{"id":49812,"date":"2025-07-07T13:38:24","date_gmt":"2025-07-07T13:38:24","guid":{"rendered":"https:\/\/www.cyberguru.it\/phishpro\/"},"modified":"2025-09-01T14:50:23","modified_gmt":"2025-09-01T14:50:23","slug":"phishpro","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/phishpro\/","title":{"rendered":"PhishPro"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb bottom_divider_color=\u00bb#0C71C3&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb24vh||10vh|10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>PhishPro<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb global_colors_info=\u00bb{}\u00bb]Training Platform \/ <span style=\"color: #f18a00;\">PhishPro<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbtop_center\u00bb min_height=\u00bb609.5px\u00bb custom_margin=\u00bb||-62px|0px|false|false\u00bb custom_padding=\u00bb||17px|0px|false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb min_height=\u00bb556.4px\u00bb custom_padding=\u00bb|10%||10%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin_tablet=\u00bb30px||||false|false\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2 style=\"text-align: left;\">Formaci\u00f3n avanzada en phishing<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px|0px|20px||false|false\u00bb custom_padding=\u00bb|0px|||false|false\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\">En el nuevo escenario de las amenazas cibern\u00e9ticas, el phishing sigue siendo uno de los vectores de ataque m\u00e1s extendidos e insidiosos. Las t\u00e9cnicas evolucionan r\u00e1pidamente, volvi\u00e9ndose cada vez m\u00e1s sofisticadas y convincentes, y se difunden a trav\u00e9s de canales siempre diferentes, como v\u00eddeos deepfake, c\u00f3digos QR y dispositivos USB.  <\/span><span style=\"color: #000000;\">Cyber Guru <strong><em>PhishPro<\/em> es la extensi\u00f3n avanzada del programa Cyber Guru Phishing<\/strong>, dise\u00f1ada para ofrecer un entrenamiento a\u00fan m\u00e1s realista, inmersivo e integrado en la cotidianidad digital de los usuarios. <\/span><\/p>\n<p><span style=\"color: #000000;\">El complemento PhishPro ampl\u00eda las simulaciones incluyendo ejercicios con <strong>ataques de v\u00eddeo\/deepfake, memorias USB y c\u00f3digos QR.<\/strong><\/span><span style=\"color: #000000;\">La formaci\u00f3n anti-phishing aprovecha la funcionalidad del <strong>Adaptive Learning Remediation<\/strong>, para garantizar un recorrido dirigido y contextual necesario para reforzar las competencias reales y mejorar la preparaci\u00f3n operativa de cada usuario.<\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter||||||||\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb][\/et_pb_blurb][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter||||||||\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb]<\/p>\n<p style=\"text-align: left;\"><strong><span style=\"color: #000000;\">Muchas ventajas en un \u00fanico complemento:<\/span><\/strong><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]Simulaciones realistas a trav\u00e9s de m\u00faltiples canales[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]Formaci\u00f3n continua, adaptativa y personalizada[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Entrenamiento contextual y medible, alineado con las amenazas actuales<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]Reducci\u00f3n medible del riesgo humano[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Integraci\u00f3n sencilla con el programa Phishing Training<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb|-34px||||\u00bb custom_padding=\u00bb|||0px||\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbSezione\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_stops=\u00bb#010512 0%|#071036 100%\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2 style=\"text-align: center;\"><strong><span style=\"color: #ffffff;\">Simulaciones avanzadas de ataques reales<\/span><\/strong><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbtop_center\u00bb min_height=\u00bb609.5px\u00bb custom_margin=\u00bb||-62px|0px|false|false\u00bb custom_padding=\u00bb||17px|0px|false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb min_height=\u00bb715px\u00bb custom_margin=\u00bb21px|auto||auto||\u00bb custom_padding=\u00bb0px|||10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|8%|||false|false\u00bb custom_padding_tablet=\u00bb|8%|||false|false\u00bb custom_padding_phone=\u00bb|2%||2%|false|true\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb width=\u00bb87.6%\u00bb width_tablet=\u00bb80%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_margin_tablet=\u00bb||25px||false|false\u00bb custom_margin_phone=\u00bb||25px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bbleft\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: left;\">Simulaci\u00f3n de ataque de v\u00eddeo (Deepfake)<\/h2>\n<p