{"id":11748,"date":"2025-11-20T11:03:56","date_gmt":"2025-11-20T14:03:56","guid":{"rendered":"https:\/\/www.flane.com.pa\/blog\/?p=11748"},"modified":"2025-11-20T11:16:22","modified_gmt":"2025-11-20T14:16:22","slug":"por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables","status":"publish","type":"post","link":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/","title":{"rendered":"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables?"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes - <\/span><\/span><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>En el contexto industrial mexicano, la <strong data-start=\"310\" data-end=\"328\">ciberseguridad<\/strong> no es un lujo: es una necesidad cr\u00edtica. Recientes datos revelan que <strong data-start=\"398\" data-end=\"427\">ocho de cada diez ataques<\/strong> dirigidos a plantas industriales tienen su origen en redes de TI mal protegidas.<\/p>\n<p>Este hallazgo, derivado del Cyber Defense Center de Minsait, pone el foco sobre un problema clave: la convergencia entre redes IT (Tecnolog\u00eda de la Informaci\u00f3n) y OT (Tecnolog\u00eda Operacional) sin una segmentaci\u00f3n adecuada.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 data-start=\"810\" data-end=\"861\">El panorama actual: sectores m\u00e1s vulnerables<\/h3>\n<p data-start=\"863\" data-end=\"1080\">Seg\u00fan el informe, en 2024 un <strong data-start=\"892\" data-end=\"935\">25 % de las organizaciones industriales<\/strong> mexicanas sufri\u00f3 paros en producci\u00f3n debido a intrusiones cibern\u00e9ticas.<\/p>\n<p data-start=\"863\" data-end=\"1080\">Los sectores m\u00e1s impactados son:<\/p>\n<ul data-start=\"1082\" data-end=\"1395\">\n<li data-start=\"1082\" data-end=\"1153\">\n<p data-start=\"1084\" data-end=\"1153\">Energ\u00eda: 34 % de los ataques.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<li data-start=\"1154\" data-end=\"1221\">\n<p data-start=\"1156\" data-end=\"1221\">Agua y saneamiento: 21 %.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<li data-start=\"1222\" data-end=\"1282\">\n<p data-start=\"1224\" data-end=\"1282\">Manufactura: 19 %.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<li data-start=\"1283\" data-end=\"1337\">\n<p data-start=\"1285\" data-end=\"1337\">Salud: 13 %. <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-&#091;15ch&#093; grow truncate overflow-hidden text-center\"><\/span><\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li data-start=\"1283\" data-end=\"1337\">\n<p data-start=\"1285\" data-end=\"1337\"><span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-&#091;15ch&#093; grow truncate overflow-hidden text-center\"><\/span><\/span><\/span><\/span><\/span>Log\u00edstica: 8 %.<\/p>\n<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Los vectores de ataque m\u00e1s comunes incluyen <strong data-start=\"1441\" data-end=\"1484\">phishing dirigido al personal de planta<\/strong>, interfaces industriales sin autenticaci\u00f3n y accesos no autorizados a dispositivos cr\u00edticos como PLCs (Controladores L\u00f3gicos Programables) o RTUs.<\/p>\n<p><span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span>Adem\u00e1s, la cadena de suministro aparece como un punto especialmente vulnerable, pues muchos atacantes aprovechan brechas en proveedores menos preparados.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 data-start=\"1865\" data-end=\"1919\">Hacia una estrategia de resiliencia industrial<\/h3>\n<p data-start=\"1921\" data-end=\"2086\">Frente a esta amenaza, Minsait propone una estrategia centrada en la <strong data-start=\"1990\" data-end=\"2005\">resiliencia<\/strong>, basada en cuatro pilares fundamentales:\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<ol data-start=\"2088\" data-end=\"2803\">\n<li data-start=\"2088\" data-end=\"2254\">\n<p data-start=\"2091\" data-end=\"2254\"><strong data-start=\"2091\" data-end=\"2115\">Alineaci\u00f3n operativa<\/strong>: Integrar la ciberseguridad con los objetivos operacionales para que no interfiera con la producci\u00f3n, sino que garantice su continuidad.<\/p>\n<\/li>\n<li data-start=\"2255\" data-end=\"2414\">\n<p data-start=\"2258\" data-end=\"2414\"><strong data-start=\"2258\" data-end=\"2284\">Visibilidad de riesgos<\/strong>: Consolidar la informaci\u00f3n de activos OT e IT en una plataforma unificada que permita priorizar y responder de forma eficiente.<\/p>\n<\/li>\n<li data-start=\"2415\" data-end=\"2619\">\n<p data-start=\"2418\" data-end=\"2619\"><strong data-start=\"2418\" data-end=\"2451\">Protecci\u00f3n de sistemas legacy<\/strong>: Muchos entornos industriales dependen de sistemas antiguos que no se pueden actualizar f\u00e1cilmente, por lo que se requieren controles compensatorios para blindarlos.