{"id":283018,"date":"2026-03-23T16:04:14","date_gmt":"2026-03-23T19:04:14","guid":{"rendered":"https:\/\/informaticala.udec.cl\/?page_id=283018"},"modified":"2026-03-24T10:14:46","modified_gmt":"2026-03-24T13:14:46","slug":"cipher-la-proteccion-de-tu-cuenta","status":"publish","type":"page","link":"https:\/\/informaticala.udec.cl\/index.php\/cipher-la-proteccion-de-tu-cuenta\/","title":{"rendered":"Cipher &#8211; La protecci\u00f3n de tu cuenta"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;Page Header&#8221; _builder_version=&#8221;4.27.5&#8243; background_image=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/03\/normas-grafi-as.jpg&#8221; parallax=&#8221;on&#8221; animation_direction=&#8221;top&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90aXRsZSIsInNldHRpbmdzIjp7ImJlZm9yZSI6IiIsImFmdGVyIjoiIn19@&#8221; scroll_down_icon_size=&#8221;48px&#8221; admin_label=&#8221;Hero Section&#8221; _builder_version=&#8221;4.27.6&#8243; _dynamic_attributes=&#8221;title&#8221; title_font=&#8221;&#8211;et_global_body_font|600|||||||&#8221; title_font_size=&#8221;36px&#8221; title_line_height=&#8221;1.4em&#8221; content_font_size=&#8221;22px&#8221; content_line_height=&#8221;1.8em&#8221; subhead_font=&#8221;||||&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(44,36,158,0.93) 0%|rgba(73,108,220,0.7) 100%&#8221; background_color_gradient_start=&#8221;rgba(58,52,226,0.93)&#8221; background_color_gradient_end=&#8221;rgba(73,108,220,0.7)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; button_one_text_size=&#8221;16px&#8221; button_one_bg_color=&#8221;#6eba01&#8243; button_one_border_width=&#8221;2px&#8221; button_one_border_color=&#8221;#6eba01&#8243; button_one_border_radius=&#8221;0&#8243; button_one_letter_spacing=&#8221;2&#8243; button_one_font=&#8221;Montserrat|||on|&#8221; button_one_use_icon=&#8221;off&#8221; button_two_text_size=&#8221;16px&#8221; button_two_border_width=&#8221;2px&#8221; button_two_border_color=&#8221;#ffffff&#8221; button_two_border_radius=&#8221;0&#8243; button_two_letter_spacing=&#8221;2&#8243; button_two_font=&#8221;Montserrat|||on|&#8221; button_two_use_icon=&#8221;off&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;0vw||0vw||true|false&#8221; animation_style=&#8221;fade&#8221; button_one_text_color_hover=&#8221;#6eba01&#8243; button_two_text_color_hover=&#8221;#6eba01&#8243; button_one_border_color_hover=&#8221;#ffffff&#8221; button_two_border_color_hover=&#8221;#ffffff&#8221; button_one_border_radius_hover=&#8221;0&#8243; button_two_border_radius_hover=&#8221;0&#8243; button_one_letter_spacing_hover=&#8221;2&#8243; button_two_letter_spacing_hover=&#8221;2&#8243; button_one_bg_color_hover=&#8221;#ffffff&#8221; button_two_bg_color_hover=&#8221;#ffffff&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;on&#8221; button_one_text_color__hover=&#8221;#6eba01&#8243; button_two_text_color__hover_enabled=&#8221;on&#8221; button_two_text_color__hover=&#8221;#6eba01&#8243; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;on&#8221; button_one_border_color__hover=&#8221;#ffffff&#8221; button_two_border_color__hover_enabled=&#8221;on&#8221; button_two_border_color__hover=&#8221;#ffffff&#8221; button_one_border_radius__hover_enabled=&#8221;on&#8221; button_one_border_radius__hover=&#8221;0&#8243; button_two_border_radius__hover_enabled=&#8221;on&#8221; button_two_border_radius__hover=&#8221;0&#8243; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;2&#8243; button_two_letter_spacing__hover_enabled=&#8221;on&#8221; button_two_letter_spacing__hover=&#8221;2&#8243; button_one_bg_color__hover_enabled=&#8221;on&#8221; button_one_bg_color__hover=&#8221;#ffffff&#8221; button_two_bg_color__hover_enabled=&#8221;on&#8221; button_two_bg_color__hover=&#8221;#ffffff&#8221;]<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-22px|auto||auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/03\/cipher.png&#8221; alt=&#8221;DG&#8221; title_text=&#8221;cipher&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Cipher \u2013 Guardiana de la Ciberseguridad&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;8f9ef2fe-68bd-4edf-ad9f-df13208ba554&#8243; title_level=&#8221;h3&#8243; title_font=&#8221;&#8211;et_global_heading_font||||||||&#8221; title_font_size=&#8221;21px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text quote_border_color=&#8221;#0047ff&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;c0223b1b-8f72-46a5-82e9-87fb4f9ec015&#8243; text_font=&#8221;&#8211;et_global_body_font||||||||&#8221; link_text_color=&#8221;#0047ff&#8221; quote_text_color=&#8221;#0047ff&#8221; width=&#8221;99.2%&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 data-section-id=\"1364h5u\" data-start=\"183\" data-end=\"206\">\u00bfQui\u00e9n es Cipher?