data-start=\"236\" data-end=\"290\">Entrenamiento avanzado contra ataques de v\u00eddeo y deepfake<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb custom_css_main_element=\u00bbfont-weight:400;\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb]<\/p>\n<p><span style=\"color: #000000;\">Permite simular emails con contenidos de v\u00eddeo falsos que muestran personas aparentemente autorizadas o conocidas, reproduciendo un ataque de v\u00eddeo. El objetivo es entrenar a los usuarios para reconocer las manipulaciones emocionales y las t\u00e9cnicas de ingenier\u00eda social cada vez m\u00e1s sofisticadas. <\/span><span style=\"color: #000000;\">Gracias al uso de plantillas espec\u00edficas, el complemento reproduce escenarios en los que se aprovechan el sentido de urgencia y la familiaridad con el interlocutor para inducir al destinatario a realizar acciones impulsivas o compartir informaci\u00f3n sensible.<\/span><\/p>\n<p><span style=\"color: #000000;\">PhishPro mejora la formaci\u00f3n permitiendo a los administradores o a las personas responsables de gestionar la herramienta:<\/span><span style=\"color: #000000;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||12px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<strong>Acceder a guiones de ejemplo para la creaci\u00f3n de v\u00eddeos deepfake simulados<\/strong>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||12px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<strong>Utilizar plantillas de correo espec\u00edficas para estos escenarios<\/strong>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||12px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<strong>Supervisar los resultados mediante informes detallados y paneles de control dedicados, obteniendo datos medibles sobre el impacto de la formaci\u00f3n<\/strong>[\/et_pb_blurb][dipl_button _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/dipl_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttp:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/Deepfake_Video_Attack_Mockup_ES.webp\u00bb alt=\u00bbDeepfake_Video_Attack_Mockup\u00bb title_text=\u00bbDeepfake_Video_Attack_Mockup_ES\u00bb align=\u00bbcenter\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_padding=\u00bb46px||100px||false|true\u00bb custom_padding_tablet=\u00bb|5%||5%|false|true\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttp:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/USB_Attack_ES-scaled.webp\u00bb alt=\u00bbUSB_Attack_IT\u00bb title_text=\u00bbUSB_Attack_ES\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|8%|||false|false\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb width=\u00bb87.6%\u00bb width_tablet=\u00bb80%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_margin_tablet=\u00bb||25px||false|false\u00bb custom_margin_phone=\u00bb||25px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bbleft\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2 style=\"text-align: left;\">Simulaci\u00f3n de ataque por dispositivo USB<\/h2>\n<p data-start=\"236\" data-end=\"290\">Entrenamiento avanzado con simulaci\u00f3n de ataques USB<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p><span style=\"color: #000000;\">Simula un ataque cl\u00e1sico mediante USB, uno de los canales m\u00e1s enga\u00f1osos para propagar malware y comprometer redes corporativas. Estos dispositivos, aparentemente inofensivos, pueden servir para extraer datos confidenciales o instalar c\u00f3digo malicioso, especialmente cuando se conectan sin la verificaci\u00f3n adecuada. <\/span><\/p>\n<p><span style=\"color: #000000;\">El objetivo es concienciar a los empleados sobre los riesgos asociados al uso de dispositivos externos y reforzar el cumplimiento de las pol\u00edticas corporativas de uso. Con la extensi\u00f3n para ataques USB, los administradores pueden:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||12px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<strong>Crear una memoria USB que contenga un archivo Word simulado con una macro maliciosa<\/strong>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||26px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<strong>Registrar cada apertura del archivo a trav\u00e9s del Remediation Dashboard<\/strong>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<strong>Supervisar cu\u00e1ntos usuarios conectaron la memoria USB y cu\u00e1ntos activaron la macro<\/strong>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f1f1f1&#8243; width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb module_alignment=\u00bbcenter\u00bb min_height=\u00bb715px\u00bb custom_margin=\u00bb21px|auto||auto||\u00bb custom_padding=\u00bb0px|||10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|8%|||false|false\u00bb custom_padding_tablet=\u00bb|8%|||false|false\u00bb custom_padding_phone=\u00bb|2%||2%|false|true\u00bb