{"id":11456,"date":"2023-03-22T10:47:08","date_gmt":"2023-03-22T09:47:08","guid":{"rendered":"https:\/\/www.pymelegal.es\/?p=11456"},"modified":"2023-03-22T10:47:08","modified_gmt":"2023-03-22T09:47:08","slug":"atacs-per-enginyeria-social-i-quins-tipus-existeixen","status":"publish","type":"post","link":"https:\/\/www.pymelegal.es\/ca\/noticias\/ciberseguretat\/atacs-per-enginyeria-social-i-quins-tipus-existeixen","title":{"rendered":"Atacs per enginyeria social i quins tipus existeixen"},"content":{"rendered":"<blockquote><p>Alguna vegada t\u2019has preguntat com afectaria un ciberatac en la teva empresa? Sabies que la majoria d\u2019ells s\u00f3n per enginyeria social?<\/p><\/blockquote>\n<p>Actualment, qualsevol empresa, sigui gran o petita, pot ser objectiu pels ciberdelinq\u00fcents. Totes les empreses tracten dades de gran valor i aquests poden ser utilitzats per perpetrar fraus o extorsionar. Per aix\u00f2, el 50% de les empreses han patit un <a href=\"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/que-es-un-ciberataque-y-como-evitarlo\"><span style=\"color: #00ccff;\"><strong>ciberatac<\/strong><\/span><\/a> que els ha paralitzat l\u2019activitat de l\u2019empresa.<\/p>\n<p>Necessites con\u00e8ixer quines s\u00f3n les principals ciberamenaces per poder-les identificar i evitar. Per aix\u00f2, en l\u2019article d\u2019avui et parlarem sobre els atacs per enginyeria social, que s\u00f3n els m\u00e9s habituals, ja que requereixen menys esfor\u00e7os que altres atacs i, per tant, el benefici \u00e9s major.<\/p>\n<h2><strong>Qu\u00e8 s\u00f3n els atacs per enginyeria social?<\/strong><\/h2>\n<p>Aquest tipus de ciberatacs es perpetua a partir de <strong>diferents t\u00e8cniques de manipulaci\u00f3 psicol\u00f2gica dirigides als usuaris <\/strong>(en el cas de les empreses sol ser dirigit als treballadors) amb l\u2019objectiu de fer-nos <strong>revelar informaci\u00f3 confidencial<\/strong> o de <strong>prendre el control dels dispositius i comptes. <\/strong><\/p>\n<p>Existeixen diferents tipus d\u2019atacs per enginyeria social, que estan basats en la <strong>manipulaci\u00f3 <\/strong>i l\u2019<strong>engany<\/strong>, encara que puguin tenir diferents conseq\u00fc\u00e8ncies i puguin ser un primer pas per cometre un atac per <em>malware<\/em>.<\/p>\n<h2><strong>Com es categoritzen els atacs per enginyeria social?<\/strong><\/h2>\n<p>Es poden categoritzar en dos tipus diferents segons les comunicacions que el ciberdelinq\u00fcent tingui per aconseguir el seu objectiu:<\/p>\n<ul>\n<li><strong>Hunting<\/strong>: L\u2019atac es comet amb <strong>nom\u00e9s una comunicaci\u00f3<\/strong>. Aquest tipus de t\u00e8cnica \u00e9s utilitzada en atacs de phishing o campanyes de malware, en les que envien campanyes massives sense tenir un objectiu concret i buscant que alg\u00fa caigui en l\u2019engany.<\/li>\n<li><strong>Farming<\/strong>: L\u2019atac es perpetra a partir de <strong>m\u00e9s d\u2019una comunicaci\u00f3<\/strong> amb la v\u00edctima fins a arribar a aconseguir l\u2019objectiu. Aquest tipus de t\u00e8cnica la veiem en campanyes de sextorsi\u00f3 o fraus del CEO.<\/li>\n<\/ul>\n<h2><strong>Quines s\u00f3n les fases dels atacs per enginyeria social?<\/strong><\/h2>\n<p>La majoria d\u2019atacs per enginyeria social comparteixen algunes caracter\u00edstiques en com\u00fa. Per aix\u00f2, saber recon\u00e8ixer-les abans de temps pot evitar que pateixis un d\u2019aquests atacs.<\/p>\n<p>Aquestes serien les fases principals:<\/p>\n<ul>\n<li><strong>Recol\u00b7lecci\u00f3 d\u2019informaci\u00f3<\/strong>: En aquesta fase el ciberdelinq\u00fcent recull tota la informaci\u00f3 sobre les possibles v\u00edctimes, esbrinant quin \u00e9s el seu correu electr\u00f2nic, els noms de domini de l\u2019empresa, els n\u00fameros de tel\u00e8fon, noms personals, etc.