<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/27/los-servicios-tic-cierran-2021-con-su-mayor-crecimiento-en-16-anos/</loc><lastmod>2022-03-21T08:14:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/26/el-almacenamiento-una-pieza-clave-en-la-lucha-contra-el-ransomware/</loc><lastmod>2022-03-21T08:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/25/ranking-lideres-2022-las-50-companias-que-mas-facturan-del-sector-tic-en-espana/</loc><lastmod>2022-03-21T08:12:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/24/carme-artigas-en-2030-la-economia-digital-supondra-el-40-del-pib-en-espana/</loc><lastmod>2022-03-21T08:10:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/23/el-ransomware-de-triple-extorsion-proliferara-en-2022-2/</loc><lastmod>2022-03-21T08:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/22/nueva-multa-a-meta-por-incumplimiento-de-la-gdpr/</loc><lastmod>2022-03-21T08:08:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/21/claves-para-mitigar-los-riesgos-de-seguridad-que-plantea-el-aumento-del-trabajo-hibrido/</loc><lastmod>2022-03-21T08:07:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/20/el-ransomware-de-triple-extorsion-proliferara-en-2022/</loc><lastmod>2022-03-13T17:22:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/19/proteger-los-dispositivos-iot-el-gran-reto-para-las-instituciones-sanitarias-en-este-2022/</loc><lastmod>2022-03-13T17:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/18/ametic-y-atos-lanzan-el-primer-observatorio-de-inteligencia-artificial-en-espana/</loc><lastmod>2022-03-13T17:19:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/17/los-mejores-moviles-del-mwc-2022/</loc><lastmod>2022-03-13T17:19:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/16/como-esta-influyendo-la-realidad-virtual-en-los-casinos-en-linea/</loc><lastmod>2022-03-13T17:17:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/15/el-gobierno-de-espana-anuncia-la-aprobacion-de-un-plan-nacional-de-ciberseguridad/</loc><lastmod>2022-03-13T17:13:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/14/runet-el-arma-de-putin-para-controlar-internet/</loc><lastmod>2022-03-13T17:11:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/13/entender-el-fraude-la-mejor-forma-de-prevenirlo/</loc><lastmod>2022-03-07T11:21:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/12/integracion-de-datos-para-liderar-en-la-economia-de-la-colaboracion/</loc><lastmod>2022-03-07T11:20:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/10/cada-vez-mas-datos-bancarios-a-la-venta-en-la-deep-web/</loc><lastmod>2022-03-07T11:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/11/el-exodo-de-las-tecnologicas-de-rusia-a-raiz-de-la-guerra/</loc><lastmod>2022-03-07T11:16:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/09/ciberguerra-ucrania-rusia-los-frentes-digitales/</loc><lastmod>2022-03-07T11:05:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/08/hacktivismo-vs-ciberactivismo/</loc><lastmod>2022-03-07T11:02:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/07/como-protegerse-en-la-ciberguerra/</loc><lastmod>2022-03-07T10:59:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/06/la-inversion-del-estado-en-tecnologia-crecera-un-5-en-2022/</loc><lastmod>2022-03-01T12:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/05/como-controlar-tu-identidad-digital-desde-tu-movil-con-blockchain/</loc><lastmod>2022-03-01T12:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/04/las-conexiones-5g-alcanzaran-los-1-000-millones-este-ano/</loc><lastmod>2022-03-01T12:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/03/structura-x-el-proyecto-de-infraestructura-de-nube-europea-conforme-a-gaia-x/</loc><lastmod>2022-03-01T12:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/02/shadow-code-una-amenaza-a-tener-muy-en-cuenta/</loc><lastmod>2022-03-01T12:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/03/01/mejorar-la-ciberseguridad-de-una-pyme/</loc><lastmod>2022-03-01T12:26:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/28/mineria-de-procesos-que-es-y-como-se-esta-aplicando-en-la-digitalizacion-empresarial/</loc><lastmod>2022-02-20T10:32:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/27/por-que-apostar-por-la-red-5g-privada/</loc><lastmod>2022-02-20T10:31:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/26/aumento-alarmante-del-ransomware-y-de-los-ciberataques-maliciosos-en-2021/</loc><lastmod>2022-02-20T10:30:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/25/wifi-6-es-mas-barato-y-rinde-mucho-mas/</loc><lastmod>2022-02-20T10:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/24/estado-de-la-inteligencia-artificial-en-espana/</loc><lastmod>2022-02-20T10:28:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/23/falsa-actualizacion-de-windows-11-infecta-ordenadores-con-el-malware-redline/</loc><lastmod>2022-02-20T10:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/22/microsoft-pondra-mas-dificil-el-robo-de-contrasenas/</loc><lastmod>2022-02-20T10:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/21/como-enamoran-los-ciberdelincuentes/</loc><lastmod>2022-02-20T10:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/20/detectan-un-agujero-de-seguridad-al-analizar-fotos-de-facebook/</loc><lastmod>2022-02-13T10:53:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/19/como-utiliza-google-la-inteligencia-artificial/</loc><lastmod>2022-02-13T10:52:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/18/sembrando-un-campo-de-minas-para-los-ciberdelicuentes/</loc><lastmod>2022-02-13T10:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/17/cinco-pasos-que-tienes-que-dar-ante-una-filtracion-de-datos/</loc><lastmod>2022-02-13T10:49:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/16/hp-wolf-security-el-malware-cada-dia-se-oculta-mejor/</loc><lastmod>2022-02-13T10:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/15/ciberamenazas-destacadas-de-2021-y-que-esperar-de-2022/</loc><lastmod>2022-02-13T10:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/14/1-de-cada-3-adolescentes-hace-un-uso-problematico-de-la-red-segun-unicef/</loc><lastmod>2022-02-13T10:44:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/13/dos-empresas-de-petroleo-alemanas-hackeadas-el-mismo-dia/</loc><lastmod>2022-02-06T10:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/12/el-itsm-como-puerta-al-exito-en-la-transformacion-digital-en-las-organizaciones/</loc><lastmod>2022-02-06T10:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/11/por-que-necesitamos-la-web-3-0/</loc><lastmod>2022-02-06T10:14:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/10/son-seguros-los-gestores-de-contrasenas/</loc><lastmod>2022-02-06T10:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/09/perspectivas-de-ciberseguridad-en-2022/</loc><lastmod>2022-02-06T10:11:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/08/el-parlamento-europeo-en-vias-de-sancionar-la-desinformacion/</loc><lastmod>2022-02-06T10:09:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/07/europol-realiza-un-operativo-a-gran-escala-para-eliminar-contenido-terrorista-online/</loc><lastmod>2022-02-06T10:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/06/el-40-de-los-correos-electronicos-son-una-potencial-amenaza/</loc><lastmod>2022-02-06T10:05:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/06/los-cibercriminales-se-centran-en-las-brechas-del-dia-cero-y-en-las-cadenas-de-suministro/</loc><lastmod>2022-02-01T08:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/04/el-peligro-para-europa-de-la-ciberguerra-en-ucrania/</loc><lastmod>2022-02-01T08:34:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/03/347-terabits-por-segundo-asi-ha-sido-el-mayor-ataque-ddos-de-la-historia/</loc><lastmod>2022-02-01T08:33:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/02/perspectivas-de-ciberseguridad-en-2022-segun-el-foro-economico-mundial/</loc><lastmod>2022-02-01T08:31:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/02/01/la-policia-nacional-desmantela-una-granja-ilegal-de-criptomonedas-en-sevilla/</loc><lastmod>2022-02-01T08:29:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/31/la-inversion-publica-en-impresion-y-gestion-documental-se-incrementa-un-50/</loc><lastmod>2022-01-28T19:01:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/30/la-ia-se-consolida-como-motor-de-eficiencia-empresarial/</loc><lastmod>2022-01-23T10:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/29/la-tecnologia-como-impulsora-del-crecimiento-economico-sostenible/</loc><lastmod>2022-01-23T10:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/28/ddos-crecen-los-ataques-con-peticion-de-rescate/</loc><lastmod>2022-01-23T10:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/27/ataques-a-la-cadena-de-suministros-la-ue-se-pone-a-prueba/</loc><lastmod>2022-01-23T10:47:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/26/los-ciberdelincuentes-se-estan-quedando-sin-formas-de-ocultar-sus-huellas-en-linea/</loc><lastmod>2022-01-23T10:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/25/una-ley-para-hacer-de-la-red-un-lugar-seguro-en-la-ue/</loc><lastmod>2022-01-23T10:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/24/ciberataque-a-cruz-roja-medio-millon-de-personas-vulnerables-afectadas/</loc><lastmod>2022-01-23T10:42:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/23/bbva-crea-un-area-de-software-para-desarrollar-soluciones-globales-y-escalables/</loc><lastmod>2022-01-16T09:40:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/22/ciberseguridad-para-gente-normal/</loc><lastmod>2022-01-16T09:39:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/21/las-companias-incrementan-sus-presupuestos-para-data-e-ia/</loc><lastmod>2022-01-16T09:38:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/20/la-ue-organiza-una-simulacion-de-ciberataque-a-gran-escala-en-las-cadenas-de-suministro/</loc><lastmod>2022-01-16T09:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/19/suiza-prohibe-a-sus-ffaa-usar-whatsapp-telegram-y-signal/</loc><lastmod>2022-01-16T09:34:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/18/el-mundo-cripto-no-deberia-interesar-a-los-cibercriminales/</loc><lastmod>2022-01-16T09:33:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/17/aumento-de-la-tension-en-ucrania-tras-un-ciberataque-masivo/</loc><lastmod>2022-01-16T09:31:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/16/el-comercio-electronico-crecera-entre-un-30-y-un-50-en-2022/</loc><lastmod>2022-01-09T09:25:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/15/que-necesitas-para-ser-un-agente-digitalizador-de-los-fondos-europeos/</loc><lastmod>2022-01-09T09:24:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/14/ces-2022-las-novedades-de-la-gran-feria-de-la-electronica-de-consumo/</loc><lastmod>2022-01-09T09:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/13/el-mercado-cloud-europeo-crece-por-encima-del-25/</loc><lastmod>2022-01-09T09:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/12/esta-vulnerabilidad-en-whatsapp-te-podria-romper-el-sistema/</loc><lastmod>2022-01-09T09:20:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/11/cuidado-con-lo-que-copiamos-y-pegamos-de-una-pagina-web/</loc><lastmod>2022-01-09T09:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/10/seguridad-fisica-y-seguridad-logicaquebraderos-de-cabeza/</loc><lastmod>2022-01-09T09:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/09/tendencias-para-2022-en-proteccion-y-gestion-de-datos/</loc><lastmod>2022-01-02T17:27:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/08/lo-que-viene-en-2022-mas-alla-del-metaverso/</loc><lastmod>2022-01-02T17:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/07/lastpass-y-el-presunto-compromiso-de-su-contrasena-maestra/</loc><lastmod>2022-01-02T17:25:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/05/los-10-peores-incidentes-de-ciberseguridad-en-2021/</loc><lastmod>2022-01-02T17:24:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/04/el-ccn-cert-impulsa-el-despliegue-de-la-red-nacional-de-centros-de-operaciones-de-ciberseguridad/</loc><lastmod>2022-01-02T17:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2022/01/03/contrainteligencia-para-proteger-a-nuestras-empresas/</loc><lastmod>2022-01-02T17:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/31/que-nos-depara-la-ciberseguridad-en-2022/</loc><lastmod>2021-12-27T09:01:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/30/la-vulnerabilidad-critica-de-apache-log4j-pone-en-riesgo-a-gran-parte-de-internet/</loc><lastmod>2021-12-27T08:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/29/ciberresiliencia-salvaguardar-los-datos-para-la-continuidad-del-negocio/</loc><lastmod>2021-12-27T08:58:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/28/twitter-nuevo-ataque-de-phishing-a-cuentas-verificadas/</loc><lastmod>2021-12-27T08:55:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/27/como-establecer-una-buena-politica-de-recuperacion-de-desastres/</loc><lastmod>2021-12-27T08:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/23/fenomenos-que-estan-afectando-la-ciberseguridad-de-las-pymes/</loc><lastmod>2021-12-19T11:02:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/22/dark-web-riesgos-contenidos-y-como-acceder/</loc><lastmod>2021-12-19T10:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/21/tendencias-en-ciberseguridad-que-podriamos-ver-en-2022/</loc><lastmod>2021-12-19T10:55:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/20/ciberseguridad-en-la-administracion-local-retos-y-necesidades/</loc><lastmod>2021-12-19T10:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/19/que-7-tendencias-que-marcaran-la-seguridad-de-las-empresas-en-2022/</loc><lastmod>2021-12-12T18:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/18/los-10-proveedores-de-ciberseguridad-mas-relevantes-del-mercado-espanol/</loc><lastmod>2021-12-12T18:44:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/17/las-empresas-espanolas-creen-en-la-estrategia-de-datos/</loc><lastmod>2021-12-12T18:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/16/crecimiento-del-cloud-computing-en-espana/</loc><lastmod>2021-12-12T18:42:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/15/proyecto-de-ciberseguridad-europeo-para-pymes-2/</loc><lastmod>2021-12-12T18:40:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/14/cuidado-con-los-activadores-piratas-de-windows-10/</loc><lastmod>2021-12-12T18:39:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/13/whatsapp-prueba-los-pagos-mediante-criptomonedas/</loc><lastmod>2021-12-12T18:38:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/12/gobierno-del-dato-moda-necesidad-o-reto/</loc><lastmod>2021-12-06T10:10:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/11/la-automatizacion-de-los-procesos-se-hace-esperar/</loc><lastmod>2021-12-06T10:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/10/el-gasto-de-ti-del-sector-publico-en-espana-crecera-un-64/</loc><lastmod>2021-12-06T10:08:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/09/mas-alla-de-la-oficina-sin-papel-una-breve-historia-de-la-transformacion-digital/</loc><lastmod>2021-12-06T10:07:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/08/orizon-lanzara-en-2022-el-primer-estandar-de-eficiencia-del-software-del-mercado/</loc><lastmod>2021-12-06T10:06:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/07/como-solucionar-problemas-con-la-recepcion-y-envio-de-correos-en-gmail/</loc><lastmod>2021-12-06T10:04:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/06/zoom-indemnizara-a-algunos-usuarios-por-no-respetar-su-privacidad/</loc><lastmod>2021-12-06T10:03:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/02/proyecto-de-ciberseguridad-europeo-para-pymes/</loc><lastmod>2021-12-02T18:27:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/05/menores-y-privacidad-una-asignatura-pendiente/</loc><lastmod>2021-12-01T08:20:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/04/piratas-informaticos-explotan-un-exploit-de-windows-installer/</loc><lastmod>2021-12-01T08:19:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/03/una-cdn-de-nueva-generacion-la-mejor-defensa-frente-a-los-bots/</loc><lastmod>2021-12-01T08:18:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/12/01/que-hacer-si-gmail-no-funciona-errores-mas-comunes-y-como-resolverlos/</loc><lastmod>2021-12-01T08:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/30/fbi-hackeado-para-emitir-alertas-falsas/</loc><lastmod>2021-11-21T18:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/29/es-de-esperar-que-sigan-aumentando-los-intentos-de-ciberataque-a-las-empresas/</loc><lastmod>2021-11-21T18:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/28/productos-tecnologicos-reacondicionados-hasta-un-70-mas-baratos-durante-todo-el-ano/</loc><lastmod>2021-11-21T18:46:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/27/como-digitalizar-una-empresa-de-manera-rapida-y-economica/</loc><lastmod>2021-11-21T18:45:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/26/el-consumo-de-pornografia-online-crece-mas-de-un-60/</loc><lastmod>2021-11-21T18:43:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/25/el-90-de-las-empresas-usa-la-nube-pero-no-para-sus-principales-aplicaciones/</loc><lastmod>2021-11-21T18:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/24/el-54-de-los-retailers-espanoles-ha-sufrido-algun-ciberataque/</loc><lastmod>2021-11-21T18:40:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/23/android-espia-incluso-desactivando-las-opciones-de-rastreo/</loc><lastmod>2021-11-21T18:39:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/22/analiza-tu-dispositivo-android-en-busca-de-virus/</loc><lastmod>2021-11-21T18:38:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/21/parcheo-de-vulnerabilidades-una-accion-urgente-para-gobiernos-y-empresas/</loc><lastmod>2021-11-14T19:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/20/ee-uu-se-une-al-acuerdo-de-paris-para-mejorar-la-seguridad-en-el-ciberespacio/</loc><lastmod>2021-11-14T19:08:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/19/las-amenazas-mas-peligrosas-que-las-pymes-reciben-por-correo-electronico/</loc><lastmod>2021-11-14T19:07:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/18/las-empresas-disparan-su-presupuesto-en-ciberseguridad-cara-a-2022/</loc><lastmod>2021-11-14T19:06:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/17/el-ransomware-tambien-afecta-al-retail/</loc><lastmod>2021-11-14T19:04:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