{"id":5211,"date":"2016-04-28T13:48:48","date_gmt":"2016-04-28T13:48:48","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/2016abrilen\/one-year-handling-cybersecurity-incidents"},"modified":"2023-07-31T13:58:20","modified_gmt":"2023-07-31T13:58:20","slug":"one-year-handling-cybersecurity-incidents","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/","title":{"rendered":"One Year Handling Cybersecurity Incidents"},"content":{"rendered":"<p>As reported by Graciela Mart\u00ednez, head of LACNIC WARP, since it began operating in March 2015, LACNIC&#8217;s center for coordinating computer security incident responses has already handled more than 140 incidents in the region.<\/p>\n<p>LACNIC WARP (<a href=\"http:\/\/warp.lacnic.net\/\">http:\/\/warp.lacnic.net\/<\/a>) is a team created to facilitate cybersecurity incident handling where members of the community can report their cybersecurity issues and have access to updated information on latent threats in Latin America and the Caribbean.<\/p>\n<p>The more than 140 incidents handled during this first year were related to the Internet resources managed by LACNIC and involved both autonomous systems and IP addresses.<\/p>\n<p>Mart\u00ednez shared statistics of the WARP&#8217; first year, noting that the largest percentage of incidents were cases of phishing 33%, followed by email abuse (account hacking or spam) 18%, others (users complaining of various incidents) 17%, and malware (software designed to perform malicious actions) 10.4%.<\/p>\n<p>LACNIC WARP also has statistics on Autonomous Systems and IP address ranges of our region used to send spam, which will soon be shared with the community through the center&#8217;s website.<\/p>\n<p>In addition, Mart\u00ednez highlighted the fact that working together with other organizations has been extremely important, as it has allowed coordinating actions and detecting threats in a timely manner. \u201cWe are all responsible; working in the field of security demands that we join our forces. If two, three or more organizations are working on the same issue, there must be no duplication of efforts but instead proper coordination and information sharing. The speed with which we act when faced with a cybersecurity incident is critical,\u201d noted the expert.<\/p>\n<p>As an example she cited the center&#8217;s coordination with Interpol through which, in addition to offering training to law enforcement officers, LACNIC WARP focused on prevention and providing users with warnings about the crimes that are committed online.<\/p>\n<p>The center has also worked on strengthening response capabilities in case of incidents involving Internet addresses assigned in Latin America and the Caribbean by promoting national CSIRTs. In this sense, close to 150 experts of the region received training in the form of workshops organized within the framework of AMPARO, a project that was incorporated into LACNIC WARP.<\/p>\n<p>According to Mart\u00ednez, LACNIC members should see the WARP as a point of reference for reporting cybersecurity incidents as well as a center for seeking help on how to solve such incidents in case of an attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As reported by Graciela Mart\u00ednez, head of LACNIC WARP, since it began operating in March 2015, LACNIC&#8217;s center for coordinating computer security incident responses has already handled more than 140 incidents in the region. LACNIC WARP (http:\/\/warp.lacnic.net\/) is a team created to facilitate cybersecurity incident handling where members of the community can report their cybersecurity [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":22013,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,471],"archivo":[779,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-5211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-warp-en","archivo-april-2016-edition","archivo-editions"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | One Year Handling Cybersecurity Incidents<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | One Year Handling Cybersecurity Incidents\" \/>\n<meta property=\"og:description\" content=\"As reported by Graciela Mart\u00ednez, head of LACNIC WARP, since it began operating in March 2015, LACNIC&#8217;s center for coordinating computer security incident responses has already handled more than 140 incidents in the region. LACNIC WARP (http:\/\/warp.lacnic.net\/) is a team created to facilitate cybersecurity incident handling where members of the community can report their cybersecurity [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-28T13:48:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-31T13:58:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"One Year Handling Cybersecurity Incidents\",\"datePublished\":\"2016-04-28T13:48:48+00:00\",\"dateModified\":\"2023-07-31T13:58:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\"},\"wordCount\":399,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg\",\"keywords\":[\"Cibersecurity\",\"WARP\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\",\"name\":\"LACNIC Blog | One Year Handling Cybersecurity Incidents\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg\",\"datePublished\":\"2016-04-28T13:48:48+00:00\",\"dateModified\":\"2023-07-31T13:58:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg\",\"width\":\"640\",\"height\":\"220\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One Year Handling Cybersecurity Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | One Year Handling Cybersecurity Incidents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | One Year Handling Cybersecurity Incidents","og_description":"As reported by Graciela Mart\u00ednez, head of LACNIC WARP, since it began operating in March 2015, LACNIC&#8217;s center for coordinating computer security incident responses has already handled more than 140 incidents in the region. LACNIC WARP (http:\/\/warp.lacnic.net\/) is a team created to facilitate cybersecurity incident handling where members of the community can report their cybersecurity [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2016-04-28T13:48:48+00:00","article_modified_time":"2023-07-31T13:58:20+00:00","og_image":[{"width":640,"height":220,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg","type":"image\/jpeg"}],"author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"One Year Handling Cybersecurity Incidents","datePublished":"2016-04-28T13:48:48+00:00","dateModified":"2023-07-31T13:58:20+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/"},"wordCount":399,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg","keywords":["Cibersecurity","WARP"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/","url":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/","name":"LACNIC Blog | One Year Handling Cybersecurity Incidents","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg","datePublished":"2016-04-28T13:48:48+00:00","dateModified":"2023-07-31T13:58:20+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg","width":"640","height":"220"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/one-year-handling-cybersecurity-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"One Year Handling Cybersecurity Incidents"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/04\/005.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":5209,"post_title":"Un a\u00f1o gestionando incidentes de seguridad inform\u00e1tica","slug":"un-ano-gestionando-incidentes-de-seguridad-informatica","href":"https:\/\/blog.lacnic.net\/un-ano-gestionando-incidentes-de-seguridad-informatica\/"},{"locale":"pt_BR","id":5212,"post_title":"Um ano gerenciando incidentes de seguran\u00e7a inform\u00e1tica","slug":"um-ano-gerenciando-incidentes-de-seguranca-informatica","href":"https:\/\/blog.lacnic.net\/pt-br\/um-ano-gerenciando-incidentes-de-seguranca-informatica\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=5211"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5211\/revisions"}],"predecessor-version":[{"id":22012,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5211\/revisions\/22012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/22013"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=5211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=5211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=5211"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=5211"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=5211"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=5211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}