{"id":12099,"date":"2020-11-25T10:00:00","date_gmt":"2020-11-25T10:00:00","guid":{"rendered":"https:\/\/thecloud.group\/?p=12099"},"modified":"2020-12-10T16:20:37","modified_gmt":"2020-12-10T16:20:37","slug":"software-uso-ilegal-impacto-en-la-ciberseguridad","status":"publish","type":"post","link":"https:\/\/thecloud.group\/en\/illegal-use-of-software-impact-on-cybersecurity\/","title":{"rendered":"Software: Illegal use in companies and its impact on cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"12099\" class=\"elementor elementor-12099\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68a330f4 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68a330f4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70f54de6\" data-id=\"70f54de6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-636f298c elementor-widget elementor-widget-image\" data-id=\"636f298c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/elementor\/thumbs\/LogoHor-osf66wqrs0q6z5scsi4c0cpaz4hmv3cdo16ybda1og.png\" title=\"The Cloud Group Logo Image\" alt=\"The Cloud Group is a business holding company focused on global digital transformation.\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5d59adb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d59adb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-214baab8\" data-id=\"214baab8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-19b26ccc\" data-id=\"19b26ccc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3eb757 elementor-widget elementor-widget-heading\" data-id=\"a3eb757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Software: Illegal use in companies and its impact on cybersecurity<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5658f684\" data-id=\"5658f684\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2aee975d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2aee975d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2ad3f93b\" data-id=\"2ad3f93b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-32e4bfc4\" data-id=\"32e4bfc4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-415caee8\" data-id=\"415caee8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-490f735a\" data-id=\"490f735a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e1b6a17 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e1b6a17\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-792a9764\" data-id=\"792a9764\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5755d6b1 elementor-widget elementor-widget-text-editor\" data-id=\"5755d6b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Businesses are always at constant risk of being attacked by malware, phishing, spam, ransomware, and outright attacks. All these are related to cybersecurity, from which they have to be protected efficiently and one of the great economic reasons. According to some experts, in 2015 cyber attacks cost companies more than $400 billion dollars, 36% more than the previous year. The website specialized in the subject <a href=\"https:\/\/globbsecurity.com\/software-ilegal\">Globb Security<\/a> explains that these figures are equivalent to one malware attack every seven minutes. Additionally, cybersecurity attacks also damage the reputation of companies in front of their customers. It affects confidence and a lot of money can be lost.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5f34f356 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f34f356\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-55962d\" data-id=\"55962d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28eb56c1 elementor-widget elementor-widget-heading\" data-id=\"28eb56c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What to do to prevent malware attacks?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-625ca0cd elementor-widget elementor-widget-text-editor\" data-id=\"625ca0cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are many actions that can be taken to prevent unwanted attacks through the web. For example, you can and should install security software, such as antivirus, and train employees. Another action is also to make use of legal software.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57f4a606 elementor-widget elementor-widget-text-editor\" data-id=\"57f4a606\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Users today highly value that a company is cybersecure. That is why you should consider taking the minimum necessary actions in yours if you want to prevent problems and losses of money related to online security. In addition to security in the organization&#039;s networks and systems so that there are no vulnerabilities, they must dispense with the use of illegal or pirated software.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2a9413d9\" data-id=\"2a9413d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61fed0c8 elementor-widget elementor-widget-image\" data-id=\"61fed0c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\" class=\"elementor-animation-hang attachment-large size-large wp-image-12103\" alt=\"Software and its illegal use\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg 950w, https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software-300x200.jpg 300w, https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-c257afc elementor-widget elementor-widget-text-editor\" data-id=\"c257afc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Illegal or pirated software can create vulnerabilities in the computers where they are installed and cause serious problems throughout the organization. Unfortunately, it is also a practice spread throughout the world to avoid paying the high sums of money that some programs cost.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfce979 elementor-widget elementor-widget-text-editor\" data-id=\"4dfce979\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Globb Security argues that among the consequences of using illegal software is the possible loss of money. \u201cAn increase in the use of legal software has a direct impact on the cybersecurity of companies. Something to keep in mind, since the cost of a successful cyberattack in an organization represents an average cost of 11 million dollars for companies \u201d, they say in an article published on their blog.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cdd8183 elementor-widget elementor-widget-heading\" data-id=\"3cdd8183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Other disadvantages of using illegal software<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-779a5095 elementor-widget elementor-widget-text-editor\" data-id=\"779a5095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to running the risk of malware infection, after installing illegal software you run the risk of presenting problems that you will not be able to solve since you do not have the technical support of the program&#039;s developers. Official licenses generally protect against failure, and if the software is pirated, you obviously won&#039;t have this help.