{"id":47088,"date":"2026-05-15T11:31:50","date_gmt":"2026-05-15T14:31:50","guid":{"rendered":"https:\/\/www.bancocmf.com.ar\/?p=47088"},"modified":"2026-05-15T11:31:55","modified_gmt":"2026-05-15T14:31:55","slug":"suplantacion-de-identidad-digital-cuando-parece-real","status":"publish","type":"post","link":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/","title":{"rendered":"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d"},"content":{"rendered":"\n<p>El trabajo h\u00edbrido se consolid\u00f3 como una modalidad que permite a empresas operar con mayor flexibilidad y eficiencia. Poder acceder a sistemas desde la oficina, el hogar o distintos espacios mejora la din\u00e1mica de trabajo y el balance entre la vida personal y laboral.<\/p>\n\n<p>En este contexto, la seguridad digital acompa\u00f1a esta evoluci\u00f3n. Hoy, proteger la informaci\u00f3n no depende solo de la infraestructura de la empresa, sino tambi\u00e9n de c\u00f3mo se gestionan los accesos, los dispositivos y los h\u00e1bitos de uso en el d\u00eda a d\u00eda.<\/p>\n\n<div class=\"wp-block-uagb-image aligncenter uagb-block-5d60902e wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" data-srcset=\"\/wp-content\/uploads\/Op-1-1024x683.png ,\/wp-content\/uploads\/Op-1.png 780w, \/wp-content\/uploads\/Op-1.png 360w\" data-sizes=\"auto, (max-width: 480px) 150px\" data-src=\"\/wp-content\/uploads\/Op-1-1024x683.png\" alt=\"\" class=\"uag-image-47149 lazyload\" width=\"1024\" height=\"683\" title=\"Op 1\" role=\"img\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/683;\" \/><\/figure><\/div>\n\n<h4 class=\"wp-block-heading\"><strong><strong><strong><strong><strong><strong><strong>Un entorno m\u00e1s flexible, que requiere nuevos cuidados<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h4>\n\n<p>Al trabajar desde distintos lugares, intervienen factores como redes dom\u00e9sticas, dispositivos personales y herramientas externas.<\/p>\n\n<p>Esto no implica un problema en s\u00ed, pero requiere mayor atenci\u00f3n para evitar accesos no autorizados, instalaci\u00f3n de software malicioso o exposici\u00f3n de datos sensibles.<\/p>\n\n<p>Por eso, la seguridad digital se convierte en una pr\u00e1ctica cotidiana.<\/p>\n\n<h4 class=\"wp-block-heading\"><strong>Dispositivos personales: c\u00f3mo usarlos de forma segura<\/strong><\/h4>\n\n<p>El uso de computadoras o celulares personales para trabajar es cada vez m\u00e1s com\u00fan. Sin embargo, estos equipos pueden no contar con las mismas medidas de protecci\u00f3n que los corporativos.<\/p>\n\n<h4 class=\"wp-block-heading\">Riesgos habituales:<\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Sistemas sin actualizar.<\/li>\n\n\n\n<li>Falta de antivirus o protecci\u00f3n activa.<\/li>\n\n\n\n<li>Aplicaciones no confiables.<\/li>\n\n\n\n<li>Informaci\u00f3n almacenada sin protecci\u00f3n.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\">Buenas pr\u00e1cticas:<\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Mantener el sistema y las aplicaciones actualizadas.<\/li>\n\n\n\n<li>Utilizar contrase\u00f1as seguras y, cuando sea posible, doble verificaci\u00f3n de acceso.<\/li>\n\n\n\n<li>Evitar compartir el dispositivo para tareas laborales.<\/li>\n\n\n\n<li>Separar el uso personal del profesional.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\"><strong><strong><strong>Archivos y accesos: ordenar para proteger<\/strong><\/strong><\/strong><\/h4>\n\n<p>El trabajo remoto implica compartir documentos y accesos de forma constante. Una gesti\u00f3n adecuada reduce significativamente los riesgos<\/p>\n\n<h4 class=\"wp-block-heading\">Situaciones a evitar:<\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Enviar archivos por canales no seguros.<\/li>\n\n\n\n<li>Otorgar accesos innecesarios.<\/li>\n\n\n\n<li>Descargar archivos sin verificar su origen.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\">Buenas pr\u00e1cticas:<\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Utilizar plataformas oficiales de la empresa.<\/li>\n\n\n\n<li>Compartir solo la informaci\u00f3n necesaria.<\/li>\n\n\n\n<li>Verificar remitentes, enlaces y documentos antes de abrirlos.