custom_padding_last_edited=\u00bbon|phone\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb width=\u00bb87.6%\u00bb width_tablet=\u00bb80%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb20px||25px||false|false\u00bb custom_margin_tablet=\u00bb||25px||false|false\u00bb custom_margin_phone=\u00bb||25px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb hover_enabled=\u00bb0&#8243; header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bbleft\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2 style=\"text-align: left;\">Simulaci\u00f3n de ataque mediante c\u00f3digo QR<\/h2>\n<p data-start=\"236\" data-end=\"290\">C\u00f3digos QR y phishing: formaci\u00f3n dirigida<\/p>\n<p>[\/et_pb_text][dipl_button _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/dipl_button][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p><span style=\"color: #000000;\">Esta simulaci\u00f3n ampl\u00eda la formaci\u00f3n antiphishing para incluir los riesgos de los c\u00f3digos QR maliciosos, entrenando a los empleados para reconocer amenazas ocultas tras estos s\u00edmbolos tan habituales. Los c\u00f3digos QR, percibidos habitualmente como inofensivos y usados de forma cotidiana, pueden redirigir a sitios web fraudulentos, iniciar descargas no deseadas o comprometer dispositivos m\u00f3viles.<\/span><\/p>\n<p><span style=\"color: #000000;\">Sensibilizar sobre su uso seguro es clave para reducir la exposici\u00f3n a amenazas cada vez m\u00e1s sofisticadas. Los administradores pueden generar c\u00f3digos QR \u201cmaliciosos\u201d para utilizarlos de dos formas:<\/span><span style=\"color: #000000;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||12px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p><strong>Formato impreso:<\/strong> Los c\u00f3digos pueden imprimirse y colocarse en zonas estrat\u00e9gicas de la oficina, f\u00e1brica u otros espacios. Una vez escaneados, se pueden registrar las acciones del usuario, como clics en enlaces o env\u00edo de datos.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png\u00bb alt=\u00bbCyberguru favicon\u00bb icon_placement=\u00bbleft\u00bb content_max_width=\u00bb1100px\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb body_font=\u00bbInter||||||||\u00bb body_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=\u00bb16px\u00bb width=\u00bb100%\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||12px|||\u00bb child_filter_saturate=\u00bb94%\u00bb child_filter_brightness=\u00bb200%\u00bb child_filter_invert=\u00bb100%\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<p><strong>Por correo electr\u00f3nico:<\/strong> Los c\u00f3digos QR tambi\u00e9n pueden incluirse en simulaciones de phishing enviadas por email, a\u00f1adiendo una capa m\u00e1s de entrenamiento realista y contextualizado.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttp:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/QR_Code_Attack_ES_Mockup.webp\u00bb alt=\u00bbQR_Code_Attack_IT_Mockup\u00bb title_text=\u00bbQR_Code_Attack_ES_Mockup\u00bb align=\u00bbcenter\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; use_custom_gutter=\u00bbon\u00bb make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_padding=\u00bb46px||100px||false|true\u00bb custom_padding_tablet=\u00bb|5%||5%|false|true\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttp:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/Adaptive-Remediation_ES-scaled.webp\u00bb alt=\u00bbAdaptive Remediation_IT\u00bb title_text=\u00bbAdaptive Remediation_ES\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb|8%|||false|false\u00bb custom_css_main_element=\u00bbmargin:auto;\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb width=\u00bb87.6%\u00bb width_tablet=\u00bb80%\u00bb width_phone=\u00bb\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbleft\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_margin_tablet=\u00bb||25px||false|false\u00bb custom_margin_phone=\u00bb||25px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bbleft\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2>Adaptive Learning Remediation<\/h2>\n<p data-start=\"236\" data-end=\"290\">Aprender de los errores: formaci\u00f3n a medida<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbInter||||||||\u00bb text_font_size=\u00bb16px\u00bb custom_margin=\u00bb10px||20px||false|false\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbfont-weight:400;\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;]<span style=\"color: #000000;\"><strong>Adaptive Learning Remediation<\/strong> ofrece itinerarios de formaci\u00f3n personalizados para aquellos usuarios identificados como m\u00e1s vulnerables a trav\u00e9s de las simulaciones de phishing.<br \/>\nA partir de los datos del <strong>Remediation Dashboard<\/strong>, los administradores pueden asignar contenidos espec\u00edficos en funci\u00f3n de los comportamientos observados, reforzando la concienciaci\u00f3n justo donde m\u00e1s se necesita.