
{"id":1015,"date":"2021-06-30T17:13:50","date_gmt":"2021-06-30T16:13:50","guid":{"rendered":"https:\/\/collective-protection.info\/?p=1015"},"modified":"2021-06-30T17:13:51","modified_gmt":"2021-06-30T16:13:51","slug":"security-in-a-box-herramientas-y-tacticas-de-seguridad-digital","status":"publish","type":"post","link":"https:\/\/collective-protection.info\/es\/security-in-a-box-herramientas-y-tacticas-de-seguridad-digital\/","title":{"rendered":"Security in a Box: Herramientas y T\u00e1cticas de Seguridad Digital"},"content":{"rendered":"<p>[vc_row full_height=\u00bbyes\u00bb columns_placement=\u00bbstretch\u00bb][vc_column width=\u00bb1\/4&#8243; css=\u00bb.vc_custom_1616602966813{border-right-width: 1px !important;padding-top: 12px !important;border-right-color: #000000 !important;border-right-style: solid !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1619799292015{margin-bottom: 15px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00bb]<\/p>\n<h2>Filtrar resultados<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00bbVolver a recursos\u00bb style=\u00bbclassic\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb link=\u00bburl:https%3A%2F%2Fcollective-protection.info%2Fes%2F\u00bb][\/vc_column][vc_column width=\u00bb3\/4&#8243; css=\u00bb.vc_custom_1616680183879{padding-top: 12px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1619799358166{margin-bottom: 12px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00bb]<\/p>\n<h2>T\u00edtulo del Recurso<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=\u00bb2\/3&#8243; offset=\u00bbvc_col-lg-8 vc_col-md-12 vc_col-xs-12&#8243;][vc_column_text css=\u00bb.vc_custom_1625069606818{margin-bottom: 25px !important;}\u00bb]Organizaci\u00f3n: <strong>Front Line Defenders; Tactical Technology Collective<\/strong><\/p>\n<p>Pa\u00eds\/Regi\u00f3n: <strong>Internacional<\/strong><\/p>\n<p>Tipo: <strong>Herramienta Digital\u00a0<\/strong><\/p>\n<p>Security in-a-Box (Seguridad en una caja) es una gu\u00eda de seguridad digital para activistas y defensores de derechos humanos alrededor del mundo.<\/p>\n<p>Si eres nuevo en la seguridad digital, las\u00a0Gu\u00edas T\u00e1cticas\u00a0abarcan los principios b\u00e1sicos, e incluyen recomendaciones sobre c\u00f3mo usar plataformas de redes sociales y tel\u00e9fonos m\u00f3viles de manera m\u00e1s segura. Las\u00a0Gu\u00edas de Herramientas\u00a0brindan instrucciones paso a paso para ayudarte a instalar y usar el software y los servicios m\u00e1s esenciales de seguridad digital.<\/p>\n<p>Las\u00a0Gu\u00edas Comunitarias\u00a0se enfocan en grupos espec\u00edficos de personas \u2014 a veces en regiones espec\u00edficas \u2014 que enfrentan graves amenazas digitales. Incluyen recomendaciones individualizadas sobre herramientas y t\u00e1cticas pertinentes para las necesidades de estos grupos particulares.<\/p>\n<p>Security in-a-Box ha sido elaborado de manera conjunta por\u00a0Front Line Defenders\u00a0y\u00a0Tactical Technology Collective, junto con una red global de activistas, instructores y expertos en seguridad digital.<\/p>\n<p>[\/vc_column_text][vc_column_text css=\u00bb.vc_custom_1625069506904{margin-bottom: 0px !important;border-top-width: 1px !important;padding-top: 8px !important;padding-bottom: 30px !important;border-top-color: #000000 !important;border-top-style: solid !important;}\u00bb]<\/p>\n<h5>Organizaci\u00f3n: <strong>Tactical Technology Collective; Frontline Defenders<\/strong><\/h5>\n<h5>A\u00f1o: <strong>N\/A<\/strong><\/h5>\n<h5>Idioma(s): <strong>Ingl\u00e9s, espa\u00f1ol, franc\u00e9s, portugu\u00e9s, \u00e1rabe, chino, ruso, vietnamita, tailand\u00e9s, bahasa indonesia<\/strong><\/h5>\n<h5>Pa\u00eds\/Regi\u00f3n: <strong>Internacional<\/strong><\/h5>\n<h5>\u00c1rea: <strong>Seguridad Digital; Investigaci\u00f3n, campa\u00f1as e incidencia<\/strong><\/h5>\n<h5>Tipo:<strong> Herramienta Digital<\/strong><\/h5>\n<h5>Rating: <strong>9,5<\/strong><\/h5>\n<p>[\/vc_column_text][vc_btn title=\u00bbEnlace al recurso\u00bb style=\u00bbclassic\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb link=\u00bburl:https%3A%2F%2Fsecurityinabox.org%2Fes%2F|target:_blank\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243; offset=\u00bbvc_hidden-md vc_hidden-sm vc_hidden-xs\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_height=\u00bbyes\u00bb columns_placement=\u00bbstretch\u00bb][vc_column width=\u00bb1\/4&#8243; css=\u00bb.vc_custom_1616602966813{border-right-width: 1px !important;padding-top: 12px !important;border-right-color: #000000 !important;border-right-style: solid !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1619799292015{margin-bottom: 15px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00bb] Filtrar resultados [\/vc_column_text][vc_btn title=\u00bbVolver a recursos\u00bb style=\u00bbclassic\u00bb shape=\u00bbsquare\u00bb color=\u00bbwhite\u00bb link=\u00bburl:https%3A%2F%2Fcollective-protection.info%2Fes%2F\u00bb][\/vc_column][vc_column width=\u00bb3\/4&#8243; css=\u00bb.vc_custom_1616680183879{padding-top: 12px !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1619799358166{margin-bottom: 12px !important;border-bottom-width: 1px !important;padding-bottom: 12px !important;border-bottom-color: #000000 !important;border-bottom-style: solid !important;}\u00bb] T\u00edtulo del Recurso [\/vc_column_text][vc_row_inner][vc_column_inner width=\u00bb2\/3&#8243; offset=\u00bbvc_col-lg-8&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[5],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/posts\/1015"}],"collection":[{"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/comments?post=1015"}],"version-history":[{"count":2,"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/posts\/1015\/revisions"}],"predecessor-version":[{"id":1017,"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/posts\/1015\/revisions\/1017"}],"wp:attachment":[{"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/media?parent=1015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/categories?post=1015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/collective-protection.info\/es\/wp-json\/wp\/v2\/tags?post=1015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}