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\"><strong><strong>Sesiones y entorno f\u00edsico: el detalle que marca la diferencia<\/strong><\/strong><\/h4>\n\n<p>El lugar desde donde se trabaja tambi\u00e9n influye en la seguridad.<\/p>\n\n<p>Pantallas visibles, sesiones abiertas o dispositivos sin supervisi\u00f3n pueden facilitar accesos no autorizados, incluso sin intenci\u00f3n.<\/p>\n\n<h4 class=\"wp-block-heading\">Medidas simples:<\/h4>\n\n<ul class=\"wp-block-list\">\n<li>Bloquear la pantalla al ausentarse.<\/li>\n\n\n\n<li>Evitar trabajar con informaci\u00f3n sensible en espacios p\u00fablicos.<\/li>\n\n\n\n<li>Cerrar sesiones al finalizar la jornada.<\/li>\n<\/ul>\n\n<h4 class=\"wp-block-heading\"><strong><strong>Una pr\u00e1ctica diaria<\/strong><\/strong><\/h4>\n\n<p>El trabajo h\u00edbrido permite operar con mayor agilidad, pero requiere acompa\u00f1arlo con h\u00e1bitos seguros.<\/p>\n\n<p>Peque\u00f1as acciones cotidianas ayudan a proteger la informaci\u00f3n, reducir riesgos y garantizar la continuidad operativa.<\/p>\n\n<p>Porque la seguridad digital no es s\u00f3lo una cuesti\u00f3n tecnol\u00f3gica: es una responsabilidad compartida que se construye todos los d\u00edas.<\/p>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\u00a1IMPORTANTE!<br\/><br\/>Banco CMF nunca va a pedir token, informaci\u00f3n o claves. Si fuiste v\u00edctima de un fraude, un evento de ciberseguridad o identific\u00e1s una situaci\u00f3n sospechosa, contactate de forma inmediata con tu oficial comercial o escribinos a <a href=\"mailto:ayudabe@bancocmf.com.ar\"><strong>ayudabe@bancocmf.com.ar<\/strong><\/a><strong>.<\/strong><br\/>Desde CMF nos pondremos en contacto con vos por la misma v\u00eda, si fuera necesario.<br\/><br\/>Otras v\u00edas de atenci\u00f3n:<br\/>Web: <a href=\"http:\/\/www.bancocmf.com.ar\/\"><\/a><a href=\"http:\/\/www.bancocmf.com.ar\">www.bancocmf.com.ar<\/a> <br\/>Tel\u00e9fono: 4318-6800<br\/>Banca Electr\u00f3nica: <a href=\"https:\/\/be.bancocmf.com.ar\/\">https:\/\/be.bancocmf.com.ar\/<\/a> haciendo click en el sobre que se encuentra en el extremo superior derecho.<br\/>Si no conoc\u00e9s los datos de tu Oficial Comercial, pod\u00e9s encontrarlos en la Banca Electr\u00f3nica CMF haciendo click en Perfil &gt; Oficial de cuenta.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.<\/p>\n","protected":false},"author":10,"featured_media":46194,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_joinchat":[],"footnotes":""},"categories":[132],"tags":[],"class_list":["post-47088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d<\/title>\n<meta name=\"description\" content=\"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d\" \/>\n<meta property=\"og:description\" content=\"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\" \/>\n<meta property=\"og:site_name\" content=\"Banco CMF\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BancoCMF\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T14:31:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-15T14:31:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bancocmf.com.ar\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Samanta Aiello\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BancoCMF\" \/>\n<meta name=\"twitter:site\" content=\"@BancoCMF\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Samanta Aiello\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\"},\"author\":{\"name\":\"Samanta Aiello\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/#\/schema\/person\/e3a8729172ebc6d659a1f2d97db32558\"},\"headline\":\"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d\",\"datePublished\":\"2026-05-15T14:31:50+00:00\",\"dateModified\":\"2026-05-15T14:31:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\"},\"wordCount\":582,\"publisher\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\",\"url\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\",\"name\":\"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d\",\"isPartOf\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png\",\"datePublished\":\"2026-05-15T14:31:50+00:00\",\"dateModified\":\"2026-05-15T14:31:55+00:00\",\"description\":\"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png\",\"contentUrl\":\"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png\",\"width\":1024,\"height\":1024},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/#website\",\"url\":\"https:\/\/www.bancocmf.com.ar\/\",\"name\":\"Banco