering-dont-be-fooled\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/cidenet.com.co\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.cidenet.net\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Prot\u00e9gete de la ingenier\u00eda social: \u00a1No te dejes enga\u00f1ar!"}]},{"@type":"WebSite","@id":"https:\/\/www.cidenet.com.co\/en\/#website","url":"https:\/\/www.cidenet.com.co\/en\/","name":"Cidenet","description":"We develop custom Software","publisher":{"@id":"https:\/\/www.cidenet.com.co\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cidenet.com.co\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cidenet.com.co\/en\/#organization","name":"Cidenet | we Develop custom Software","url":"https:\/\/www.cidenet.com.co\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cidenet.com.co\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2022\/08\/Logos-cidenet-NEGATIVO.png","contentUrl":"https:\/\/cidenet.com.co\/wp-content\/uploads\/2022\/08\/Logos-cidenet-NEGATIVO.png","width":305,"height":68,"caption":"Cidenet | Desarrollamos Software a la Medida"},"image":{"@id":"https:\/\/www.cidenet.com.co\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Cidenet","https:\/\/www.linkedin.com\/company\/cidenet-s-a-s-","https:\/\/www.instagram.com\/cidenet\/","https:\/\/www.youtube.com\/@CidenetSAS\/featured"],"publishingPrinciples":"https:\/\/cidenet.com.co\/politica-de-proteccion-de-datos-personales\/"},{"@type":"Person","@id":"https:\/\/www.cidenet.com.co\/en\/#\/schema\/person\/2a56133fd7fb18ba5c9520590ee7c87d","name":"cidenetadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/793beefefd2315b34c5d5ce6a652df6efd8061b6e091c506c9d2cb29ac0ff364?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/793beefefd2315b34c5d5ce6a652df6efd8061b6e091c506c9d2cb29ac0ff364?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/793beefefd2315b34c5d5ce6a652df6efd8061b6e091c506c9d2cb29ac0ff364?s=96&d=mm&r=g","caption":"cidenetadmin"},"sameAs":["https:"],"url":"https:\/\/cidenet.com.co\/en\/author\/cidenetadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/posts\/7508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/comments?post=7508"}],"version-history":[{"count":0,"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/posts\/7508\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/media\/7509"}],"wp:attachment":[{"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/media?parent=7508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/categories?post=7508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cidenet.com.co\/en\/wp-json\/wp\/v2\/tags?post=7508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}