{"id":116845,"date":"2022-08-10T08:25:00","date_gmt":"2022-08-10T06:25:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=116845"},"modified":"2024-01-19T11:24:11","modified_gmt":"2024-01-19T10:24:11","slug":"numeros-de-empresa-en","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/numeros-de-empresa-en\/","title":{"rendered":"Las empresas pagan por ello"},"content":{"rendered":"<p>Un nuevo estudio de Trend Micro revela que el 90% de las empresas alemanas de los sectores de la electricidad, el suministro de petr\u00f3leo y gas y la fabricaci\u00f3n se han visto afectadas por ciberataques en los \u00faltimos doce meses. El 48% de las empresas alemanas encuestadas afirman que siempre o habitualmente responden a un ataque con mejoras en su infraestructura de ciberseguridad. Sin embargo, no todas las empresas disponen a\u00fan de recursos o conocimientos suficientes para protegerse contra futuras amenazas. As\u00ed, el 52% reacciona s\u00f3lo a veces o casi nunca. <\/p>\n\n\n\n<p>Para las empresas alemanas cuyos sistemas OT (tecnolog\u00eda operativa) y de control industrial se vieron afectados por ciberataques, el da\u00f1o financiero medio asciende a unos 2,9 millones de euros, seg\u00fan sus propios datos. En comparaci\u00f3n con Jap\u00f3n (2,1 millones de euros) y Estados Unidos (2,6 millones de euros), el importe de los da\u00f1os en Alemania es el m\u00e1s elevado. La industria del petr\u00f3leo y el gas sufri\u00f3 las mayores p\u00e9rdidas. Para el 90% de las empresas alemanas, la cadena de suministro se vio afectada adem\u00e1s de sus operaciones principales, por lo que tuvieron que reducir temporalmente las entregas o modificar su planificaci\u00f3n de entregas. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"293\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800.jpg\" alt=\"\" class=\"wp-image-116846\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800-768x281.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800-100x37.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800-480x176.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800-640x234.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/TrendMicro_Infografizieller-Schaden_800-720x264.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption><em>Da\u00f1o econ\u00f3mico medio causado por ciberataques en los \u00faltimos doce meses. Fuente: Trend Micro.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Tres cuartas partes (75%) de los encuestados alemanes afirmaron incluso haberse visto afectados por ciberataques en sus entornos industriales al menos seis veces en el transcurso de un a\u00f1o. La integraci\u00f3n de la computaci\u00f3n en la nube, la computaci\u00f3n en los bordes y la 5G en entornos mixtos de TI y OT ha cambiado fundamentalmente los sistemas y procesos industriales. Las empresas deben adelantarse a esta evoluci\u00f3n e implementar proactivamente medidas de seguridad para proteger sus activos empresariales. Mejorar la visibilidad de los riesgos y las amenazas es un primer paso importante para proteger la red privada y la nube industrial.<\/p>","protected":false},"excerpt":{"rendered":"<p>El da\u00f1o medio causado por los ciberataques a instalaciones industriales alcanza millones de d\u00f3lares.<\/p>","protected":false},"author":38,"featured_media":116848,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40957],"tags":[8405,26082,40960,5207,3865],"coauthors":[19920],"class_list":["post-116845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-07","tag-cyberangriffe","tag-cybersicherheit","tag-mag-22-07","tag-sapanoptikum","tag-trendmicro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_499702849_Omelchenko-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Der durchschnittliche Schaden, den Cyberangriffe auf Industrieanlagen verursachen, erreicht einen Betrag in Millionenh\u00f6he.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-22-07\/\" rel=\"category tag\">Mag 22-07<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/116845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=116845"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/116845\/revisions"}],"predecessor-version":[{"id":137471,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/116845\/revisions\/137471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/116848"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=116845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=116845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=116845"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=116845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}