/16/como-alcanzan-los-cibercriminales-a-los-proveedores-de-seguridad/</loc><lastmod>2021-11-14T19:03:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/15/la-venta-de-portatiles-crece-un-8-en-el-tercer-trimestre/</loc><lastmod>2021-11-14T19:02:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/14/los-mejores-motores-de-busqueda-alternativos-a-google/</loc><lastmod>2021-11-08T09:15:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/13/como-usar-el-editor-de-fotos-de-whatsapp-web/</loc><lastmod>2021-11-08T09:13:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/12/bitdefender-publica-informe-sobre-ciberseguridad-y-comportamientos-online/</loc><lastmod>2021-11-08T09:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/11/el-juego-del-calamar-se-convierte-en-objetivo-de-estafas-y-malware/</loc><lastmod>2021-11-08T09:11:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/10/ee-uu-pone-al-creador-de-pegasus-nso-group-en-la-lista-negra/</loc><lastmod>2021-11-08T09:10:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/09/microsoft-anuncia-defender-for-business-y-otras-novedades-en-ciberseguridad/</loc><lastmod>2021-11-08T09:10:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/08/la-policia-alerta-del-pagamocho-la-ciberestafa-que-se-aprovecha-de-bizum/</loc><lastmod>2021-11-08T09:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/07/que-necesitas-para-minar-criptomonedas-y-cuanto-cuesta/</loc><lastmod>2021-11-01T10:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/06/ocho-consejos-contra-ataques-de-phishing-que-cualquier-usuario-puede-seguir/</loc><lastmod>2021-11-01T10:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/05/mozilla-firefox-problemas-para-actualizar/</loc><lastmod>2021-11-01T10:38:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/04/misterysnail-otra-amenaza-para-windows/</loc><lastmod>2021-11-01T10:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/03/green-pass-falsos-mucho-cuidado-con-ellos/</loc><lastmod>2021-11-01T10:35:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/02/solo-un-35-de-empresas-se-han-adaptado-bien-a-los-cambios-de-los-ultimos-dos-anos/</loc><lastmod>2021-11-01T10:34:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/11/01/inteligencia-al-servicio-de-la-productividad/</loc><lastmod>2021-11-01T10:33:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/31/que-es-la-tecnologia-deepfakes-en-el-cibercrimen/</loc><lastmod>2021-10-24T17:02:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/30/la-apuesta-por-la-sostenibilidad-impulsa-el-reacondicionamiento-tecnologico/</loc><lastmod>2021-10-24T17:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/29/la-falta-de-desarrolladores-estimula-nuevas-formulas-de-contratacion-de-talento-ti/</loc><lastmod>2021-10-24T16:59:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/28/el-gasto-ti-superara-los-4-billones-de-dolares-en-2022/</loc><lastmod>2021-10-24T16:58:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/27/las-empresas-reclaman-la-ciberseguridad-gestionada/</loc><lastmod>2021-10-24T16:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/26/microsoft-muestra-los-beneficios-de-seguridad-en-windows-11-2/</loc><lastmod>2021-10-24T16:56:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/25/como-pueden-las-empresas-protegerse-de-ataques-ddos-en-la-nube/</loc><lastmod>2021-10-24T16:55:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/24/una-segunda-revolucion-de-la-nube/</loc><lastmod>2021-10-17T17:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/23/como-reconocer-el-verdadero-almacenamiento-como-servicio/</loc><lastmod>2021-10-17T17:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/22/glovo-inaugura-en-madrid-su-nuevo-hub-tecnologico-en-madrid/</loc><lastmod>2021-10-17T17:43:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/21/siete-aplicaciones-de-mensajeria-para-los-preocupados-por-su-privacidad/</loc><lastmod>2021-10-17T17:42:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/20/whatsapp-estrena-el-cifrado-de-extremo-a-extremo-para-el-backup-en-nube/</loc><lastmod>2021-10-17T17:41:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/19/microsoft-muestra-los-beneficios-de-seguridad-en-windows-11/</loc><lastmod>2021-10-17T17:40:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/18/que-es-la-ciberadiccion-o-el-trastorno-de-adiccion-a-internet/</loc><lastmod>2021-10-17T17:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/17/cinco-formaciones-que-te-abriran-las-puertas-al-mercado-laboral-de-las-tic/</loc><lastmod>2021-10-11T07:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/16/intel-descarta-al-reino-unido-como-destino-de-sus-fabricas-de-chips-debido-al-brexit/</loc><lastmod>2021-10-11T07:08:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/15/5-razones-por-las-que-adoptar-soluciones-de-backup-as-a-service/</loc><lastmod>2021-10-11T07:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/14/los-nuevos-retos-de-seguridad-en-aplicaciones-web-y-api/</loc><lastmod>2021-10-11T07:06:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/13/incibe-abre-el-registro-del-encuentro-internacional-de-seguridad-de-la-informacion-15enise/</loc><lastmod>2021-10-11T07:05:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/12/los-hospitales-sufren-un-robo-de-datos-con-250-ciberataques-diarios/</loc><lastmod>2021-10-11T07:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/11/como-evitar-que-nos-timen-con-codigos-qr-y-bizum/</loc><lastmod>2021-10-11T07:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/10/wifi-cumple-22-anos/</loc><lastmod>2021-10-03T10:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/09/desmontando-mitos-verdades-y-falsas-creencias-sobre-el-big-data/</loc><lastmod>2021-10-03T10:55:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/08/facturacion-y-gestion-empresarial/</loc><lastmod>2021-10-03T10:54:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/07/el-internet-de-los-sentidos-un-paso-mas-hacia-un-cerebro-digital-global/</loc><lastmod>2021-10-03T10:53:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/06/como-garantizar-la-ciberseguridad-en-la-vuelta-a-la-oficina/</loc><lastmod>2021-10-03T10:52:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/05/el-gobierno-transfiere-52-millones-al-cni-para-implementar-el-centro-de-operaciones-de-ciberseguridad/</loc><lastmod>2021-10-03T10:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/04/francia-prohibe-a-sus-ministros-usar-la-nube-de-office-365/</loc><lastmod>2021-10-03T10:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/03/envios-seguros-de-archivos-entre-empresa-y-cliente-con-c2-transfer/</loc><lastmod>2021-10-01T07:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/02/google-maps-muestra-los-incendios-forestales-en-directo/</loc><lastmod>2021-10-01T07:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/10/01/una-nueva-ciberestafa-planea-sobre-las-criptomonedas-2/</loc><lastmod>2021-10-01T07:09:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/30/facebook-files-el-nuevo-escandalo-de-facebook-por-manipular-su-algoritmo/</loc><lastmod>2021-09-29T07:06:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/29/skype-lanza-importantes-novedades-copiando-a-zoom/</loc><lastmod>2021-09-29T07:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/28/ciberseguridad-gestionada-una-oportunidad-de-negocio/</loc><lastmod>2021-09-27T18:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/27/google-alerta-de-una-nueva-tecnica-que-hace-indetectable-el-malware-en-windows/</loc><lastmod>2021-09-27T18:10:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/26/los-fondos-europeos-son-una-oportunidad-unica-para-la-digitalizacion-de-la-pyme/</loc><lastmod>2021-09-18T18:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/25/9-consejos-fundamentales-para-incrementar-la-seguridad-en-wordpress/</loc><lastmod>2021-09-18T18:47:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/24/los-ataques-aumentan-en-el-primer-semestre-de-2021/</loc><lastmod>2021-09-18T18:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/23/deepfakes-ya-estan-aqui/</loc><lastmod>2021-09-18T18:44:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/22/la-escalada-del-ransomware-es-imparable/</loc><lastmod>2021-09-18T18:43:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/21/asi-es-la-victima-perfecta-para-un-ataque-de-ransomware/</loc><lastmod>2021-09-18T18:41:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/20/codigo-abierto-y-malware-una-relacion-compleja/</loc><lastmod>2021-09-18T18:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/19/ciberseguridad-un-reto-mas-en-la-educacion-2/</loc><lastmod>2021-09-13T08:01:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/18/donde-debe-centrar-sus-miras-el-canal-ti-en-la-era-pos-covid/</loc><lastmod>2021-09-13T08:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/17/aliexpress-agiliza-sus-entregas-con-una-red-de-mas-de-600-taquillas/</loc><lastmod>2021-09-13T07:59:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/16/administracion-publica-cual-es-la-penetracion-cloud-computing/</loc><lastmod>2021-09-13T07:58:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/15/continuidad-o-proteccion-del-negocio-esa-es-la-cuestion/</loc><lastmod>2021-09-13T07:56:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/14/una-nueva-ciberestafa-planea-sobre-las-criptomonedas/</loc><lastmod>2021-09-13T07:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/13/dia-del-programador-los-perfiles-mas-demandados/</loc><lastmod>2021-09-13T07:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/12/tecnologia-en-almacenes-los-imprescindibles-para-una-logistica-inteligente/</loc><lastmod>2021-09-05T18:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/11/los-ciberdelincuentes-venden-herramientas-para-ocultar-malware-en-gpus-de-amd-y-nvidia-2/</loc><lastmod>2021-09-05T18:04:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/10/las-mejores-apps-para-ganar-espacio-en-un-movil-android/</loc><lastmod>2021-09-05T18:03:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/09/el-mercado-pc-crecera-un-13-en-emea-en-2021/</loc><lastmod>2021-09-04T12:39:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/07/ciberseguridad-un-reto-mas-en-la-educacion/</loc><lastmod>2021-09-04T12:38:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/06/los-ciberdelincuentes-venden-herramientas-para-ocultar-malware-en-gpus-de-amd-y-nvidia/</loc><lastmod>2021-09-04T12:37:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/05/telegram-supera-los-mil-millones-de-descargas/</loc><lastmod>2021-09-01T07:07:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/04/diez-amenazas-a-superar-para-lograr-un-teletrabajo-seguro-2/</loc><lastmod>2021-09-01T07:06:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/03/docker-cuidado-con-las-descargas-incluso-de-sitios-legitimos/</loc><lastmod>2021-09-01T07:05:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/02/como-asegurarse-que-un-pc-esta-libre-de-malware-antes-de-la-vuelta-al-cole/</loc><lastmod>2021-09-01T07:04:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/09/01/china-adoptara-un-modelo-semejante-a-la-gdpr/</loc><lastmod>2021-09-01T07:03:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/31/el-sector-de-servicios-tic-sigue-liderando-la-recuperacion-economica/</loc><lastmod>2021-08-25T16:41:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/30/la-ciberdelincuencia-alcanza-su-sofisticacion/</loc><lastmod>2021-08-25T16:40:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/29/un-hacker-encuentra-la-manera-de-robar-las-credenciales-de-windows-365/</loc><lastmod>2021-08-25T16:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/28/t-mobile-investiga-una-violacion-masiva-de-datos-de-clientes/</loc><lastmod>2021-08-25T16:38:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/27/desastre-de-seguridad-en-los-emails-de-los-servicios-publicos/</loc><lastmod>2021-08-25T16:37:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/26/diez-amenazas-a-superar-para-lograr-un-teletrabajo-seguro/</loc><lastmod>2021-08-25T16:36:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/25/andalucia-implanta-analitica-avanzada-en-su-sistema-sanitario/</loc><lastmod>2021-08-24T07:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/24/el-78-de-padres-desconoce-como-proteger-a-sus-hijos-de-los-peligros-de-internet/</loc><lastmod>2021-08-22T08:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/23/espana-recibe-casi-el-10-del-spam-de-todo-el-mundo/</loc><lastmod>2021-08-18T07:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/22/ransomware-protocolo-de-actuacion-para-pymes/</loc><lastmod>2021-08-16T08:11:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/21/accenture-confirma-ataque-de-lockbit-el-ransomware-es-una-epidemia-mundial/</loc><lastmod>2021-08-16T08:10:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/20/espana-entre-los-paises-con-peor-tasa-de-conversion/</loc><lastmod>2021-08-16T08:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/19/uno-de-los-problemas-medioambientales-en-espana-se-llama-basura-electronica/</loc><lastmod>2021-08-16T08:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/18/el-40-de-las-empresas-ha-implantado-ya-alguna-solucion-de-impresion-cloud/</loc><lastmod>2021-08-16T08:07:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/17/nuevas-exigencias-para-las-pymes/</loc><lastmod>2021-08-16T08:04:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/16/grooming-sexting-stalking-y-sextorsion-definicion-y-modus-operandi/</loc><lastmod>2021-08-16T08:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/15/como-mantener-seguros-los-datos-2/</loc><lastmod>2021-08-09T08:33:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/14/incibe-abre-el-registro-de-la-academia-hacker-buscando-talento-en-ciberseguridad/</loc><lastmod>2021-08-09T08:31:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/13/windows-10-bloqueara-por-defecto-las-aplicaciones-potencialmente-no-deseadas/</loc><lastmod>2021-08-09T08:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/12/google-exigira-una-politica-de-privacidad-para-todas-las-apps-de-play-store/</loc><lastmod>2021-08-09T08:29:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/11/los-actores-del-acoso-y-el-ciberacoso-victima-acosador-y-testigos/</loc><lastmod>2021-08-09T08:28:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/10/malware-oculto-en-redes-neuronales/</loc><lastmod>2021-08-09T08:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/09/expertos-de-samsung-explican-en-cinco-videos-como-reducir-los-problemas-de-ciberseguridad/</loc><lastmod>2021-08-09T08:21:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/08/tres-de-cada-diez-espanoles-podran-teletrabajar-en-los-proximos-anos/</loc><lastmod>2021-08-01T12:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/07/las-8-areas-de-negocio-que-debe-controlar-un-administrador-de-sistemas/</loc><lastmod>2021-08-01T12:11:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/06/cuidado-con-los-windows-11-falsos-son-malware/</loc><lastmod>2021-08-01T12:09:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/05/como-mantener-seguros-los-datos/</loc><lastmod>2021-08-01T12:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/04/bitdefender-descubre-nuevas-capacidades-del-peligroso-troyano-trickbot/</loc><lastmod>2021-08-01T12:07:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/03/doxing-los-riesgos-de-ligar-a-traves-de-la-red/</loc><lastmod>2021-08-01T12:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/02/la-mayoria-de-los-empleados-adoptan-practicas-de-ciberseguridad-que-ponen-en-riesgo-a-las-empresas/</loc><lastmod>2021-08-01T12:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/08/01/por-que-un-fallo-en-el-sistema-de-akamai-provoco-la-caida-de-media-internet/</loc><lastmod>2021-08-01T12:01:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/31/grupo-amper-y-prosegur-se-alian-para-digitalizar-los-sistemas-de-proteccion-contra-incendios/</loc><lastmod>2021-07-26T07:55:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/30/dmca-una-amenaza-para-la-ciberseguridad/</loc><lastmod>2021-07-26T07:52:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/29/scraping-robe-los-datos-de-700-millones-de-usuarios-de-linkedin-por-diversion/</loc><lastmod>2021-07-26T07:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/28/que-es-pegasus-el-sistema-de-espionaje-telefonico-israeli-usado-por-gobiernos-de-todo-el-mundo/</loc><lastmod>2021-07-26T07:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/27/bruselas-actualiza-sus-reglas-para-transferir-datos-fuera-de-la-union/</loc><lastmod>2021-07-24T10:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/26/el-mayor-centro-de-inteligencia-artificial-de-europa-estara-en-alava/</loc><lastmod>2021-07-23T16:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/25/la-vpn-de-mozilla-ya-esta-disponible-en-espana/</loc><lastmod>2021-07-16T17:53:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/24/lo-mas-buscado-en-google-en-espana-en-lo-que-va-de-2021/</loc><lastmod>2021-07-16T17:51:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/23/tiktok-supera-los-3-000-millones-de-descargas/</loc><lastmod>2021-07-16T17:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/22/google-meet-pone-fin-a-las-videollamadas-sin-limite-de-tiempo/</loc><lastmod>2021-07-16T17:47:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/21/magecart-sigue-innovando-para-robar-tarjetas-de-credito-de-sitios-de-ecommerce/</loc><lastmod>2021-07-16T17:45:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/20/como-proteger-tus-datos-personales-y-profesionales-si-te-roban-el-smartphone/</loc><lastmod>2021-07-16T17:44:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/19/lo-que-tu-navegador-cuenta-de-ti/</loc><lastmod>2021-07-16T17:44:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/16/europa-necesita-operadores-poderosos/</loc><lastmod>2021-07-11T18:09:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/18/audacity-y-la-polemica-de-la-recopilacion-de-datos-software-espia/</loc><lastmod>2021-07-11T18:08:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/17/diavol-otro-ransomware-de-wizard-spider/</loc><lastmod>2021-07-11T18:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/12/un-fallo-en-los-sistemas-de-la-consejeria-de-sanidad-de-la-comunidad-de-madrid-expone-datos-de-miles-de-personas/</loc><lastmod>2021-07-11T18:05:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/15/la-necesidad-de-renovar-las-competencias-profesionales