{"id":27868,"date":"2017-06-23T11:22:25","date_gmt":"2017-06-23T11:22:25","guid":{"rendered":"http:\/\/www.zemsania.com\/?p=16720"},"modified":"2022-12-23T10:59:46","modified_gmt":"2022-12-23T10:59:46","slug":"tips-to-prevent-cyber-attacks-cybersecurity","status":"publish","type":"post","link":"https:\/\/zemsaniaglobalgroup.com\/en\/consejos-prevenir-ciberataques-ciberseguridad\/","title":{"rendered":"Tips for preventing and responding to cyber-attacks in Industry 4.0"},"content":{"rendered":"<p>The IoT and Industry 4.0 have changed the way we understand the <strong>cyberattacks<\/strong>, whose presence has multiplied exponentially due to the increase in the number of connected devices in society. Cell phones, tablets, computers, smart cars, televisions... a host of devices that have the Internet and that relate to each other, either by exchanging information or by performing any other function. The common link in these devices is the so called<strong> firmware, a term that refers to the interface between the hareware and the software.<\/strong> and that makes them very vulnerable to attacks by third parties.<\/p>\n\n\n\n<p>Classic cyber-attacks, therefore, respond to the theft of data and confidential information: phishing or malware are two common methods. But what about<strong>what about new cyber attacks aimed at large-scale physical damage?<\/strong>?<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Contents\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/consejos-prevenir-ciberataques-ciberseguridad\/#Los_nuevos_ciberataques_el_IoT_y_la_Industria_40_como_actores_principales\" >The new cyber-attacks: IoT and Industry 4.0 as key players<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/consejos-prevenir-ciberataques-ciberseguridad\/#%C2%BFComo_protegerse_ante_los_ciberataques_masivos\" >How to protect yourself against massive cyber-attacks?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"Los_nuevos_ciberataques_el_IoT_y_la_Industria_40_como_actores_principales\"><\/span>The new cyber-attacks: IoT and Industry 4.0 as key players<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Recent news offers several examples of how IoT and Industry 4.0 have changed the way cybercriminals plan their attacks. In 2010 in Iran, for example, there was a virus attack on the machinery used by several industrial plants to enrich uranium. In Germany, something similar happened, although the information that has come to light has been minimal. These two examples call into question <strong>the security system for cyber-attacks on connected devices<\/strong>. Nowadays, the problem is not to fight against the possibility of having our home computer infected by means of an antivirus. On the contrary, the real problem lies in <strong>avoid massive infections of industrial plants, financial institutions or public administrations with the aim of doing real physical damage<\/strong>.<\/p>\n\n\n\n<p>Therefore, we have moved from small-scale cyberattacks to ones where the <strong>industrial sabotage<\/strong> has become the central focus. According to experts, the only way to avoid any kind of piracy in industrial equipment is to have machines and devices that are not connected to the Internet and that are not intercommunicated with each other. Logically, in the digital era in which we live this situation is impossible, since Industry 4.0 and IoT are two concepts diametrically opposed to this situation of maximum security.<\/p>\n\n\n\n<p>The reality is also the opposite, since according to German government statistics, large companies in the German industrial sector are planning to <strong>investing 40 billion euros per year until 2020<\/strong>. The goal is to have 80% of the value chains of these industrial plants fully digitized.<\/p>\n\n\n\n<p>At Zemsania Group we are <strong>IoT and Industry 4.0 experts <\/strong>and we take safety very seriously<\/p>\n\n\n\n<h3 class=\"has-ast-global-color-0-color has-text-color wp-block-heading\"><span class=\"ez-toc-section\" id=\"%C2%BFComo_protegerse_ante_los_ciberataques_masivos\"><\/span>How to protect yourself against massive cyber-attacks?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>From our point of view, it is important to know the vulnerabilities in all phases of software production. They are the following:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Breaking the chain of trust<\/strong>It is necessary to perform an exhaustive analysis of the life cycle of the devices in order to discover the holes and flaws that may exist in the system. The belief that, because the software is only manipulated by authorized personnel, it will never be infected, must disappear.<\/li>\n\n\n\n<li><strong>Development and design phase<\/strong>At this stage of the project, there may be situations of vulnerability in which the firmware may be manipulated. Therefore, extreme caution must be exercised. Similarly, it should be noted that any malicious manipulation at this stage is unlikely because it would have to come from within the company itself. Moreover, it would not be very effective, since it would be corrected throughout the development and design phase.<\/li>\n\n\n\n<li><strong>Production phase<\/strong>The following is an example: to introduce some kind of vulnerability in the firmware during this phrase, it is necessary to physically access the firmware. This fact reduces the chances of success, but extreme caution must be exercised.<\/li>\n\n\n\n<li><strong>Transport phase<\/strong>malware is usually introduced remotely, but in the transport phase, the hardware can be intercepted and conveniently manipulated before it reaches its destination. It is obvious that to do something like this, you need to have privileged information.