{"id":30872,"date":"2023-10-01T19:43:49","date_gmt":"2023-10-01T19:43:49","guid":{"rendered":"https:\/\/scottmax.com\/?p=30872"},"modified":"2024-06-28T15:26:23","modified_gmt":"2024-06-28T15:26:23","slug":"estadisticas-de-ciberseguridad","status":"publish","type":"post","link":"https:\/\/scottmax.com\/es\/cyber-security-statistics\/","title":{"rendered":"76 estad\u00edsticas de ciberseguridad que conviene conocer"},"content":{"rendered":"<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked abril, 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-YxTwY7Mn\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bienvenido al campo de batalla digital de 2023, donde las ciberamenazas evolucionan a un ritmo que marear\u00eda incluso al m\u00e1s experto de los hackers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En este art\u00edculo, nos embarcaremos en un apasionante viaje a trav\u00e9s de 76 fascinantes estad\u00edsticas sobre ciberseguridad que arrojan luz sobre el estado del mundo digital este a\u00f1o.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Suj\u00e9tense los sombreros virtuales mientras descubrimos los retos, triunfos y tendencias de la ciberseguridad, desde los estragos del ransomware hasta las persistentes estratagemas del phishing.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Tanto si es usted un entusiasta de la tecnolog\u00eda, un cibernauta preocupado o un profesional de la inform\u00e1tica en primera l\u00ednea, estas estad\u00edsticas le intrigar\u00e1n, le educar\u00e1n y quiz\u00e1s incluso le alarmar\u00e1n. As\u00ed pues, sumerj\u00e1monos en las cifras y descubramos lo que acecha en las sombras virtuales.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de malware 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Ad\u00e9ntrese en el mundo de las plagas digitales con las Estad\u00edsticas de malware para 2023, donde descubrimos las amenazas en constante evoluci\u00f3n que acechan en las sombras de Internet.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Caos de malware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El malware es como la navaja suiza de los ciberataques, capaz de causar estragos en diversas formas, desde el DDoS al ransomware. En la primera mitad de 2022, el panorama digital fue testigo de la asombrosa cifra de 2.800 millones de ataques de malware. Y ojo, \u00a1eso ni siquiera es el panorama completo! S\u00f3lo durante el segundo trimestre de 2022, las medidas de seguridad consiguieron bloquear la friolera de 5.520.908 ataques de malware m\u00f3vil, adware y riskware.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-1024x575.jpg\" alt=\"\" class=\"wp-image-58588\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162104.251-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-JUuMPkkt\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Ir\u00e1n en el punto de mira<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En lo que respecta a los ataques de malware m\u00f3vil, Ir\u00e1n fue el pa\u00eds m\u00e1s afectado. El pa\u00eds experiment\u00f3 una importante avalancha de incidentes de malware m\u00f3vil. Es un duro recordatorio de que estas amenazas no conocen fronteras.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-1024x575.jpg\" alt=\"\" class=\"wp-image-58591\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162356.156-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-mRJuCHGd\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El troyano VBA toma protagonismo<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En el siempre cambiante mundo del malware, el troyano VBA emergi\u00f3 como la estrella del espect\u00e1culo en 2022. Esta variante de malware en particular consigui\u00f3 acaparar la atenci\u00f3n por su prevalencia e impacto.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-1024x575.jpg\" alt=\"\" class=\"wp-image-58592\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162441.380-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-Ypo5fzLg\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El correo electr\u00f3nico: El caballo de Troya del malware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El correo electr\u00f3nico sigue siendo el principal m\u00e9todo de entrega del malware. De hecho, un asombroso 92% del malware encuentra su camino hacia las v\u00edctimas a trav\u00e9s del correo electr\u00f3nico. Esto pone de relieve la importancia de estar alerta cuando se trata de su bandeja de entrada.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-1024x575.jpg\" alt=\"\" class=\"wp-image-58593\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/92-4-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-TQWvKbCv\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El alarmante aumento de Emotet<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Una de las tendencias m\u00e1s preocupantes en el panorama del malware fue el enorme aumento de las detecciones de Emotet durante el primer semestre de 2022. En comparaci\u00f3n con el mismo periodo del a\u00f1o anterior, se produjo un asombroso aumento de 976,7% en las detecciones de Emotet. Esto subraya la adaptabilidad y persistencia de los ciberdelincuentes a la hora de explotar vulnerabilidades.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-1024x575.jpg\" alt=\"\" class=\"wp-image-58594\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162704.177-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-JxrMHjf1\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de phishing 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">En el \u00e1mbito del ciberenga\u00f1o, las estad\u00edsticas de phishing para 2023 arrojan luz sobre las t\u00e1cticas predominantes y las sorprendentes cifras que se esconden tras una de las amenazas en l\u00ednea m\u00e1s omnipresentes.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Bullseye en Finanzas<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En el primer trimestre de 2022, el sector financiero se encontr\u00f3 en el punto de mira de los ciberdelincuentes. Un asombroso 23,6% de todos los ataques de phishing iban dirigidos a instituciones financieras. No es de extra\u00f1ar, dado el potencial beneficio econ\u00f3mico que atrae a los atacantes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-1024x575.jpg\" alt=\"\" class=\"wp-image-58598\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T162824.325-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-kS9ldSbt\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Pandemia de phishing<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los ataques de phishing experimentaron un alarmante aumento durante el primer semestre de 2022. La revista Security Magazine inform\u00f3 de un asombroso total de 255 millones de ataques de phishing durante este periodo. Se trata de un n\u00famero ingente de intentos de enga\u00f1ar a personas desprevenidas para que divulguen informaci\u00f3n confidencial.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-1024x575.jpg\" alt=\"\" class=\"wp-image-58596\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163007.331-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-sBIVQqoA\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Las amenazas de las horas cero toman protagonismo<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las amenazas de hora cero, esos ataques furtivos que se aprovechan de las vulnerabilidades antes incluso de que sean descubiertas y parcheadas, robaron el protagonismo en 2022. Supusieron la friolera de 54% de todas las amenazas detectadas. Esto demuestra la incesante innovaci\u00f3n de los ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-1024x575.jpg\" alt=\"\" class=\"wp-image-58599\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/54-18-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-7TbaTNwy\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El spear-phishing ataca con fuerza<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los ataques dirigidos de spear-phishing dise\u00f1ados para obtener credenciales valiosas fueron una amenaza prevalente, constituyendo un 76% significativo de todas las amenazas. Estos ataques suelen implicar t\u00e1cticas personalizadas para enga\u00f1ar a las v\u00edctimas con el fin de que revelen informaci\u00f3n cr\u00edtica.