<\/li>\n<li><strong>Manipulaci\u00f3<\/strong>: Aquesta \u00e9s la fase m\u00e9s important de qualsevol atac, ja que \u00e9s on es produeix l\u2019atac en q\u00fcesti\u00f3. La majoria dels ciberdelinq\u00fcents tenen experi\u00e8ncia fent fraus, per aix\u00f2 saben utilitzar la manipulaci\u00f3 psicol\u00f2gica per generar una relaci\u00f3 de confian\u00e7a amb la v\u00edctima. Tamb\u00e9 juguen amb motius d\u2019urg\u00e8ncia, falta de pagaments o retirades de servei perqu\u00e8 s\u2019actu\u00ef m\u00e9s depressa i de forma m\u00e9s inconscient.<\/li>\n<li><strong>Sortida<\/strong>: L\u2019\u00faltima fase de l\u2019atac on el ciberdelinq\u00fcent intentar\u00e0 no ser descobert despr\u00e9s d\u2019haver com\u00e8s el frau perqu\u00e8 l\u2019impacte de l\u2019atac sigui encara major per l\u2019empresa.<\/li>\n<\/ul>\n<h2><strong>Quin \u00e9s el principal mitj\u00e0 de comunicaci\u00f3 per aquests atacs?<\/strong><\/h2>\n<p>El correu electr\u00f2nic sol ser el mitj\u00e0 preferit pels ciberdelinq\u00fcents, ja que la majoria d\u2019empreses i aut\u00f2noms utilitzen el correu en el seu dia a dia com a eina de treball.<\/p>\n<p>Al ser una tasca que moltes vegades realitzem de forma mec\u00e0nica i molt sovint, aix\u00f2 pot provocar que es converteixi en una eina perillosa, perqu\u00e8 podr\u00edem accedir a p\u00e0gines web fraudulentes sense adonar-nos-en.<\/p>\n<h2><strong>Quins tipus d\u2019atacs per enginyeria social existeixen?<\/strong><\/h2>\n<ul>\n<li><strong>Phishing, vishing i smishing<\/strong>: Aquests tres atacs per enginyeria social s\u00f3n molt similars. En tots ells <strong>el ciberdelinq\u00fcent envia un missatge suplantant la identitat d\u2019una entitat<\/strong> (banc, empresa, xarxa social, entitat p\u00fablica o servei t\u00e8cnic) de confian\u00e7a per aconseguir enganyar a la v\u00edctima a trav\u00e9s d\u2019un enlla\u00e7 o arxiu malici\u00f3s.<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">El <strong>phishing<\/strong> \u00e9s una estafa per <strong>correu, xarxes socials o missatgeria instant\u00e0nia<\/strong>, el <strong>vishing<\/strong> es duu a terme mitjan\u00e7ant <strong>trucades telef\u00f2niques<\/strong> i el <strong>smishing<\/strong> mitjan\u00e7ant els <strong>SMS<\/strong>.<\/p>\n<ul>\n<li><strong>Baiting (o Gancho)<\/strong>: Aquest atac es produeix a trav\u00e9s d\u2019un mitj\u00e0 f\u00edsic, com pot ser un dispositiu d\u2019emmagatzematge o USB, que els ciberdelinq\u00fcents col\u00b7loquen en llocs estrat\u00e8gics per infectar els equips o robar dades o informaci\u00f3 confidencial.<\/li>\n<li><strong>Shoulder surfing<\/strong>: Aquest tipus d\u2019atac consisteix en robar informaci\u00f3 (documents confidencials, claus, contrasenyes, contactes, credencials&#8230;) dels dispositius posicionant-se a prop de la v\u00edctima.<\/li>\n<li><strong>Dumpster Diving<\/strong>: \u00c9s un atac on el ciberdelinq\u00fcent busca en les escombraries dels nostres dispositius per obtenir informaci\u00f3 confidencial sobre l\u2019empresa.<\/li>\n<li><strong>Spam<\/strong>: Consisteix en l\u2019enviament de molts missatges publicitaris que no s\u00f3n desitjats ni han estat sol\u00b7licitats. Solen ser missatges comercials, per\u00f2 tamb\u00e9 poden amagar algun malware.<\/li>\n<li><strong>Fraus online<\/strong>: S\u00f3n estafes online amb els que pretenen enganyar-nos perqu\u00e8 revelem dades personals o confidencials amb les quals obtenir beneficis econ\u00f2mics a la nostra costa.<\/li>\n<\/ul>\n<h2><strong>Com podem evitar aquests atacs?<\/strong><\/h2>\n<p>Com t\u2019hem dit anteriorment, la majoria d\u2019atacs per enginyeria social compten amb unes caracter\u00edstiques similars. Pel que podr\u00e0s identificar aquests fraus si:<\/p>\n<ul>\n<li><strong>Analitzes l\u2019adre\u00e7a de correu electr\u00f2nic del remitent<\/strong> per comprovar que no sigui falsejada o sospitosa.