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d696243 elementor-widget elementor-widget-text-editor\" data-id=\"d696243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another disadvantage is being fined by law. Many countries use copyright laws to protect software developers. In the event that your company is found to be using pirated software, it can lead to very high fines as violating copyright is considered a crime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-21d45dea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21d45dea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8c336e\" data-id=\"f8c336e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d696243 elementor-widget elementor-widget-text-editor\" data-id=\"d696243\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another disadvantage is being fined by law. Many countries use copyright laws to protect software developers. In the event that your company is found to be using pirated software, it can lead to very high fines as violating copyright is considered a crime.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19d3cf29 elementor-widget elementor-widget-text-editor\" data-id=\"19d3cf29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is important for companies to ensure that illegal software is not installed on company employees&#039; computers. As we have already mentioned, there can be very high fines, but depending on the country&#039;s legislation, it may be ordered to suspend activities, close the premises, prison and even dissolve the company.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4913cdef elementor-widget elementor-widget-text-editor\" data-id=\"4913cdef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Is it worth the risk? The fines imposed are sometimes up to four times what it would cost to pay for the legal license of the computer program.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d92998 elementor-widget elementor-widget-heading\" data-id=\"8d92998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Create awareness<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d707b7 elementor-widget elementor-widget-text-editor\" data-id=\"7d707b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An important action that companies can take to prevent their employees from installing illegal software on computers is to run internal awareness campaigns. They may not be aware of the possible legal consequences that the use of pirated software can have and what it can mean for them: forced closure and loss of jobs, for example.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6ef827b1\" data-id=\"6ef827b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d302ca3 elementor-widget elementor-widget-image\" data-id=\"6d302ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"757\" height=\"951\" src=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/softwareIlegal.jpg\" class=\"elementor-animation-hang attachment-large size-large wp-image-12116\" alt=\"The use of illegal software in companies\" srcset=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/softwareIlegal.jpg 757w, https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/softwareIlegal-239x300.jpg 239w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-14648e3b elementor-widget elementor-widget-text-editor\" data-id=\"14648e3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We invite you to read more about related topics at <a href=\"https:\/\/thecloud.group\/en\/blog\/\">our blog<\/a> And if you require advice for software development, digital marketing, social networks and more, \u00a1<a href=\"https:\/\/thecloud.group\/en\/contact\/\">you can contact us<\/a>!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41ee7eba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41ee7eba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2342ef3e\" data-id=\"2342ef3e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Businesses are always at constant risk of being attacked by malware, phishing, spam, ransomware, and outright attacks. All of these are related to cybersecurity, from which they have to be efficiently protected and one of the great economic reasons. According to some experts, in 2015 cyberattacks cost companies more than $400 billion dollars, 36% more than the previous year. The specialized website Globb Security explains that these figures are equivalent to one malware attack every seven minutes. Additionally, cybersecurity attacks also damage the reputation of companies with their customers. Confidence is affected and a lot of money can be lost.<\/p>","protected":false},"author":1,"featured_media":12103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[162],"tags":[],"class_list":["post-12099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categorizar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecloud.group\/en\/illegal-use-of-software-impact-on-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group\" \/>\n<meta property=\"og:description\" content=\"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos. Todos estos est\u00e1n relacionados con la ciberseguridad, de la cual se tienen que proteger eficientemente y una de las grandes razones econ\u00f3mica. Seg\u00fan algunos expertos, en 2015 los ataques cibern\u00e9ticos costaron a las empresas m\u00e1s de $400 mil millones de d\u00f3lares, 36% m\u00e1s que el a\u00f1o anterior. El sitio web especializado en el tema Globb Security explica que estas cifras equivalen a un ataque de malware cada siete minutos. Adicionalmente, los ataques a la ciberseguridad tambi\u00e9n da\u00f1an la reputaci\u00f3n de las empresas frente a sus clientes. Afecta la confianza y se puede perder mucho dinero.