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-1024x575.jpg\" alt=\"\" class=\"wp-image-58600\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/76-5-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-pmHr5woL\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Abundan los enga\u00f1os sobre dominios<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los ataques de phishing suelen basarse en sitios web o correos electr\u00f3nicos falsos que imitan a organizaciones leg\u00edtimas. En 2022, la asombrosa cifra de 850.000 nombres de dominio fueron denunciados por actividades de phishing, seg\u00fan Interisle. Esto pone de manifiesto hasta qu\u00e9 punto llegan los ciberdelincuentes para enga\u00f1ar a sus objetivos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-1024x575.jpg\" alt=\"\" class=\"wp-image-58601\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163648.186-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-d38itocL\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Las costosas consecuencias<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las ramificaciones financieras de los ataques de phishing pueden dejarle boquiabierto. Seg\u00fan IBM, se sit\u00faan como el vector de ataque inicial m\u00e1s caro, con un coste medio de la friolera de 4,91 millones de d\u00f3lares. Estos ataques golpean a las organizaciones donde m\u00e1s les duele: en sus carteras.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-1024x575.jpg\" alt=\"\" class=\"wp-image-58602\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163820.183-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-CtOLJIlv\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">La batalla de Google contra el diluvio<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Para que se haga una idea de la magnitud del problema, en noviembre de 2022, Google tuvo que rechazar la alucinante cifra de 231.000 millones de correos electr\u00f3nicos de spam y phishing. Es un recordatorio de la batalla constante contra esta avalancha de mensajes enga\u00f1osos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-1024x575.jpg\" alt=\"\" class=\"wp-image-58603\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T163954.295-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-giTfUkxy\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas del ransomware en 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Prep\u00e1rese para un viaje en monta\u00f1a rusa por el mundo de la extorsi\u00f3n digital con las Estad\u00edsticas del ransomware para 2023, que revelan los asombrosos costes y la evoluci\u00f3n de las estrategias en este ciberjuego de altas apuestas.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aluvi\u00f3n de ransomware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El ransomware sigui\u00f3 proyectando una larga sombra en 2022, afectando a un sorprendente 71% de las empresas. Estos ataques maliciosos pasaron factura a las empresas, caus\u00e1ndoles importantes p\u00e9rdidas. Entre los pa\u00edses m\u00e1s afectados, Austria se llev\u00f3 la peor parte de los ataques de ransomware.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-1024x575.jpg\" alt=\"\" class=\"wp-image-58604\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-6-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-0mWSQkMp\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El \u00e9xito hist\u00f3rico de Costa Rica<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En un sombr\u00edo r\u00e9cord, el gobierno de Costa Rica se convirti\u00f3 en v\u00edctima del ataque de ransomware m\u00e1s masivo jam\u00e1s documentado. Es un recordatorio aleccionador de la audacia de los ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-1024x575.jpg\" alt=\"\" class=\"wp-image-58605\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164231.193-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-SueCopFP\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Pagar el precio<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Cuando se trata de hacer frente a los ataques de ransomware, los profesionales de TI se enfrentan a menudo a una dif\u00edcil decisi\u00f3n. Seg\u00fan Statista, un considerable 72% de ellos recurri\u00f3 al pago del rescate en 2022. Esto subraya la grave situaci\u00f3n en la que se encuentran las organizaciones cuando intentan recuperar sus datos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-1024x575.jpg\" alt=\"\" class=\"wp-image-58606\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-12-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-cBbdf2Qv\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Carrera contrarreloj<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Detectar un ataque de ransomware no es un proceso r\u00e1pido. Por t\u00e9rmino medio, se tardan unos preocupantes 49 d\u00edas en identificar un ataque de este tipo. Durante este tiempo, las empresas y organizaciones siguen siendo vulnerables, con sus datos secuestrados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-1024x575.jpg\" alt=\"\" class=\"wp-image-58607\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164630.326-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-g3DJt4at\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Objetivos cambiantes<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los atacantes de ransomware tienen un don para la adaptabilidad. En el segundo trimestre de 2022, el sector de bienes y servicios industriales fue el principal objetivo, sintiendo el calor de estos ataques.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Sin embargo, hay un rayo de esperanza, ya que en el tercer trimestre de 2022 se produjo un descenso del 10,5% en la actividad del ransomware en comparaci\u00f3n con el trimestre anterior.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-1024x575.jpg\" alt=\"\" class=\"wp-image-58608\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T164747.272-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-ywkzQt5u\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aumenta el ransomware como servicio (RaaS)<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El panorama del ransomware est\u00e1 evolucionando, y una tendencia preocupante es el auge del ransomware como servicio (RaaS). S\u00f3lo en la primera mitad del a\u00f1o, se inform\u00f3 de la asombrosa cifra de 67 ofertas activas de RaaS.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Esto significa que incluso aquellos sin grandes conocimientos t\u00e9cnicos pueden entrar en la acci\u00f3n del ransomware, convirti\u00e9ndolo en una amenaza m\u00e1s extendida.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-1024x575.jpg\" alt=\"\" class=\"wp-image-58609\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/In-just-the-first-half-of-the-year-a-staggering-67-active-RaaS-offerings-were-reported-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-s4frwSwr\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas DDoS 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Prep\u00e1rese para un viaje al mundo del bombardeo cibern\u00e9tico con las Estad\u00edsticas DDoS para 2023, donde exploramos la creciente ola de ataques distribuidos de denegaci\u00f3n de servicio y su impacto.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">DDoS: Una amenaza creciente<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El espectro de los ataques distribuidos de denegaci\u00f3n de servicio (DDoS) se cerni\u00f3 sobre 2022, con un preocupante aumento del 60% en ataques maliciosos durante la primera mitad del a\u00f1o, seg\u00fan Govtech.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Este aumento incesante de los ataques demostr\u00f3 la creciente destreza de los ciberdelincuentes en el manejo de esta arma disruptiva.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-1024x575.jpg\" alt=\"\" class=\"wp-image-58610\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/60-19-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-5ueKsAqh\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Mirai desata el caos<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Entre los mayores ataques DDoS, una formidable variante de la red de bots Mirai caus\u00f3 estragos con un colosal ataque de 2,5 Tbps. \u00bfSu objetivo? Un servidor de Minecraft.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Este asombroso ataque, del que informa Cloudflare, sirve como crudo recordatorio del poder y la audacia de los atacantes DDoS.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-1024x575.jpg\" alt=\"\" class=\"wp-image-58611\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/Mirai-botnet-variant-wreaked-havoc-with-a-colossal-2.5-Tbps-attack.