<\/li>\n<li><strong>No descarreguis arxius adjunts sospitosos<\/strong>, ni de correus desconeguts, tenint especial cura amb les extensions &lt;&lt;.exe, .vbs, .msi, .vbs, .docm, .xlsm o .pptm&gt;&gt; i amb els arxius comprimits.<\/li>\n<li>Comproves que <strong>la comunicaci\u00f3 del correu \u00e9s impersonal <\/strong>o generalista, per exemple \u201cestimat client\u201d o \u201cusuari\u201d en comptes d\u2019una comunicaci\u00f3 personal on es dirigeixen pel teu nom.<\/li>\n<li><strong>La redacci\u00f3 de la comunicaci\u00f3 \u00e9s dolenta<\/strong> i hi ha faltes d\u2019ortografia i erros gramaticals. Les empreses o entitats solen cuidar molt la seva comunicaci\u00f3 i que els seus correus estiguin ben redactats.<\/li>\n<li><strong>No cliques enlla\u00e7os a p\u00e0gines web<\/strong> quan el correu \u00e9s sospit\u00f3s. Has de verificar a quina web redirigeix i si \u00e9s segura.<\/li>\n<li><strong>El correu no t\u00e9 firma oficial<\/strong> o el par\u00e0graf legal sobre privacitat.<\/li>\n<\/ul>\n<p>Si no vols patir una bretxa de seguretat en la teva empresa, protegeix sempre les teves dades i compleix amb les mesures de seguretat necess\u00e0ries. Des de Pyme Legal <a href=\"https:\/\/www.pymelegal.es\/contactar-lopd\"><span style=\"color: #00ccff;\"><strong>podem ajudar-te<\/strong><\/span><\/a> per evitar aquests ciberatacs.<\/p>\n<p>L\u2019equip de <a href=\"https:\/\/www.pymelegal.es\/contactar-lopd\"><span style=\"color: #00ccff;\"><strong>Pyme Legal<\/strong><\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alguna vegada t\u2019has preguntat com afectaria un ciberatac en la teva empresa? Sabies que la majoria d\u2019ells s\u00f3n per enginyeria social? Actualment, qualsevol empresa, sigui gran o petita, pot ser objectiu pels ciberdelinq\u00fcents. Totes les empreses tracten dades de gran valor i aquests poden ser utilitzats per perpetrar fraus o extorsionar. Per aix\u00f2, el 50% &#8230; <a title=\"Atacs per enginyeria social i quins tipus existeixen\" class=\"read-more\" href=\"https:\/\/www.pymelegal.es\/ca\/noticias\/ciberseguretat\/atacs-per-enginyeria-social-i-quins-tipus-existeixen\" aria-label=\"M\u00e9s informaci\u00f3 sobre Atacs per enginyeria social i quins tipus existeixen\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":11454,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[97],"tags":[333,306,332,129,334,335,336,185,305],"class_list":["post-11456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguretat","tag-atac","tag-bretxa-de-seguretat","tag-ciberatac","tag-ciberatacs","tag-empreses","tag-enginyeria-social","tag-phishing-ca","tag-rgpd-ca","tag-violacio-de-dades"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Atacs per enginyeria social i quins tipus existeixen - PymeLegal<\/title>\n<meta name=\"description\" content=\"La majoria de ciberatacs s\u00f3n per enginyeria social. Avui t&#039;expliquem com pots evitar aquest tipus d&#039;atacs a la teva empresa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atacs per enginyeria social i quins tipus existeixen - PymeLegal\" \/>\n<meta property=\"og:description\" content=\"La majoria de ciberatacs s\u00f3n per enginyeria social. Avui t&#039;expliquem com pots evitar aquest tipus d&#039;atacs a la teva empresa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen\" \/>\n<meta property=\"og:site_name\" content=\"PymeLegal\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-22T09:47:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/Imatges-Wordpress-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PymeLegal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"PymeLegal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen\"},\"author\":{\"name\":\"PymeLegal\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#\\\/schema\\\/person\\\/364442751b92f8a04fc5adde3be95c8f\"},\"headline\":\"Atacs per enginyeria social i quins tipus