{"id":5235,"date":"2022-08-22T19:48:51","date_gmt":"2022-08-22T19:48:51","guid":{"rendered":"https:\/\/ipse.gov.co\/intranet\/?p=5235"},"modified":"2022-08-23T14:22:10","modified_gmt":"2022-08-23T14:22:10","slug":"protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular","status":"publish","type":"post","link":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/","title":{"rendered":"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular"},"content":{"rendered":"<p><span style=\"display:none;\" data-uw-styling-context=\"true\"> <\/span><br \/>\nLos estafadores usan varios m\u00e9todos para lograr su cometido, uno de ellos es enviar mensajes de correo electr\u00f3nico a tu bandeja de entrada, otra forma son los mensajes de texto o mensajes de WhatsApp para enga\u00f1arte y lograr que des informaci\u00f3n personal. As\u00ed, estos personajes pueden robarte tus contrase\u00f1as, n\u00fameros de cuentas y lograr acceder a tu email, bancos y otras cuentas. Esta modalidad se denomina Phishing, y en nuestro pa\u00eds se registran alrededor de 187 denuncias al mes por robos inform\u00e1ticos empleando esta forma de estafa.<\/p>\n<p>Adicionalmente, puede que los emails y mensajes de texto phishing sean enviados por una compa\u00f1\u00eda que tu conozcas o en la que conf\u00edes. Estos correos pueden tener el mismo aspecto gr\u00e1fico que los mensajes que env\u00eda tu banco de confianza, tu red social, un sitio web, aplicaciones de pago en l\u00ednea o tiendas online.<\/p>\n<p>\u00bfC\u00f3mo debes evitar este m\u00e9todo de fraude? a continuaci\u00f3n te damos algunas recomendaciones para evitar este delito:<\/p>\n<p>\u25cf Navega por sitios web seguros que cuenten con certificado de seguridad SSL, es decir que el ingresar la URL incluya la letra S despu\u00e9s del http.<\/p>\n<p>\u25cf Evita los correos que llegan a la bandeja de SPAM o NO DESEADO.<\/p>\n<p>\u25cf Si tienes dudas sobre el origen de un correo, verifica directamente con la entidad para corroborar la solicitud.<\/p>\n<p>\u25cf Ten en cuenta que las empresas nunca le van a solicitar informaci\u00f3n confidencial, como el c\u00f3digo de verificaci\u00f3n de su Tarjeta de Cr\u00e9dito o D\u00e9bito, por ning\u00fan medio electr\u00f3nico, solo por aplicaciones certificadas.<\/p>\n<p>Debes tener en cuenta que los ciberdelincuentes tambi\u00e9n utilizan la aplicaci\u00f3n de WhatsApp para cometer este tipo de delitos, ya que, es muy frecuente que lleguen mensajes con link de ofertas online, rastreo de encomiendas o c\u00f3digos que permiten acceder a tu informaci\u00f3n personal.<\/p>\n<p>Por \u00faltimo, cualquiera de nosotros puede ser v\u00edctima del Phishing, lo m\u00e1s importante es estar atentos a la hora de divulgar nuestra informaci\u00f3n y denunciar los casos que conozcas al correo phishing-report@colcert.gov.co con el link de fraude.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los estafadores usan varios m\u00e9todos para lograr su cometido, uno de ellos es enviar mensajes de correo electr\u00f3nico a tu bandeja de entrada, otra forma son los mensajes de texto o mensajes de WhatsApp para enga\u00f1arte y lograr que des informaci\u00f3n personal. As\u00ed, estos personajes pueden robarte tus contrase\u00f1as, n\u00fameros de cuentas y lograr acceder [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,12],"tags":[],"class_list":["post-5235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticia","category-noticias-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular - IPSE-INTRANET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular\" \/>\n<meta property=\"og:description\" content=\"Los estafadores usan varios m\u00e9todos para lograr su cometido, uno de ellos es enviar mensajes de correo electr\u00f3nico a tu bandeja de entrada, otra forma son los mensajes de texto o mensajes de WhatsApp para enga\u00f1arte y lograr que des informaci\u00f3n personal. As\u00ed, estos personajes pueden robarte tus contrase\u00f1as, n\u00fameros de cuentas y lograr acceder [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/\" \/>\n<meta property=\"og:site_name\" content=\"IPSE-INTRANET\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-22T19:48:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-23T14:22:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"886\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/\",\"url\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/\",\"name\":\"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular - IPSE-INTRANET\",\"isPartOf\":{\"@id\":\"https:\/\/ipse.gov.co\/intranet\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png\",\"datePublished\":\"2022-08-22T19:48:51+00:00\",\"dateModified\":\"2022-08-23T14:22:10+00:00\",\"author\":{\"@id\":\"https:\/\/ipse.gov.co\/intranet\/#\/schema\/person\/445cc538cfa4ede50e3d9a85c69064f9\"},\"breadcrumb\":{\"@id\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#primaryimage\",\"url\":\"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png\",\"contentUrl\":\"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png\",\"width\":886,\"height\":668},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ipse.gov.co\/intranet\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ipse.gov.co\/intranet\/#website\",\"url\":\"https:\/\/ipse.gov.co\/intranet\/\",\"name\":\"IPSE-INTRANET\",\"description\":\"Transformamos Territorios\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ipse.gov.co\/intranet\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ipse.gov.co\/intranet\/#\/schema\/person\/445cc538cfa4ede50e3d9a85c69064f9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ipse.gov.co\/intranet\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5805ae0098f60a337ba72d58f1f9aec7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5805ae0098f60a337ba72d58f1f9aec7?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/portal.ipse.gov.co\"],\"url\":\"https:\/\/ipse.gov.co\/intranet\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular - IPSE-INTRANET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/","og_locale":"es_ES","og_type":"article","og_title":"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular","og_description":"Los estafadores usan varios m\u00e9todos para lograr su cometido, uno de ellos es enviar mensajes de correo electr\u00f3nico a tu bandeja de entrada, otra forma son los mensajes de texto o mensajes de WhatsApp para enga\u00f1arte y lograr que des informaci\u00f3n personal. As\u00ed, estos personajes pueden robarte tus contrase\u00f1as, n\u00fameros de cuentas y lograr acceder [&hellip;]","og_url":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/","og_site_name":"IPSE-INTRANET","article_published_time":"2022-08-22T19:48:51+00:00","article_modified_time":"2022-08-23T14:22:10+00:00","og_image":[{"width":886,"height":668,"url":"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/","url":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/","name":"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular - IPSE-INTRANET","isPartOf":{"@id":"https:\/\/ipse.gov.co\/intranet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#primaryimage"},"image":{"@id":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#primaryimage"},"thumbnailUrl":"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png","datePublished":"2022-08-22T19:48:51+00:00","dateModified":"2022-08-23T14:22:10+00:00","author":{"@id":"https:\/\/ipse.gov.co\/intranet\/#\/schema\/person\/445cc538cfa4ede50e3d9a85c69064f9"},"breadcrumb":{"@id":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#primaryimage","url":"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png","contentUrl":"https:\/\/ipse.gov.co\/intranet\/wp-content\/uploads\/sites\/4\/2022\/08\/intranet-peligro-cibernetico-1.png","width":886,"height":668},{"@type":"BreadcrumbList","@id":"https:\/\/ipse.gov.co\/intranet\/2022\/08\/22\/protegete-de-las-estafas-informaticas-que-llegan-a-tu-correo-electronico-y-celular\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ipse.gov.co\/intranet\/"},{"@type":"ListItem","position":2,"name":"Prot\u00e9gete de las estafas inform\u00e1ticas que llegan a tu correo electr\u00f3nico y celular"}]},{"@type":"WebSite","@id":"https:\/\/ipse.gov.co\/intranet\/#website","url":"https:\/\/ipse.gov.co\/intranet\/","name":"IPSE-INTRANET","description":"Transformamos Territorios","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipse.gov.co\/intranet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/ipse.gov.co\/intranet\/#\/schema\/person\/445cc538cfa4ede50e3d9a85c69064f9","name":"admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ipse.gov.co\/intranet\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5805ae0098f60a337ba72d58f1f9aec7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5805ae0098f60a337ba72d58f1f9aec7?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/portal.ipse.gov.co"],"url":"https:\/\/ipse.gov.co\/intranet\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/posts\/5235"}],"collection":[{"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/comments?post=5235"}],"version-history":[{"count":0,"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/posts\/5235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/media\/5236"}],"wp:attachment":[{"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/media?parent=5235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/categories?post=5235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipse.gov.co\/intranet\/wp-json\/wp\/v2\/tags?post=5235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}