/</loc><lastmod>2021-07-11T18:04:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/14/check-point-revela-las-prioridades-de-seguridad-para-el-trabajo-hibrido/</loc><lastmod>2021-07-11T18:03:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/13/margrethe-vestager-el-gobierno-espanol-es-pionero-en-derechos-digitales/</loc><lastmod>2021-07-11T18:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/11/la-inversion-en-ciberseguridad-crece-pero-no-lo-suficiente/</loc><lastmod>2021-07-05T07:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/10/lo-que-la-ciberseguridad-moderna-puede-aprender-de-los-antiguos-adversarios/</loc><lastmod>2021-07-05T07:32:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/09/kaseya-un-ataque-de-ransomware-colosal-paraliza-centenares-de-empresas/</loc><lastmod>2021-07-05T07:31:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/08/microsoft-se-une-a-foretica-para-trabajar-en-iniciativas-de-digitalizacion-sostenible/</loc><lastmod>2021-07-05T07:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/07/coca-cola-disena-un-plan-para-digitalizar-el-sector-hostelero/</loc><lastmod>2021-07-05T07:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/06/los-4-momentos-criticos-en-los-que-debes-cambiar-tu-contrasena-consejos-y-riesgos/</loc><lastmod>2021-07-05T07:22:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/05/descubren-como-hackear-cajeros-automaticos-con-solo-un-telefono-movil/</loc><lastmod>2021-07-05T07:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/04/hackean-el-instituto-de-investigacion-nuclear-de-corea-del-sur-aprovechando-un-fallo-en-vpn/</loc><lastmod>2021-07-01T07:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/03/google-reforzara-la-seguridad-de-google-workspace/</loc><lastmod>2021-07-01T07:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/02/microsoft-explica-por-que-necesitaras-un-chip-tpm-2-0-para-windows-11/</loc><lastmod>2021-07-01T07:45:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/07/01/ciberseguridad-para-periodistas-2/</loc><lastmod>2021-07-01T07:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/30/windows-11-ya-esta-aqui-que-hay-de-nuevo/</loc><lastmod>2021-06-27T09:01:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/29/los-ciberataques-aumentan-un-300-debido-al-teletrabajo/</loc><lastmod>2021-06-27T09:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/28/inteligencia-artificial-que-es-como-funciona-y-para-que-se-esta-utilizando/</loc><lastmod>2021-06-27T08:59:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/27/quieres-combatir-a-los-cibercriminales-descubre-el-mejor-master-en-ciberseguridad/</loc><lastmod>2021-06-21T07:23:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/26/robo-de-criptomonedas-una-tendencia-al-alza/</loc><lastmod>2021-06-21T07:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/25/tim-cook-android-tiene-47-veces-mas-malware-que-ios/</loc><lastmod>2021-06-21T07:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/24/los-podcasts-llegan-a-facebook-el-22-de-junio/</loc><lastmod>2021-06-21T07:21:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/23/que-es-el-shadowban-en-redes-sociales-y-como-evitarlo/</loc><lastmod>2021-06-21T07:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/22/como-aws-esta-construyendo-su-ecosistema-de-partners-en-espana/</loc><lastmod>2021-06-21T07:19:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/21/quien-es-quien-en-el-mundo-del-ransomware/</loc><lastmod>2021-06-21T07:18:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/20/la-escasez-de-chips-fomenta-la-proliferacion-de-componentes-falsos/</loc><lastmod>2021-06-14T07:41:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/19/las-ventas-de-smartphones-crecen-un-26-en-el-primer-trimestre/</loc><lastmod>2021-06-14T07:41:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/18/seguridad-de-la-informacion-en-el-sector-asegurador/</loc><lastmod>2021-06-14T07:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/17/ministerio-de-trabajo-y-economia-social-otro-ciberataque-contra-administraciones-publicas/</loc><lastmod>2021-06-14T07:38:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/16/chrome-91-identificara-extensiones-maliciosas-antes-de-instalarlas/</loc><lastmod>2021-06-14T07:37:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/15/en-que-estado-se-encuentra-la-ciberseguridad-en-espana/</loc><lastmod>2021-06-14T07:36:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/14/el-sepe-uso-durante-anos-programas-pirata-pese-al-riesgo-muy-critico-para-la-seguridad-de-sus-sistemas/</loc><lastmod>2021-06-14T07:32:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/13/pagar-o-no-pagar-el-ransomware-esa-es-la-cuestion/</loc><lastmod>2021-06-07T07:17:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/12/como-encontrar-nuestra-especializacion-tecnologica/</loc><lastmod>2021-06-07T07:16:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/11/invertir-en-tecnologia-clave-en-la-recuperacion-del-sector-turistico-espanol/</loc><lastmod>2021-06-07T07:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/10/erp-en-la-nube-necesidad-y-flexibilidad/</loc><lastmod>2021-06-07T07:10:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/09/el-73-de-las-companias-de-servicios-financieros-mantendran-o-incrementaran-el-gasto-ti/</loc><lastmod>2021-06-07T07:10:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/08/5g-por-fin-una-solucion-para-todos/</loc><lastmod>2021-06-07T07:09:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/07/fujifilm-la-penultima-victima-conocida-por-ransomware/</loc><lastmod>2021-06-07T07:07:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/05/que-es-google-kelm/</loc><lastmod>2021-06-02T08:11:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/06/solo-el-18-de-las-empresas-tiene-una-estrategia-ti-sostenible/</loc><lastmod>2021-06-02T08:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/04/como-crear-alianzas-resilientes-en-el-canal-ti-en-la-era-pos-covid-19/</loc><lastmod>2021-06-02T08:07:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/03/ciberamenazas-y-covid-19-2/</loc><lastmod>2021-06-02T08:06:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/02/espana-aprueba-en-infraestructuras-y-conectividad-pero-acusa-una-falta-de-competencias-y-talento/</loc><lastmod>2021-06-02T08:05:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/06/01/los-ataques-ddos-decaen-a-niveles-prepandemia/</loc><lastmod>2021-05-31T16:12:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/31/3-anos-de-la-gdpr-ha-cambiado-algo-en-proteccion-de-datos/</loc><lastmod>2021-05-29T07:50:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/30/como-contactar-con-google/</loc><lastmod>2021-05-29T07:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/29/conoces-los-terminos-mas-usados-en-el-mundo-de-la-ciberseguridad/</loc><lastmod>2021-05-29T07:48:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/28/amazon-presenta-su-primer-centro-europeo-de-innovacion-para-operaciones/</loc><lastmod>2021-05-24T07:46:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/27/los-ataques-de-credential-stuffing-a-empresas-de-servicios-financieros-aumentan-un-45/</loc><lastmod>2021-05-24T07:45:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/26/la-situacion-de-espana-frente-la-ciberseguridad/</loc><lastmod>2021-05-24T07:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/25/microsoft-publica-el-boletin-de-seguridad-de-mayo-para-corregir-55-vulnerabilidades/</loc><lastmod>2021-05-24T07:42:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/24/google-store-la-primera-tienda-fisica-de-la-compania-abrira-en-verano/</loc><lastmod>2021-05-24T07:41:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/23/llega-el-ransomware-de-triple-extorsion/</loc><lastmod>2021-05-21T17:44:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/22/un-ciberataque-obliga-al-sistema-de-salud-de-irlanda-a-cerrar-su-sistema-informatico-y-suspender-las-consultas/</loc><lastmod>2021-05-21T17:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/17/17-de-mayo-dia-de-internet/</loc><lastmod>2021-05-17T17:41:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/21/colonial-pipeline-puede-un-ataque-de-ransomware-dejar-sin-combustible-a-un-pais-como-ee-uu/</loc><lastmod>2021-05-15T06:35:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/20/actualizaciones-automaticas-seguridad-o-riesgo/</loc><lastmod>2021-05-15T06:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/19/ciberamenazas-y-covid-19/</loc><lastmod>2021-05-15T06:32:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/18/la-falta-de-ciberseguridad-pone-en-riesgo-al-56-de-las-empresas-espanolas/</loc><lastmod>2021-05-15T06:29:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/16/la-mitad-de-los-cisos-espanoles-no-se-sienten-preparados-para-abordar-ciberataques/</loc><lastmod>2021-05-15T06:23:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/15/microsoft-almacenara-en-una-nube-europea-los-datos-de-sus-clientes-de-la-ue/</loc><lastmod>2021-05-13T15:47:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/14/como-mejorar-la-privacidad-limpiando-las-cuentas-on-line-que-no-utilices/</loc><lastmod>2021-05-09T09:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/13/microsoft-alerta-de-docenas-de-vulnerabilidades-criticas-en-dispositivos-iot/</loc><lastmod>2021-05-09T09:52:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/12/la-seguridad-de-los-dispositivos-moviles-clave-en-la-transformacion-digital-de-las-empresas/</loc><lastmod>2021-05-09T09:51:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/11/10-pasos-para-garantizar-una-seguridad-proactiva/</loc><lastmod>2021-05-09T09:50:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/10/dia-de-la-contrasena-que-es-lo-que-no-debes-hacer/</loc><lastmod>2021-05-09T09:49:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/09/las-apps-mas-descargadas-en-el-mundo/</loc><lastmod>2021-05-08T08:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/08/google-meet-estrena-un-modo-ahorro-de-datos-y-bateria/</loc><lastmod>2021-05-08T07:59:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/07/impugnacion-de-whatsapps-y-carga-de-la-prueba/</loc><lastmod>2021-05-05T07:46:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/06/encripta-tus-correos-electronicos-con-seguridad/</loc><lastmod>2021-05-05T07:43:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/05/el-factor-humano-en-la-ciberdelincuencia/</loc><lastmod>2021-05-04T06:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/04/por-un-programa-de-proteccion-de-datos-de-exito/</loc><lastmod>2021-05-04T06:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/02/twitter-supera-los-199-millones-de-usuarios-diarios/</loc><lastmod>2021-04-30T17:58:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/01/como-escoger-antivirus-para-tu-ordenador-y-smartphone/</loc><lastmod>2021-04-30T17:57:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/05/03/la-administracion-publica-reduce-en-un-20-sus-inversiones-tic-en-2020/</loc><lastmod>2021-04-29T08:05:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/30/babuk-publica-la-filtracion-completa-de-phone-house/</loc><lastmod>2021-04-23T18:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/29/el-fbi-elimina-cientos-de-shells-maliciosos-instalados-por-hackers-chinos-en-servidores-expuestos-con-exchange/</loc><lastmod>2021-04-23T18:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/28/cinco-formas-de-evitar-el-phishing-y-otros-ciberataques/</loc><lastmod>2021-04-23T18:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/27/deepfakes-que-es-tipos-riesgos-y-amenazas/</loc><lastmod>2021-04-23T18:28:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/26/la-policia-desmantela-en-tenerife-el-primer-taller-ilegal-de-impresion-de-armas-3d-en-espana/</loc><lastmod>2021-04-23T18:26:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/25/como-descargar-windows-10-gratis-y-de-forma-legal/</loc><lastmod>2021-04-18T09:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/24/como-viajar-en-el-tiempo-con-timelapse-de-google-earth/</loc><lastmod>2021-04-18T09:13:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/23/algunos-cracks-para-piratear-office-o-photoshop-incluyen-un-regalito-cuidado/</loc><lastmod>2021-04-18T09:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/22/guia-practica-de-control-parental-2/</loc><lastmod>2021-04-18T09:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/21/ciberfatiga-por-que-nos-cansamos-de-tomar-precauciones-en-internet-y-como-permanecer-alerta/</loc><lastmod>2021-04-18T09:07:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/20/estas-preparado-para-un-ataque/</loc><lastmod>2021-04-18T09:05:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/19/hacer-que-tu-pc-con-windows-10-arranque-mas-rapido/</loc><lastmod>2021-04-18T09:03:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/18/facebook-lanza-hotline-otra-app-para-hacer-conferencias-en-directo/</loc><lastmod>2021-04-11T11:01:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/17/google-prueba-la-publicidad-online-sin-cookies-que-respeta-la-privacidad/</loc><lastmod>2021-04-11T10:59:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/16/se-filtran-datos-personales-de-500-millones-de-cuentas-de-linkedin/</loc><lastmod>2021-04-11T10:58:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/15/el-camino-hacia-la-empresa-inteligente-en-la-nube/</loc><lastmod>2021-04-11T10:56:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/14/el-gasto-mundial-en-ti-superara-los-4-billones-de-dolares-en-2021/</loc><lastmod>2021-04-11T10:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/13/una-de-cada-tres-empresas-no-toma-medidas-tras-un-ciberataque/</loc><lastmod>2021-04-11T10:54:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/12/cybereason-quieres-ver-como-se-lleva-a-cabo-un-ataque-de-ransomware/</loc><lastmod>2021-04-11T10:53:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/11/una-campana-de-phishing-suplanta-a-la-agencia-tributaria-cuidado/</loc><lastmod>2021-04-10T08:31:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/09/hasta-donde-llega-la-privacidad-en-el-modo-incognito-de-navegadores/</loc><lastmod>2021-04-05T09:19:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/10/cuando-el-criminal-utiliza-herramientas-legitimas-para-introducirse-en-la-empresa/</loc><lastmod>2021-04-05T09:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/08/un-nuevo-software-espia-para-android-se-enmascara-como-actualizacion-de-sistema/</loc><lastmod>2021-04-05T09:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/07/quieres-ayudar-a-fortalecer-las-capacidades-de-ciberseguridad-de-las-pymes/</loc><lastmod>2021-04-05T09:14:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/06/se-filtran-datos-personales-de-533-millones-de-usuarios-de-facebook/</loc><lastmod>2021-04-05T09:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/05/ciberseguridad-seguridad-informatica-y-seguridad-de-la-informacion/</loc><lastmod>2021-04-05T09:12:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/04/los-equipos-de-impresion-compactos-alzan-la-demanda/</loc><lastmod>2021-04-02T07:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/03/la-mayoria-de-cios-europeos-no-estan-preparados-para-la-automatizacion/</loc><lastmod>2021-04-02T07:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/02/realidad-mixta-el-primer-diccionario-maquina-humano/</loc><lastmod>2021-04-02T07:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/04/01/guia-practica-de-control-parental/</loc><lastmod>2021-03-29T18:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/31/el-precio-medio-pagado-por-los-rescates-de-ransomware-subio-un-171-en-2020/</loc><lastmod>2021-03-29T11:31:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/30/recuperar-archivos-sin-pagar-rescate/</loc><lastmod>2021-03-29T07:30:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/29/incibe-gestiono-mas-de-130-000-incidentes-de-ciberseguridad-durante-2020/</loc><lastmod>2021-03-26T18:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/28/los-juguetes-sexuales-tambien-son-objeto-de-ciberataques/</loc><lastmod>2021-03-18T19:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/27/dropbox-permitira-usar-gratis-su-gestor-de-contrasenas/</loc><lastmod>2021-03-18T19:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/26/tres-importantes-novedades-que-llegan-a-google-maps/</loc><lastmod>2021-03-18T19:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/25/el-area-metropolitana-de-barcelona-sufre-otro-ataque-de-ransomware-como-el-del-sepe/</loc><lastmod>2021-03-18T19:07:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/24/2020-ha-supuesto-una-tormenta-perfecta-para-los-ciberdelincuentes-y-2021/</loc><lastmod>2021-03-18T19:06:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/23/analisis-forense-auditoria-post-mortem/</loc><lastmod>2021-03-18T19:04:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/22/15-anos-con-twitter-el-pajaro-que-revoluciono-las-redes/</loc><lastmod>2021-03-18T08:23:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/21/nuevas-herramientas-para-ninos-google-play-books/</loc><lastmod>2021-03-15T07:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/20/los-mejores-bancos-de-imagenes-gratis-en-internet/</loc><lastmod>2021-03-15T07:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/18/las-4-nuevas-reglas-para-la-seguridad-de-webapps-y-apis/</loc><lastmod>2021-03-15T07:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/19/ryuk-el-malware-tras-el-ataque-al-sepe/</loc><lastmod>2021-03-15T07:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/17/ahora-que-tu-correo-corporativo-esta-en-la-nube-es-tan-seguro-como-crees/</loc><lastmod>2021-03-15T07:42:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/16/debo-desactivar-la-camara-web-cuando-no-este-en-uso/</loc><lastmod>2021-03-15T07:40:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/15/8-consejos-de-ciberseguridad-que-no-debes-dejar-pasar/</loc><lastmod>2021-03-14T19:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/14/la-industria-de-la-informacion/</loc><lastmod>2021-03-07T10:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/13/comprender-los-principales-aspectos-de-una-auditoria/</loc><lastmod>2021-03-07T10:02:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/12/reimaginar-una-espana-competitiva-y-sostenible-gracias-a-la-digitalizacion/</loc><lastmod>2021-03-07T10:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/11/formacion-innovacion-y-nuevas-tecnologias-claves-para-un-empleo-bien-remunerado/</loc><lastmod>2021-03-07T09:59:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/10/aumenta-la-presencia-de-mujeres-en-el-ambito-de-la-ciberseguridad/</loc><lastmod>2021-03-07T09:58:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/09/un-nuevo-terremoto-llamado-workplace/</loc><lastmod>2021-03-07T09:57:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/08/paises-con-mas-cajeros-de-criptomonedas-en-el-mundo/</loc><lastmod>2021-03-07T09:55:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/07/como-mejorar-la-seguridad-de-un-router-y-evitar-ciberataques/</loc><lastmod>2021-03-05T08:16:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/06/solarwinds123-con-estas-contrasenas-se-entiende-el-desastre-en-ciberseguridad/</loc><lastmod>2021-03-05T08:15:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/26/el-tjue-condena-a-espana-a-pagar-15-millones-por-no-trasponer-una-directiva-de-proteccion-de-datos/</loc><lastmod>2021-02-26T18:31:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/05/se-busca-cultura-en-ciberseguridad/</loc><lastmod>2021-02-26T18:29:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/04/que-es-el-fingerprinting-o-la-huella-digital-de-nuestros-dispositivos/</loc><lastmod>2021-02-22T10:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/03/detectan-mas-de-400-campanas-de-phishing-a-la-semana-que-usan-san-valentin-como-gancho/</loc><lastmod>2021-02-22T10:33:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/02/el-deepfake-plantea-riesgos-a-las-empresas/</loc><lastmod>2021-02-22T10:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/03/01/crece-el-abuso-sexual-infantil-en-la-red/</loc><lastmod>2021-02-22T10:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/27/la-ciberseguridad-en-espana-mueve-un-volumen-de-1-324-millones/</loc><lastmod>2021-02-20T11:42:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/26/la-gran-mentira-digital/</loc><lastmod>2021-02-20T11:41:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/25/enfoques-sobre-la-seguridad-de-la-informacion/</loc><lastmod>2021-02-20T11:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/24/nuevo-real-decreto-de-seguridad-de-las-redes-y-sistemas-de-informacion/</loc><lastmod>2021-02-20T11:39:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/23/la-inteligencia-artificial-como-influencia-negativa/</loc><lastmod>2021-02-20T11:38:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/22/personas-procesos-y-prevencion-la-formula-del-exito-para-la-ciberseguridad-en-2021/</loc><lastmod>2021-02-20T11:37:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/19/invertir-en-un-modelo-de-trabajo-hibrido-una-cuestion-de-competitividad/</loc><lastmod>2021-02-16T08:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/21/digitalizacion-es-futuro/</loc><lastmod>2021-02-16T08:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/20/la-tecnologia-debe-ser-el-adn-de-las-empresas/</loc><lastmod>2021-02-16T08:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/18/tendencia-para-este-2021-comunicaciones-en-la-nube-para-el-teletrabajo/</loc><lastmod>2021-02-16T08:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/17/ia-para-transformar-la-relacion-con-los-clientes/</loc><lastmod>2021-02-16T08:16:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/16/los-seis-fraudes-en-linea-mas-comunes-contra-empresas-y-autonomos/</loc><lastmod>2021-02-16T08:15:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/15/espana-exige-a-las-empresas-que-nombren-un-responsable-de-ciberseguridad/</loc><lastmod>2021-02-12T11:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/14/kobalos-un-malware-para-linux-que-roba-credenciales-en-supercomputadoras/</loc><lastmod>2021-02-12T08:38:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/12/10-consejos-de-proteccion-en-el-dia-de-internet-segura-2021/</loc><lastmod>2021-02-12T08:37:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/13/tratamiento-de-aguas-en-el-punto-de-mira-del-cibersabotaje/</loc><lastmod>2021-02-12T08:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/11/el-nuevo-real-decreto-de-seguridad-de-las-redes-y-sistemas-de-informacion/</loc><lastmod>2021-02-10T16:52:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/09/dia-internacional-del-internet-seguro/</loc><lastmod>2021-02-09T18:00:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/10/asi-afectara-a-las-empresas-espanolas-la-nueva-estrategia-europea-de-ciberseguridad/</loc><lastmod>2021-02-09T08:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/09/el-86-de-las-empresas-espanolas-carecen-de-cultura-de-ciberseguridad/</loc><lastmod>2021-02-07T10:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/08/informe-demoledor-los-ninos-ven-pornografia-por-internet-a-los-8-anos/</loc><lastmod>2021-02-06T13:10:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/07/webinars-gratuitos-de-ciberseguridad-basica-que-no-te-puedes-perder/</loc><lastmod>2021-02-04T09:28:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/06/un-gusano-para-android-aprovecha-las-respuestas-rapidas-de-whatsapp/</loc><lastmod>2021-02-04T09:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/05/hacking-etico-tienes-lo-que-hay-que-tener/</loc><lastmod>2021-02-04T09:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/04/vuelve-el-cryptojacking-pro-ocean-para-atacar-servidores-apache-oracle-y-redis/</loc><lastmod>2021-02-04T09:25:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/03/como-mantener-mis-cuentas-bancarias-seguras/</loc><lastmod>2021-02-01T17:18:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/02/publicado-el-reglamento-de-seguridad-de-las-redes-y-sistemas-de-informacion/</loc><lastmod>2021-01-29T19:10:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/02/01/espana-es-el-tercer-pais-con-mayor-riesgo-de-sufrir-ciberataques/</loc><lastmod>2021-01-29T19:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/31/las-multas-por-incumplimiento-del-rgpd-crecen-un-40/</loc><lastmod>2021-01-25T09:17:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/30/que-necesita-espana-para-estar-en-el-top-de-la-ciberseguridad/</loc><lastmod>2021-01-25T09:16:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/29/en-que-consiste-el-problema-de-seguridad-de-youtube-con-las-listas-privadas/</loc><lastmod>2021-01-25T09:15:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/28/pedro-sanchez-los-fondos-europeos-facilitaran-la-transicion-digital-de-espana/</loc><lastmod>2021-01-25T09:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/27/google-y-microsoft-mejoran-el-administrador-de-contrasenas-de-sus-navegadores-web/</loc><lastmod>2021-01-25T09:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/26/ojo-aumentan-las-estafas-y-robos-en-tinder-y-otras-apps-para-ligar/</loc><lastmod>2021-01-25T09:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/25/por-que-debes-buscar-alternativas-a-whatsapp-y-cuales-son-las-mejores/</loc><lastmod>2021-01-25T09:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/22/whatsapp-y-sus-terminos/</loc><lastmod>2021-01-18T09:19:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/24/aplicaciones-para-verificacion-en-dos-pasos-google-authenticator-y-microsoft-authenticator/</loc><lastmod>2021-01-18T09:17:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/23/smishing-el-fraude-de-los-sms/</loc><lastmod>2021-01-18T09:16:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/21/asalto-al-capitolio-tambien-un-problema-de-seguridad-it/</loc><lastmod>2021-01-18T09:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/20/ocho-errores-fatales-que-cometen-las-empresas-tras-sufrir-una-crisis-informatica/</loc><lastmod>2021-01-18T09:14:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/19/10-consejos-para-mejorar-la-seguridad-en-internet/</loc><lastmod>2021-01-18T09:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/18/controles-necesarios-para-la-seguridad-de-la-informacion/</loc><lastmod>2021-01-18T09:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/17/los-discos-hdd-ganan-la-batalla-del-almacenamiento/</loc><lastmod>2021-01-13T09:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/16/6-tendencias-ti-para-2021-segun-cisco/</loc><lastmod>2021-01-13T09:15:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/15/whatsapp-cedera-tus-datos-a-facebook-te-parezca-bien-o-mal/</loc><lastmod>2021-01-13T09:14:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/14/babuk-locker-el-primer-ransomware-contra-empresas-de-2021/</loc><lastmod>2021-01-13T09:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/13/expuestos-mas-de-100-000-registros-de-personal-de-la-onu/</loc><lastmod>2021-01-13T09:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/12/la-produccion-de-smartphones-crecera-un-9-en-2021/</loc><lastmod>2021-01-10T10:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/11/ia-5g-y-edge-inteligente-el-tridente-de-intel-para-2021/</loc><lastmod>2021-01-10T10:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/10/google-chrome-mostrara-advertencias-de-contrasenas-debiles-en-la-verificacion-de-seguridad/</loc><lastmod>2021-01-10T10:56:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/09/apoyo-de-la-normalizacion-a-la-transformacion-digital-nuevo-informe-de-une/</loc><lastmod>2021-01-07T19:35:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/08/smishing-mucho-mas-activo-y-peligroso-de-lo-que-podria-parecer/</loc><lastmod>2021-01-05T11:45:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/07/nuevas-habilidades-profesionales-para-la-nueva-era-post-covid/</loc><lastmod>2021-01-05T11:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/06/que-es-la-tecnologia-5g-beneficios-y-rumores/</loc><lastmod>2021-01-01T19:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/05/las-10-noticias-del-ano-2020-en-social-media/</loc><lastmod>2021-01-01T18:59:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/04/la-dgt-endurece-las-multas-por-usar-el-movil-al-conducir/</loc><lastmod>2021-01-01T18:58:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/03/como-vender-con-seguridad-un-smartphone-de-segunda-mano/</loc><lastmod>2021-01-01T18:56:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2021/01/02/los-10-peores-incidentes-de-ciberseguridad-en-2020-pandemia-virtual-datos-y-malware/</loc><lastmod>2021-01-01T18:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/31/el-frenesi-de-las-redes-sociales/</loc><lastmod>2020-12-26T17:37:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/30/las-grandes-claves-de-la-ia/</loc><lastmod>2020-12-26T17:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/29/la-importancia-de-las-actualizaciones-en-ciberseguridad/</loc><lastmod>2020-12-26T17:35:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/28/teletrabajo-y-realidad-hibrida-somos-mas-productivos/</loc><lastmod>2020-12-26T17:35:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/27/la-ciberseguridad-como-clave-para-superar-la-crisis-de-la-covid-19-en-las-pymes-2/</loc><lastmod>2020-12-26T17:33:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/26/desmantelan-red-privada-virtual-favorita-de-los-cibercriminales/</loc><lastmod>2020-12-26T17:15:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/24/la-red-de-redes/</loc><lastmod>2020-12-20T11:26:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/23/ciberespionaje-una-actividad-muy-lucrativa-para-los-ciberdelincuentes/</loc><lastmod>2020-12-20T11:25:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/22/apps-para-hablar-por-videollamada-con-papa-noel-esta-navidad/</loc><lastmod>2020-12-27T00:43:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/21/como-recuperar-sistemas-windows-infectados-con-estos-antivirus-gratuitos/</loc><lastmod>2020-12-20T11:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/20/los-ciberdelincuentes-ponen-en-la-diana-a-los-distribuidores-de-vacunas-contra-el-covid-19-2/</loc><lastmod>2020-12-15T09:19:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/19/la-ciberseguridad-como-clave-para-superar-la-crisis-de-la-covid-19-en-las-pymes/</loc><lastmod>2020-12-15T09:18:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/17/un-grupo-hacker-accede-a-datos-de-las-agencias-federales-estadounidenses/</loc><lastmod>2020-12-15T09:17:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/18/5g-dara-cobertura-a-mas-de-mil-millones-de-personas-a-finales-de-2020/</loc><lastmod>2020-12-15T09:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/16/7-claves-para-una-estrategia-cloud-empresarial-de-exito/</loc><lastmod>2020-12-15T09:14:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/15/la-inversion-publica-en-ti-cae-un-22-hasta-el-tercer-trimestre/</loc><lastmod>2020-12-15T09:13:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/14/la-agencia-europea-del-medicamento-sufre-un-ciberataque/</loc><lastmod>2020-12-11T18:26:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/13/cinco-ciberestafas-que-prevenir-en-navidad/</loc><lastmod>2020-12-08T09:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/12/nueva-guia-como-configurar-el-router-wifi/</loc><lastmod>2020-12-08T09:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/11/como-un-ciberataque-puede-terminar-en-un-ataque-biologico/</loc><lastmod>2020-12-08T09:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/10/tu-envio-esta-en-camino-o-se-ha-retrasado-cuidado-con-el-phishing-en-paqueteria/</loc><lastmod>2020-12-08T09:36:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/09/los-ciberdelincuentes-ponen-en-la-diana-a-los-distribuidores-de-vacunas-contra-el-covid-19/</loc><lastmod>2020-12-08T09:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/08/como-hacer-frente-a-los-riesgos-y-amenazas-en-la-era-digital/</loc><lastmod>2020-12-04T11:31:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/07/fundacion-lab-mediterraneo-asi-sera-el-lobby-tecnologico-valenciano-impulsado-por-ave/</loc><lastmod>2020-12-04T11:28:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/06/el-cifrado-de-extremo-a-extremo-llega-a-los-mensajes-de-android-2/</loc><lastmod>2020-12-02T08:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/05/los-ataques-de-ransomware-a-empresas-se-han-vuelto-mucho-mas-brutales/</loc><lastmod>2020-12-02T08:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/04/conoce-las-camaras-de-seguridad-y-como-pueden-beneficiarte/</loc><lastmod>2020-12-02T08:22:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/03/ciberataques-contra-las-farmaceuticas-que-desarrollan-las-vacunas-contra-el-covid-19/</loc><lastmod>2020-12-02T08:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/02/10-consejos-para-mejorar-la-privacidad-de-tu-smartphone-con-android/</loc><lastmod>2020-12-02T08:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/30/dia-internacional-de-seguridad-de-la-informacion/</loc><lastmod>2020-11-30T18:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/12/01/lo-nuevo-de-samsung-para-los-diabeticos-mide-el-nivel-de-glucosa-sin-pinchazos/</loc><lastmod>2020-11-29T10:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/26/se-constituye-oficialmente-el-foro-nacional-de-ciberseguridad/</loc><lastmod>2020-11-26T12:47:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/30/como-proteger-tu-empresa-de-una-forma-proactiva/</loc><lastmod>2020-11-22T11:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/29/el-86-de-las-empresas-considera-la-nube-hibrida-como-el-modelo-ideal/</loc><lastmod>2020-11-22T11:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/28/la-movilidad-impulsara-las-ventas-del-mercado-pc-en-2021/</loc><lastmod>2020-11-22T11:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/27/la-mensajeria-de-google-ya-esta-disponible-en-todo-el-mundo/</loc><lastmod>2020-11-22T11:42:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/26/diseno-de-un-sistema-de-gestion-de-seguridad/</loc><lastmod>2020-11-22T11:41:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/25/microsoft-alerta-de-la-inseguridad-de-la-autenticacion-de-dos-factores-por-sms/</loc><lastmod>2020-11-22T11:39:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/24/que-caracteristicas-debes-valorar-en-un-servidor-cloud/</loc><lastmod>2020-11-22T11:38:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/23/webnavigator-un-navegador-web-muy-poco-fiable/</loc><lastmod>2020-11-22T11:37:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/22/el-cifrado-de-extremo-a-extremo-llega-a-los-mensajes-de-android/</loc><lastmod>2020-11-22T11:11:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/21/los-usuarios-de-internet-podran-presentar-reclamaciones-sobre-proteccion-de-datos-y-publicidad-en-un-nuevo-sistema-extrajudicial/</loc><lastmod>2020-11-19T08:48:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/20/los-cinco-malware-mas-peligrosos-de-2020/</loc><lastmod>2020-11-18T16:56:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/19/beservices-los-miedos-a-la-adopcion-cloud-estan-basados-en-conceptos-erroneos/</loc><lastmod>2020-11-16T18:40:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/18/la-aepd-publica-la-guia-de-proteccion-de-datos-por-defecto/</loc><lastmod>2020-11-13T12:35:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/17/plan-del-gobierno-para-digitalizar-micropymes-y-pymes/</loc><lastmod>2020-11-11T11:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/16/que-es-el-domain-authority-de-una-web-y-como-mejorarlo/</loc><lastmod>2020-11-10T09:27:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/15/como-nos-protegen-los-antivirus/</loc><lastmod>2020-11-10T09:26:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/14/que-herramientas-necesita-un-servicio-de-atencion-al-cliente/</loc><lastmod>2020-11-10T09:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/13/los-accesorios-inteligentes-superaran-los-200-millones-de-unidades-en-2020/</loc><lastmod>2020-11-10T09:23:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/12/las-pymes-espanolas-incrementan-sus-ventas-a-traves-de-amazon-un-33/</loc><lastmod>2020-11-10T09:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/11/la-inversion-en-tecnologias-para-smart-cities-crecera-un-227-hasta-2025/</loc><lastmod>2020-11-10T09:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/10/la-estafa-triangular-bitcoins-y-articulos-de-2a-mano/</loc><lastmod>2020-11-10T09:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/08/microsoft-elimina-flash-player-de-windows/</loc><lastmod>2020-11-07T17:24:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/09/asi-pueden-hackear-el-cajero-mientras-estas-sacando-dinero/</loc><lastmod>2020