existeixen\",\"datePublished\":\"2023-03-22T09:47:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pymelegal.es\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Imatges-Wordpress-4.png\",\"keywords\":[\"atac\",\"bretxa de seguretat\",\"ciberatac\",\"ciberatacs\",\"empreses\",\"enginyeria social\",\"phishing\",\"RGPD\",\"violaci\u00f3 de dades\"],\"articleSection\":[\"CIBERSEGURETAT\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen\",\"url\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen\",\"name\":\"Atacs per enginyeria social i quins tipus existeixen - PymeLegal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pymelegal.es\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Imatges-Wordpress-4.png\",\"datePublished\":\"2023-03-22T09:47:08+00:00\",\"description\":\"La majoria de ciberatacs s\u00f3n per enginyeria social. Avui t'expliquem com pots evitar aquest tipus d'atacs a la teva empresa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage\",\"url\":\"https:\\\/\\\/www.pymelegal.es\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Imatges-Wordpress-4.png\",\"contentUrl\":\"https:\\\/\\\/www.pymelegal.es\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Imatges-Wordpress-4.png\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/noticias\\\/ciberseguridad\\\/ataques-por-ingenieria-social-y-que-tipos-existen#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.pymelegal.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atacs per enginyeria social i quins tipus existeixen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#website\",\"url\":\"https:\\\/\\\/www.pymelegal.es\\\/\",\"name\":\"PymeLegal\",\"description\":\"Adaptaci\u00f3n LOPDGDD-RGPD-LSSICE\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pymelegal.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#organization\",\"name\":\"PymeLegal\",\"url\":\"https:\\\/\\\/www.pymelegal.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pymelegal.es\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cropped-logo-pymelegal-10-anys-e1678286058678.png\",\"contentUrl\":\"https:\\\/\\\/www.pymelegal.es\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cropped-logo-pymelegal-10-anys-e1678286058678.png\",\"width\":2364,\"height\":694,\"caption\":\"PymeLegal\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pymelegal.es\\\/#\\\/schema\\\/person\\\/364442751b92f8a04fc5adde3be95c8f\",\"name\":\"PymeLegal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8114df484a5cd2738a02a5e9462b0881d50584495a20b6ddaeaa1841b1187017?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8114df484a5cd2738a02a5e9462b0881d50584495a20b6ddaeaa1841b1187017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8114df484a5cd2738a02a5e9462b0881d50584495a20b6ddaeaa1841b1187017?s=96&d=mm&r=g\",\"caption\":\"PymeLegal\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Atacs per enginyeria social i quins tipus existeixen - PymeLegal","description":"La majoria de ciberatacs s\u00f3n per enginyeria social. Avui t'expliquem com pots evitar aquest tipus d'atacs a la teva empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen","og_locale":"ca_ES","og_type":"article","og_title":"Atacs per enginyeria social i quins tipus existeixen - PymeLegal","og_description":"La majoria de ciberatacs s\u00f3n per enginyeria social. Avui t'expliquem com pots evitar aquest tipus d'atacs a la teva empresa.","og_url":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen","og_site_name":"PymeLegal","article_published_time":"2023-03-22T09:47:08+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/Imatges-Wordpress-4.png","type":"image\/png"}],"author":"PymeLegal","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"PymeLegal","Temps estimat de lectura":"5 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#article","isPartOf":{"@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen"},"author":{"name":"PymeLegal","@id":"https:\/\/www.pymelegal.es\/#\/schema\/person\/364442751b92f8a04fc5adde3be95c8f"},"headline":"Atacs