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecloud.group\/en\/illegal-use-of-software-impact-on-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Cloud Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thecloudgroupglobal\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-25T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-10T16:20:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"633\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3\"},\"headline\":\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad\",\"datePublished\":\"2020-11-25T10:00:00+00:00\",\"dateModified\":\"2020-12-10T16:20:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\/\/thecloud.group\/#organization\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"articleSection\":[\"Sin categorizar\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\",\"url\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\",\"name\":\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group\",\"isPartOf\":{\"@id\":\"https:\/\/thecloud.group\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"datePublished\":\"2020-11-25T10:00:00+00:00\",\"dateModified\":\"2020-12-10T16:20:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage\",\"url\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"contentUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg\",\"width\":950,\"height\":633,\"caption\":\"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thecloud.group\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software: Uso ilegal en empresas y su impacto en la ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thecloud.group\/#website\",\"url\":\"https:\/\/thecloud.group\/\",\"name\":\"The Cloud Group\",\"description\":\"|\u00a0Holding Internacional de Servicios\",\"publisher\":{\"@id\":\"https:\/\/thecloud.group\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thecloud.group\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thecloud.group\/#organization\",\"name\":\"The Cloud Group - Holding International de Servicios\",\"url\":\"https:\/\/thecloud.group\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png\",\"contentUrl\":\"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png\",\"width\":300,\"height\":190,\"caption\":\"The Cloud Group - Holding International de Servicios\"},\"image\":{\"@id\":\"https:\/\/thecloud.group\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/thecloudgroupglobal\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thecloud.group\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/thecloud.group\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software: Illegal Use in Companies and Its Impact on Cybersecurity | The Cloud Group","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecloud.group\/en\/illegal-use-of-software-impact-on-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad | The Cloud Group","og_description":"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos. Todos estos est\u00e1n relacionados con la ciberseguridad, de la cual se tienen que proteger eficientemente y una de las grandes razones econ\u00f3mica. Seg\u00fan algunos expertos, en 2015 los ataques cibern\u00e9ticos costaron a las empresas m\u00e1s de $400 mil millones de d\u00f3lares, 36% m\u00e1s que el a\u00f1o anterior. El sitio web especializado en el tema Globb Security explica que estas cifras equivalen a un ataque de malware cada siete minutos. Adicionalmente, los ataques a la ciberseguridad tambi\u00e9n da\u00f1an la reputaci\u00f3n de las empresas frente a sus clientes. Afecta la confianza y se puede perder mucho dinero.","og_url":"https:\/\/thecloud.group\/en\/illegal-use-of-software-impact-on-cybersecurity\/","og_site_name":"The Cloud Group","article_publisher":"https:\/\/www.facebook.com\/thecloudgroupglobal","article_published_time":"2020-11-25T10:00:00+00:00","article_modified_time":"2020-12-10T16:20:37+00:00","og_image":[{"width":950,"height":633,"url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#article","isPartOf":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/"},"author":{"name":"admin","@id":"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3"},"headline":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad","datePublished":"2020-11-25T10:00:00+00:00","dateModified":"2020-12-10T16:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/"},"wordCount":755,"publisher":{"@id":"https:\/\/thecloud.group\/#organization"},"image":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","articleSection":["Sin categorizar"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","url":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/","name":"Software: Illegal Use in Companies and Its Impact on Cybersecurity | The Cloud Group","isPartOf":{"@id":"https:\/\/thecloud.group\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage"},"image":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","datePublished":"2020-11-25T10:00:00+00:00","dateModified":"2020-12-10T16:20:37+00:00","breadcrumb":{"@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#primaryimage","url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","contentUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/11\/software.jpg","width":950,"height":633,"caption":"Las empresas siempre est\u00e1n en constante riesgo de ser atacadas por alg\u00fan malware, phishing, spam, ransomware y ataques directos."},{"@type":"BreadcrumbList","@id":"https:\/\/thecloud.group\/software-uso-ilegal-impacto-en-la-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecloud.group\/"},{"@type":"ListItem","position":2,"name":"Software: Uso ilegal en empresas y su impacto en la ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/thecloud.group\/#website","url":"https:\/\/thecloud.group\/","name":"The Cloud Group","description":"| International Services Holding","publisher":{"@id":"https:\/\/thecloud.group\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecloud.group\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/thecloud.group\/#organization","name":"The Cloud Group - International Services Holding","url":"https:\/\/thecloud.group\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecloud.group\/#\/schema\/logo\/image\/","url":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png","contentUrl":"https:\/\/thecloud.group\/wp-content\/uploads\/2020\/05\/logoSmallFirmaCorreo.png","width":300,"height":190,"caption":"The Cloud Group - Holding International de Servicios"},"image":{"@id":"https:\/\/thecloud.group\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/thecloudgroupglobal"]},{"@type":"Person","@id":"https:\/\/thecloud.group\/#\/schema\/person\/96af9c910256c8762bee808ba76fc3b3","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecloud.group\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4907ac288f1c97f319a5c5097e9024eb489ee94179b3b92b6fa7716b303cdc86?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/thecloud.group"]}]}},"_links":{"self":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts\/12099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/comments?post=12099"}],"version-history":[{"count":12,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts\/12099\/revisions"}],"predecessor-version":[{"id":13214,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/posts\/12099\/revisions\/13214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/media\/12103"}],"wp:attachment":[{"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/media?parent=12099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/categories?post=12099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloud.group\/en\/wp-json\/wp\/v2\/tags?post=12099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}