{"id":225145,"date":"2025-05-29T13:44:26","date_gmt":"2025-05-29T13:44:26","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=225145"},"modified":"2025-08-06T13:58:17","modified_gmt":"2025-08-06T13:58:17","slug":"apoyo-para-promover-la-confianza-y-la-seguridad-en-linea","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/action-plan\/online-trust-and-safety\/","title":{"rendered":"Apoyo para promover la confianza y la seguridad en l\u00ednea"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">Apoyo para promover la confianza y la seguridad en l\u00ednea<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-32-font-size\" id=\"we-will-equip-the-global-encryption-coalition-and-the-internet-society-community-with-the-tools-needed-to-help-increase-awareness-of-the-value-of-encryption\"><strong>Trabajamos para ayudar a las personas reci\u00e9n conectadas a tener una experiencia en l\u00ednea m\u00e1s segura.<\/strong><\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Al conectarse por primera vez, los nuevos usuarios de Internet se enfrentan a un entorno digital complejo, que puede ser dif\u00edcil de navegar de manera segura sin experiencia previa. Ayudar a los usuarios reci\u00e9n conectados a desarrollar confianza y habilidades en materia de seguridad es fundamental para construir una Internet m\u00e1s segura, confiable e inclusiva. Por eso, para garantizar que todas las personas puedan aprovechar plenamente las oportunidades que ofrece Internet, Internet Society se ha unido a la comunidad para cocrear un programa de seguridad en l\u00ednea pr\u00e1ctico, sostenible y liderado por la comunidad.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:5.5%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:84%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top is-image-fill-element\" style=\"grid-template-columns:auto 33%\"><div class=\"wp-block-media-text__content\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop uag-hide-tab\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-fbf14fa1 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Icon_Online_Safety_Dark_RGB-150x150.png\" alt=\"a shield and a question mark icon\" width=\"100\" height=\"100\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Qu\u00e9 entendemos por seguridad<\/h3><\/div><p class=\"uagb-ifb-desc\">La capacidad de identificar y evitar experiencias potencialmente da\u00f1inas en l\u00ednea.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-3a93a6a6 uagb-infobox__content-wrap  uagb-infobox-icon-left uagb-infobox-left uagb-infobox-stacked-tablet uagb-infobox-image-valign-middle\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/11\/Iconography-Trust-Dark-RGB-150x150.png\" alt=\"a shield icon\" width=\"100\" height=\"100\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Qu\u00e9 entendemos por confianza<\/h3><\/div><p class=\"uagb-ifb-desc\">La capacidad de identificar fuentes, sitios y aplicaciones en l\u00ednea confiables y evitar aquellos que no lo son.<\/p><\/div><\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer.jpg\" alt=\"A person wearing a hoodie sits on a window sill, working on a laptop\" class=\"wp-image-224372 size-large\" style=\"object-position:50% 50%\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/man-at-computer-250x167.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Abordar la falta de confianza en Internet<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Queremos que todo el mundo pueda acceder a informaci\u00f3n, recursos y una red de promotores de la seguridad en l\u00ednea para asegurar que siempre cuenten con la informaci\u00f3n m\u00e1s reciente sobre c\u00f3mo mantenerse seguros en l\u00ednea. Mediante el desarrollo conjunto de recursos y materiales de capacitaci\u00f3n, buscamos brindar a todas las personas los conocimientos necesarios para:<\/p>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>Identificar comunicaciones provenientes de fuentes que no son confiables (intentos de phishing, sitios web inseguros o falsos, intentos de fraude financiero, etc.);<\/li>\n\n\n\n<li>Tomar decisiones informadas sobre qu\u00e9 herramientas usar para comunicarse de forma segura con amigos y familiares, por ejemplo, servicios de mensajer\u00eda que ofrecen <a href=\"https:\/\/www.internetsociety.org\/issues\/encryption\/what-is\/\">cifrado de extremo a extremo<\/a>;<\/li>\n\n\n\n<li>Comprender los m\u00e9todos que utilizan los actores maliciosos para enga\u00f1ar a las personas y hacer que revelen informaci\u00f3n personal\u2014como datos bancarios\u2014 y por qu\u00e9 las contrase\u00f1as seguras son tan importantes; y<\/li>\n\n\n\n<li>Evitar la instalaci\u00f3n involuntaria de malware o virus en los dispositivos.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Participe&nbsp;<\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event.jpg\" alt=\"A woman in a hijab writes on a poster covered in colorful sticky notes\" class=\"wp-image-224355\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/writing-on-board-ISOC-at-event-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-6e38d95b uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"mailto:ots@isoc.org\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Cont\u00e1ctenos<\/h5><\/div><p class=\"uagb-ifb-desc\">Ahora mismo estamos trabajando con la comunidad para desarrollar recursos y materiales de capacitaci\u00f3n. \u00bfEs usted experto en confianza y seguridad en l\u00ednea? \u00bfSu organizaci\u00f3n, universidad o cap\u00edtulo local de Internet Society ha desarrollado materiales de capacitaci\u00f3n sobre confianza y seguridad en l\u00ednea? Queremos saber de usted.<br><\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event.jpg\" alt=\"A group of people seated at a table, reviewing documents and discussing ideas together.\" class=\"wp-image-224368\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/people-at-event-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/sigs\/online-safety\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">\u00danase al Grupo de Inter\u00e9s Especial sobre Seguridad en L\u00ednea<\/h5><\/div><p class=\"uagb-ifb-desc\">\u00bfLe gustar\u00eda ayudar a crear conciencia sobre las amenazas emergentes en l\u00ednea, como el ciberacoso, el robo de identidad y el acoso digital, y a la vez ofrecer orientaci\u00f3n pr\u00e1ctica sobre c\u00f3mo mitigar los riesgos y proteger la informaci\u00f3n personal? \u00danase al Grupo de Inter\u00e9s Especial (SIG) sobre Seguridad en L\u00ednea de Internet Society.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"613\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training.jpg\" alt=\"A group of men and women sit in a training\" class=\"wp-image-223500\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training-450x276.