<\/h3>\n<p data-start=\"208\" data-end=\"358\">Cipher es la <strong data-start=\"221\" data-end=\"254\">protectora digital del campus<\/strong>, encargada de resguardar la informaci\u00f3n, las cuentas y la seguridad de toda la comunidad universitaria.<\/p>\n<p data-start=\"360\" data-end=\"592\">Naci\u00f3 a partir de algoritmos de cifrado y protocolos de seguridad que, con el tiempo, evolucionaron hasta formar una entidad capaz de <strong data-start=\"494\" data-end=\"591\">detectar amenazas, bloquear ataques y educar a los usuarios en el uso seguro de la tecnolog\u00eda<\/strong>.<\/p>\n<p data-start=\"594\" data-end=\"649\">Donde hay un riesgo digital\u2026 <strong data-start=\"623\" data-end=\"648\">Cipher ya est\u00e1 alerta<\/strong>.<\/p>\n<p data-start=\"594\" data-end=\"649\">\n<p data-start=\"594\" data-end=\"649\">\n<p data-start=\"594\" data-end=\"649\"><span>\ud83d\udc49 <\/span><strong data-start=\"1708\" data-end=\"1795\">\u201cCipher te ayuda a proteger tu cuenta, tus datos y a no caer en fraudes digitales.\u201d<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Especialidad&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p data-start=\"676\" data-end=\"701\">Cipher se especializa en:<\/p>\n<ul data-start=\"703\" data-end=\"915\">\n<li data-section-id=\"lo2vc2\" data-start=\"703\" data-end=\"744\">Protecci\u00f3n de cuentas institucionales<\/li>\n<li data-section-id=\"g2eg3t\" data-start=\"745\" data-end=\"782\">Prevenci\u00f3n de ataques de phishing<\/li>\n<li data-section-id=\"yp2iv\" data-start=\"783\" data-end=\"811\">Seguridad de contrase\u00f1as<\/li>\n<li data-section-id=\"10epylz\" data-start=\"812\" data-end=\"848\">Detecci\u00f3n de accesos sospechosos<\/li>\n<li data-section-id=\"1ch4kwz\" data-start=\"849\" data-end=\"880\">Educaci\u00f3n en ciberseguridad<\/li>\n<li data-section-id=\"19ozplu\" data-start=\"881\" data-end=\"915\">Protecci\u00f3n de datos personales<\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Personalidad&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p data-start=\"942\" data-end=\"952\">Cipher es:<\/p>\n<ul data-start=\"954\" data-end=\"1052\">\n<li data-section-id=\"c7fohk\" data-start=\"954\" data-end=\"967\">anal\u00edtica<\/li>\n<li data-section-id=\"1r798o8\" data-start=\"968\" data-end=\"983\">estrat\u00e9gica<\/li>\n<li data-section-id=\"s0wzsv\" data-start=\"984\" data-end=\"998\">protectora<\/li>\n<li data-section-id=\"rix6tu\" data-start=\"999\" data-end=\"1017\">siempre alerta<\/li>\n<li data-section-id=\"165gl1i\" data-start=\"1018\" data-end=\"1052\">directa cuando detecta riesgos<\/li>\n<\/ul>\n<p data-start=\"1054\" data-end=\"1067\">Su filosof\u00eda:<\/p>\n<p data-start=\"1069\" data-end=\"1108\">\ud83d\udc49 <em data-start=\"1072\" data-end=\"1108\">\u201cM\u00e1s vale prevenir que recuperar.\u201d<\/em><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Habilidades&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul data-start=\"1260\" data-end=\"1454\">\n<li data-section-id=\"11swj9y\" data-start=\"1135\" data-end=\"1170\">Detecta amenazas en segundos \u26a0\ufe0f<\/li>\n<li data-section-id=\"bailx3\" data-start=\"1171\" data-end=\"1210\">Analiza comportamientos sospechosos<\/li>\n<li data-section-id=\"1vxxxva\" data-start=\"1211\" data-end=\"1244\">Protege identidades digitales<\/li>\n<li data-section-id=\"glz1co\" data-start=\"1245\" data-end=\"1285\">Ense\u00f1a buenas pr\u00e1cticas de seguridad<\/li>\n<li data-section-id=\"snmx9t\" data-start=\"1286\" data-end=\"1330\">Trabaja en coordinaci\u00f3n con