{"id":2825,"date":"2025-09-01T12:59:38","date_gmt":"2025-09-01T10:59:38","guid":{"rendered":"https:\/\/www.dartem.cat\/?p=2825"},"modified":"2025-09-01T13:15:01","modified_gmt":"2025-09-01T11:15:01","slug":"ciber-seguridad-riesgo-invisible","status":"publish","type":"post","link":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/","title":{"rendered":"La ciberseguridad como baluarte de reputaci\u00f3n"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb4.27.0&#8243; background_image=\u00bbhttps:\/\/www.dartem.cat\/wp-content\/uploads\/2023\/01\/No-hi-ha-ciberseguretat-sense-privadesa.jpg\u00bb custom_padding=\u00bb68px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb4.27.0&#8243; background_color=\u00bbrgba(255,255,255,0.35)\u00bb background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_padding=\u00bb40px|30px||30px|false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_heading title=\u00bbLa ciberseguridad como baluarte de reputaci\u00f3n: el riesgo m\u00e1s invisible de tu empresa\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#FFFFFF\u00bb custom_margin=\u00bb50px||50px||false|false\u00bb title_text_shadow_style=\u00bbpreset2&#8243; title_text_shadow_color=\u00bb#000000&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p data-start=\"368\" data-end=\"919\">En un panorama empresarial cada vez m\u00e1s digitalizado, muchas pymes mexicanas subestiman una amenaza que va m\u00e1s all\u00e1 de los robos de datos o los fallos operativos: el deterioro de la <strong data-start=\"182\" data-end=\"208\">reputaci\u00f3n empresarial<\/strong>. Esta erosi\u00f3n silenciosa puede suponer una p\u00e9rdida de confianza que impacta en ventas, alianzas y candidaturas a ayudas p\u00fablicas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb80px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_heading title=\u00bb1. El verdadero punto de dolor: p\u00e9rdida de confianza, no solo datos\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_level=\u00bbh2&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li data-start=\"270\" data-end=\"350\">\n<p data-start=\"272\" data-end=\"350\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Un reciente informe de Forrester revela que el <strong data-start=\"47\" data-end=\"71\">60\u202f% de las empresas<\/strong> identifican los <strong data-start=\"88\" data-end=\"112\">riesgos tecnol\u00f3gicos<\/strong> como su principal desaf\u00edo de cara a 2025<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\" data-testid=\"webpage-citation-pill\"><a href=\"https:\/\/cincodias.elpais.com\/extras\/2025-03-03\/la-proteccion-de-datos-hoja-de-ruta-de-la-confianza-corporativa-para-2025.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\" alt=\"https:\/\/cincodias.elpais.com\/extras\/2025-03-03\/la-proteccion-de-datos-hoja-de-ruta-de-la-confianza-corporativa-para-2025.html?utm_source=chatgpt.com\" class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">Cinco D\u00edas<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<li data-start=\"351\" data-end=\"431\">\n<p data-start=\"353\" data-end=\"431\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">El coste medio global de un ciberataque ascendi\u00f3 a <strong data-start=\"51\" data-end=\"79\">4,88\u202fmillones de d\u00f3lares<\/strong> en 2024, seg\u00fan IBM, pero lo m\u00e1s grave no siempre es el impacto econ\u00f3mico inmediato, sino el <strong data-start=\"172\" data-end=\"196\" data-is-last-node=\"\">da\u00f1o a la reputaci\u00f3n<\/strong><\/span><\/p>\n<\/li>\n<li data-start=\"351\" data-end=\"431\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"172\" data-end=\"196\" data-is-last-node=\"\">Clientes cada vez m\u00e1s exigentes valoran empresas que demuestren un tratamiento \u00e9tico y seguro de sus datos, lo que exige ir m\u00e1s all\u00e1 de cumplir la normativa <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\" data-testid=\"webpage-citation-pill\"><a href=\"https:\/\/cincodias.elpais.com\/extras\/2025-03-03\/la-proteccion-de-datos-hoja-de-ruta-de-la-confianza-corporativa-para-2025.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\" alt=\"https:\/\/cincodias.elpais.com\/extras\/2025-03-03\/la-proteccion-de-datos-hoja-de-ruta-de-la-confianza-corporativa-para-2025.html?utm_source=chatgpt.com\" class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">Cinco D\u00edas<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+1<\/span><\/span><\/span><\/a><\/span><\/span>.