-Its-target-A-Minecraft-server-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-rHrWNvot\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aumentan los DDoS HTTP<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Cloudflare tambi\u00e9n observ\u00f3 un fuerte repunte de los ataques DDoS HTTP, con un asombroso aumento interanual de 111%. Estos ataques dirigidos a la capa de aplicaci\u00f3n web pueden paralizar los servicios en l\u00ednea, lo que supone una amenaza significativa para las empresas y organizaciones<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-1024x575.jpg\" alt=\"\" class=\"wp-image-58612\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165559.854-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-ZckJHeUJ\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Juegos y apuestas en el punto de mira<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En el mundo de los DDoS, algunas industrias resultaron m\u00e1s vulnerables que otras. El sector del juego y las apuestas se encontr\u00f3 de lleno en el punto de mira de los ataques DDoS L3\/4.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Estos ataques en las capas de red y transporte pueden interrumpir las plataformas de juego en l\u00ednea y los sitios web de apuestas, provocando el caos para los usuarios y p\u00e9rdidas financieras para las empresas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-1024x575.jpg\" alt=\"\" class=\"wp-image-58613\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T165745.420-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-l0QrKfCX\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Ataques BEC 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Ad\u00e9ntrese en el complejo reino de los ataques de compromiso del correo electr\u00f3nico empresarial (BEC) en 2023, donde descubrimos la creciente preocupaci\u00f3n de las empresas y la batalla por ir un paso por delante de los ciberdelincuentes.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Ataques BEC: Una amenaza dominante<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En el turbulento panorama de la ciberseguridad, una amenaza que realmente destac\u00f3 en 2022 fueron los ataques Business Email Compromise (BEC).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Estos ataques representaron la asombrosa cifra de 34% de todos los ciberataques, seg\u00fan Arctic Wolf. Este tipo de ataque se convirti\u00f3 r\u00e1pidamente en un gran quebradero de cabeza para las empresas de todos los tama\u00f1os, dejando a las organizaciones lidiando con una amenaza cada vez mayor.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-1024x575.jpg\" alt=\"\" class=\"wp-image-58614\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-7-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-NaQZ6DaW\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">AMF: La pieza del puzzle que faltaba<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Una de las revelaciones m\u00e1s alarmantes fue que un impactante 80% de las organizaciones que fueron v\u00edctimas de ataques BEC carec\u00edan de la salvaguarda de la autenticaci\u00f3n multifactor (MFA).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Esta vulnerabilidad convirti\u00f3 en pan comido para los piratas inform\u00e1ticos infiltrarse y acceder a datos y sistemas sensibles. Es un recordatorio aleccionador de la importancia de la AMF en el panorama digital actual.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-1024x575.jpg\" alt=\"\" class=\"wp-image-58615\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-17-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-7yfgCJld\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Un cambio de prioridades<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Avance r\u00e1pido hasta 2023 y la narrativa est\u00e1 cambiando. La friolera de 80% de las organizaciones, seg\u00fan la encuesta de Sonicwall, reconocen ahora la importancia cr\u00edtica de protegerse contra los ataques BEC.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Este cambio subraya la naturaleza evolutiva de las preocupaciones en materia de ciberseguridad, ya que las organizaciones reconocen la necesidad apremiante de defenderse contra esta forma particularmente insidiosa de ciberamenaza.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-1024x575.jpg\" alt=\"\" class=\"wp-image-58616\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-18-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-iHrCeSoR\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de ciberseguridad IoT 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Sum\u00e9rjase en el mundo interconectado de las estad\u00edsticas de ciberseguridad de la IoT para 2023, destacando las vulnerabilidades, las brechas y la creciente superficie de ataque en la Internet de los objetos.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">IoT: Una frontera creciente para los piratas inform\u00e1ticos<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El Internet de las cosas (IoT) est\u00e1 en pleno auge, con casi 24.000 millones de dispositivos y unidades de tecnolog\u00eda de operaciones repartidos por todo el planeta. Es un vasto terreno de juego para los piratas inform\u00e1ticos, que cocinan constantemente nuevos e innovadores programas maliciosos para sembrar el caos en el ecosistema de la IoT.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Los profesionales de la ciberseguridad son muy conscientes de que la IoT y la OT (tecnolog\u00eda de operaciones) ampl\u00edan enormemente el campo de juego para los ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-1024x575.jpg\" alt=\"\" class=\"wp-image-58617\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170434.690-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-X6dbBLE6\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Una marea asombrosa de infracciones<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">S\u00f3lo en la primera mitad de 2022, se inform\u00f3 de la asombrosa cifra de 1.510 millones de infracciones del IoT. Esta cifra alucinante subraya el colosal reto al que se enfrentan las organizaciones para salvaguardar sus ecosistemas IoT.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">La magnitud de estas brechas es un duro recordatorio de la naturaleza implacable de las ciberamenazas en el \u00e1mbito del IoT.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-1024x575.jpg\" alt=\"\" class=\"wp-image-58618\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170603.246-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-e8nscM1C\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El enigma de la visibilidad<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Una tendencia preocupante es que un 51% significativo de los equipos de TI est\u00e1n en la oscuridad acerca de los tipos de dispositivos conectados a sus redes. Esta falta de visibilidad y control sobre el panorama del IoT deja a las organizaciones vulnerables a las posibles vulnerabilidades que acechan a sus sistemas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-1024x575.jpg\" alt=\"\" class=\"wp-image-58619\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/51-6-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-ukvLzq8I\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas del criptojacking 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Descubra el mundo encubierto de la miner\u00eda de criptodivisas con las Estad\u00edsticas del Criptojacking para 2023, donde profundizamos en los problemas del sector financiero con las criptodivisas y en la escalada de las amenazas.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aumenta el criptojacking<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los ataques de criptojacking, especialmente en el sector financiero, experimentaron un alarmante aumento en 2022. Los incidentes se dispararon en un asombroso 269%, dejando a las instituciones financieras lidiando con esta amenaza en constante evoluci\u00f3n.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-1024x575.jpg\" alt=\"\" class=\"wp-image-58620\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T170951.143-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-pkKEvjTu\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Afectando a miles<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El impacto del criptojacking es generalizado, con m\u00e1s de 500.000 usuarios v\u00edctimas de software de miner\u00eda malicioso s\u00f3lo en el primer trimestre de 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Estos ataques furtivos suelen volar bajo el radar, desviando potencia de c\u00e1lculo para minar criptodivisas. Curiosamente, Monero (XMR) emergi\u00f3 como la primera opci\u00f3n para los criptojackers, destacando su popularidad entre los ciberdelincuentes, seg\u00fan Kaspersky.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-1024x575.jpg\" alt=\"\" class=\"wp-image-58621\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171200.525-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-NLOSKmeB\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Millones perdidos<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El sector financiero se llev\u00f3 la peor parte de estos ataques, con la friolera de 66,7 millones de casos denunciados en el primer semestre de 2022. Estos incidentes provocaron p\u00e9rdidas asombrosas, por valor de hasta $3 billones de criptomonedas. Es un duro recordatorio del impacto financiero que pueden tener estos ataques.