-11-07T17:22:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/07/incibe-publica-la-guia-de-ciberataques/</loc><lastmod>2020-11-03T18:45:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/06/google-revela-un-nuevo-zero-day-en-windows-10-explotado-y-sin-parche/</loc><lastmod>2020-11-03T18:44:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/05/los-principales-hitos-de-internet-en-el-aniversario-de-arpanet/</loc><lastmod>2020-11-03T18:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/04/la-seguridad-comienza-en-casa/</loc><lastmod>2020-11-02T16:24:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/03/la-crisis-sanitaria-generaliza-el-uso-del-cloud-computing/</loc><lastmod>2020-11-01T10:15:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/02/google-se-prepara-para-la-guerra-contra-la-tasa-digital/</loc><lastmod>2020-10-30T16:48:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/11/01/ransomware-e-ingenieria-social-principales-amenazas-segun-el-informe-anual-de-europol/</loc><lastmod>2020-10-29T17:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/31/el-iot-que-veremos-en-2021/</loc><lastmod>2020-10-28T09:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/30/10-claves-para-reducir-los-costes-de-ti-en-tiempos-de-crisis/</loc><lastmod>2020-10-28T08:59:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/29/el-problema-de-la-no-actualizacion/</loc><lastmod>2020-10-28T08:58:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/28/contexto-de-la-organizacion-en-una-auditoria-sgsi/</loc><lastmod>2020-10-28T08:57:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/27/la-app-radar-covid-ha-tenido-una-brecha-de-seguridad-desde-su-lanzamiento/</loc><lastmod>2020-10-25T12:58:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/26/errores-comunes-en-la-atribucion-de-ciberataques/</loc><lastmod>2020-10-19T11:27:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/25/fakembam-el-malware-que-se-vistio-de-antivirus/</loc><lastmod>2020-10-18T09:07:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/24/microsoft-publica-sus-parches-de-seguridad-mensuales-y-son-de-obligada-instalacion/</loc><lastmod>2020-10-18T09:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/23/kaspersky-refuerza-su-catalogo-de-soluciones-empresariales/</loc><lastmod>2020-10-18T09:06:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/22/vishing-la-llamada-del-fraude/</loc><lastmod>2020-10-18T09:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/21/el-nuevo-ios-14-protegiendo-tu-privacidad/</loc><lastmod>2020-10-18T09:04:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/20/auditoria-de-seguridad-en-tiempos-de-big-data/</loc><lastmod>2020-10-18T09:02:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/19/estos-son-los-errores-que-cometen-las-empresas-con-el-ransomware/</loc><lastmod>2020-10-18T09:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/18/los-10-ataques-de-phishing-en-los-que-mas-suelen-picar-los-empleados/</loc><lastmod>2020-10-11T18:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/17/google-cierra-daydream-su-plataforma-de-realidad-virtual/</loc><lastmod>2020-10-11T18:22:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/16/dispositivos-desprotegidos-y-teletrabajo/</loc><lastmod>2020-10-11T18:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/15/ibm-se-divide-en-dos-empresas/</loc><lastmod>2020-10-11T18:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/14/el-60-de-los-espanoles-retrasara-la-compra-de-su-proximo-smartphone/</loc><lastmod>2020-10-11T18:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/13/kaspersky-consejos-para-elaborar-una-estrategia-de-seguridad/</loc><lastmod>2020-10-11T18:15:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/12/la-otan-se-plantea-una-nueva-estrategia-frente-a-las-ciberamenazas/</loc><lastmod>2020-10-11T18:13:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/11/mas-del-90-de-las-empresas-elevara-su-inversion-para-asegurar-el-teletrabajo/</loc><lastmod>2020-10-03T15:39:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/10/el-corte-ingles-reta-a-amazon-con-su-nueva-app-para-compras-online/</loc><lastmod>2020-10-03T15:38:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/09/principales-aspectos-de-una-auditoria-de-sistemas-de-gestion-de-seguridad-de-la-informacion-2/</loc><lastmod>2020-10-03T15:36:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/08/elecciones-presidenciales-de-estados-unidos-el-reto-de-la-seguridad/</loc><lastmod>2020-10-03T15:35:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/07/el-nivel-de-madurez-en-el-uso-de-los-datos-aun-es-bajo/</loc><lastmod>2020-10-03T15:33:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/06/el-codigo-fuente-de-windows-xp-filtrado-es-real-y-es-un-problema-para-la-seguridad/</loc><lastmod>2020-10-03T15:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/05/los-5-principios-eticos-de-la-inteligencia-artificial/</loc><lastmod>2020-10-03T15:29:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/04/facebook-recomendara-los-grupos-publicos-y-seran-indexados-por-google/</loc><lastmod>2020-10-03T15:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/03/cualquier-aparato-inteligente-puede-ser-secuestrado-con-ramsonware/</loc><lastmod>2020-10-03T15:27:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/02/principales-aspectos-de-una-auditoria-de-sistemas-de-gestion-de-seguridad-de-la-informacion/</loc><lastmod>2020-10-01T07:29:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/10/01/onlyfans-la-nueva-red-social-para-vender-tu-privacidad/</loc><lastmod>2020-10-01T07:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/30/bitdefender-10-in-10-un-informe-interesante-sobre-la-situacion-de-la-ciberseguridad-mundial/</loc><lastmod>2020-09-26T12:48:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/29/servicios-de-mailing-en-el-punto-de-mira-del-phishing/</loc><lastmod>2020-09-26T12:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/28/mozi-el-problema-de-seguridad-de-internet-de-las-cosas/</loc><lastmod>2020-09-26T12:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/27/nueva-amenaza-el-criptophising/</loc><lastmod>2020-09-22T08:13:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/26/guia-basica-de-auditorias-de-sgsi/</loc><lastmod>2020-09-22T08:12:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/25/correos-de-nuevo-en-una-campana-de-phishing/</loc><lastmod>2020-09-22T08:11:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/23/mensajeria-instantanea-y-privacidad/</loc><lastmod>2020-09-22T08:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/22/cuando-el-ransomware-puede-costar-vidas/</loc><lastmod>2020-09-22T08:09:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/24/practicamente-todo-lo-que-tenga-bluetooth-es-vulnerable-a-este-nuevo-ataque/</loc><lastmod>2020-09-18T15:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/20/la-interaccion-digital-en-la-banca-en-espana-ronda-el-60/</loc><lastmod>2020-09-13T10:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/19/soluciones-reales-para-los-desafios-digitales/</loc><lastmod>2020-09-13T10:37:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/18/las-autoridades-francesas-alertan-emotet-vuelve-con-fuerza/</loc><lastmod>2020-09-13T10:36:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/17/como-un-hacker-obtuvo-el-control-de-toda-la-flota-de-tesla/</loc><lastmod>2020-09-13T10:35:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/16/emotet-afecta-a-mas-de-un-15-de-las-empresas-espanolas/</loc><lastmod>2020-09-13T10:34:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/15/pass-the-hash-cuidado-con-los-temas-de-windows-10-personalizados/</loc><lastmod>2020-09-13T10:33:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/14/amenaza-de-bomba-por-email/</loc><lastmod>2020-09-13T10:32:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/13/email-7-de-cada-10-amenazas-llegan-por-correo-electronico/</loc><lastmod>2020-09-06T18:43:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/12/descubre-las-formaciones-especializadas-en-ciberseguridad-de-inesem-que-te-haran-invencible-frente-a-hackers-y-malware/</loc><lastmod>2020-09-06T18:42:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/11/charming-kitten-delincuentes-que-se-hacen-pasar-por-periodistas/</loc><lastmod>2020-09-06T18:41:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/10/intel-presenta-los-procesadores-para-portatiles-finos-y-ligeros/</loc><lastmod>2020-09-06T18:40:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/09/los-productos-y-servicios-digitales-supondran-el-27-del-pib-en-2020/</loc><lastmod>2020-09-06T18:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/08/la-seguridad-sincronizada-o-por-que-necesitas-una-comunicacion-entre-todos-los-componentes-de-seguridad/</loc><lastmod>2020-09-06T18:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/07/cloud-3-0-o-la-nueva-era-del-cloud-distribuido/</loc><lastmod>2020-09-06T18:38:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/06/oracle-podria-comprar-tiktok-por-20-000-millones-de-dolares/</loc><lastmod>2020-09-01T07:00:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/05/asi-operan-los-beagleboys-un-grupo-de-hackers-norcoreanos/</loc><lastmod>2020-09-01T06:59:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/04/tesla-frustra-un-ataque-cibernetico/</loc><lastmod>2020-09-01T06:59:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/03/visa-un-fallo-de-seguridad-permite-eludir-el-pin/</loc><lastmod>2020-09-01T06:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/02/las-empresas-espanolas-dedican-casi-el-15-de-su-presupuesto-de-ti-a-ciberseguridad/</loc><lastmod>2020-09-01T06:57:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/09/01/terracotta-el-fraude-de-la-publicidad-que-ves-pero-no-ves/</loc><lastmod>2020-09-01T06:56:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/31/el-hacker-mas-buscado-del-mundo/</loc><lastmod>2020-08-23T18:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/30/las-12-mejores-extensiones-de-navegador-para-seo/</loc><lastmod>2020-08-23T18:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/29/mapfre-victima-de-un-ataque-de-ransomware/</loc><lastmod>2020-08-23T18:48:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/28/wannaren-otro-ransomware-que-muerde-el-polvo/</loc><lastmod>2020-08-23T18:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/27/por-que-es-importante-la-open-source-security-foundation/</loc><lastmod>2020-08-23T18:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/26/protecciones-fisicas-que-pueden-evitar-riesgos-de-ciberseguridad/</loc><lastmod>2020-08-23T18:46:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/25/microsoft-defender-ya-no-podra-ser-deshabilitado-desde-el-registro/</loc><lastmod>2020-08-23T18:45:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/24/el-diseno-clasico-de-facebook-dejara-de-estar-disponible-en-septiembre/</loc><lastmod>2020-08-23T18:44:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/23/aumentan-los-archivos-maliciosos-de-office-y-del-ransomware-a-nivel-global/</loc><lastmod>2020-08-15T16:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/22/ransomware-en-lafayette-la-ciudad-que-decidio-pagar-el-rescate/</loc><lastmod>2020-08-15T16:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/21/tiktok-recopilo-informacion-sobre-sus-usuarios/</loc><lastmod>2020-08-15T16:48:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/20/revolte-problemas-en-la-implementacion-del-cifado-en-4g/</loc><lastmod>2020-08-15T16:48:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/19/vulnerabilidades-en-alexa-permiten-a-los-piratas-informaticos-instalar-habilidades-maliciosas/</loc><lastmod>2020-08-15T16:47:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/18/la-herramienta-de-analisis-de-ciberataques-pionera-para-la-deteccion-precoz-de-ciberamenazas-en-espana/</loc><lastmod>2020-08-15T16:45:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/17/conoce-estas-opciones-para-compartir-archivos-cifrados-y-seguros/</loc><lastmod>2020-08-15T16:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/16/tecnologia-5g-y-riesgos-de-ciberseguridad/</loc><lastmod>2020-08-09T18:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/15/bulos-y-fake-news-fuentes-de-desinformacion/</loc><lastmod>2020-08-09T18:07:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/14/derecho-de-la-ciberseguridad/</loc><lastmod>2020-08-09T18:06:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/13/fbi-alerta-del-uso-de-windows-7-en-empresas/</loc><lastmod>2020-08-09T18:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/12/intel-exconfidential-filtracion-de-informacion-confidencial/</loc><lastmod>2020-08-09T17:59:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/11/google-y-los-altavoces-que-escuchaban-demasiado/</loc><lastmod>2020-08-09T17:58:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/10/brechas-de-seguridad-cuanto-cuestan-a-sus-victimas/</loc><lastmod>2020-08-09T17:58:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/09/571-detenciones-a-menores-espanoles-de-18-anos-en-2019-por-cibercrimen/</loc><lastmod>2020-08-04T18:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/08/formacion-en-ciberseguridad/</loc><lastmod>2020-08-01T17:16:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/07/planificacion-y-control-operacional-en-una-auditoria-de-sgsi/</loc><lastmod>2020-08-01T17:15:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/06/como-reaccionar-juridicamente-ante-un-incidente-de-ciberseguridad/</loc><lastmod>2020-08-01T17:14:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/05/online-grooming-una-aproximacion-criminologica/</loc><lastmod>2020-08-01T17:11:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/04/proteccion-de-datos-da-tres-meses-a-las-empresas-para-adaptarse-a-la-actualizacion-de-la-guia-de-cookies/</loc><lastmod>2020-08-01T17:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/03/la-ciberseguridad-un-sistema-de-capas/</loc><lastmod>2020-08-01T17:07:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/02/twitter-la-historia-del-hackeo-mas-sonado-del-ano/</loc><lastmod>2020-08-01T08:27:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/08/01/ccleaner-una-amenaza-de-seguridad-para-windows-10/</loc><lastmod>2020-08-01T08:26:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/31/la-tecnologia-es-esencial-para-la-recuperacion/</loc><lastmod>2020-07-26T11:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/30/el-mercado-pc-en-europa-occidental-experimenta-su-mayor-crecimiento-en-22-anos/</loc><lastmod>2020-07-26T11:10:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/29/informe-anual-sobre-incidentes-de-seguridad-de-servicios-fiduciarios-en-2019/</loc><lastmod>2020-07-26T11:09:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/28/ataques-watering-hole-en-que-consisten-y-como-protegerse/</loc><lastmod>2020-07-24T18:39:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/27/agenda-espana-digital-2025/</loc><lastmod>2020-07-24T15:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/26/pegasus-que-es-y-por-que-habla-todo-el-mundo-de-el/</loc><lastmod>2020-07-19T09:28:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/25/mas-de-la-mitad-de-los-profesionales-de-ciberseguridad-sufren-exceso-de-trabajo-o-agotamiento/</loc><lastmod>2020-07-19T09:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/24/hackeo-de-twitter-que-sabemos-hasta-el-momento/</loc><lastmod>2020-07-19T09:27:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/23/aspectos-clave-para-una-correcta-planificacion-de-sgsi/</loc><lastmod>2020-07-19T09:26:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/22/la-justicia-europea-invalida-privacy-shield/</loc><lastmod>2020-07-19T09:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/21/la-empresa-de-seguridad-informatica-tecteco-publica-la-guia-practica-de-ciberseguridad-para-pymes/</loc><lastmod>2020-07-19T09:23:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/20/nuevas-soluciones-de-proteccion-para-el-telefono-movil/</loc><lastmod>2020-07-19T09:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/19/la-supercomputacion-se-enfrenta-a-la-covid-19/</loc><lastmod>2020-07-12T17:59:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/18/encrochat-cae-una-red-de-comunicaciones-para-delincuentes/</loc><lastmod>2020-07-12T17:58:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/17/coronavirus-los-espanoles-no-se-fian-de-las-apps-de-seguimiento/</loc><lastmod>2020-07-12T17:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/16/microsoft-contra-los-defraudadores-del-coronavirus/</loc><lastmod>2020-07-12T17:56:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/15/915-cwb-la-ciberguerra-salta-al-campo-de-batalla/</loc><lastmod>2020-07-12T17:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/14/el-troyano-bancario-mispadu-se-extiende-a-traves-de-cupones-falsos-de-amazon/</loc><lastmod>2020-07-12T17:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/13/el-liderazgo-y-compromiso-de-la-direccion-en-un-entorno-de-sgsi/</loc><lastmod>2020-07-12T17:54:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/12/nuevas-guias-configura-tus-dispositivos-android-e-ios-para-que-esten-ciberseguros/</loc><lastmod>2020-07-05T09:51:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/11/consejos-para-unas-vacaciones-ciberseguras/</loc><lastmod>2020-07-05T09:51:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/10/datos-caracter-personal-algunas-aclaraciones/</loc><lastmod>2020-07-05T09:49:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/09/crycryptor-la-herramienta-de-descifrado-del-ransomware-que-afecta-a-dispositivos-android/</loc><lastmod>2020-07-05T09:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/08/las-mejores-herramientas-para-respuestas-a-incidentes-de-seguridad/</loc><lastmod>2020-07-05T09:46:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/07/manten-a-salvo-los-datos-de-tu-pc-con-zonealarm-anti-ransomware/</loc><lastmod>2020-07-05T09:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/06/envia-tus-archivos-rapidos-y-seguros-a-traves-de-blockchain/</loc><lastmod>2020-07-05T09:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/05/check-point-detecta-2-600-ataques-diarios-relacionados-con-coronavirus/</loc><lastmod>2020-06-28T18:07:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/04/la-ciberseguridad-y-la-proteccion-de-datos-en-tiempos-de-pandemia/</loc><lastmod>2020-06-28T18:07:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/03/las