<\/strong><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_heading title=\u00bb2. Amenazas silenciosas que golpean m\u00e1s all\u00e1 del sistema\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_level=\u00bbh2&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li data-start=\"577\" data-end=\"655\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">El <strong data-start=\"3\" data-end=\"24\">phishing dirigido<\/strong> sigue siendo una amenaza clave: se estima que el <strong data-start=\"74\" data-end=\"148\" data-is-last-node=\"\">30\u202f% de las peque\u00f1as empresas lo considera su mayor riesgo cibern\u00e9tico.<\/strong><\/span><\/li>\n<li data-start=\"658\" data-end=\"738\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Pero a\u00fan m\u00e1s preocupante: el <strong data-start=\"29\" data-end=\"98\">82\u202f% de las pymes no est\u00e1 preparada para recuperarse de un ataque<\/strong>, y solo el <strong data-start=\"110\" data-end=\"144\">14\u202f% se considera \u201cmuy segura\u201d<\/strong> t\u00e9cnicamente<\/span>.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_heading title=\u00bb3. \u00bfQu\u00e9 provoca esta vulnerabilidad? Errores humanos y escasez de recursos\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_level=\u00bbh2&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li data-start=\"821\" data-end=\"905\">\n<p data-start=\"823\" data-end=\"905\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">M\u00e1s del <strong data-start=\"8\" data-end=\"34\">80\u202f% de los incidentes<\/strong> en empresas tienen un origen humano, agravado por el teletrabajo mal gestionado<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\" data-testid=\"webpage-citation-pill\"><a href=\"https:\/\/cadenaser.com\/navarra\/2025\/06\/02\/invertir-en-ciberseguridad-ya-no-es-una-opcion-es-una-cuestion-de-supervivencia-empresarial-radio-pamplona\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\" alt=\"https:\/\/cadenaser.com\/navarra\/2025\/06\/02\/invertir-en-ciberseguridad-ya-no-es-una-opcion-es-una-cuestion-de-supervivencia-empresarial-radio-pamplona\/?utm_source=chatgpt.com\" class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">Cadena SER<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<li data-start=\"906\" data-end=\"990\">\n<p data-start=\"908\" data-end=\"990\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Muchas pymes sufren por la <strong data-start=\"27\" data-end=\"62\">falta de inversi\u00f3n en seguridad<\/strong>, mientras que grandes compa\u00f1\u00edas destinan hasta el <strong data-start=\"113\" data-end=\"139\">8\u202f% del presupuesto IT<\/strong> a este \u00e1rea<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\" data-testid=\"webpage-citation-pill\"><a href=\"https:\/\/cadenaser.com\/navarra\/2025\/06\/02\/invertir-en-ciberseguridad-ya-no-es-una-opcion-es-una-cuestion-de-supervivencia-empresarial-radio-pamplona\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\" alt=\"https:\/\/cadenaser.com\/navarra\/2025\/06\/02\/invertir-en-ciberseguridad-ya-no-es-una-opcion-es-una-cuestion-de-supervivencia-empresarial-radio-pamplona\/?utm_source=chatgpt.com\" class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">Cadena SER<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<li data-start=\"991\" data-end=\"1073\">\n<p data-start=\"993\" data-end=\"1073\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Espa\u00f1a ocupa el <strong data-start=\"16\" data-end=\"66\">octavo puesto mundial en ataques de ransomware<\/strong>, lo cual se explica en parte por su tejido empresarial mayoritariamente pymes sin defensas adecuadas<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\" data-testid=\"webpage-citation-pill\"><a href=\"https:\/\/www.huffingtonpost.es\/economia\/espana-potencia-hackers-que-hay-detras-aumento-ciberdelitos.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\" alt=\"https:\/\/www.huffingtonpost.es\/economia\/espana-potencia-hackers-que-hay-detras-aumento-ciberdelitos.html?utm_source=chatgpt.com\" class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">ElHuffPost<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbEmpieza hoy mismo a proteger tu empresa\u00bb button_text=\u00bb\u00a1Contacta Ahora!