{"id":77939,"date":"2018-04-17T14:27:29","date_gmt":"2018-04-17T14:27:29","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/04\/space-invaders-consumer-grade-iot-enterprise\/"},"modified":"2025-11-10T17:19:27","modified_gmt":"2025-11-10T17:19:27","slug":"space-invaders-consumer-grade-iot-enterprise","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/space-invaders-consumer-grade-iot-enterprise\/","title":{"rendered":"Space Invaders \u2013 los dispositivos de IoT est\u00e1n en marcha"},"content":{"rendered":"<p>Me sol\u00eda gustar el juego Space Invaders: las olas de atacantes enemigos. Con experiencia, podr\u00edas aprender sus t\u00e1cticas y ser muy h\u00e1bil para detenerlas. Para el personal de TI de la empresa actual, los dispositivos de la IoT de gran publico sin duda se perciben como los invasores del espacio de anta\u00f1o.<\/p>\n<p>Hay buenas noticias y malas noticias sobre estas nuevas criaturas en la empresa. La buena noticia es que no comienzan con una mala intenci\u00f3n. La mala noticia es que est\u00e1n entrando en oleadas, a menudo desliz\u00e1ndose por debajo del radar, y las consecuencias pueden ser mucho mayores que recibir disparos en un juego.<\/p>\n<p>Para ayudar al personal de TI de negocios a lidiar con esta nueva ola hemos publicado\u00a0<em><a href=\"https:\/\/otalliance.org\/system\/files\/files\/initiative\/documents\/enterprise_iot_checklist.pdf\">The Enterprise IoT Security\u00a0 Checklist: Best Practices for Securing Consumer-Grade IoT in the Enterprise<\/a><\/em>.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2018\/04\/space-invaders-consumer-grade-iot-enterprise\/\">Saber m\u00e1s (ingl\u00e9s)<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Me sol\u00eda gustar el juego Space Invaders: las olas de atacantes enemigos. Con experiencia, podr\u00edas aprender sus t\u00e1cticas y ser muy h\u00e1bil para detenerlas. Para el personal de TI de la empresa actual, los dispositivos de la IoT de gran publico sin duda se perciben como los invasores del espacio de anta\u00f1o. Hay buenas noticias [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":77934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[186,157,171,4910],"tags":[6248,4350,2796],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4221],"class_list":["post-77939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-confianza","category-iot-es","category-privacidad","category-fortalecimiento-de-internet","tag-internet-de-las-cosas-iot","tag-online-trust-alliance-es","tag-ota-es","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",1280,854,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-768x512.jpg",768,512,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",1280,854,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",1280,854,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/04\/Checklist-IoT-Enterprise.jpg",600,400,false]},"uagb_author_info":{"display_name":"Jeff Wilbur","author_link":"https:\/\/www.internetsociety.org\/es\/author\/wilbur\/"},"uagb_comment_info":0,"uagb_excerpt":"Me sol\u00eda gustar el juego Space Invaders: las olas de atacantes enemigos. Con experiencia, podr\u00edas aprender sus t\u00e1cticas y ser muy h\u00e1bil para detenerlas. Para el personal de TI de la empresa actual, los dispositivos de la IoT de gran publico sin duda se perciben como los invasores del espacio de anta\u00f1o. Hay buenas noticias&hellip;","authors":[{"term_id":4221,"user_id":43,"is_guest":0,"slug":"wilbur","display_name":"Jeff Wilbur","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Jeff-Wilbur.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Jeff-Wilbur.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/77939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=77939"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/77939\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/77934"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=77939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=77939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=77939"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=77939"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=77939"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=77939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}