<\/li>\n\n\n\n<li><strong>Operating phase<\/strong>Vulnerabilities in this phase are usually remote or occur in the facilities themselves, which makes us think about security in industrial plants.<\/li>\n<\/ol>\n\n\n\n<p>In conclusion, cyber-attacks must be approached from multiple points of view, as many as the phases in which the entire life cycle of a firmware is structured. Hence, it is necessary to stop looking at a single point and start to <strong>interpreting cybersecurity as a global problem that affects both industry and society<\/strong>. This is the first step in successfully tackling cyber-attacks.<\/p>","protected":false},"excerpt":{"rendered":"<p>El IoT y la Industria 4.0 han cambiado la forma de entender los ciberataques, cuya presencia se ha multiplicado exponencialmente debido al aumento de dispositivos conectados en la sociedad. M\u00f3viles, tablets, ordenadores, coches inteligentes, televisiones&#8230;un mont\u00f3n de dispositivos que cuentan con Internet y que se relacionan entre ellos, ya sea intercambiando informaci\u00f3n o mediante la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":27869,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[2,14,3],"tags":[],"class_list":["post-27868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias-zemsania","category-empresas-innovacion","category-tendencias-it-digital"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consejos para prevenir los ciberataques en la Industria 4.0 | Zemsania<\/title>\n<meta name=\"description\" content=\"Te contamos c\u00f3mo prevenir los ciberataques a las plantas industriales teniendo en cuenta el ciclo de vida del firmware. \u00a1No te lo pierdas!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zemsaniaglobalgroup.com\/en\/tips-to-prevent-cyber-attacks-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consejos para prevenir los ciberataques en la Industria 4.0 | Zemsania\" \/>\n<meta property=\"og:description\" content=\"Te contamos c\u00f3mo prevenir los ciberataques a las plantas industriales teniendo en cuenta el ciclo de vida del firmware. \u00a1No te lo pierdas!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zemsaniaglobalgroup.com\/en\/tips-to-prevent-cyber-attacks-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Zemsania Global Group\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-23T11:22:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-23T10:59:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"619\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"jmarin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmarin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/\"},\"author\":{\"name\":\"jmarin\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\"},\"headline\":\"Consejos para prevenir y responder a los ciberataques en la Industria 4.0\",\"datePublished\":\"2017-06-23T11:22:25+00:00\",\"dateModified\":\"2022-12-23T10:59:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/\"},\"wordCount\":837,\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/plantilla-5c-20_35610088.png\",\"articleSection\":[\"Blog\",\"Empresas e Innovaci\u00f3n\",\"Tendencias IT &amp; Digital\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/\",\"name\":\"Consejos para prevenir los ciberataques en la Industria 4.0 | Zemsania\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/plantilla-5c-20_35610088.png\",\"datePublished\":\"2017-06-23T11:22:25+00:00\",\"dateModified\":\"2022-12-23T10:59:46+00:00\",\"description\":\"Te contamos c\u00f3mo prevenir los ciberataques a las plantas industriales teniendo en cuenta el ciclo de vida del firmware. \u00a1No te lo pierdas!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/plantilla-5c-20_35610088.png\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/plantilla-5c-20_35610088.png\",\"width\":1100,\"height\":619},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/consejos-prevenir-ciberataques-ciberseguridad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/category\\\/noticias-zemsania\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Consejos para prevenir y responder a los ciberataques en la Industria 4.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#website\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"name\":\"Zemsania Global Group\",\"description\":\"Ofrecemos soluciones digitales innovadoras y talento IT especializado, siendo un referente para nuestros clientes y un partner tecnol\u00f3gico de confianza en los diferentes procesos empresariales.\",\"publisher\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\"},\"alternateName\":\"Zemsania\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#organization\",\"name\":\"Zemsania Global Group\",\"alternateName\":\"Zemsania\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"contentUrl\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo-zemsania-horiz.svg\",\"caption\":\"Zemsania Global Group\"},\"image\":{\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/zemsania-global-group\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/#\\\/schema\\\/person\\\/0725e5e5b51900fbf2d344a650e9b75c\",\"name\":\"jmarin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g\",\"caption\":\"jmarin\"},\"sameAs\":[\"https:\\\/\\\/zemsaniaglobalgroup.com\"],\"url\":\"https:\\\/\\\/zemsaniaglobalgroup.com\\\/en\\\/author\\\/jmarin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips to prevent cyber-attacks in Industry 4.0 | Zemsania","description":"We tell you how to prevent cyber-attacks on industrial plants by taking into account the firmware lifecycle - don't miss it!