\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p data-start=\"4979\" data-end=\"5084\">Aprovecha esta oportunidad subvencionada para dar un salto en ciberseguridad y digitalizaci\u00f3n. En Dartem:<\/p>\n<p data-start=\"4979\" data-end=\"5084\">Te preparamos un <strong data-start=\"5106\" data-end=\"5147\">presupuesto gratuito y sin compromiso<\/strong><br data-start=\"5147\" data-end=\"5150\" \/>Gestionamos por ti la <strong data-start=\"5175\" data-end=\"5222\">solicitud del Bono de Asesoramiento Digital<\/strong><br data-start=\"5222\" data-end=\"5225\" \/>Te acompa\u00f1amos en todo el proceso, hasta la ejecuci\u00f3n del proyecto<\/p>\n<p>[\/et_pb_cta][et_pb_heading title=\u00bb4. \u00bfPor qu\u00e9 puede costar m\u00e1s la imagen que los datos?\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_level=\u00bbh2&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li data-start=\"1137\" data-end=\"1275\">Un solo incidente puede circular en redes sociales o medios locales y generar incertidumbre entre clientes, proveedores y colaboradores.<\/li>\n<li data-start=\"1278\" data-end=\"1454\">As\u00ed como la seguridad t\u00e9cnica incluye cifrado y protecci\u00f3n perimetral, la <strong data-start=\"1352\" data-end=\"1386\">gesti\u00f3n de crisis reputacional<\/strong> exige protocolos de comunicaci\u00f3n, transparencia y respuesta r\u00e1pida.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_heading title=\u00bb5. Reputaci\u00f3n: \u00bfpuede ser el gran valor a\u00f1adido frente a la competencia?\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_level=\u00bbh2&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<ul>\n<li data-start=\"1535\" data-end=\"1775\">\n<p data-start=\"1537\" data-end=\"1601\">Empresas proactivas que refuerzan su postura cibersegura logran:<\/p>\n<ul data-start=\"1604\" data-end=\"1775\">\n<li data-start=\"1604\" data-end=\"1649\">\n<p data-start=\"1606\" data-end=\"1649\">Mayor <strong data-start=\"1612\" data-end=\"1648\">retenci\u00f3n de clientes existentes<\/strong>.<\/p>\n<\/li>\n<li data-start=\"1652\" data-end=\"1706\">\n<p data-start=\"1654\" data-end=\"1706\">Credibilidad en procesos de licitaci\u00f3n o subvenci\u00f3n.<\/p>\n<\/li>\n<li data-start=\"1709\" data-end=\"1775\">\n<p data-start=\"1711\" data-end=\"1775\">Reputaci\u00f3n de marca como <strong data-start=\"1736\" data-end=\"1774\">\u201csocios tecnol\u00f3gicos de confianza\u201d<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1776\" data-end=\"1876\">\n<p data-start=\"1778\" data-end=\"1876\">La ciberseguridad ya no es solo t\u00e9cnica: es un elemento diferenciador en la confianza del mercado.<\/p>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_heading title=\u00bb6. Acciones estrat\u00e9gicas para proteger tu reputaci\u00f3n digital\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_level=\u00bbh2&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<table data-start=\"1945\" data-end=\"2361\" class=\"w-fit min-w-(--thread-content-width)\">\n<thead data-start=\"1945\" data-end=\"1967\">\n<tr data-start=\"1945\" data-end=\"1967\">\n<th data-start=\"1945\" data-end=\"1954\" data-col-size=\"md\">Acci\u00f3n<\/th>\n<th data-start=\"1954\" data-end=\"1967\" data-col-size=\"sm\">Beneficio<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"1991\" data-end=\"2361\">\n<tr data-start=\"1991\" data-end=\"2094\">\n<td data-start=\"1991\" data-end=\"2055\" data-col-size=\"md\">Implementar planes de respuesta y comunicaci\u00f3n post-incidente<\/td>\n<td data-col-size=\"sm\" data-start=\"2055\" data-end=\"2094\">Contenci\u00f3n del impacto reputacional<\/td>\n<\/tr>\n<tr data-start=\"2095\" data-end=\"2183\">\n<td data-start=\"2095\" data-end=\"2145\" data-col-size=\"md\">Formar al equipo espec\u00edfico en manejo de crisis<\/td>\n<td data-start=\"2145\" data-end=\"2183\" data-col-size=\"sm\">Respuesta coordinada y profesional<\/td>\n<\/tr>\n<tr data-start=\"2184\" data-end=\"2273\">\n<td data-start=\"2184\" data-end=\"2243\" data-col-size=\"md\">Certificar y comunicar buenas pr\u00e1cticas (ISO 27001, ENS)<\/td>\n<td data-col-size=\"sm\" data-start=\"2243\" data-end=\"2273\">Diferenciaci\u00f3n competitiva<\/td>\n<\/tr>\n<tr data-start=\"2274\" data-end=\"2361\">\n<td