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training-768x471.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Cameroon-Chapter-Training-250x153.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d9cd8911 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/learning\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h5 class=\"uagb-ifb-title\">Aprenda<\/h5><\/div><p class=\"uagb-ifb-desc\">Fortalezca sus habilidades y conocimientos con estos cursos gratuitos disponibles en Internet Society Learning:<br><br>Huellas digitales, Privacidad, Cifrado, Lo que Internet necesita para existir, Lo que Internet necesita para prosperar<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-depth-teal-color has-text-color has-link-color wp-elements-a1a0fe9ff76b09b25acb804e8d5b37ac\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Noticias y recursos<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-grid uagb-post-grid  uagb-post__image-position-top uagb-post__image-disabled uagb-block-a8fd20a7     uagb-post__items uagb-post__columns-3 is-grid uagb-post__columns-tablet-2 uagb-post__columns-mobile-1 uagb-post__equal-height\" data-total=\"1\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/isoc\/\" title=\"Entradas de Internet Society\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Internet Society<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2026-02-10T17:10:20+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t10 de febrero de 2026\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2026\/02\/safer-internet-initiative\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Iniciativa Internet M\u00e1s Segura<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/bernardi\/\" title=\"Entradas de Paula Bernardi\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Paula Bernardi<\/a>, <a href=\"https:\/\/www.internetsociety.org\/es\/author\/richardson\/\" title=\"Entradas de Celia Richardson\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Celia Richardson<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-05-02T17:59:50+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t2 de mayo de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">\u00bfQu\u00e9 es una puerta trasera de cifrado?<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/hall\/\" title=\"Entradas de Joseph Lorenzo Hall\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Joseph Lorenzo Hall<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-04-17T20:08:44+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t17 de abril de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/richardson\/\" title=\"Entradas de Celia Richardson\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Celia Richardson<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2025-01-15T15:17:22+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t15 de enero de 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/01\/entender-e-identificar-estafas-capacitar-digitalmente-a-los-adultos-mayores-en-mexico\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Entender e identificar estafas: Capacitar digitalmente a los adultos mayores en M\u00e9xico<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<span class=\"uagb-post__author\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/author\/schonfeld\/\" title=\"Entradas de Sebasti\u00e1n Schonfeld\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Sebasti\u00e1n Schonfeld<\/a>, <a href=\"https:\/\/www.internetsociety.org\/es\/author\/ncampbell\/\" title=\"Entradas de Natalie Campbell\" rel=\"author\" itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\">Natalie Campbell<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<time datetime=\"2023-05-03T23:43:29+00:00\" class=\"uagb-post__date\">\n\t\t\t\t\t\t\t\t\t3 de mayo de 2023\t\t\t\t<\/time>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h5 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/05\/el-cifrado-protege-a-los-menores-en-internet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">El cifrado protege a los menores en Internet<\/a>\n\t\t\t<\/h5>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-post-pagination-wrap\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-link-color has-12-font-size wp-elements-cc40cc94bd932d84a17381b7813d6870\">Derechos de autor de las im\u00e1genes:<br>Creative Commons (dos fotos superiores), \u00a9 Berke Aksoz, \u00a9 Berke Aksoz, \u00a9 Internet Society Cameroon Chapter<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trabajamos para ayudar a las personas reci\u00e9n conectadas a tener una experiencia en l\u00ednea m\u00e1s segura a trav\u00e9s de un programa de seguridad en l\u00ednea pr\u00e1ctico, sostenible y liderado por la comunidad.<\/p>\n","protected":false},"author":46,"featured_media":246947,"parent":223313,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4910],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-225145","page","type-page","status-publish","has-post-thumbnail","hentry","category-fortalecimiento-de-internet"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",1278,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-450x194.jpg",450,194,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-768x331.jpg",768,331,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-1024x441.jpg",1024,441,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",1278,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",1278,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-250x108.jpg",250,108,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/girl-with-phone-1.jpg",600,258,false]},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/es\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Trabajamos para ayudar a las personas reci\u00e9n conectadas a tener una experiencia en l\u00ednea m\u00e1s segura a trav\u00e9s de un programa de seguridad en l\u00ednea pr\u00e1ctico, sostenible y liderado por la comunidad.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/225145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=225145"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/225145\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/223313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/246947"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=225145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=225145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=225145"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=225145"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=225145"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=225145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}