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-1024x575.jpg\" alt=\"\" class=\"wp-image-58622\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/The-financial-sector-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-IQkxzRdn\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Roturas de puentes entre cadenas<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los puentes entre cadenas, componentes cruciales en el mundo de las criptomonedas, no escaparon al punto de mira de los atacantes. Las brechas que se produjeron en 2022 causaron p\u00e9rdidas por valor de $1.400 millones. Estos puentes conectan diferentes blockchains, y su seguridad es primordial para la integridad de todo el criptoecosistema.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-1024x575.jpg\" alt=\"\" class=\"wp-image-58623\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T171647.343-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-SYv4nQEH\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Atraco r\u00e9cord<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Poniendo de relieve la gravedad y sofisticaci\u00f3n de estas amenazas a la seguridad, el mayor ciberataque en el espacio de las criptomonedas hasta la fecha cost\u00f3 la friolera de $615 millones. Sirve como un duro recordatorio de que el mundo de las criptodivisas, aunque prometedor, tambi\u00e9n est\u00e1 plagado de riesgos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-1024x575.jpg\" alt=\"\" class=\"wp-image-58624\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/the-largest-cyber-attack-in-the-crypto-space-to-date-cost-a-jaw-dropping-615-million-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-bTF8Dnme\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de ciberseguridad 2023 por tipos u objetivos<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Emb\u00e1rquese en un exhaustivo viaje a trav\u00e9s del variado panorama de las ciberamenazas en 2023, explorando las estad\u00edsticas clasificadas por tipos de ataque y objetivos, que revelan los polifac\u00e9ticos retos de la defensa digital.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Seguridad de los sitios web: Un imperativo creciente<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En el panorama digital actual, la seguridad de los sitios web se ha convertido en una preocupaci\u00f3n primordial, y las estad\u00edsticas pintan un cuadro claro de los retos que se plantean.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-1024x575.jpg\" alt=\"\" class=\"wp-image-58626\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174153.184-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-YQx4hvK4\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Incesantes intentos de pirateo<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Seg\u00fan un informe de DWG, el campo de batalla digital est\u00e1 activo 24 horas al d\u00eda, 7 d\u00edas a la semana. La asombrosa cifra de 50.000 sitios web son v\u00edctimas de la pirater\u00eda inform\u00e1tica a diario, y un sitio web se enfrenta a un ataque cada 39 segundos. Es una embestida implacable a la que organizaciones y particulares deben hacer frente.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-1024x575.jpg\" alt=\"\" class=\"wp-image-58627\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174320.720-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-e3W4H8a8\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Amenazas cr\u00edticas al acecho<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El panorama de las amenazas dista mucho de ser benigno, ya que se ha descubierto que un preocupante 18% de los sitios web contienen amenazas de gravedad cr\u00edtica. Estas vulnerabilidades pueden exponer datos sensibles y causar estragos en la funcionalidad de un sitio web.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-1024x575.jpg\" alt=\"\" class=\"wp-image-58628\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-8-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-jThmBLde\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Una epidemia de malware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La asombrosa cifra de 4,1 millones de sitios web albergan programas maliciosos en un momento dado. Esta insidiosa presencia de software malicioso supone una importante amenaza tanto para los propietarios de los sitios web como para sus visitantes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-1024x575.jpg\" alt=\"\" class=\"wp-image-58629\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T174610.198-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-LiwHdsaB\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El comercio electr\u00f3nico bajo asedio<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los sitios web de comercio electr\u00f3nico son especialmente vulnerables, ya que en ellos se ha producido la asombrosa cifra de 75% de incidentes de fraude y robo de datos, seg\u00fan informa GM Security. Estas plataformas manejan grandes cantidades de informaci\u00f3n sensible de los clientes, lo que las convierte en objetivos atractivos para los ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-1024x575.jpg\" alt=\"\" class=\"wp-image-58630\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-15-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-F8R6jntT\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">La batalla contra los robots<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los sitios web no s\u00f3lo est\u00e1n plagados de atacantes humanos, sino que tambi\u00e9n se enfrentan a un importante tr\u00e1fico de bots. Un informe de Sitelock revela que los sitios web reciben aproximadamente 2603 visitas de tr\u00e1fico de bots a la semana.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Estos bots pueden realizar actividades que van desde el scraping de contenidos hasta el lanzamiento de ataques DDoS, lo que supone un reto polifac\u00e9tico para los propietarios de sitios web.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-1024x575.jpg\" alt=\"\" class=\"wp-image-58631\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/websites-receive-approximately-2603-bot-traffic-hits-per-week-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-lMk4Qj0N\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de seguridad m\u00f3vil 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Navegue por los mares siempre cambiantes de la seguridad m\u00f3vil con las Estad\u00edsticas de seguridad m\u00f3vil para 2023, que desvelan los riesgos, los comportamientos de los usuarios y las tendencias del mercado que configuran el futuro de la protecci\u00f3n m\u00f3vil.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Presencia persistente del adware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La seguridad m\u00f3vil sigue siendo una preocupaci\u00f3n acuciante, ya que el adware representa un considerable 25,28% de los incidentes de seguridad, seg\u00fan informa Kaspersky. Esta amenaza se ve subrayada por la detecci\u00f3n de la asombrosa cifra de 405.684 paquetes de instalaci\u00f3n maliciosos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-1024x575.jpg\" alt=\"\" class=\"wp-image-58632\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175202.318-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-uI3VUFjE\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Phishing en movimiento<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El cambio a los dispositivos m\u00f3viles no ha pasado desapercibido para los ciberdelincuentes. Un alarmante 75% de los sitios de phishing est\u00e1n ahora especialmente dise\u00f1ados para dispositivos m\u00f3viles, seg\u00fan revela Zimperium.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Lo que hace que esto sea a\u00fan m\u00e1s preocupante es que 53% de los dispositivos m\u00f3viles tienen acceso a m\u00e1s datos sensibles, lo que los convierte en objetivos atractivos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-1024x575.jpg\" alt=\"\" class=\"wp-image-58633\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/75-16-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-WGP3TDEv\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Vigilancia en la App Store<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las tiendas de aplicaciones m\u00f3viles est\u00e1n intensificando su juego para contrarrestar estas amenazas. Google y Apple han bloqueado colectivamente 1,2 millones y 1,6 millones de aplicaciones sospechosas. Estas medidas son cruciales para eliminar las amenazas potenciales.