{"id":8952,"date":"2022-07-14T15:58:54","date_gmt":"2022-07-14T19:58:54","guid":{"rendered":"http:\/\/localhost:10003\/?page_id=8952"},"modified":"2024-05-28T12:47:02","modified_gmt":"2024-05-28T16:47:02","slug":"nellies","status":"publish","type":"page","link":"https:\/\/knowledgeflow.org\/es\/nellies\/","title":{"rendered":"Nellies"},"content":{"rendered":"<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/07\/device-and-data-access-when-personal-safety-is-at-risk.pdf\" type=\"application\/pdf\" style=\"width:100%;height:1200px\" aria-label=\"Incrustado de device-and-data-access-when-personal-safety-is-at-risk.\"><\/object><a id=\"wp-block-file--media-9a9fd667-1a21-4f26-a6dc-a78f3ccee9c9\" href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/07\/device-and-data-access-when-personal-safety-is-at-risk.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">acceso a dispositivos y datos en caso de riesgo para la seguridad personal<\/a><a href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/07\/device-and-data-access-when-personal-safety-is-at-risk.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9a9fd667-1a21-4f26-a6dc-a78f3ccee9c9\">Descargar<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/07\/Revamp_of_Secure_your_Devices_and_Accounts_Checklist_Infographic.pdf\" type=\"application\/pdf\" style=\"width:100%;height:1200px\" aria-label=\"Incrustado de eeRevamp_of_Secure_your_Devices_and_Accounts_Checklist_Infographic.\"><\/object><a id=\"wp-block-file--media-b07fa9ec-b344-4120-8292-a49201d5565b\" href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/07\/Revamp_of_Secure_your_Devices_and_Accounts_Checklist_Infographic.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">eeRevamp_of_Secure_your_Devices_and_Accounts_Checklist_Infographic<\/a><a href=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/07\/Revamp_of_Secure_your_Devices_and_Accounts_Checklist_Infographic.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b07fa9ec-b344-4120-8292-a49201d5565b\">Descargar<\/a><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Prot\u00e9jase contra las estafas\" width=\"720\" height=\"405\" src=\"https:\/\/www.youtube.com\/embed\/tR2_KHKIvGM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<style>.kt-post-loop8952_902650-2f .kadence-post-image{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-post-loop8952_902650-2f .kt-post-grid-wrap{gap:30px 30px;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;border-top:1px solid #eeeeee;border-right:1px solid #eeeeee;border-bottom:1px solid #eeeeee;border-left:1px solid #eeeeee;overflow:hidden;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item .kt-blocks-post-grid-item-inner{padding-top:15px;padding-right:25px;padding-bottom:25px;padding-left:25px;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item header{padding-top:0px;padding-right:0px;padding-bottom:10px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item .entry-title{padding-top:10px;padding-right:0px;padding-bottom:5px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:24px;line-height:30px;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item .kt-blocks-post-top-meta{color:#777777;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item .kt-blocks-post-top-meta a{color:#777777;}.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item .kt-blocks-post-top-meta a:hover{color:#444444;}.kt-post-loop8952_902650-2f .entry-content{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-post-loop8952_902650-2f .kt-blocks-post-footer{color:#777777;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:12px;line-height:20px;}.kt-post-loop8952_902650-2f .entry-content:after{height:0px;}.kt-post-loop8952_902650-2f .kt-blocks-post-footer a{color:#777777;}.kt-post-loop8952_902650-2f .kt-blocks-post-footer a:hover{color:#444444;}.kt-post-loop8952_902650-2f .kb-filter-item{border-top-width:0px;border-right-width:0px;border-bottom-width:2px;border-left-width:0px;padding-top:5px;padding-right:8px;padding-bottom:5px;padding-left:8px;margin-top:0px;margin-right:10px;margin-bottom:0px;margin-left:0px;}@media all and (max-width: 1024px){.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item{border-top:1px solid #eeeeee;border-right:1px solid #eeeeee;border-bottom:1px solid #eeeeee;border-left:1px solid #eeeeee;}}@media all and (max-width: 767px){.kt-post-loop8952_902650-2f .kt-blocks-post-grid-item{border-top:1px solid #eeeeee;border-right:1px solid #eeeeee;border-bottom:1px solid #eeeeee;border-left:1px solid #eeeeee;}}<\/style><div class=\"wp-block-kadence-postgrid kt-blocks-post-loop-block alignnone kt-post-loop8952_902650-2f kt-post-grid-layout-grid\"><div class=\"kt-post-grid-layout-grid-wrap kt-post-grid-wrap\" data-columns-xxl=\"2\" data-columns-xl=\"2\" data-columns-md=\"2\" data-columns-sm=\"2\" data-columns-xs=\"1\" data-columns-ss=\"1\"data-item-selector=\".kt-post-masonry-item\" aria-label=\"Carrusel de puestos\"><article class=\"kt-blocks-post-grid-item post-9247 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-visuals topic-scams-and-fraud-awareness resource-initiative-knowledgeweb resource-initiative-knowledgewise\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-66-67\" style=\"padding-bottom:66.67%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/knowledgeflow.org\/es\/resource\/scam-red-flags\/\" aria-label=\"Banderas rojas de la estafa: Los signos distintivos de una estafa en l\u00ednea\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals-1024x256.png\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Visuals.