<\/p>\n<\/li>\n<li data-start=\"2620\" data-end=\"2803\">\n<p data-start=\"2623\" data-end=\"2803\"><strong data-start=\"2623\" data-end=\"2647\">Gobernanza integrada<\/strong>: Centralizar la gesti\u00f3n de riesgos haciendo que IT y OT trabajen bajo una estrategia com\u00fan, con pol\u00edticas claras y una estructura de gobernanza compartida.<\/p>\n<\/li>\n<\/ol>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Minsait tambi\u00e9n advierte que los SOC (Centros de Operaciones de Seguridad) tradicionales no bastan para proteger entornos OT. Se necesitan capacidades espec\u00edficas para monitorear protocolos industriales, automatizar respuestas y actuar con inteligencia contextual.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 data-start=\"3111\" data-end=\"3180\">Resiliencia: no solo una defensa, sino una ventaja competitiva<\/h3>\n<p data-start=\"3182\" data-end=\"3451\">Adoptar un modelo de ciberseguridad 360\u00b0 para entornos industriales no solo protege: tambi\u00e9n <strong data-start=\"3275\" data-end=\"3291\">genera valor<\/strong>. Seg\u00fan Erik Moreno, director de Minsait Cyber en M\u00e9xico, la resiliencia debe ser parte del ADN operativo de la empresa.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p data-start=\"3453\" data-end=\"3498\">Una estrategia robusta de protecci\u00f3n implica:<\/p>\n<ul data-start=\"3500\" data-end=\"3685\">\n<li data-start=\"3500\" data-end=\"3534\">\n<p data-start=\"3502\" data-end=\"3534\">Segmentaci\u00f3n efectiva de redes<\/p>\n<\/li>\n<li data-start=\"3535\" data-end=\"3574\">\n<p data-start=\"3537\" data-end=\"3574\">Gesti\u00f3n estricta de accesos remotos<\/p>\n<\/li>\n<li data-start=\"3575\" data-end=\"3634\">\n<p data-start=\"3577\" data-end=\"3634\">Protecci\u00f3n especializada para dispositivos industriales<\/p>\n<\/li>\n<li data-start=\"3635\" data-end=\"3685\">\n<p data-start=\"3637\" data-end=\"3685\">Cultura de ciberseguridad en todos los equipos<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3687\" data-end=\"3847\">Este enfoque no solo asegura la continuidad de la operaci\u00f3n, sino que puede transformar la ciberseguridad en un <strong data-start=\"3799\" data-end=\"3826\">habilitador del negocio<\/strong>, no en un costo m\u00e1s.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>El desaf\u00edo de los ciberataques industriales en M\u00e9xico evidencia que no basta con proteger los sistemas de producci\u00f3n. La clave est\u00e1 en reforzar las redes corporativas (IT), cerrar brechas entre IT y OT y adoptar una mentalidad de resiliencia. Las empresas que inviertan en esto no solo evitar\u00e1n p\u00e9rdidas, sino que tambi\u00e9n ganar\u00e1n competitividad.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong data-start=\"4217\" data-end=\"4232\">Referencia:<\/strong><br data-start=\"4232\" data-end=\"4235\" \/>Art\u00edculo original: <a href=\"https:\/\/esemanal.mx\/2025\/08\/el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\"><em data-start=\"4254\" data-end=\"4342\">El 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables<\/em>. eSemanal.<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"En el contexto industrial mexicano, la ciberseguridad no es un lujo: es una necesidad cr\u00edtica. Recientes datos revelan que ocho de cada diez ataques dirigidos a plantas industriales tienen su origen en redes de TI mal protegidas. Este hallazgo, derivado del Cyber Defense Center de Minsait, pone el foco sobre un problema clave: la convergencia...","protected":false},"author":11,"featured_media":11749,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1809,1924,2094],"tags":[469,212,4656,391,138,189,140,56,116,574,22,4660,84,198,4658,58,423,421],"class_list":["post-11748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-fastlane","category-iot","tag-automatizacion","tag-ciberseguridad","tag-ciberseguridad-industrial","tag-cloud-computing","tag-conectividad","tag-datos","tag-digitalizacion","tag-fast-lane","tag-ia","tag-innovacion","tag-it","tag-ot-es","tag-security","tag-seguridad","tag-soc-industrial","tag-tecnologia","tag-trabajo-hibrido","tag-transformacion-digital"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables? - TechTalk powered by Fast Lane LATAM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables? - TechTalk powered by Fast Lane LATAM\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTalk powered by Fast Lane LATAM\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FastLane.br\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-20T14:03:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T14:16:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mayra Toullier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FastLaneBr\" \/>\n<meta name=\"twitter:site\" content=\"@FastLaneBr\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mayra Toullier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\"},\"author\":{\"name\":\"Mayra Toullier\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/9ca04e8669e599937e2b1cb1089c15cf\"},\"headline\":\"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables?\",\"datePublished\":\"2025-11-20T14:03:56+00:00\",\"dateModified\":\"2025-11-20T14:16:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\"},\"wordCount\":666,\"publisher\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png\",\"keywords\":[\"automatizaci\u00f3n\",\"Ciberseguridad\",\"ciberseguridad industrial\",\"cloud computing\",\"Conectividad\",\"Datos\",\"Digitalizaci\u00f3n\",\"Fast Lane\",\"IA\",\"innovaci\u00f3n\",\"IT\",\"OT\",\"Security\",\"Seguridad\",\"SOC industrial\",\"Tecnologia\",\"Trabajo h\u00edbrido\",\"Transformaci\u00f3n digital\"],\"articleSection\":[\"Cyber Security\",\"Fast Lane\",\"IoT\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\",\"name\":\"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables? - TechTalk powered by Fast Lane LATAM\",\"isPartOf\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png\",\"datePublished\":\"2025-11-20T14:03:56+00:00\",\"dateModified\":\"2025-11-20T14:16:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png\",\"contentUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.flane.com.pa\/blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#website\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/\",\"name\":\"TechTalk powered by Fast Lane LATAM\",\"description\":\"Sharing ideas and knowledge on IT training and certification\",\"publisher\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.flane.com.pa\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#organization\",\"name\":\"Fast Lane Brasil\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png\",\"contentUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png\",\"width\":209,\"height\":31,\"caption\":\"Fast Lane Brasil\"},\"image\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/FastLane.br\",\"https:\/\/x.com\/FastLaneBr\",\"https:\/\/www.instagram.com\/fastlane.br\/\",\"https:\/\/www.linkedin.com\/company\/fastlanebr\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/9ca04e8669e599937e2b1cb1089c15cf\",\"name\":\"Mayra Toullier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8ebee7fc1ee72a241cd95e6bead6fa5a0e8ba2630ca552a5b9cfaa1cee2c6bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8ebee7fc1ee72a241cd95e6bead6fa5a0e8ba2630ca552a5b9cfaa1cee2c6bb?s=96&d=mm&r=g\",\"caption\":\"Mayra Toullier\"},\"description\":\"Especialista en Marketing Digital y Administraci\u00f3n con experiencia en la planificaci\u00f3n y ejecuci\u00f3n de estrategias digitales para empresas de diversos sectores. Experta en gesti\u00f3n de redes sociales, an\u00e1lisis de resultados, gesti\u00f3n de eventos y creaci\u00f3n de contenido. Capaz de liderar proyectos que incrementen la interacci\u00f3n y ventas digitales, con una formaci\u00f3n constante y orientada a resultados.\",\"sameAs\":[\"www.linkedin.com\/in\/mayratoullier\"],\"url\":\"https:\/\/www.flane.com.pa\/blog\/author\/mayra-toullier\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables? - TechTalk powered by Fast Lane LATAM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/","og_locale":"pt_BR","og_type":"article","og_title":"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables? - TechTalk powered by Fast Lane LATAM","og_url":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/","og_site_name":"TechTalk powered by Fast Lane LATAM","article_publisher":"https:\/\/www.facebook.com\/FastLane.br","article_published_time":"2025-11-20T14:03:56+00:00","article_modified_time":"2025-11-20T14:16:22+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png","type":"image\/png"}],"author":"Mayra Toullier","twitter_card":"summary_large_image","twitter_creator":"@FastLaneBr","twitter_site":"@FastLaneBr","twitter_misc":{"Escrito por":"Mayra Toullier","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#article","isPartOf":{"@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/"},"author":{"name":"Mayra