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zemsaniaglobalgroup.com\/en\/tips-to-prevent-cyber-attacks-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Consejos para prevenir los ciberataques en la Industria 4.0 | Zemsania","og_description":"Te contamos c\u00f3mo prevenir los ciberataques a las plantas industriales teniendo en cuenta el ciclo de vida del firmware. \u00a1No te lo pierdas!","og_url":"https:\/\/zemsaniaglobalgroup.com\/en\/tips-to-prevent-cyber-attacks-cybersecurity\/","og_site_name":"Zemsania Global Group","article_published_time":"2017-06-23T11:22:25+00:00","article_modified_time":"2022-12-23T10:59:46+00:00","og_image":[{"width":1100,"height":619,"url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png","type":"image\/png"}],"author":"jmarin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmarin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#article","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/"},"author":{"name":"jmarin","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c"},"headline":"Consejos para prevenir y responder a los ciberataques en la Industria 4.0","datePublished":"2017-06-23T11:22:25+00:00","dateModified":"2022-12-23T10:59:46+00:00","mainEntityOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/"},"wordCount":837,"publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png","articleSection":["Blog","Empresas e Innovaci\u00f3n","Tendencias IT &amp; Digital"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/","url":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/","name":"Tips to prevent cyber-attacks in Industry 4.0 | Zemsania","isPartOf":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#primaryimage"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png","datePublished":"2017-06-23T11:22:25+00:00","dateModified":"2022-12-23T10:59:46+00:00","description":"We tell you how to prevent cyber-attacks on industrial plants by taking into account the firmware lifecycle - don't miss it!","breadcrumb":{"@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#primaryimage","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png","width":1100,"height":619},{"@type":"BreadcrumbList","@id":"https:\/\/zemsaniaglobalgroup.com\/consejos-prevenir-ciberataques-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/zemsaniaglobalgroup.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/zemsaniaglobalgroup.com\/category\/noticias-zemsania\/"},{"@type":"ListItem","position":3,"name":"Consejos para prevenir y responder a los ciberataques en la Industria 4.0"}]},{"@type":"WebSite","@id":"https:\/\/zemsaniaglobalgroup.com\/#website","url":"https:\/\/zemsaniaglobalgroup.com\/","name":"Zemsania Global Group","description":"We offer innovative digital solutions and specialized IT talent, being a reference for our customers and a trusted technology partner in different business processes.","publisher":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#organization"},"alternateName":"Zemsania","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zemsaniaglobalgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zemsaniaglobalgroup.com\/#organization","name":"Zemsania Global Group","alternateName":"Zemsania","url":"https:\/\/zemsaniaglobalgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","contentUrl":"https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2024\/04\/logo-zemsania-horiz.svg","caption":"Zemsania Global Group"},"image":{"@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/zemsania-global-group"]},{"@type":"Person","@id":"https:\/\/zemsaniaglobalgroup.com\/#\/schema\/person\/0725e5e5b51900fbf2d344a650e9b75c","name":"jmarin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ccd1d1e7c325f45d8d7d291c92a781dc6367e0692ac23375bf9ab738bd2a8eb2?s=96&d=mm&r=g","caption":"jmarin"},"sameAs":["https:\/\/zemsaniaglobalgroup.com"],"url":"https:\/\/zemsaniaglobalgroup.com\/en\/author\/jmarin\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png",1100,619,false],"thumbnail":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088-150x150.png",150,150,true],"medium":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088-300x169.png",300,169,true],"medium_large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088-768x432.png",768,432,true],"large":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088-1024x576.png",1024,576,true],"1536x1536":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png",1100,619,false],"2048x2048":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png",1100,619,false],"trp-custom-language-flag":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png",18,10,false],"cover":["https:\/\/zemsaniaglobalgroup.com\/wp-content\/uploads\/2017\/06\/plantilla-5c-20_35610088.png",817,460,false]},"uagb_author_info":{"display_name":"jmarin","author_link":"https:\/\/zemsaniaglobalgroup.com\/en\/author\/jmarin\/"},"uagb_comment_info":0,"uagb_excerpt":"El IoT y la Industria 4.0 han cambiado la forma de entender los ciberataques, cuya presencia se ha multiplicado exponencialmente debido al aumento de dispositivos conectados en la sociedad. M\u00f3viles, tablets, ordenadores, coches inteligentes, televisiones&#8230;un mont\u00f3n de dispositivos que cuentan con Internet y que se relacionan entre ellos, ya sea intercambiando informaci\u00f3n o mediante la&hellip;","_links":{"self":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts\/27868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/comments?post=27868"}],"version-history":[{"count":0,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/posts\/27868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/media\/27869"}],"wp:attachment":[{"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/media?parent=27868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/categories?post=27868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zemsaniaglobalgroup.com\/en\/wp-json\/wp\/v2\/tags?post=27868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}