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-1024x575.jpg\" alt=\"\" class=\"wp-image-58634\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175423.467-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-iRG41u6F\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El papel del comportamiento del usuario<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las brechas de seguridad m\u00f3vil no son \u00fanicamente el resultado de amenazas externas. El comportamiento de los usuarios desempe\u00f1a un papel fundamental, ya que el 44% de las empresas atribuyen las brechas de seguridad m\u00f3vil a las acciones de los usuarios, seg\u00fan Verizon. Esto pone de relieve la importancia de educar a los usuarios de m\u00f3viles sobre las mejores pr\u00e1cticas de seguridad.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-1024x575.jpg\" alt=\"\" class=\"wp-image-58635\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/44-7-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-ZW8eQvWE\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Phishing sobre la marcha<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los correos electr\u00f3nicos de phishing no se limitan a los ordenadores de sobremesa. Una revelaci\u00f3n interesante es que el 18% de los clics en correos electr\u00f3nicos de phishing se originan en dispositivos m\u00f3viles. Esto subraya la necesidad de medidas de seguridad m\u00f3viles s\u00f3lidas para protegerse contra los intentos de phishing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-1024x575.jpg\" alt=\"\" class=\"wp-image-58636\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/18-9-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-epfkhhKK\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Crecimiento del mercado y variaciones mundiales<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El mercado mundial de la seguridad m\u00f3vil est\u00e1 preparado para un crecimiento sustancial, y se espera que alcance los $14,82 mil millones en 2028. Mientras tanto, los usuarios de m\u00f3viles en Australia e Ir\u00e1n se enfrentan a mayores amenazas, con tasas de encuentro de 27% y 24% con amenazas de aplicaciones m\u00f3viles, respectivamente.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-1024x575.jpg\" alt=\"\" class=\"wp-image-58638\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T175914.779-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-5qp9Ex7V\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Problemas de seguimiento<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El rastreo no se limita a los sitios web. Las aplicaciones m\u00f3viles de las revistas tienen el mayor n\u00famero de rastreadores, mientras que los gigantes de las redes sociales como YouTube y TikTok tambi\u00e9n est\u00e1n cargados de mecanismos de rastreo. Esto pone de relieve la necesidad de que los usuarios sean cautelosos con los datos que comparten a trav\u00e9s de las aplicaciones m\u00f3viles.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-1024x575.jpg\" alt=\"\" class=\"wp-image-58640\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180114.861-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-DjVP0cXm\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Retos BYOD<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Por \u00faltimo, una tendencia destacable es que el 41% de las empresas permite a los empleados utilizar sus tel\u00e9fonos personales para acceder a los sistemas y datos corporativos. Aunque esto ofrece flexibilidad, tambi\u00e9n plantea retos para la seguridad m\u00f3vil, ya que las organizaciones tienen que equilibrar la comodidad con la salvaguarda de los datos sensibles.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-1024x575.jpg\" alt=\"\" class=\"wp-image-58642\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-7-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-ecl7MKwd\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de seguridad de las API en 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Abra la puerta al mundo de la seguridad de las interfaces de programaci\u00f3n de aplicaciones (API) con las Estad\u00edsticas de seguridad de las API para 2023, donde exploramos las vulnerabilidades, los incidentes y las tendencias del mercado en torno a este aspecto cr\u00edtico de la infraestructura digital.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Seguridad de las API: Una preocupaci\u00f3n acuciante<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La seguridad de las API se est\u00e1 convirtiendo en una preocupaci\u00f3n cr\u00edtica en el panorama digital actual, y las estad\u00edsticas pintan un panorama aleccionador de los retos a los que nos enfrentamos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-1024x575.jpg\" alt=\"\" class=\"wp-image-58644\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T180425.526-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-q4h9EbBe\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Incidencia<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Un informe de Venturebeat revela que un significativo 41% de las organizaciones experimentaron un incidente de seguridad de la API el a\u00f1o pasado. Lo que es m\u00e1s alarmante es que 63% de estos incidentes estuvieron relacionados con filtraciones o p\u00e9rdidas de datos, lo que pone de relieve las graves consecuencias de las vulnerabilidades de las API.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-1024x575.jpg\" alt=\"\" class=\"wp-image-58646\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/41-8-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-mtUBQxjD\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">APIs: El n\u00facleo del tr\u00e1fico web<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las API son el alma de Internet, y representan la asombrosa cifra de 91% de todo el tr\u00e1fico web. Esta prevalencia las convierte en un objetivo primordial para los atacantes que buscan explotar vulnerabilidades.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El tr\u00e1fico malicioso de API se dispar\u00f3 en la asombrosa cifra de 681% en 2022, seg\u00fan Salt Labs. Adem\u00e1s, se produjo un desalentador aumento de 286% en las amenazas a las API trimestre tras trimestre, lo que subraya la naturaleza implacable de estos ataques.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-1024x575.jpg\" alt=\"\" class=\"wp-image-58647\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-5-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-Ox0Mcmkf\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Lagunas de la estrategia de seguridad<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">A pesar de la escalada de las amenazas, muchas organizaciones a\u00fan no han implantado medidas de seguridad adecuadas para las API. El informe de Salt Labs pinta un panorama preocupante, con 34% de organizaciones que carecen de una estrategia de seguridad de API definida.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adem\u00e1s, 62% de las organizaciones tuvieron que ralentizar el despliegue de nuevas aplicaciones debido a preocupaciones sobre la seguridad de las API. Un obst\u00e1culo importante es la falta de experiencia o recursos, citada por 35% de los encuestados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-1024x575.jpg\" alt=\"\" class=\"wp-image-58648\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/34-8-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-VvQEf00X\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Datos sensibles en peligro<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Una de las preocupaciones m\u00e1s importantes en la seguridad de las API es la exposici\u00f3n de datos sensibles. Seg\u00fan Venturebeat, un asombroso 91% de API expuso abiertamente informaci\u00f3n de identificaci\u00f3n personal (IPI) y datos sensibles a los actores de amenazas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Se trata de una vulnerabilidad flagrante que debe abordarse para proteger la privacidad y los datos de las personas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-1024x575.jpg\" alt=\"\" class=\"wp-image-58650\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/91-6-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-N1SydW42\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de ciberseguridad sanitaria 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Ad\u00e9ntrese en el terreno cr\u00edtico de las Estad\u00edsticas de ciberseguridad sanitaria para 2023, donde desvelamos los incesantes ataques, brechas y esfuerzos por asegurar los datos y servicios m\u00e9dicos sensibles.