per enginyeria social i quins tipus existeixen","datePublished":"2023-03-22T09:47:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.pymelegal.es\/#organization"},"image":{"@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage"},"thumbnailUrl":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/Imatges-Wordpress-4.png","keywords":["atac","bretxa de seguretat","ciberatac","ciberatacs","empreses","enginyeria social","phishing","RGPD","violaci\u00f3 de dades"],"articleSection":["CIBERSEGURETAT"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen","url":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen","name":"Atacs per enginyeria social i quins tipus existeixen - PymeLegal","isPartOf":{"@id":"https:\/\/www.pymelegal.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage"},"image":{"@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage"},"thumbnailUrl":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/Imatges-Wordpress-4.png","datePublished":"2023-03-22T09:47:08+00:00","description":"La majoria de ciberatacs s\u00f3n per enginyeria social. Avui t'expliquem com pots evitar aquest tipus d'atacs a la teva empresa.","breadcrumb":{"@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#primaryimage","url":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/Imatges-Wordpress-4.png","contentUrl":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/Imatges-Wordpress-4.png","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.pymelegal.es\/noticias\/ciberseguridad\/ataques-por-ingenieria-social-y-que-tipos-existen#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.pymelegal.es\/"},{"@type":"ListItem","position":2,"name":"Atacs per enginyeria social i quins tipus existeixen"}]},{"@type":"WebSite","@id":"https:\/\/www.pymelegal.es\/#website","url":"https:\/\/www.pymelegal.es\/","name":"PymeLegal","description":"Adaptaci\u00f3n LOPDGDD-RGPD-LSSICE","publisher":{"@id":"https:\/\/www.pymelegal.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pymelegal.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.pymelegal.es\/#organization","name":"PymeLegal","url":"https:\/\/www.pymelegal.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.pymelegal.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/cropped-logo-pymelegal-10-anys-e1678286058678.png","contentUrl":"https:\/\/www.pymelegal.es\/wp-content\/uploads\/2023\/03\/cropped-logo-pymelegal-10-anys-e1678286058678.png","width":2364,"height":694,"caption":"PymeLegal"},"image":{"@id":"https:\/\/www.pymelegal.es\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pymelegal.es\/#\/schema\/person\/364442751b92f8a04fc5adde3be95c8f","name":"PymeLegal","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/8114df484a5cd2738a02a5e9462b0881d50584495a20b6ddaeaa1841b1187017?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8114df484a5cd2738a02a5e9462b0881d50584495a20b6ddaeaa1841b1187017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8114df484a5cd2738a02a5e9462b0881d50584495a20b6ddaeaa1841b1187017?s=96&d=mm&r=g","caption":"PymeLegal"}}]}},"_links":{"self":[{"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/posts\/11456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/comments?post=11456"}],"version-history":[{"count":1,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/posts\/11456\/revisions"}],"predecessor-version":[{"id":11457,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/posts\/11456\/revisions\/11457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/media\/11454"}],"wp:attachment":[{"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/media?parent=11456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/categories?post=11456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pymelegal.es\/ca\/wp-json\/wp\/v2\/tags?post=11456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}