-normas-iso-en-la-gestion-de-la-seguridad-de-la-informacion-2/</loc><lastmod>2020-06-28T18:06:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/02/a-facebook-no-le-preocupa-tu-seguridad-y-al-fbi-tampoco/</loc><lastmod>2020-06-28T18:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/07/01/usuarios-de-firefox-acusan-al-edge-chromium-de-importar-datos-furtivamente/</loc><lastmod>2020-06-28T18:04:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/30/filtraciones-de-datos-accidentales-un-problema-muy-serio/</loc><lastmod>2020-06-28T18:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/29/estas-son-las-soluciones-de-ciberseguridad-para-el-mundo-que-viene/</loc><lastmod>2020-06-28T18:02:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/28/alianza-por-la-ciberseguridad-de-los-menores-2/</loc><lastmod>2020-06-24T16:40:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/27/teletrabajo-si-pero-con-seguridad/</loc><lastmod>2020-06-24T16:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/26/cibercriminalidad-en-espana-2019/</loc><lastmod>2020-06-24T16:38:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/25/las-normas-iso-en-la-gestion-de-la-seguridad-de-la-informacion/</loc><lastmod>2020-06-24T16:36:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/24/mozilla-vpn-sera-el-nombre-de-la-red-privada-virtual-de-firefox/</loc><lastmod>2020-06-21T09:43:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/23/las-companias-tienen-en-cuenta-a-los-empleados-a-la-hora-de-adquirir-nuevas-tecnologias/</loc><lastmod>2020-06-21T09:42:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/22/fema-cuando-el-enemigo-esta-dentro/</loc><lastmod>2020-06-21T09:41:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/21/barcelona-puerta-de-embarque-a-la-transformacion-digital/</loc><lastmod>2020-06-15T11:58:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/20/el-2-de-las-transacciones-bancarias-y-de-ecommerce-fueron-fraudulentas-en-2019/</loc><lastmod>2020-06-15T11:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/19/descubren-tres-vulnerabilidades-en-linux-que-afectan-a-las-defensas-contra-spectre/</loc><lastmod>2020-06-15T11:57:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/18/coronavirus-que-ocurrio-el-27-de-abril/</loc><lastmod>2020-06-15T11:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/17/participa-en-nuestro-estudio-ciberseguridad-en-la-empresa-espanola-y-gana-los-mejores-libros/</loc><lastmod>2020-06-15T11:55:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/16/pautas-para-la-implantacion-de-sistemas-de-gestion-de-seguridad-de-la-informacion/</loc><lastmod>2020-06-15T11:54:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/15/el-grupo-de-delitos-telematicos-de-la-guardia-civil-ha-recibido-mas-de-13-000-comunicaciones-ciudadanas-al-correo-tras-decretarse-el-estado-de-alarma/</loc><lastmod>2020-06-11T18:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/14/netwalker-un-ataque-de-ransomware-que-ha-secuestrado-una-ciudad/</loc><lastmod>2020-06-09T17:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/13/cuales-son-las-mejores-soluciones-de-seguridad-corporativa-para-android/</loc><lastmod>2020-06-09T17:23:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/12/las-companias-de-seguros-en-un-entorno-de-riesgo/</loc><lastmod>2020-06-09T17:22:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/11/miles-de-numeros-de-whatsapp-aparecen-publicados-en-google/</loc><lastmod>2020-06-09T17:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/10/los-ninos-pasan-75-minutos-al-dia-en-youtube-y-71-en-tiktok/</loc><lastmod>2020-06-09T17:20:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/09/ramsay-una-nueva-plataforma-para-ciberespionaje-y-robo-de-datos/</loc><lastmod>2020-06-05T08:27:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/08/la-digitalizacion-de-las-pymes-y-la-formacion-digital-claves-para-reactivar-la-economia-y-el-empleo-tras-la-covid-19/</loc><lastmod>2020-06-05T08:24:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/07/la-inversion-en-blockchain-en-espana-llegara-a-1035-millones-de-dolares-en-2020/</loc><lastmod>2020-06-02T09:10:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/06/bankia-crea-la-comision-de-tecnologia-e-innovacion/</loc><lastmod>2020-06-02T09:09:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/05/ciber-seguro-es-la-plataforma-online-de-artai-que-evalua-los-riesgos-en-ciberseguridad/</loc><lastmod>2020-06-02T09:08:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/04/equipado-y-vulnerable-los-riesgos-de-los-dispositivos-wearables/</loc><lastmod>2020-06-02T09:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/03/alianza-por-la-ciberseguridad-de-los-menores/</loc><lastmod>2020-06-02T09:06:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/02/la-ciberseguridad-le-ocupa-o-le-preocupa/</loc><lastmod>2020-06-02T09:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/06/01/la-convocatoria-digitaliza-teletrabajo-del-ivace-supera-expectativas/</loc><lastmod>2020-05-29T18:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/31/tecnica-de-ataque-a-prueba-de-cdns/</loc><lastmod>2020-05-27T07:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/30/se-triplican-los-ataques-ddos/</loc><lastmod>2020-05-27T07:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/29/facebook-lanza-15-nuevos-cursos/</loc><lastmod>2020-05-27T07:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/28/enlaces-internos-de-una-web/</loc><lastmod>2020-05-27T07:48:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/27/windows-defender-offline-contra-el-malware/</loc><lastmod>2020-05-27T07:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/26/2-600-ataques-diarios-relacionados-con-coronavirus/</loc><lastmod>2020-05-23T11:56:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/25/ciberataques-error-humano/</loc><lastmod>2020-05-23T11:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/24/proteger-la-red-con-sistemas-ids-ips/</loc><lastmod>2020-05-23T11:53:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/23/google-maps-zonas-accesibles-para-personas-de-movilidad-reducida/</loc><lastmod>2020-05-23T11:52:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/22/inteligencia-artificial-revoluciona-la-atencion-al-cliente/</loc><lastmod>2020-05-19T07:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/21/el-trabajo-remoto-ciberdelincuentes/</loc><lastmod>2020-05-19T07:17:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/20/ataque-frustrado-contra-hospitales-rumanos/</loc><lastmod>2020-05-19T07:16:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/19/mandrake-amenaza-para-android/</loc><lastmod>2020-05-19T07:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/18/las-cuatro-claves-que-han-puesto-a-prueba-el-sector-it-con-la-crisis-del-covid-19/</loc><lastmod>2020-05-14T16:06:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/17/1-200-tiendas-online-afectadas-por-un-skimmer/</loc><lastmod>2020-05-14T08:30:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/16/microsoft-family-safety/</loc><lastmod>2020-05-14T08:28:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/15/google-ofrece-cursos-gratis/</loc><lastmod>2020-05-14T08:26:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/14/alerta-de-nuevas-campanas-de-phishing-coronavirus/</loc><lastmod>2020-05-14T08:25:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/13/proteger-datos-sensibles-en-una-pyme/</loc><lastmod>2020-05-11T09:51:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/12/dejar-un-movil-con-internet-a-un-nino-sin-supervisarle-es-como-abandonarlo-en-un-centro-comercial/</loc><lastmod>2020-05-11T09:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/11/robar-24-millones-de-dolares-en-criptomonedas/</loc><lastmod>2020-05-11T09:48:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/06/facebook-supera-los-2-600-millones/</loc><lastmod>2020-05-02T12:18:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/05/linkedin-supera-los-690-millones/</loc><lastmod>2020-05-02T12:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/04/twitter-supera-los-166-millones/</loc><lastmod>2020-05-02T12:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/03/ciberataques-por-extorsion/</loc><lastmod>2020-05-02T12:13:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/02/detecta-2-600-ataques-diarios-coronavirus/</loc><lastmod>2020-05-02T12:10:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/05/01/seguridad-e-inteligencia/</loc><lastmod>2020-04-30T18:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/25/google-contra-el-coronavirus/</loc><lastmod>2020-04-25T12:42:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/26/ampliar-la-vida-util-ordenador-portatil/</loc><lastmod>2020-04-25T12:41:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/30/tag-barnakle-ataque-masivo/</loc><lastmod>2020-04-25T12:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/29/google-avisara-no-existan-resultados/</loc><lastmod>2020-04-25T12:37:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/28/zoom-nuevo-problema-seguridad/</loc><lastmod>2020-04-25T12:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/27/facebook-videollamadas/</loc><lastmod>2020-04-25T12:33:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/25/consejos-sobre-ciberseguridad/</loc><lastmod>2020-04-23T08:49:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/24/ataques-ddos/</loc><lastmod>2020-04-21T15:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/23/problemas-de-seguridad-con-las-apps-de-seguimiento-del-coronavirus/</loc><lastmod>2020-04-21T15:22:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/22/vulnerabilidad-critica-en-google-chrome/</loc><lastmod>2020-04-21T15:20:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/21/coronavirus-ciberdelincuentes/</loc><lastmod>2020-04-16T08:41:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/20/whatsapp-facebook/</loc><lastmod>2020-04-16T08:39:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/19/tecnologias-decada/</loc><lastmod>2020-04-13T10:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/18/ransomware/</loc><lastmod>2020-04-13T10:19:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/17/emotet-tumba-red-microsoft/</loc><lastmod>2020-04-13T10:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/16/teclado-braille-para-android/</loc><lastmod>2020-04-13T10:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/15/aislamiento-navegador-web/</loc><lastmod>2020-04-13T10:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/14/redes-ddos/</loc><lastmod>2020-04-13T10:14:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/13/aumento-malware/</loc><lastmod>2020-04-13T10:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/12/pautas-legales-ante-la-situacion-actual-covid-19/</loc><lastmod>2020-04-04T16:33:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/11/como-eliminar-malware-de-un-pc-paso-a-paso/</loc><lastmod>2020-04-04T16:32:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/10/estos-son-los-principales-ataques-que-recibiras-relacionados-con-el-covid-19/</loc><lastmod>2020-04-04T16:31:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/09/especial-cibercriminales-y-coronavirus-3/</loc><lastmod>2020-04-04T16:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/08/ataques-a-infraestructuras-criticas-el-sistema-sanitario-en-jaque-2/</loc><lastmod>2020-04-04T16:29:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/07/que-es-el-malware-evasivo-que-no-para-de-aumentar/</loc><lastmod>2020-04-04T16:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/06/zoom-confirma-problemas-de-seguridad-y-los-arreglara-en-tres-meses/</loc><lastmod>2020-04-04T16:25:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/05/noticias-de-interes-ciberseguridad/</loc><lastmod>2020-04-01T16:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/04/en-tierra-de-virus/</loc><lastmod>2020-04-01T16:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/03/inteligencia-artificial-y-coronavirus/</loc><lastmod>2020-04-01T16:03:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/02/informaticos-espanoles-se-unen-a-una-red-mundial-para-evitar-hackeos-a-hospitales/</loc><lastmod>2020-04-01T16:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/04/01/ibm-security-lanzo-su-indice-anual-de-inteligencia-de-amenazas-demostrando-que-los-ciberataques-a-tecnologias-operativas-aumentaron-un-2000/</loc><lastmod>2020-03-28T09:31:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/31/ataques-a-infraestructuras-criticas-el-sistema-sanitario-en-jaque/</loc><lastmod>2020-03-27T09:38:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/30/especial-cibercriminales-y-coronavirus-2/</loc><lastmod>2020-03-27T09:36:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/29/los-desafios-de-la-ciberseguridad-en-tiempos-del-covid-19/</loc><lastmod>2020-03-27T09:34:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/28/prueba-tu-red-domestica-con-las-mismas-herramientas-que-usan-los-malos/</loc><lastmod>2020-03-27T09:34:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/27/eset-lanza-su-antivirus-para-linux-porque-el-malware-no-se-limita-a-windows/</loc><lastmod>2020-03-27T09:33:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/26/que-nos-depara-2020-en-el-ambito-de-la-ciberseguridad/</loc><lastmod>2020-03-23T09:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/25/teletrabajo-ciberseguro-en-tiempos-del-coronavirus/</loc><lastmod>2020-03-17T12:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/24/especial-cibercriminales-y-coronavirus/</loc><lastmod>2020-03-17T12:53:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/23/espana-forma-parte-del-plan-de-google-para-desplegar-infraestructuras-cloud/</loc><lastmod>2020-08-10T10:21:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/22/apps-para-hacer-videollamadas-con-amigos-y-familia-durante-el-confinamiento/</loc><lastmod>2020-03-15T10:42:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/21/tecnologia-motion-sense-desbloquea-tu-smartphone-con-un-gesto/</loc><lastmod>2020-03-15T10:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/20/poblar-con-tecnologia-la-espana-vaciada/</loc><lastmod>2020-03-15T10:39:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/19/watchguard-technologies-se-hace-con-el-control-de-panda-security-2/</loc><lastmod>2020-03-15T10:38:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/18/el-listado-de-vulnerabilidades-de-software-de-los-ultimos-20-anos-te-va-a-sorprender-2/</loc><lastmod>2020-03-15T10:37:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/17/las-vulnerabilidades-en-procesadores-exigiran-crear-una-nueva-arquitectura-de-hardware/</loc><lastmod>2020-03-15T10:37:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/16/microsoft-publica-los-parches-de-marzo-y-es-de-los-gordos-115-actualizaciones-de-seguridad/</loc><lastmod>2020-03-15T10:36:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/15/las-tres-leyes-de-la-inteligencia-artificial/</loc><lastmod>2020-03-10T08:38:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/14/las-aplicaciones-moviles-ocultas-son-la-mayor-amenaza-de-malware/</loc><lastmod>2020-03-10T08:37:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/13/puede-la-industria-de-la-seguridad-hackear-la-sociedad-para-mejorar-los-problemas-humanos/</loc><lastmod>2020-03-10T08:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/12/probamos-las-google-titan-keys-mas-seguridad-en-tus-cuentas/</loc><lastmod>2020-03-10T08:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/11/watchguard-technologies-se-hace-con-el-control-de-panda-security/</loc><lastmod>2020-03-10T08:34:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/10/el-listado-de-vulnerabilidades-de-software-de-los-ultimos-20-anos-te-va-a-sorprender/</loc><lastmod>2020-03-10T08:33:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/09/espana-en-la-zona-media-baja-de-la-ciberseguridad-europea/</loc><lastmod>2020-03-04T09:03:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/08/microsoft-abre-una-nueva-region-de-centros-de-datos-en-espana/</loc><lastmod>2020-03-01T20:02:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/07/el-mercado-smarthome-crece-a-un-ritmo-del-223-a-nivel-global/</loc><lastmod>2020-03-01T20:01:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/06/debe-haber-mayor-inversion-en-soluciones-cloud-como-apoyo-a-la-seguridad/</loc><lastmod>2020-03-01T20:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/05/las-10-predicciones-de-gartner/</loc><lastmod>2020-03-01T20:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/04/es-la-privacidad-total-una-quimera-en-la-era-digital/</loc><lastmod>2020-03-01T19:59:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/03/stalkerware-y-adware-las-amenazas-moviles-mas-activas/</loc><lastmod>2020-03-01T19:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/02/cuales-son-las-amenazas-internas-que-mas-dinero-le-cuesta-a-las-empresas-en-2020/</loc><lastmod>2020-03-01T19:58:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/03/01/el-mercado-de-pc-en-emea-tocado-pero-no-hundido-por-el-coronavirus/</loc><lastmod>2020-02-29T18:59:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/29/diario-de-troya-3-los-rusos-lo-vuelven-a-hacer-y-un-adolescente-hackea-mcdonalds/</loc><lastmod>2020-02-24T15:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/28/privacidad-vs-seguridad/</loc><lastmod>2020-02-24T15:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/27/los-datos-que-no-queremos-en-internet/</loc><lastmod>2020-02-24T15:18:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/26/datos-el-combustible-de-una-empresa-inteligente/</loc><lastmod>2020-02-24T15:17:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/25/android-11-mejorara-la-seguridad-y-privacidad-como-asunto-prioritario/</loc><lastmod>2020-02-24T15:16:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/24/cinco-tipos-de-contenido-utiles-para-lograr-enlaces-a-una-web/</loc><lastmod>2020-02-24T15:16:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/23/cancelado-el-mobile-world-congress-2020/</loc><lastmod>2020-02-16T11:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/22/facebook-avanza-en-su-idea-de-lanzar-satelites-al-espacio/</loc><lastmod>2020-02-16T11:22:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/21/cual-es-el-origen-de-whatsapp-por-que-se-llama-whatsapp/</loc><lastmod>2020-02-16T11:20:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/20/diario-de-troya-2-de-la-genialidad-de-la-cia-al-troleo-a-google