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">La batalla de la sanidad contra las ciberamenazas<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El sector sanitario se enfrenta a un aluvi\u00f3n persistente de ciberamenazas, con la friolera de 125 infracciones registradas s\u00f3lo en el primer trimestre de 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Entre estas amenazas, los ataques de ransomware han surgido como una amenaza significativa, dirigida constantemente a las organizaciones sanitarias.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-1024x575.jpg\" alt=\"\" class=\"wp-image-58651\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181152.411-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-hfphV5HD\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Infracciones notables<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En septiembre de 2022, el Hospital New York-Presbyterian (NYP) inform\u00f3 de una filtraci\u00f3n de datos que afect\u00f3 a unas 12.000 personas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Del mismo modo, Aveanna Healthcare se enfrent\u00f3 a una serie de filtraciones de datos relacionadas con el phishing, que dieron lugar a un importante pago de $425.000. Estas filtraciones subrayan las consecuencias y los costes de largo alcance de los fallos en la seguridad de los datos sanitarios.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-1024x575.jpg\" alt=\"\" class=\"wp-image-58652\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/sasafs-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-3LU7c3Ij\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Impacto global<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La vulnerabilidad de la industria sanitaria no se limita a una regi\u00f3n espec\u00edfica. El sector sanitario indio, por ejemplo, tuvo que hacer frente a la asombrosa cifra de 1,9 millones de ataques denunciados hasta noviembre de 2022. Esta naturaleza global de las ciberamenazas plantea retos a los sistemas sanitarios de todo el mundo.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-1024x575.jpg\" alt=\"\" class=\"wp-image-58653\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181516.178-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-Irk6BiJq\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Riesgos de terceros<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las filtraciones de datos de terceros tambi\u00e9n han dejado huella en la atenci\u00f3n sanitaria, con un \u00fanico incidente que afect\u00f3 a 119 consultas pedi\u00e1tricas y a 2,2 millones de pacientes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Estos incidentes ponen de relieve la necesidad de adoptar medidas de seguridad s\u00f3lidas no s\u00f3lo dentro de las organizaciones sanitarias, sino tambi\u00e9n entre sus socios externos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-1024x575.jpg\" alt=\"\" class=\"wp-image-58658\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181656.395-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-t2Ucfj11\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El crecimiento del mercado refleja el desaf\u00edo<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La magnitud de los retos de ciberseguridad a los que se enfrenta la industria sanitaria se refleja en las tendencias del mercado. Se prev\u00e9 que el mercado mundial de la ciberseguridad sanitaria crezca de $13.180 millones en 2021 a una cifra estimada de $15.700 millones en 2022. Este crecimiento es un testimonio del reconocimiento por parte del sector de la acuciante necesidad de fortificar sus defensas contra las ciberamenazas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-1024x575.jpg\" alt=\"\" class=\"wp-image-58660\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T181848.974-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-2FuwLwx1\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas sobre ciberseguridad en la educaci\u00f3n 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">\u00danase a nosotros en las aulas digitales de Estad\u00edsticas de ciberseguridad en la educaci\u00f3n para 2023, donde examinamos los persistentes retos a los que se enfrentan las instituciones educativas, desde los ataques DDoS a los incidentes de ransomware.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">La educaci\u00f3n asediada<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las instituciones educativas de Estados Unidos y Europa se han enfrentado el a\u00f1o pasado a los incesantes ataques de bandas de ransomware como Hive y Lockbit.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ha sido una dura batalla para la industria de la educaci\u00f3n, con una asombrosa media de casi 2.000 ataques denunciados por organizaci\u00f3n cada semana en 2022.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-1024x575.jpg\" alt=\"\" class=\"wp-image-58661\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182212.271-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-rYb8VE2e\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">ANZ se lleva la peor parte<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La regi\u00f3n ANZ (Australia y Nueva Zelanda) soport\u00f3 la carga m\u00e1s pesada, siendo testigo del mayor n\u00famero de ataques dirigidos a escuelas y universidades. Esta regi\u00f3n se enfrent\u00f3 a un ataque concentrado de ciberamenazas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-1024x575.jpg\" alt=\"\" class=\"wp-image-58662\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182546.527-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-pRXH1gKP\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Phishing: una t\u00e1ctica habitual<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El phishing se ha revelado como un vector de ataque omnipresente que asola el sector educativo. Seg\u00fan un informe de Pondurance, los piratas inform\u00e1ticos a menudo se hacen pasar por funcionarios de los centros escolares, desplegando correos electr\u00f3nicos y sitios web falsos para enga\u00f1ar a los estudiantes y al personal y conseguir que divulguen sus credenciales de acceso.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Una vez en posesi\u00f3n de estas credenciales, los ciberdelincuentes pueden acceder a datos confidenciales o lanzar ataques m\u00e1s sofisticados contra los sistemas de la escuela.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-1024x575.jpg\" alt=\"\" class=\"wp-image-58663\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T182735.019-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-UFeZbBgL\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Las crecientes amenazas de Am\u00e9rica Latina<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En Am\u00e9rica Latina, el panorama de las amenazas experiment\u00f3 un preocupante aumento del 62% en los ciberataques en julio de 2022, con el sector educativo directamente en el punto de mira. Las instituciones educativas de esta regi\u00f3n se enfrentaron a importantes retos a la hora de defenderse de estas embestidas digitales.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-1024x575.jpg\" alt=\"\" class=\"wp-image-58664\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/62-9-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-u9nOOv8l\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Las escuelas de EE.UU. bajo fuego<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En Estados Unidos, las escuelas no se han librado de los ciberataques, que han provocado la exposici\u00f3n de datos sensibles pertenecientes a m\u00e1s de un mill\u00f3n de alumnos actuales y antiguos.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un caso alarmante es el de Nueva York, donde 565 escuelas se vieron afectadas por ciberataques, lo que subraya la urgente necesidad de reforzar las medidas de seguridad para proteger a las instituciones educativas de las ciberamenazas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-1024x575.jpg\" alt=\"\" class=\"wp-image-58665\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184447.341-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-oj6pvenr\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas de ciberseguridad de los servicios financieros en 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Entre en el mundo de alto riesgo de las estad\u00edsticas de ciberseguridad de los servicios financieros para 2023, descubriendo la escalada de las amenazas, las p\u00e9rdidas financieras y los esfuerzos para salvaguardar el sector contra los ciberadversarios.