data-start=\"2274\" data-end=\"2327\" data-col-size=\"md\">Simular ataques y auditor\u00edas de reputaci\u00f3n digital<\/td>\n<td data-start=\"2327\" data-end=\"2361\" data-col-size=\"sm\">Detecci\u00f3n proactiva de riesgos<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb2_5,3_5&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb2_5&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.dartem.cat\/wp-content\/uploads\/2021\/02\/Dartem-Girona-RGPD-9e-video.png\u00bb title_text=\u00bbDartem-Girona-RGPD-9e-video\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_width_all=\u00bb5px\u00bb border_color_all=\u00bb#C00049&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb3_5&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_heading title=\u00bbLa ciberseguridad eficaz ya no es solo cuesti\u00f3n de tecnolog\u00eda: es una palanca de reputaci\u00f3n y diferenciaci\u00f3n competitiva.\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#FFFFFF\u00bb background_color=\u00bb#C00049&#8243; custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb35px|30px|35px|30px|false|false\u00bb border_radii=\u00bbon|5px|5px|5px|5px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_heading][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p data-start=\"4541\" data-end=\"4564\">Defender tu empresa ante amenazas es defender la confianza de tus clientes. Una inversi\u00f3n estrat\u00e9gica en protecci\u00f3n digital es tambi\u00e9n una garant\u00eda para el \u00e9xito a largo plazo.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_cta title=\u00bbContacta ahora con Dartem  y da el primer paso hacia una empresa m\u00e1s segura, eficiente y preparada para el futuro digital.\u00bb button_url=\u00bbhttps:\/\/www.dartem.cat\/contacte\/\u00bb button_text=\u00bb\u00a1Contacta Ahora!\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_level=\u00bbh4&#8243; header_text_color=\u00bb#C00049&#8243; background_color=\u00bb#d3d1c9&#8243; custom_button=\u00bbon\u00bb button_text_color=\u00bb#C00049&#8243; border_radii=\u00bbon|5px|5px|5px|5px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En un panorama empresarial cada vez m\u00e1s digitalizado, muchas pymes mexicanas subestiman una amenaza que va m\u00e1s all\u00e1 de los robos de datos o los fallos operativos: el deterioro de la reputaci\u00f3n empresarial. Esta erosi\u00f3n silenciosa puede suponer una p\u00e9rdida de confianza que impacta en ventas, alianzas y candidaturas a ayudas p\u00fablicas. Un reciente informe [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[26],"tags":[79,37,80,82,81,77,83,39,78,75,76,84],"class_list":["post-2825","post","type-post","status-publish","format-standard","hentry","category-sin-categoria","tag-ciberataques","tag-ciberseguridad","tag-confianza-del-cliente","tag-crisis-reputacional","tag-estrategia-digital","tag-imagen-corporativa","tag-prevencion-de-riesgos","tag-proteccion-de-datos","tag-pymes","tag-reputacion-empresarial","tag-seguridad-digital","tag-transformacion-digital"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguridad y reputaci\u00f3n: el riesgo invisible de tu empresa<\/title>\n<meta name=\"description\" content=\"Descubre c\u00f3mo la ciberseguridad protege no solo tus datos, sino tambi\u00e9n la reputaci\u00f3n de tu pyme. Confianza, prevenci\u00f3n con Dartem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad y reputaci\u00f3n: el riesgo invisible de tu empresa\" \/>\n<meta property=\"og:description\" content=\"Descubre c\u00f3mo la ciberseguridad protege no solo tus datos, sino tambi\u00e9n la reputaci\u00f3n de tu pyme. Confianza, prevenci\u00f3n con Dartem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/\" \/>\n<meta property=\"og:site_name\" content=\"Dartem\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-01T10:59:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T11:15:01+00:00\" \/>\n<meta name=\"author\" content=\"dartem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"dartem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/\",\"url\":\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/\",\"name\":\"Ciberseguridad y reputaci\u00f3n: el riesgo invisible de tu empresa\",\"isPartOf\":{\"@id\":\"https:\/\/www.dartem.cat\/es\/#website\"},\"datePublished\":\"2025-09-01T10:59:38+00:00\",\"dateModified\":\"2025-09-01T11:15:01+00:00\",\"author\":{\"@id\":\"https:\/\/www.dartem.cat\/es\/#\/schema\/person\/eb622dc1a0b39774cf61877894c2ca3b\"},\"description\":\"Descubre c\u00f3mo la ciberseguridad protege no solo tus datos, sino tambi\u00e9n la reputaci\u00f3n de tu pyme. Confianza, prevenci\u00f3n con Dartem.