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" title=\"\"><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/es\/resource\/scam-red-flags\/\">Banderas rojas de la estafa: Los signos distintivos de una estafa en l\u00ednea<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">Banderas rojas de estafa: 4 sencillos pasos Presentamos \"Scam Red Flags: Los signos distintivos de una estafa en l\u00ednea\", su gu\u00eda definitiva para...<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-9243 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheets resource-type-visuals resource-initiative-knowledgeweb resource-initiative-knowledgewise\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-66-67\" style=\"padding-bottom:66.67%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/knowledgeflow.org\/es\/resource\/password-best-practices\/\" aria-label=\"Buenas pr\u00e1cticas en materia de contrase\u00f1as\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-1024x256.png\" class=\"attachment-large size-large wp-post-image\" alt=\"unas manos escribiendo en un teclado y un icono de portapapeles\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" title=\"\"><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/es\/resource\/password-best-practices\/\">Buenas pr\u00e1cticas en materia de contrase\u00f1as<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">Lista de comprobaci\u00f3n de las mejores pr\u00e1cticas de contrase\u00f1as Presentamos la lista de comprobaci\u00f3n de las mejores pr\u00e1cticas de contrase\u00f1as. Esta gu\u00eda visual mantendr\u00e1 sus contrase\u00f1as seguras en...<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><article class=\"kt-blocks-post-grid-item post-4217 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-tip-sheets topic-online-privacy-and-security topic-scams-and-fraud-awareness resource-initiative-knowledgeweb resource-initiative-knowledgewise\"><div class=\"kt-blocks-post-grid-item-inner-wrap kt-feat-image-align-top kt-feat-image-mobile-align-top\"><div class=\"kadence-post-image\"><div class=\"kadence-post-image-intrisic kt-image-ratio-66-67\" style=\"padding-bottom:66.67%;\"><div class=\"kadence-post-image-inner-intrisic\"><a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" href=\"https:\/\/knowledgeflow.org\/es\/resource\/what-to-do-after-a-privacy-breach\/\" aria-label=\"Qu\u00e9 hacer tras una violaci\u00f3n de la privacidad: Si han pirateado su informaci\u00f3n o su cuenta\" class=\"kadence-post-image-inner-wrap\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-1024x256.png\" class=\"attachment-large size-large wp-post-image\" alt=\"unas manos escribiendo en un teclado y un icono de portapapeles\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Tip-Sheet.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" title=\"\"><\/a><\/div><\/div><\/div><div class=\"kt-blocks-post-grid-item-inner\"><header><h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/es\/resource\/what-to-do-after-a-privacy-breach\/\">Qu\u00e9 hacer tras una violaci\u00f3n de la privacidad: Si han pirateado su informaci\u00f3n o su cuenta<\/a><\/h2><div class=\"kt-blocks-post-top-meta\"><\/div><\/header><div class=\"entry-content\">Qu\u00e9 hacer tras una violaci\u00f3n de la privacidad: Si han pirateado su informaci\u00f3n o su cuenta Descubra los pasos cruciales para...<\/div><footer class=\"kt-blocks-post-footer\"><div class=\"kt-blocks-post-footer-left\"><\/div><div class=\"kt-blocks-post-footer-right\"><\/div><\/footer><\/div><\/div><\/article><\/div><\/div><!-- .wp-block-kadence-postgrid -->\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Proteja su dispositivo Presentaci\u00f3n\" width=\"720\" height=\"405\" src=\"https:\/\/www.youtube.com\/embed\/M58WA1TDoPE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Proteja su informaci\u00f3n\" width=\"720\" height=\"405\" src=\"https:\/\/www.youtube.com\/embed\/Qaz-SwqdImI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-8952","page","type-page","status-publish","hentry"],"acf":[],"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/es\/author\/knowledgefloweditor\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/pages\/8952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/comments?post=8952"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/pages\/8952\/revisions"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=8952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}