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Mercado negro de datos de tarjetas de cr\u00e9dito<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La asombrosa cifra de 17,5 millones de registros de tarjetas de cr\u00e9dito se vendieron en los mercados negros. El comercio il\u00edcito de estos datos financieros pone de manifiesto la naturaleza lucrativa y oscura de las actividades de los ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-1024x575.jpg\" alt=\"\" class=\"wp-image-58666\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184614.012-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-eGSq08p1\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aluvi\u00f3n de ransomware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los ataques de ransomware han experimentado un asombroso aumento de 1.300% en los \u00faltimos a\u00f1os dentro del sector financiero. Este alarmante repunte pone de manifiesto la creciente audacia y sofisticaci\u00f3n de los ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-1024x575.jpg\" alt=\"\" class=\"wp-image-58669\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184750.016-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-wGpVPlDY\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">La prevalencia del phishing<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El phishing sigue siendo el arma preferida para los ciberataques, ya que los piratas inform\u00e1ticos han registrado m\u00e1s de 10.000 dominios de phishing para hacerse pasar por instituciones financieras. Esta t\u00e1ctica enga\u00f1osa se aprovecha de individuos y organizaciones desprevenidos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-1024x575.jpg\" alt=\"\" class=\"wp-image-58671\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T184938.154-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-zspuKK5h\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Problemas de autenticaci\u00f3n<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Una estad\u00edstica preocupante de Security Boulevard revela que la friolera de 80% de las organizaciones sufrieron al menos una brecha relacionada con una autenticaci\u00f3n d\u00e9bil. Esta vulnerabilidad subraya la importancia de unas medidas de autenticaci\u00f3n s\u00f3lidas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-1024x575.jpg\" alt=\"\" class=\"wp-image-58675\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/80-19-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-xPu4Iyr1\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aumentan los ataques DDoS en el Reino Unido<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En el Reino Unido, el sector financiero tuvo que hacer frente a un aumento del 4% en ataques de denegaci\u00f3n de servicio distribuido (DDoS) en comparaci\u00f3n con el a\u00f1o anterior. Los actores de las amenazas evolucionan continuamente sus t\u00e1cticas para perturbar los servicios financieros.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-1024x575.jpg\" alt=\"\" class=\"wp-image-58677\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/4-7-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-8H4MlHkC\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El ascenso del malware bancario<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El malware bancario, ejemplificado por amenazas como MaliBot, ha escalado hasta el tercer puesto en la lista de malware m\u00f3vil m\u00e1s prevalente, seg\u00fan ha identificado Checkpoint. Esto demuestra la capacidad de adaptaci\u00f3n de los ciberdelincuentes para atacar al sector financiero.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-1024x575.jpg\" alt=\"\" class=\"wp-image-58678\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T190224.146-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-pwWL4RZT\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Los operadores de la red oscura, en el punto de mira de las finanzas<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los informes sugieren que el 79% de los profesionales de TI creen que el sector bancario es un objetivo f\u00e1cil para los operadores de la darknet. El atractivo de los datos y activos financieros lo convierte en un objetivo primordial para las actividades nefastas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-1024x575.jpg\" alt=\"\" class=\"wp-image-58679\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/79-5-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-3Ho4dKCR\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Impacto asombroso<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Las consecuencias de estos ciberataques en el mundo real son colosales, como se ha visto en incidentes como el caso Transit Finance, en el que un pirata inform\u00e1tico rob\u00f3 $29 millones.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adem\u00e1s, un significativo 71% de organizaciones fueron v\u00edctimas de ataques o intentos de fraude en los pagos, lo que subraya el coste financiero de estos ataques.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-1024x575.jpg\" alt=\"\" class=\"wp-image-58682\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/71-7-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-hNjPawyt\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Estad\u00edsticas sobre ciberseguridad gubernamental 2023<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Prep\u00e1rese para navegar por el complejo panorama de las estad\u00edsticas de ciberseguridad gubernamental para 2023, donde exploramos la creciente oleada de ataques a las organizaciones gubernamentales y sus estrategias para defenderse de las ciberamenazas.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Aumento alarmante de los ataques<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En los \u00faltimos seis meses de 2022 se produjo un asombroso aumento 95% de los ciberataques dirigidos a organizaciones gubernamentales. Este aumento de los ataques subraya la naturaleza implacable y evolutiva de las ciberamenazas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-1024x575.jpg\" alt=\"\" class=\"wp-image-58686\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/95-3-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-dTMrtbyS\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">La vulnerabilidad de Vanuatu al descubierto<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">En noviembre de 2022, el gobierno de Vanuatu fue v\u00edctima de un ciberataque que puso en peligro sus sitios oficiales y servicios en l\u00ednea. Este incidente dej\u00f3 al gobierno vulnerable a las violaciones de datos y suscit\u00f3 acuciantes preocupaciones sobre la seguridad de la informaci\u00f3n sensible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-1024x575.jpg\" alt=\"\" class=\"wp-image-58691\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191256.830-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-63tRvud8\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Peaje financiero<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">El coste financiero de estos ataques puede ser astron\u00f3mico. Un condado de Colorado, por ejemplo, perdi\u00f3 la importante cantidad de $238.000 a manos de los piratas inform\u00e1ticos tras un ciberataque similar. La magnitud de las p\u00e9rdidas financieras sirve de crudo recordatorio del impacto econ\u00f3mico de las ciberamenazas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-1024x575.jpg\" alt=\"\" class=\"wp-image-58692\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191430.250-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-fZQtRhss\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">El coste del ransomware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los ataques de ransomware siguen siendo una amenaza importante. S\u00f3lo el gobierno de EE.UU. inform\u00f3 de p\u00e9rdidas superiores a $70 mil millones por ataques de ransomware desde 2018 hasta octubre de 2022. Estos ataques no s\u00f3lo interrumpen las operaciones, sino que tambi\u00e9n agotan valiosos recursos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-1024x575.jpg\" alt=\"\" class=\"wp-image-58696\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191600.501-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-dpwYItab\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Mitigar la amenaza<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Los gobiernos est\u00e1n tomando medidas proactivas para mitigar el impacto de los ciberataques. El gobierno del estado de Victoria, en Australia, destina $100.000 a la formaci\u00f3n en ciberseguridad adaptada a las mujeres.