Toullier","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/9ca04e8669e599937e2b1cb1089c15cf"},"headline":"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables?","datePublished":"2025-11-20T14:03:56+00:00","dateModified":"2025-11-20T14:16:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/"},"wordCount":666,"publisher":{"@id":"https:\/\/www.flane.com.pa\/blog\/#organization"},"image":{"@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage"},"thumbnailUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png","keywords":["automatizaci\u00f3n","Ciberseguridad","ciberseguridad industrial","cloud computing","Conectividad","Datos","Digitalizaci\u00f3n","Fast Lane","IA","innovaci\u00f3n","IT","OT","Security","Seguridad","SOC industrial","Tecnologia","Trabajo h\u00edbrido","Transformaci\u00f3n digital"],"articleSection":["Cyber Security","Fast Lane","IoT"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/","url":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/","name":"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables? - TechTalk powered by Fast Lane LATAM","isPartOf":{"@id":"https:\/\/www.flane.com.pa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage"},"image":{"@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage"},"thumbnailUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png","datePublished":"2025-11-20T14:03:56+00:00","dateModified":"2025-11-20T14:16:22+00:00","breadcrumb":{"@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#primaryimage","url":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png","contentUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/11\/\u00bfPor-que-el-80-de-los-ciberataques-industriales-en-Mexico-se-originan-en-redes-IT-vulnerables.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.flane.com.pa\/blog\/es\/por-que-el-80-de-los-ciberataques-industriales-en-mexico-se-originan-en-redes-it-vulnerables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.flane.com.pa\/blog\/es\/"},{"@type":"ListItem","position":2,"name":"\u00bfPor qu\u00e9 el 80 % de los ciberataques industriales en M\u00e9xico se originan en redes IT vulnerables?"}]},{"@type":"WebSite","@id":"https:\/\/www.flane.com.pa\/blog\/#website","url":"https:\/\/www.flane.com.pa\/blog\/","name":"TechTalk powered by Fast Lane LATAM","description":"Sharing ideas and knowledge on IT training and certification","publisher":{"@id":"https:\/\/www.flane.com.pa\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.flane.com.pa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.flane.com.pa\/blog\/#organization","name":"Fast Lane Brasil","url":"https:\/\/www.flane.com.pa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png","contentUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png","width":209,"height":31,"caption":"Fast Lane Brasil"},"image":{"@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FastLane.br","https:\/\/x.com\/FastLaneBr","https:\/\/www.instagram.com\/fastlane.br\/","https:\/\/www.linkedin.com\/company\/fastlanebr"]},{"@type":"Person","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/9ca04e8669e599937e2b1cb1089c15cf","name":"Mayra Toullier","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8ebee7fc1ee72a241cd95e6bead6fa5a0e8ba2630ca552a5b9cfaa1cee2c6bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8ebee7fc1ee72a241cd95e6bead6fa5a0e8ba2630ca552a5b9cfaa1cee2c6bb?s=96&d=mm&r=g","caption":"Mayra Toullier"},"description":"Especialista en Marketing Digital y Administraci\u00f3n con experiencia en la planificaci\u00f3n y ejecuci\u00f3n de estrategias digitales para empresas de diversos sectores. Experta en gesti\u00f3n de redes sociales, an\u00e1lisis de resultados, gesti\u00f3n de eventos y creaci\u00f3n de contenido. Capaz de liderar proyectos que incrementen la interacci\u00f3n y ventas digitales, con una formaci\u00f3n constante y orientada a resultados.","sameAs":["www.linkedin.com\/in\/mayratoullier"],"url":"https:\/\/www.flane.com.pa\/blog\/author\/mayra-toullier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts\/11748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/comments?post=11748"}],"version-history":[{"count":2,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts\/11748\/revisions"}],"predecessor-version":[{"id":11751,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts\/11748\/revisions\/11751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/media\/11749"}],"wp:attachment":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/media?parent=11748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/categories?post=11748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/tags?post=11748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}