<\/span><\/p>\n<p><span style=\"color: #000000;\">El resultado es una experiencia de aprendizaje m\u00e1s relevante, eficaz y adaptada a cada persona.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s\u00bb title_text=\u00bbM\u00e1s\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFila\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuieres saber m\u00e1s?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bbhttps:\/\/www.cyberguru.it\/es\/contacto\/\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONT\u00c1CTANOS\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ5NDk1In19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbHOJA DE DATOS\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb hover_enabled=\u00bb0&#8243; custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITA DEMO\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bb\u00bfQuieres saber\u00bb title_text=\u00bb\u00bfQuieres saber\u00bb align=\u00bbright\u00bb disabled_on=\u00bbon|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PhishProTraining Platform \/ PhishProFormaci\u00f3n avanzada en phishingEn el nuevo escenario de las amenazas cibern\u00e9ticas, el phishing sigue siendo uno de los vectores de ataque m\u00e1s extendidos e insidiosos. Las t\u00e9cnicas evolucionan r\u00e1pidamente, volvi\u00e9ndose cada vez m\u00e1s sofisticadas y convincentes, y se difunden a trav\u00e9s de canales siempre diferentes, como v\u00eddeos deepfake, c\u00f3digos QR y dispositivos [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-49812","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PhishPro: Entrenamiento Anti-Phishing Avanzado - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Descubre PhishPro, el complemento avanzado para la formaci\u00f3n anti-phishing con simulaciones realistas y aprendizaje personalizado.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/phishpro\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhishPro\" \/>\n<meta property=\"og:description\" content=\"Descubre PhishPro, el complemento avanzado para la formaci\u00f3n anti-phishing con simulaciones realistas y aprendizaje personalizado.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/phishpro\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T14:50:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"28 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/phishpro\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/phishpro\\\/\",\"name\":\"PhishPro: Entrenamiento Anti-Phishing Avanzado - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2025-07-07T13:38:24+00:00\",\"dateModified\":\"2025-09-01T14:50:23+00:00\",\"description\":\"Descubre PhishPro, el complemento avanzado para la formaci\u00f3n anti-phishing con simulaciones realistas y aprendizaje personalizado.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/phishpro\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/phishpro\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/phishpro\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PhishPro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhishPro: Entrenamiento Anti-Phishing Avanzado - Cyber Guru","description":"Descubre PhishPro, el complemento avanzado para la formaci\u00f3n anti-phishing con simulaciones realistas y aprendizaje personalizado.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/phishpro\/","og_locale":"es_ES","og_type":"article","og_title":"PhishPro","og_description":"Descubre PhishPro, el complemento avanzado para la formaci\u00f3n anti-phishing con simulaciones realistas y aprendizaje personalizado.","og_url":"https:\/\/www.cyberguru.it\/es\/phishpro\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-09-01T14:50:23+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"28 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/phishpro\/","url":"https:\/\/www.cyberguru.it\/es\/phishpro\/","name":"PhishPro: Entrenamiento Anti-Phishing Avanzado - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2025-07-07T13:38:24+00:00","dateModified":"2025-09-01T14:50:23+00:00","description":"Descubre PhishPro, el complemento avanzado para la formaci\u00f3n anti-phishing con simulaciones realistas y aprendizaje personalizado.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/phishpro\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/phishpro\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/phishpro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"PhishPro"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/49812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=49812"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/49812\/revisions"}],"predecessor-version":[{"id":49994,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/49812\/revisions\/49994"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=49812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}