{"id":11329,"date":"2018-12-19T17:58:57","date_gmt":"2018-12-19T17:58:57","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=11329"},"modified":"2018-12-19T17:58:57","modified_gmt":"2018-12-19T17:58:57","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p><strong>Towards Greater Security. <\/strong>This year, <a href=\"https:\/\/warp.lacnic.net\/taller-amparo\">LACNIC&#8217;s AMPARO project<\/a> organized four workshops to train the community on how to create Computer Security Incident Response Teams (CSIRTs). More than 120 professionals from the region\u2019s leading security organizations participated in these workshops, held in Trinidad and Tobago, Guatemala, Honduras and Uruguay.<\/p>\n<p><strong>Cyber Threats. <\/strong>According to the reports received this year by LACNIC WARP, in 2018 phishing continued to be the main cyber threat in Latin America and the Caribbean with 60% of all attacks, although there was also a significant increase in the use of malware (18.9%) and redirect attacks (16.35%). During the webinar on <a href=\"https:\/\/prensa.lacnic.net\/news\/ciberseguridad\/tendencias-sobre-ataques-en-ciberseguridad-en-america-latina-y-el-caribe\">Cybersecurity Attack Trends in the LAC Region<\/a> organized by LACNIC, the head of LACNIC WARP pointed out that cybercrime manages to get away with between 15 and 20% of the economies that the Internet generates each year.<\/p>\n<p><strong>A Key Rollover. <\/strong>A historic event began this 11 October: the <a href=\"https:\/\/prensa.lacnic.net\/news\/ciberseguridad\/la-nueva-clave-de-seguridad-de-internet\">new Domain Name System Security Extensions key<\/a> was used for the first time. The rollover process is expected to be completed in March 2019, when ICANN will remove the previous key from the equipment it uses to manage keys in its facilities.<\/p>\n<p><strong>The Dream Team<\/strong>. This year, Montevideo brought together the world&#8217;s leading cybercrime experts working with <a href=\"https:\/\/prensa.lacnic.net\/news\/ciberseguridad\/expertos-advierten-que-estan-perdiendo-las-batallas-contra-los-ciber-delincuentes\">Team Cymru<\/a>, a global organization specializing in cybersecurity. Invited by LACNIC, Team Cymru&#8217;s local partner, the select group of professionals addressed the main challenges cybercrime is currently facing and agreed to enhance international cooperation to deal with the growing proliferation of online criminal groups.<\/p>\n<p><strong>Greater Resilience<\/strong>. LACNIC&#8217;s +Ra\u00edces program promoted the installation of an anycast copy of the I root server in Latin America and the Caribbean, in partnership with Netnod.<\/p>\n<p>Three out of the 15 organizations which applied were chosen for the installation of root server copies.<\/p>\n<p>The first of these projects was implemented in <a href=\"https:\/\/prensa.lacnic.net\/news\/ciberseguridad\/instalan-copia-de-servidor-raiz-de-internet-en-paraguay\">Paraguay.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Towards Greater Security. This year, LACNIC&#8217;s AMPARO project organized four workshops to train the community on how to create Computer Security Incident Response Teams (CSIRTs). More than 120 professionals from the region\u2019s leading security organizations participated in these workshops, held in Trinidad and Tobago, Guatemala, Honduras and Uruguay. Cyber Threats. According to the reports received [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":11191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,474],"archivo":[870,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-11329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-institutional","archivo-december-2018-edition","archivo-editions"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Cybersecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Towards Greater Security. This year, LACNIC&#8217;s AMPARO project organized four workshops to train the community on how to create Computer Security Incident Response Teams (CSIRTs). More than 120 professionals from the region\u2019s leading security organizations participated in these workshops, held in Trinidad and Tobago, Guatemala, Honduras and Uruguay. Cyber Threats. According to the reports received [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-19T17:58:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"Cybersecurity\",\"datePublished\":\"2018-12-19T17:58:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\"},\"wordCount\":297,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png\",\"keywords\":[\"Cibersecurity\",\"Institutional\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\",\"name\":\"LACNIC Blog | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png\",\"datePublished\":\"2018-12-19T17:58:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Cybersecurity","og_description":"Towards Greater Security. This year, LACNIC&#8217;s AMPARO project organized four workshops to train the community on how to create Computer Security Incident Response Teams (CSIRTs). More than 120 professionals from the region\u2019s leading security organizations participated in these workshops, held in Trinidad and Tobago, Guatemala, Honduras and Uruguay. Cyber Threats. According to the reports received [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2018-12-19T17:58:57+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png","type":"image\/png"}],"author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"Cybersecurity","datePublished":"2018-12-19T17:58:57+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/"},"wordCount":297,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png","keywords":["Cibersecurity","Institutional"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/","url":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/","name":"LACNIC Blog | Cybersecurity","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png","datePublished":"2018-12-19T17:58:57+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2014\/11\/warp-2014-new-centro-de-respuesta.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":11327,"post_title":"Ciberseguridad","slug":"ciberseguridad","href":"https:\/\/blog.lacnic.net\/ciberseguridad\/"},{"locale":"pt_BR","id":11330,"post_title":"Seguran\u00e7a cibern\u00e9tica","slug":"seguranca-cibernetica","href":"https:\/\/blog.lacnic.net\/pt-br\/seguranca-cibernetica\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=11329"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11329\/revisions"}],"predecessor-version":[{"id":11331,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/11329\/revisions\/11331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/11191"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=11329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=11329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=11329"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=11329"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=11329"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=11329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}