CMF\",\"description\":\"Valor es conocerte\",\"publisher\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/#organization\"},\"alternateName\":\"CMF\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bancocmf.com.ar\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/#organization\",\"name\":\"Banco CMF\",\"alternateName\":\"CMF\",\"url\":\"https:\/\/www.bancocmf.com.ar\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/#\/schema\/logo\/image\/\",\"url\":\"\/wp-content\/uploads\/2023\/12\/cmf-banco-corporativo.png\",\"contentUrl\":\"\/wp-content\/uploads\/2023\/12\/cmf-banco-corporativo.png\",\"width\":254,\"height\":106,\"caption\":\"Banco CMF\"},\"image\":{\"@id\":\"https:\/\/www.bancocmf.com.ar\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BancoCMF\",\"https:\/\/x.com\/BancoCMF\",\"https:\/\/www.linkedin.com\/company\/bancocmf\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bancocmf.com.ar\/#\/schema\/person\/e3a8729172ebc6d659a1f2d97db32558\",\"name\":\"Samanta Aiello\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/30b7027a36853a39754720b47ebc112cc7c2e1d0af688d8a6ef17597ea552346?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/30b7027a36853a39754720b47ebc112cc7c2e1d0af688d8a6ef17597ea552346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/30b7027a36853a39754720b47ebc112cc7c2e1d0af688d8a6ef17597ea552346?s=96&d=mm&r=g\",\"caption\":\"Samanta Aiello\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d","description":"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/","og_locale":"en_US","og_type":"article","og_title":"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d","og_description":"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.","og_url":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/","og_site_name":"Banco CMF","article_publisher":"https:\/\/www.facebook.com\/BancoCMF","article_published_time":"2026-05-15T14:31:50+00:00","article_modified_time":"2026-05-15T14:31:55+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.bancocmf.com.ar\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png","type":"image\/png"}],"author":"Samanta Aiello","twitter_card":"summary_large_image","twitter_creator":"@BancoCMF","twitter_site":"@BancoCMF","twitter_misc":{"Written by":"Samanta Aiello","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#article","isPartOf":{"@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/"},"author":{"name":"Samanta Aiello","@id":"https:\/\/www.bancocmf.com.ar\/#\/schema\/person\/e3a8729172ebc6d659a1f2d97db32558"},"headline":"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d","datePublished":"2026-05-15T14:31:50+00:00","dateModified":"2026-05-15T14:31:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/"},"wordCount":582,"publisher":{"@id":"https:\/\/www.bancocmf.com.ar\/#organization"},"image":{"@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/","url":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/","name":"Suplantaci\u00f3n de identidad digital: cuando \u201cparece real\u201d","isPartOf":{"@id":"https:\/\/www.bancocmf.com.ar\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage"},"image":{"@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png","datePublished":"2026-05-15T14:31:50+00:00","dateModified":"2026-05-15T14:31:55+00:00","description":"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bancocmf.com.ar\/en\/suplantacion-de-identidad-digital-cuando-parece-real\/#primaryimage","url":"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png","contentUrl":"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png","width":1024,"height":1024},{"@type":"WebSite","@id":"https:\/\/www.bancocmf.com.ar\/#website","url":"https:\/\/www.bancocmf.com.ar\/","name":"Banco CMF","description":"Valor es