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Esta iniciativa no s\u00f3lo promueve la diversidad, sino que tambi\u00e9n dota al gobierno de mejores capacidades para hacer frente a las ciberamenazas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-1024x575.jpg\" alt=\"\" class=\"wp-image-58700\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/staff-2024-06-28T191819.492-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-IAN78ZWV\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Cifrado de ransomware<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">A pesar de los esfuerzos de mitigaci\u00f3n, los ataques de ransomware siguen siendo una amenaza persistente. Un asombroso 72% de las organizaciones gubernamentales estatales y locales que fueron v\u00edctimas del ransomware encontraron sus datos encriptados, lo que pone de relieve los desaf\u00edos para contrarrestar estos ataques con eficacia.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-1024x575.jpg\" alt=\"\" class=\"wp-image-58701\" srcset=\"https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-1024x575.jpg 1024w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-300x168.jpg 300w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-768x431.jpg 768w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-1536x862.jpg 1536w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-2048x1150.jpg 2048w, https:\/\/scottmax.com\/wp-content\/uploads\/2024\/06\/72-13-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-theme-palette-8-background-color has-background has-small-font-size wp-block-paragraph\">Fact checked 2026 | \t\t<a \n\t\t\tid=\"ctc-inline-UY0VSMhQ\"\n\t\t\tclass=\"ctc-shortcode ctc-shortcode--native\"\n\t\t\tdata-ctc-analytics=\"1\"\n\t\t\tdata-ctc-copy=\"https:\/\/scottmax.com\/cyber-security-statistics\/\"\n\t\t\tdata-ctc-success=\"Copied!\"\n\t\t\tdata-ctc-format=\"text\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"javascript:void(0);\"\n\t\t\t\ttitle=\"Copy to clipboard\"\n\t\t\t\t\t>\n\t\t\t<span class=\"ctc-shortcode__text\">https:\/\/scottmax.com\/cyber-security-statistics\/<\/span>\n\t\t\t<span class=\"ctc-shortcode__icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewbox=\"0 0 24 24\" stroke=\"currentColor\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M8 16H6a2 2 0 01-2-2V6a2 2 0 012-2h8a2 2 0 012 2v2m-6 12h8a2 2 0 002-2v-8a2 2 0 00-2-2h-8a2 2 0 00-2 2v8a2 2 0 002 2z\" \/><\/svg><\/span>\t\t\t<span class=\"ctc-shortcode__success\" aria-live=\"polite\"><\/span>\n\t\t<\/a>\n\t\t Esta imagen est\u00e1 libre de derechos de autor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Conclusi\u00f3n<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Al concluir nuestro viaje rel\u00e1mpago por la ciberseguridad en 2023, una cosa est\u00e1 muy clara: el \u00e1mbito digital es un campo de batalla din\u00e1mico, donde hay mucho en juego y los adversarios son implacables.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Desde las luchas de la industria sanitaria hasta la resistencia del sector financiero y los continuos retos a los que se enfrentan los gobiernos y las instituciones educativas, es evidente que ning\u00fan rinc\u00f3n del mundo digital es inmune a las ciberamenazas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Es un mundo en el que la vigilancia, la educaci\u00f3n y la colaboraci\u00f3n son primordiales, y en el que los individuos, las empresas y los gobiernos deben permanecer unidos frente a las siempre presentes ciberamenazas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As\u00ed pues, mant\u00e9ngase informado, permanezca alerta y hagamos de 2023 un a\u00f1o en el que el mundo digital se convierta en un lugar m\u00e1s seguro para todos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Preguntas frecuentes<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>1. \u00bfCu\u00e1l es el estado actual de las amenazas a la ciberseguridad en el sector educativo para 2023?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Las instituciones educativas est\u00e1n lidiando con una alarmante afluencia de ciberamenazas, experimentando casi 2.000 ataques semanales por organizaci\u00f3n en 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Estas amenazas van desde los ataques DDoS hasta el ransomware y el phishing, planteando importantes retos a la seguridad de los datos y perturbando el entorno de aprendizaje.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>2. \u00bfC\u00f3mo le ir\u00e1 al sector de los servicios financieros frente a las ciberamenazas en 2023?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Las instituciones financieras se enfrentan a un alarmante aumento de los ataques de ransomware. El phishing, la autenticaci\u00f3n d\u00e9bil y el malware m\u00f3vil como MaliBot plantean retos importantes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Los ciberataques han provocado importantes p\u00e9rdidas financieras, como el incidente de Transit Finance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>3. \u00bfCu\u00e1les son las tendencias clave en ciberseguridad gubernamental en 2023?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Las organizaciones gubernamentales han experimentado un preocupante 95% aumento de los ciberataques. Incidentes de gran repercusi\u00f3n, como la violaci\u00f3n de datos del gobierno de Vanuatu, ponen de relieve la vulnerabilidad de los sistemas gubernamentales.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Los esfuerzos para reforzar la ciberseguridad incluyen la inversi\u00f3n en formaci\u00f3n y diversidad, como se ha visto en Victoria (Australia).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>4. \u00bfCu\u00e1l es la situaci\u00f3n de la seguridad de las API en los \u00faltimos a\u00f1os?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Los incidentes relacionados con la seguridad de las API han aumentado, y 41% de las organizaciones informaron de infracciones en el \u00faltimo a\u00f1o. Las API constituyen 91% del tr\u00e1fico web, lo que las convierte en objetivos principales de los ataques. El tr\u00e1fico malicioso de API ha aumentado en 681%, lo que subraya la necesidad de medidas de seguridad robustas para las API.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>5. \u00bfC\u00f3mo afrontan las instituciones educativas los retos de la ciberseguridad en 2023?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Las instituciones educativas se enfrentaron a casi 2.000 ciberataques semanales por organizaci\u00f3n en 2022. Los ataques DDoS, el ransomware y el phishing son amenazas prevalentes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">En particular, el sector educativo del Reino Unido experiment\u00f3 un aumento del 4% en ataques DDoS. Estos ataques ponen en peligro la seguridad de los datos e interrumpen los entornos de aprendizaje.<\/p>","protected":false},"excerpt":{"rendered":"<p>Fact checked | Bienvenido al campo de batalla digital de 2023, donde las ciberamenazas evolucionan a un ritmo que marear\u00eda incluso al m\u00e1s experto de los hackers. En este art\u00edculo, nos embarcaremos en un apasionante viaje a trav\u00e9s de 76 fascinantes estad\u00edsticas sobre ciberseguridad que arrojan luz sobre el estado del mundo digital este a\u00f1o. Ag\u00e1rrese...<\/p>","protected":false},"author":151266,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[201],"tags":[260],"class_list":["post-30872","post","type-post","status-publish","format-standard","hentry","category-statistics","tag-cyber-security"],"taxonomy_info":{"category":[{"value":201,"label":"Statistics"}],"post_tag":[{"value":260,"label":"Cyber Security"}]},"featured_image_src_large":false,"author_info":{"display_name":"solution","author_link":"https:\/\/scottmax.com\/es\/author\/solution\/"},"comment_info":0,"category_info":[{"term_id":201,"name":"Statistics","slug":"statistics","term_group":0,"term_taxonomy_id":201,"taxonomy":"category","description":"","parent":0,"count":148,"filter":"raw","cat_ID":201,"category_count":148,"category_description":"","cat_name":"Statistics","category_nicename":"statistics","category_parent":0}],"tag_info":[{"term_id":260,"name":"Cyber Security","slug":"cyber-security","term_group":0,"term_taxonomy_id":260,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/posts\/30872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/users\/151266"}],"replies":[{"embeddable":true,"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/comments?post=30872"}],"version-history":[{"count":4,"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/posts\/30872\/revisions"}],"predecessor-version":[{"id":58702,"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/posts\/30872\/revisions\/58702"}],"wp:attachment":[{"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/media?parent=30872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/categories?post=30872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scottmax.com\/es\/wp-json\/wp\/v2\/tags?post=30872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}