-maps/</loc><lastmod>2020-02-16T11:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/19/google-chrome-bloqueara-descargas-inseguras-en-proximas-versiones/</loc><lastmod>2020-02-16T11:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/18/contrasenas-guia-de-buenas-practicas/</loc><lastmod>2020-02-16T11:18:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/17/el-017-ya-esta-activo-en-espana-y-puede-ser-una-gran-ayuda-en-materia-de-ciberseguridad/</loc><lastmod>2020-02-16T11:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/16/los-5-mitos-del-cloud/</loc><lastmod>2020-02-08T16:48:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/15/las-amenazas-internas-tambien-le-cuestan-caro-a-las-empresas-2/</loc><lastmod>2020-02-08T16:47:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/14/windows-7-seguira-siendo-soportado-por-los-principales-proveedores-de-seguridad/</loc><lastmod>2020-02-08T16:46:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/13/un-fallo-en-las-bombillas-philips-hue-expone-redes-wi-fi-a-piratas-informaticos/</loc><lastmod>2020-02-08T16:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/12/ransomware-hospital-de-torrejon-2/</loc><lastmod>2020-02-03T13:57:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/11/mas-de-la-mitad-de-las-empresas-se-sumergira-en-un-proceso-de-digitalizacion-en-2020/</loc><lastmod>2020-02-03T13:55:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/10/si-tu-disco-duro-falla-asi-puedes-recuperar-tus-datos/</loc><lastmod>2020-02-03T13:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/09/los-ciberdelincuentes-empiezan-a-sacar-partido-al-coronavirus/</loc><lastmod>2020-02-02T10:55:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/08/como-proteger-la-red-en-el-apogeo-del-5g/</loc><lastmod>2020-02-02T10:54:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/07/cardplanet-asi-funcionaba-el-mercado-de-tarjetas-de-credito-robadas/</loc><lastmod>2020-02-02T10:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/05/dia-europeo-de-la-proteccion-de-datos-casi-40-anos-de-evolucion-de-salvaguarda-de-la-informacion/</loc><lastmod>2020-02-02T10:52:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/06/los-mejores-antivirus-para-windows-10-en-equipos-de-consumo/</loc><lastmod>2020-02-02T10:51:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/04/el-antivirus-gratuito-de-avast-sigue-envuelto-en-la-polemica-por-la-recopilacion-de-datos/</loc><lastmod>2020-02-02T10:50:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/03/las-amenazas-internas-tambien-le-cuestan-caro-a-las-empresas/</loc><lastmod>2020-02-02T10:50:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/02/una-flota-de-drones-inteligentes-para-garantizar-la-seguridad-en-las-ciudades-del-futuro/</loc><lastmod>2020-01-30T13:20:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/02/01/el-reconocimiento-facial-la-tecnologia-biometrica-del-presente/</loc><lastmod>2020-01-30T13:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/31/una-brecha-de-datos-expone-250-millones-de-registros-del-soporte-al-cliente-de-microsoft/</loc><lastmod>2020-01-25T18:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/30/la-botnet-muhstik-ataca-routers-con-el-firmware-tomato/</loc><lastmod>2020-01-25T18:39:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/29/filtrado-de-credenciales/</loc><lastmod>2020-01-25T18:38:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/28/ransomware-hospital-de-torrejon/</loc><lastmod>2020-01-25T18:37:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/27/el-cibercrimen-aumento-un-67-en-espana-en-el-segundo-semestre-de-2019/</loc><lastmod>2020-01-25T18:35:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/26/nadia-calvino-llevara-las-riendas-de-la-transformacion-digital/</loc><lastmod>2020-01-12T11:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/25/la-ciencia-ficcion-que-se-hara-realidad-en-2020/</loc><lastmod>2020-01-12T11:11:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/24/como-mejorar-la-seguridad-en-internet-para-comenzar-bien-2020/</loc><lastmod>2020-01-12T11:10:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/23/indra-compra-sia-y-domina-la-ciberseguridad-en-espana/</loc><lastmod>2020-01-12T11:09:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/22/vulnerabilidad-critica-0-day-en-firefox/</loc><lastmod>2020-01-12T11:08:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/21/samsung-vende-67-millones-de-smartphones-5g/</loc><lastmod>2020-01-12T11:07:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/20/el-gasto-en-robotica-y-drones-crecera-un-17-en-2020/</loc><lastmod>2020-01-12T11:06:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/19/la-inteligencia-artificial-impulsa-el-crecimiento-del-almacenamiento/</loc><lastmod>2020-01-12T11:05:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/18/el-mercado-de-reconocimiento-facial-crecera-un-125-hasta-2024/</loc><lastmod>2020-01-12T11:04:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/17/10-habilidades-tecnologicas-necesarias-en-2020/</loc><lastmod>2020-01-12T11:03:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/16/saas-un-negocio-de-100-000-millones-de-dolares-en-10-anos/</loc><lastmod>2020-01-12T11:03:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/15/el-mercado-5g-crecera-con-fuerza-hasta-2026/</loc><lastmod>2020-01-12T11:02:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/14/como-los-var-pueden-aprovechar-las-tecnologias-emergentes/</loc><lastmod>2020-01-12T11:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/13/chrome-y-firefox-contra-las-ventanas-emergentes-invasivas-y-notificaciones-de-spam/</loc><lastmod>2020-01-12T11:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/12/casi-el-75-de-los-objetos-sospechosos-resultan-maliciosos/</loc><lastmod>2020-01-05T18:02:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/11/nace-la-primera-estructura-paritaria-sectorial-para-la-industria-digital/</loc><lastmod>2020-01-05T18:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/10/veinte-incidentes-que-resumen-la-ciberseguridad-en-2019/</loc><lastmod>2020-01-05T18:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/09/personalizacion-y-omnicanalidad-tendencias-del-comercio-electronico-en-2020/</loc><lastmod>2020-01-05T17:59:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/08/open-source-y-su-influencia-creciente-en-el-sector-tecnologico/</loc><lastmod>2020-01-05T17:58:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/07/microsoft-concluye-su-mejor-ano-en-una-decada/</loc><lastmod>2020-01-05T17:57:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/06/ces-2020-que-se-espera-de-la-mayor-cita-de-tecnologia-de-consumo/</loc><lastmod>2020-01-05T17:57:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/05/inteligencia-artificial-en-crecimientos-acelerados-del-40/</loc><lastmod>2020-01-01T11:26:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/04/como-restaurar-windows-10-ante-una-infeccion-de-malware/</loc><lastmod>2020-01-29T12:27:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/03/2020-cambios-para-el-e-mail/</loc><lastmod>2020-01-01T11:24:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2020/01/02/la-nube-hibrida-ia-y-machine-learning-lideraran-en-2020/</loc><lastmod>2020-01-01T11:23:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/31/microsoft-no-pagues-ningun-rescate-por-ransomware/</loc><lastmod>2019-12-21T19:10:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/30/que-software-malicioso-amenaza-con-asolar-a-los-usuarios-y-companias-en-2020/</loc><lastmod>2019-12-21T19:09:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/29/google-integra-en-su-nube-la-seguridad-de-qualys-cloud-agent/</loc><lastmod>2019-12-21T19:08:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/28/microsoft-y-la-universidad-pontificia-comillas-se-alian-por-la-innovacion-educativa/</loc><lastmod>2019-12-21T19:07:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/27/prosegur-y-ryuk-por-que-ocurrio/</loc><lastmod>2019-12-21T19:06:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/26/rusia-y-windows-xp/</loc><lastmod>2019-12-21T19:06:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/24/hacia-una-nueva-nube-privada/</loc><lastmod>2019-12-21T19:05:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/23/certificaciones-ti-a-tener-en-cuenta-para-2020/</loc><lastmod>2019-12-21T19:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/22/navegadores-y-deep-web-profundicemos-en-el-tema-2/</loc><lastmod>2019-12-15T18:46:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/21/sabias-que-los-ataques-de-ingenieria-social-suponen-el-93-de-las-brechas-de-seguridad/</loc><lastmod>2019-12-15T18:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/20/millones-de-usuarios-reutilizan-contrasenas-hackeadas-en-los-servicios-de-microsoft/</loc><lastmod>2019-12-15T18:45:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/19/una-vulnerabilidad-permite-secuestrar-las-conexiones-vpn-en-linux/</loc><lastmod>2019-12-15T18:44:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/18/avast-recopila-y-vende-datos-de-400-millones-de-usuarios-desde-2013/</loc><lastmod>2019-12-15T18:43:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/17/plundervolt-nueva-vulnerabilidad-que-afecta-a-los-procesadores-intel/</loc><lastmod>2019-12-15T18:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/16/chrome-79-alerta-de-las-contrasenas-hackeadas-y-mejora-el-bloqueo-de-phishing/</loc><lastmod>2019-12-15T18:42:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/15/en-pos-de-la-administracion-conectada-al-ciudadano/</loc><lastmod>2019-12-08T18:52:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/14/el-ransomware-se-ceba-con-las-empresas-espanolas-en-noviembre/</loc><lastmod>2019-12-08T18:51:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/13/hemos-detectado-a-grupos-de-cibercriminales-que-llevan-recaudados-mas-de-20-millones-en-ransomware-2/</loc><lastmod>2019-12-08T18:50:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/12/como-mejorar-la-seguridad-de-un-hosting-wordpress/</loc><lastmod>2019-12-08T18:50:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/11/las-llamadas-de-spam-crecieron-un-18-en-2019-como-prevenir-comunicaciones-no-deseadas-estafas-y-fraudes/</loc><lastmod>2019-12-08T18:49:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/10/china-exige-pasar-un-reconocimiento-facial-para-contratar-el-telefono/</loc><lastmod>2019-12-08T18:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/09/te-preocupa-la-seguridad-de-windows-7-asi-puedes-actualizar-a-windows-10-gratis-y-legal/</loc><lastmod>2019-12-08T18:47:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/08/microsoft-habilitara-dns-sobre-https-directamente-en-windows-10-2/</loc><lastmod>2019-11-30T19:00:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/07/google-confirma-la-vulnerabilidad-de-la-app-de-camara-de-android/</loc><lastmod>2019-11-30T18:59:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/06/kaspersky-encuentra-decenas-de-vulnerabilidades-en-aplicaciones-vnc/</loc><lastmod>2019-11-30T18:58:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/05/un-ataque-informatico-a-prosegur-confirma-la-amenaza-del-ransomware/</loc><lastmod>2019-11-30T18:57:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/04/hemos-detectado-a-grupos-de-cibercriminales-que-llevan-recaudados-mas-de-20-millones-en-ransomware/</loc><lastmod>2019-11-30T18:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/03/nueva-guia-sobre-como-identificar-fraudes-online/</loc><lastmod>2019-11-30T18:55:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/02/sabias-que-los-navegadores-web-almacenan-mas-informacion-de-la-que-creemos/</loc><lastmod>2019-11-30T18:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/12/01/navegadores-y-deep-web-profundicemos-en-el-tema/</loc><lastmod>2019-11-30T18:53:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/30/cuales-seran-las-principales-tendencias-en-ciberseguridad-para-2020/</loc><lastmod>2019-11-30T12:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/29/iberia-lanza-una-aplicacion-para-embarcar-mediante-el-reconocimiento-facial-en-el-aeropuerto-de-madrid-barajas/</loc><lastmod>2019-11-23T12:49:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/28/vulnerabilidades-en-tpm-afectan-a-millones-de-dispositivos/</loc><lastmod>2019-11-23T12:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/27/como-configurar-las-cookies-en-google-chrome/</loc><lastmod>2019-11-23T12:47:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/26/microsoft-habilitara-dns-sobre-https-directamente-en-windows-10/</loc><lastmod>2019-11-23T12:47:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/25/el-fundador-de-telegram-arremete-contra-whatsapp/</loc><lastmod>2019-11-23T12:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/24/microsoft-defender-llegara-a-linux-en-2020/</loc><lastmod>2019-11-17T09:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/23/cybercamp-2019-abre-registro-y-ofrece-acceso-gratuito-para-todos-los-publicos/</loc><lastmod>2019-11-17T09:37:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/22/iot-e-inteligencia-artificial-el-binomio-aiot-de-valor/</loc><lastmod>2020-01-02T06:56:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/21/invertir-mas-en-ciberseguridad-no-significa-estar-mas-protegido/</loc><lastmod>2019-11-17T09:35:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/20/crece-la-adopcion-cloud-en-las-empresas-pero-falta-seguridad/</loc><lastmod>2019-11-17T09:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/19/el-33-del-negocio-de-partners-de-microsoft-proviene-de-servicios-cloud/</loc><lastmod>2019-11-17T09:33:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/18/donde-se-encuentra-la-transformacion-digital-real/</loc><lastmod>2019-11-17T09:32:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/17/keepassxc-2-5-se-reafirma-como-el-gestor-de-contrasenas-libre-mas-recomendable/</loc><lastmod>2019-11-11T08:50:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/16/como-prevenir-el-ransomware-una-gran-amenaza-para-la-ciberseguridad/</loc><lastmod>2019-11-11T08:49:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/15/descubren-una-vulnerabilidad-en-los-altavoces-inteligentes-los-laseres/</loc><lastmod>2019-11-11T08:49:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/14/google-lanza-la-app-defense-alliance-para-proteger-android-de-malware/</loc><lastmod>2019-11-11T08:48:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/13/la-gran-pregunta-es-cuando-las-empresas-van-a-ir-al-cloud/</loc><lastmod>2019-11-11T08:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/12/la-pregunta-del-millon-como-resolver-la-complejidad-en-la-nube/</loc><lastmod>2019-11-11T08:46:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/11/backup-en-windows-una-tarea-imprescindible-para-limitar-los-efectos-del-malware/</loc><lastmod>2019-11-11T08:45:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/10/importante-cambio-en-el-algoritmo-de-busquedas-de-google/</loc><lastmod>2019-11-01T09:01:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/09/samsung-knox-alta-proteccion-y-cifrado-de-datos/</loc><lastmod>2019-11-01T09:00:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/08/diode-en-10-anos-no-hablaremos-de-iot-porque-estara-embebido-en-todo/</loc><lastmod>2019-11-01T08:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/07/la-transformacion-digital-se-llevara-mas-de-mitad-de-las-inversiones/</loc><lastmod>2019-11-01T08:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/06/los-empleados-de-facebook-se-quejan-por-permitir-mentir-a-los-politicos-en-los-anuncios/</loc><lastmod>2019-11-01T08:57:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/05/ine-rastreara-millones-de-moviles-espanoles-durante-ocho-dias-es-legal-o-atenta-contra-la-privacidad/</loc><lastmod>2019-11-01T08:56:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/04/facebook-acepta-pagar-la-multa-por-el-escandalo-cambridge-analytica/</loc><lastmod>2019-11-01T08:55:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/03/los-wearables-y-accesorios-de-apple-generan-casi-el-mismo-negocio-que-los-macs/</loc><lastmod>2019-11-01T08:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/02/la-venta-de-monitores-crece-un-27-en-espana-en-el-tercer-trimestre/</loc><lastmod>2019-11-01T08:53:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/11/01/hiperescaladores-los-catalizadores-del-ecosistema-cloud/</loc><lastmod>2019-11-01T08:53:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/31/kaspersky-actualiza-su-software-de-seguridad-para-el-cliente-final/</loc><lastmod>2019-10-26T11:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/30/como-instalar-manualmente-una-actualizacion-de-seguridad-en-windows-10/</loc><lastmod>2019-10-26T11:54:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/29/samsung-knox-descubre-la-plataforma-que-te-mantiene-seguro-productivo-y-conectado/</loc><lastmod>2019-10-26T11:53:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/28/aumentan-los-ciberataques-a-companias-del-sector-de-salud/</loc><lastmod>2019-10-26T11:53:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/27/microsoft-activa-la-proteccion-contra-manipulaciones-en-windows-defender/</loc><lastmod>2019-10-20T09:16:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/26/intel-entrara-en-el-mercado-grafico-en-2020-con-sus-gpus-en-10-nm/</loc><lastmod>2019-10-20T09:15:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/25/el-problema-de-seguridad-son-los-usuarios/</loc><lastmod>2019-10-20T09:14:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/24/017-sera-el-numero-de-ayuda-en-cuestiones-de-ciberseguridad-en-espana/</loc><lastmod>2019-10-20T09:13:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/23/2-de-cada-5-envios-de-pedidos-ocasionan-problemas/</loc><lastmod>2019-10-20T09:13:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/22/facebook-bloquea-por-error-a-quienes-denuncian-a-otros/</loc><lastmod>2019-10-20T09:12:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/21/tony-anscombe-global-ambassador-de-eset-la-computacion-cuantica-tiene-el-potencial-para-acabar-con-la-seguridad-informatica/</loc><lastmod>2019-10-20T09:11:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/20/99-dias-para-el-adios-a-windows-7-como-afecta-a-la-seguridad-y-que-pueden-hacer-usuarios-y-empresas/</loc><lastmod>2019-10-13T09:30:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/19/las-infraestructuras-criticas-espanolas-no-estan-preparadas-para-las-ciberamenazas/</loc><lastmod>2019-10-13T09:30:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/18/descubren-una-vulnerabilidad-0-day-en-apple-itunes-e-icloud-para-windows-actualiza/</loc><lastmod>2019-10-13T09:29:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/17/intel-anuncia-el-fin-de-ciclo-de-vida-de-los-procesadores-kaby-lake/</loc><lastmod>2019-10-13T09:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/16/la-seguridad-de-los-dispositivos-usb-no-resulta-prioritaria-para-las-empresas/</loc><lastmod>2019-10-13T09:27:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/15/asi-sera-el-modo-oscuro-de-la-web-de-facebook/</loc><lastmod>2019-10-13T09:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/13/la-demanda-de-almacenamiento-flash-nand-crecera-con-la-llegada-de-5g/</loc><lastmod>2019-10-13T09:25:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/14/amd-mejora-su-cuota-de-mercado-en-el-sector-profesional/</loc><lastmod>2019-10-13T09:25:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/12/quien-teme-a-la-inteligencia-artificial/</loc><lastmod>2019-10-06T11:22:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/11/fake-news-la-desinformacion/</loc><lastmod>2019-10-06T11:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/10/las-aplicaciones-maliciosas-de-google-play-acumularon-335-millones-de-instalaciones-en-septiembre/</loc><lastmod>2019-10-06T11:18:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/09/ya-esta-disponible-la-beta-de-e-un-nuevo-android-centrado-en-la-privacidad/</loc><lastmod>2019-10-06T11:17:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/08/onedrive-personal-vault-microsoft-refuerza-la-seguridad-de-su-servicio-en-nube/</loc><lastmod>2019-10-06T11:16:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/07/la-estafa-a-la-emt-una-operacion-de-manual-de-los-cibercriminales/</loc><lastmod>2019-10-06T11:14:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/06/octubre-mes-europeo-de-la-ciberseguridad-2019/</loc><lastmod>2019-10-03T07:31:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/05/trend-micro-senala-los-potenciales-riesgos-de-seguridad-de-la-nueva-banca-abierta/</loc><lastmod>2019-09-30T15:31:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/04/privacidad-whatsapp-y-nuestros-mensajes-de-texto/</loc><lastmod>2019-09-30T15:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/03/los-calendarios-de-google-filtran-informacion-privada-y-la-responsabilidad-es-de-los-usuarios-2/</loc><lastmod>2019-09-30T15:29:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/02/reino-unido-usara-puertas-traseras-para-acceder-a-los-mensajes-de-facebook-y-whatsapp/</loc><lastmod>2019-09-30T15:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/10/01/los-46-paises-del-mundo-que-mas-usan-las-redes-sociales/</loc><lastmod>2019-09-30T15:28:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/30/los-calendarios-de-google-filtran-informacion-privada-y-la-responsabilidad-es-de-los-usuarios/</loc><lastmod>2019-09-23T06:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/29/el-90-de-las-pymes-espanolas-hace-una-gestion-ineficiente-de-su-software/</loc><lastmod>2019-09-23T06:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/28/un-chivato-en-nuestro-bolsillo/</loc><lastmod>2019-09-23T06:46:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/27/esta-es-toda-la-informacion-que-facebook-recopila-de-cada-usuario/</loc><lastmod>2019-09-23T06:45:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/26/facebook-lanza-portal-tv-y-nuevas-pantallas-inteligentes/</loc><lastmod>2019-09-23T06:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/25/seis-vias-de-entrada-para-ciberataques-que-no-podras-creerte-que-existieran/</loc><lastmod>2019-09-23T06:43:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/24/que-papel-juega-la-realidad-aumentada-en-el-sector-retail/</loc><lastmod>2019-09-23T06:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/23/todo-lo-que-necesita-saber-de-blockchain/</loc><lastmod>2019-09-23T06:42:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/22/por-que-borrar-las-cookies-del-navegador/</loc><lastmod>2019-09-14T12:21:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/21/5g-un-revulsivo-para-el-mercado-de-smartphones-en-2020/</loc><lastmod>2019-09-14T12:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/20/ransomware-lilu/</loc><lastmod>2019-09-14T12:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/19/hitachi-nos-anima-a-saludar-a-camara-y-olvidarnos-de-las-contrasenas/</loc><lastmod>2019-09-14T12:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/18/los-vendedores-iot-fallan-en-aspectos-basicos-de-seguridad/</loc><lastmod>2019-09-14T12:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/17/samsung-seguira-liderando-el-mercado-smartphone-de-gama-alta/</loc><lastmod>2019-09-14T12:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/16/iot-asi-se-resiente-la-seguridad-del-internet-de-las-cosas/</loc><lastmod>2019-09-14T12:16:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/15/el-algoritmo-de-google-priorizara-a-los-medios-que-antes-ofrecen-una-noticia/</loc><lastmod>2019-09-14T12:16:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/14/epsd2-los-pagos-online-mas-seguros/</loc><lastmod>2019-09-14T12:15:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/13/la-inteligencia-artificial-impulsa-la-banca/</loc><lastmod>2019-09-01T09:37:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/12/la-factura-electronica-prepara-su-desembarco-en-la-empresa-privada/</loc><lastmod>2019-09-01T09:35:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/11/caixabank-ya-trabaja-con-computacion-cuantica/</loc><lastmod>2019-09-01T09:34:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/10/la-interconexion-y-el-futuro-del-sector-audiovisual/</loc><lastmod>2019-09-01T09:33:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/09/sabias-que-las-criptomonedas-estan-involucradas-en-algunos-ciberdelitos/</loc><lastmod>2019-09-01T09:32:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/08/las-cuentas-de-google-ya-son-accesibles-mediante-la-autenticacion-biometrica-de-android/</loc><lastmod>2019-09-01T09:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/07/apple-advierte-si-rompes-la-privacidad-de-safari-te-trataremos-como-malware/</loc><lastmod>2019-09-01T09:31:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/06/el-banco-central-europeo-cierra-el-portal-bird-tras-ser-pirateado/</loc><lastmod>2019-09-01T09:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/05/grandes-tecnologicas-se-alian-para-mejorar-la-seguridad-en-la-nube-bajo-el-confidential-computing-consortium/</loc><lastmod>2019-09-01T09:29:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/04/moviepass-expuso-datos-de-miles-de-tarjetas-de-credito/</loc><lastmod>2019-09-01T09:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/03/una-planta-nuclear-ucraniana-fue-conectada-a-internet-para-minar-criptomonedas/</loc><lastmod>2019-09-01T09:28:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/02/microsoft-pagara-por-localizar-fallos-de-seguridad-en-edge-chromium/</loc><lastmod>2019-09-01T09:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/09/01/apple-fulmina-el-jailbreak-de-ios-12-con-un-parche-de-emergencia/</loc><lastmod>2019-09-01T09:26:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/31/importante-brecha-de-seguridad-en-biostar-2/</loc><lastmod>2019-08-21T08:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/30/dropshipping-es-viable-para-nuestra-tienda-on-line/</loc><lastmod>2019-08-21T08:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/29/lenovo-advierte-una-posible-subida-de-precios-por-los-impuestos-estadounidenses/</loc><lastmod>2019-08-21T08:34:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/28/5-fracasos-de-microsoft-que-podrian-haber-triunfado/</loc><lastmod>2019-08-21T08:33:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/27/whatsapp-comunicacion-cercana-con-el-cliente/</loc><lastmod>2019-08-21T08:32:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/26/pwn20wnd-publica-el-primer-jailbreak-para-iphone-en-anos/</loc><lastmod>2019-08-21T08:32:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/25/monitores-lg-con-pantallas-curvas-que-ventajas-ofrecen/</loc><lastmod>2019-08-15T06:52:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/24/como-desactivar-la-webcam-y-mejorar-la-privacidad/</loc><lastmod>2019-08-15T06:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/23/las-inversiones-globales-en-iot-alcanzaran-los-11-billones-de-dolares-en-2023/</loc><lastmod>2019-08-15T06:50:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/22/el-5g-afectara-a-la-demanda-de-memoria-ram-vemos-sus-consecuencias/</loc><lastmod>2019-08-15T06:50:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/21/empleados-de-facebook-tambien-escucharon-conversaciones-de-los-usuarios/</loc><lastmod>2019-08-15T06:49:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/20/como-resolver-el-fallo-de-google-play-services-que-agota-la-bateria-del-movil/</loc><lastmod>2019-08-15T06:48:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/19/no-more-ransom-ya-ha-evitado-el-pago-de-108-millones-de-euros-a-los-cibercriminales-2/</loc><lastmod>2019-08-12T11:30:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/18/una-ex-empleada-de-aws-hackeo-capital-one-y-robo-datos-de-100-millones-de-clientes/</loc><lastmod>2019-08-12T11:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/17/cisco-pagara-86-millones-por-vender-software-de-videovigilancia-con-graves-problemas-de-seguridad/</loc><lastmod>2019-08-12T11:28:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/16/el-mercado-en-auge-de-los-ataques-de-dia-cero/</loc><lastmod>2019-08-12T11:28:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/15/chrome-76-apuesta-por-la-seguridad-mejorando-el-modo-incognito-y-bloqueando-flash/</loc><lastmod>2019-08-12T11:27:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/14/apple-regalara-iphones-especiales-a-investigadores-de-seguridad/</loc><lastmod>2019-08-12T11:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/13/acusan-a-corea-el-norte-de-robar-2-000-millones-de-dolares-en-criptomonedas/</loc><lastmod>2019-08-12T11:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/12/black-hat-usa-2019-los-hackers-eticos-deben-proteger-los-derechos-digitales/</loc><lastmod>2019-08-12T11:25:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/11/cuales-son-los-contenidos-mas-populares-en-youtube/</loc><lastmod>2019-08-01T06:16:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/10/el-siri-de-apple-tambien-esta-cuestionado-por-la-falta-de-privacidad/</loc><lastmod>2019-08-01T06:15:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/09/que-seguridad-tenemos-de-que-no-se-expongan-nuestros-datos-privados/</loc><lastmod>2019-08-01T06:14:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/08/no-more-ransom-ya-ha-evitado-el-pago-de-108-millones-de-euros-a-los-cibercriminales/</loc><lastmod>2019-08-01T06:13:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/07/intel-empieza-a-suministrar-cpus-ice-lake-de-10-nm-a-oems/</loc><lastmod>2019-08-01T06:12:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/06/nvidia-confirma-el-lanzamiento-de-nuevos-portatiles-rtx-studio/</loc><lastmod>2019-08-01T06:11:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/05/capital-one-brecha-de-seguridad-que-afecta-a-100-millones-de-clientes/</loc><lastmod>2019-08-01T06:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/04/ps4-ha-superado-los-100-millones-de-unidades-vendidas/</loc><lastmod>2019-08-01T06:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/03/como-encriptar-y-proteger-tu-correo-electronico/</loc><lastmod>2019-08-01T06:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/02/recomendaciones-de-samsung-sobre-el-movil-en-vacaciones/</loc><lastmod>2019-08-01T06:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/08/01/nueve-claves-para-evitar-ciberrobos-estas-vacaciones/</loc><lastmod>2019-08-01T06:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/31/intel-cumple-con-las-expectativas-de-los-analistas/</loc><lastmod>2019-07-28T12:04:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/31/investigadores-saltan-el-sistema-anti-rastreo-del-estandar-bluetooth/</loc><lastmod>2019-07-28T12:02:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/30/como-bloquear-las-cookies-de-terceros-en-los-principales-navegadores-web/</loc><lastmod>2019-07-28T12:01:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/30/todo-lo-que-tienes-que-saber-sobre-la-multa-de-la-ftc-a-facebook/</loc><lastmod>2019-07-28T12:01:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/29/buen-estado-de-la-transformacion-digital-de-servicios/</loc><lastmod>2019-07-28T12:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/29/seguridad-de-la-informacion-historia-terminologia-y-campo-de-accion/</loc><lastmod>2019-07-28T11:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/28/multa-millonaria-a-youtube-por-violar-la-privacidad-de-los-ninos/</loc><lastmod>2019-07-23T18:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/28/un-fallo-en-facebook-messenger-kids-permitio-a-menores-chatear-con-desconocidos/</loc><lastmod>2019-07-23T18:57:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/27/ia-un-sistema-inmunologico-para-la-ciberserguridad/</loc><lastmod>2019-07-23T18:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/27/los-hackers-tambien-pueden-con-la-agencia-rusa-de-inteligencia/</loc><lastmod>2019-07-23T18:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/26/la-privacidad-y-seguridad-de-los-moviles-cada-vez-preocupa-mas-a-los-espanoles/</loc><lastmod>2019-07-23T18:53:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/26/enrique-avila-iot-abre-un-nuevo-escenario-en-ciberseguridad/</loc><lastmod>2019-07-23T18:52:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/25/motores-de-mercado-de-la-internet-de-las-cosas/</loc><lastmod>2019-07-23T18:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/25/5g-revitalizara-el-mercado-mundial-de-telefonia/</loc><lastmod>2019-07-23T18:50:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/24/faceapp-la-app-de-moda-cuestionada-por-privacidad/</loc><lastmod>2019-07-23T18:49:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/24/el-nuevo-pegasus-puede-robar-datos-personales-de-los-servidores-en-nube/</loc><lastmod>2019-07-23T18:48:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/23/el-ransomware-en-empresas-aumento-un-200-segun-malwarebytes-2/</loc><lastmod>2019-07-19T14:45:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/23/microsoft-introduce-telemetria-en-windows-7-a-traves-de-una-actualizacion-de-seguridad/</loc><lastmod>2019-07-19T14:42:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/22/piratas-informaticos-pueden-manipular-los-archivos-multimedia-de-whatsapp-o-telegram/</loc><lastmod>2019-07-19T14:41:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/22/mas-de-120-000-ciberataques-a-las-pymes-en-2018/</loc><lastmod>2019-07-19T14:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/21/hacknet-el-juego-que-te-ensena-ciberseguridad-desde-dentro/</loc><lastmod>2019-07-19T14:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/21/que-es-el-ciberacoso-y-que-tipos-existen/</loc><lastmod>2019-07-19T14:32:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/20/viajar-sin-pasaporte-gracias-a-la-biometria-y-al-blockchain/</loc><lastmod>2019-07-19T14:30:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/20/dos-de-cada-tres-empresas-reforzaran-sus-sistemas-de-defensa-con-inteligencia-artificial/</loc><lastmod>2019-07-19T14:28:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/19/claves-para-la-defensa-de-ciberataques-industriales/</loc><lastmod>2019-07-14T16:04:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/19/la-banca-europea-destinara-este-ano-12-000-millones-para-su-transformacion-digital/</loc><lastmod>2019-07-14T16:03:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/18/nace-la-primera-red-de-blockchain-operativa-para-la-gestion-del-coaseguro/</loc><lastmod>2019-07-14T16:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/18/bitdefender-lanza-una-solucion-de-monitoreo-y-analisis-del-trafico-de-red/</loc><lastmod>2019-07-14T16:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/17/sabias-que-existen-distintos-tipos-de-cifrado-para-proteger-la-privacidad-de-nuestra-informacion-en-internet/</loc><lastmod>2019-07-14T16:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/17/la-guardia-civil-detiene-a-los-mayores-ciberestafadores-espanoles-bajo-la-operacion-lupin-2/</loc><lastmod>2019-07-14T15:59:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/16/british-airways-se-enfrenta-a-una-multa-record-por-una-brecha-de-seguridad-230-millones-de-dolares/</loc><lastmod>2019-07-14T15:58:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/16/microsoft-entra-en-el-santuario-privado-de-seguridad-para-linux/</loc><lastmod>2019-07-14T15:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/15/diez-antivirus-gratuitos-para-rescatar-sistemas-windows-infectados/</loc><lastmod>2019-07-14T15:57:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/15/analisis-internacional-de-amenazas/</loc><lastmod>2019-07-14T15:56:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/14/la-vulnerabilidad-de-la-comodidad/</loc><lastmod>2019-07-07T08:29:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/14/el-gobierno-del-dato-es-el-timon-del-sector-financiero/</loc><lastmod>2019-07-07T08:28:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/13/5-pistas-para-sacar-partido-al-cloud/</loc><lastmod>2019-07-07T08:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/13/el-troyano-bancario-movil-ruso-riltok-se-internacionaliza-2/</loc><lastmod>2019-07-07T08:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/12/ciberseguridad-en-sanidad-con-5g/</loc><lastmod>2019-07-07T08:25:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/12/el-potencial-de-iot/</loc><lastmod>2019-07-07T08:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/11/onedrive-personal-vault-mas-proteccion-para-tus-archivos-on-line-2/</loc><lastmod>2019-07-07T08:23:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog/2019/07/11/el-lado-oculto-de-google-recaptcha-v3/</loc><lastmod>2019-08-16T21:44:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://telematicayciberseguridad.tech.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-03-21T08:14:47+00:00</lastmod></url></urlset>