conocerte","publisher":{"@id":"https:\/\/www.bancocmf.com.ar\/#organization"},"alternateName":"CMF","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bancocmf.com.ar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bancocmf.com.ar\/#organization","name":"Banco CMF","alternateName":"CMF","url":"https:\/\/www.bancocmf.com.ar\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bancocmf.com.ar\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2023\/12\/cmf-banco-corporativo.png","contentUrl":"\/wp-content\/uploads\/2023\/12\/cmf-banco-corporativo.png","width":254,"height":106,"caption":"Banco CMF"},"image":{"@id":"https:\/\/www.bancocmf.com.ar\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BancoCMF","https:\/\/x.com\/BancoCMF","https:\/\/www.linkedin.com\/company\/bancocmf\/"]},{"@type":"Person","@id":"https:\/\/www.bancocmf.com.ar\/#\/schema\/person\/e3a8729172ebc6d659a1f2d97db32558","name":"Samanta Aiello","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/30b7027a36853a39754720b47ebc112cc7c2e1d0af688d8a6ef17597ea552346?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/30b7027a36853a39754720b47ebc112cc7c2e1d0af688d8a6ef17597ea552346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/30b7027a36853a39754720b47ebc112cc7c2e1d0af688d8a6ef17597ea552346?s=96&d=mm&r=g","caption":"Samanta Aiello"}}]}},"author_meta":{"display_name":"Samanta Aiello","author_link":"https:\/\/www.bancocmf.com.ar\/en\/author\/saiello\/"},"featured_img":"\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_-300x300.png","uagb_featured_image_src":{"full":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"thumbnail":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_-150x150.png",150,150,true],"medium":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_-300x300.png",300,300,true],"medium_large":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_-768x768.png",768,768,true],"large":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"gs-tiny":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_-50x50.png",50,50,true],"xl":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"xxl":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"xxxl":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"xxxxl":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"xxxxxl":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"1536x1536":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false],"2048x2048":["\/wp-content\/uploads\/ChatGPT-Image-4-mar-2026-04_47_37-p.m_.png",1024,1024,false]},"uagb_author_info":{"display_name":"Samanta Aiello","author_link":"https:\/\/www.bancocmf.com.ar\/en\/author\/saiello\/"},"uagb_comment_info":0,"uagb_excerpt":"En un mundo cada vez m\u00e1s conectado, recibir un correo electr\u00f3nico sospechoso se volvi\u00f3 parte de la rutina. Lo importante es que podamos identificar cu\u00e1ndo ese mensaje representa una amenaza real para nuestra seguridad digital.","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/www.bancocmf.com.ar\/en\/category\/cybersecurity\/\" class=\"advgb-post-tax-term\">Cybersecurity<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Cybersecurity<\/span>"]}},"comment_count":0,"relative_dates":{"created":"Posted 10 hours ago","modified":"Updated 10 hours ago"},"absolute_dates":{"created":"Posted on May 15, 2026","modified":"Updated on May 15, 2026"},"absolute_dates_time":{"created":"Posted on May 15, 2026 11:31 am","modified":"Updated on May 15, 2026 11:31 am"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/posts\/47088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/comments?post=47088"}],"version-history":[{"count":2,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/posts\/47088\/revisions"}],"predecessor-version":[{"id":47185,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/posts\/47088\/revisions\/47185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/media\/46194"}],"wp:attachment":[{"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/media?parent=47088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/categories?post=47088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bancocmf.com.ar\/en\/wp-json\/wp\/v2\/tags?post=47088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}