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.dartem.cat\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La ciberseguridad como baluarte de reputaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dartem.cat\/es\/#website\",\"url\":\"https:\/\/www.dartem.cat\/es\/\",\"name\":\"Dartem\",\"description\":\"Protecci\u00f3 de dades i Seguretat de la informaci\u00f3\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dartem.cat\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dartem.cat\/es\/#\/schema\/person\/eb622dc1a0b39774cf61877894c2ca3b\",\"name\":\"dartem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.dartem.cat\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b1582f802a0e4aedb7455342857399b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b1582f802a0e4aedb7455342857399b0?s=96&d=mm&r=g\",\"caption\":\"dartem\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad y reputaci\u00f3n: el riesgo invisible de tu empresa","description":"Descubre c\u00f3mo la ciberseguridad protege no solo tus datos, sino tambi\u00e9n la reputaci\u00f3n de tu pyme. Confianza, prevenci\u00f3n con Dartem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/","og_locale":"es_ES","og_type":"article","og_title":"Ciberseguridad y reputaci\u00f3n: el riesgo invisible de tu empresa","og_description":"Descubre c\u00f3mo la ciberseguridad protege no solo tus datos, sino tambi\u00e9n la reputaci\u00f3n de tu pyme. Confianza, prevenci\u00f3n con Dartem.","og_url":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/","og_site_name":"Dartem","article_published_time":"2025-09-01T10:59:38+00:00","article_modified_time":"2025-09-01T11:15:01+00:00","author":"dartem","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"dartem","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/","url":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/","name":"Ciberseguridad y reputaci\u00f3n: el riesgo invisible de tu empresa","isPartOf":{"@id":"https:\/\/www.dartem.cat\/es\/#website"},"datePublished":"2025-09-01T10:59:38+00:00","dateModified":"2025-09-01T11:15:01+00:00","author":{"@id":"https:\/\/www.dartem.cat\/es\/#\/schema\/person\/eb622dc1a0b39774cf61877894c2ca3b"},"description":"Descubre c\u00f3mo la ciberseguridad protege no solo tus datos, sino tambi\u00e9n la reputaci\u00f3n de tu pyme. Confianza, prevenci\u00f3n con Dartem.","breadcrumb":{"@id":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dartem.cat\/es\/ciber-seguridad-riesgo-invisible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.dartem.cat\/es\/"},{"@type":"ListItem","position":2,"name":"La ciberseguridad como baluarte de reputaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/www.dartem.cat\/es\/#website","url":"https:\/\/www.dartem.cat\/es\/","name":"Dartem","description":"Protecci\u00f3 de dades i Seguretat de la informaci\u00f3","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dartem.cat\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.dartem.cat\/es\/#\/schema\/person\/eb622dc1a0b39774cf61877894c2ca3b","name":"dartem","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.dartem.cat\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b1582f802a0e4aedb7455342857399b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b1582f802a0e4aedb7455342857399b0?s=96&d=mm&r=g","caption":"dartem"}}]}},"_links":{"self":[{"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/posts\/2825"}],"collection":[{"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/comments?post=2825"}],"version-history":[{"count":4,"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/posts\/2825\/revisions"}],"predecessor-version":[{"id":2830,"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/posts\/2825\/revisions\/2830"}],"wp:attachment":[{"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/media?parent=2825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/categories?post=2825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dartem.cat\/es\/wp-json\/wp\/v2\/tags?post=2825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}