Nodo y Pixel<\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||7px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_toggle title=&#8221;\ud83d\udee1\ufe0f Servicios de Cipher \u2013 Ciberseguridad &#8211; Protecci\u00f3n de Cuentas&#8221; icon_color=&#8221;#E09900&#8243; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;22px&#8221; open_use_icon_font_size=&#8221;on&#8221; open_icon_font_size=&#8221;22px&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; title_text_color=&#8221;#0C71C3&#8243; title_level=&#8221;h4&#8243; title_font=&#8221;|600|||||||&#8221; title_font_size=&#8221;18px&#8221; body_font_size=&#8221;16px&#8221; custom_margin=&#8221;||14px|||&#8221; animation_style=&#8221;bounce&#8221; title_text_align_tablet=&#8221;&#8221; title_text_align_phone=&#8221;&#8221; title_text_align_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p data-start=\"658\" data-end=\"821\">\n<table style=\"border-collapse: collapse; width: 100%;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 33.333333%;\">\n<h2 data-section-id=\"1njrd7h\" data-start=\"190\" data-end=\"236\">\ud83d\udd10 1. Protecci\u00f3n de cuentas institucionales<\/h2>\n<ul data-start=\"237\" data-end=\"438\">\n<li data-section-id=\"12t3yzx\" data-start=\"237\" data-end=\"278\">Recuperaci\u00f3n de cuentas comprometidas<\/li>\n<li data-section-id=\"1mvtf0i\" data-start=\"279\" data-end=\"324\">Bloqueo preventivo de accesos sospechosos<\/li>\n<li data-section-id=\"11huym9\" data-start=\"325\" data-end=\"372\">Asesor\u00eda en creaci\u00f3n de contrase\u00f1as seguras<\/li>\n<li data-section-id=\"vmm8vq\" data-start=\"373\" data-end=\"438\">Activaci\u00f3n de medidas de seguridad (ej: verificaci\u00f3n adicional)<\/li>\n<\/ul>\n<ul data-start=\"410\" data-end=\"553\"><\/ul>\n<\/td>\n<td style=\"width: 33.333333%;\">\n<h2 data-section-id=\"1xq2oop\" data-start=\"445\" data-end=\"488\">\u26a0\ufe0f 2. Gesti\u00f3n de incidentes de seguridad<\/h2>\n<ul data-start=\"489\" data-end=\"653\">\n<li data-section-id=\"qwyvs7\" data-start=\"489\" data-end=\"534\">Reporte y an\u00e1lisis de correos de phishing<\/li>\n<li data-section-id=\"3r3o3o\" data-start=\"535\" data-end=\"570\">Revisi\u00f3n de enlaces sospechosos<\/li>\n<li data-section-id=\"1v0jj9x\" data-start=\"571\" data-end=\"609\">Apoyo ante posible malware o virus<\/li>\n<li data-section-id=\"u6tain\" data-start=\"610\" data-end=\"653\">Investigaci\u00f3n de accesos no autorizados<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 33.333333%;\">\n<h2 data-section-id=\"6hie7h\" data-start=\"660\" data-end=\"696\">\ud83e\udde0 3. Educaci\u00f3n en ciberseguridad<\/h2>\n<ul data-start=\"697\" data-end=\"854\">\n<li data-section-id=\"e8w4oe\" data-start=\"697\" data-end=\"736\">Recomendaciones de buenas pr\u00e1cticas<\/li>\n<li data-section-id=\"p4o3mu\" data-start=\"737\" data-end=\"768\">Campa\u00f1as de concientizaci\u00f3n<\/li>\n<li data-section-id=\"nul5sq\" data-start=\"769\" data-end=\"809\">Gu\u00edas para uso seguro de plataformas<\/li>\n<li data-section-id=\"1xok9fd\" data-start=\"810\" data-end=\"854\">Apoyo en prevenci\u00f3n de fraudes digitales<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-collapse: collapse; width: 100%;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"width: 33.333333%;\">\n<h2 data-section-id=\"3cbe1a\" data-start=\"861\" data-end=\"902\">\ud83d\udd0d 4. An\u00e1lisis y prevenci\u00f3n de riesgos<\/h2>\n<ul data-start=\"903\" data-end=\"1077\">\n<li data-section-id=\"17iblcg\" data-start=\"903\" data-end=\"961\">Identificaci\u00f3n de vulnerabilidades b\u00e1sicas en usuarios<\/li>\n<li data-section-id=\"18iatce\" data-start=\"962\" data-end=\"1005\">Evaluaci\u00f3n de comportamientos de riesgo<\/li>\n<li data-section-id=\"7wrrce\" data-start=\"1006\" data-end=\"1037\">Recomendaciones preventivas<\/li>\n<li data-section-id=\"14tph3p\" data-start=\"1038\" data-end=\"1077\">Alertas de seguridad a la comunidad<\/li>\n<\/ul>\n<ul data-start=\"937\" data-end=\"1051\"><\/ul>\n<\/td>\n<td style=\"width: 33.333333%;\">\n<h2 data-section-id=\"oapep3\" data-start=\"1084\" data-end=\"1124\">\ud83d\udee1\ufe0f 5. Protecci\u00f3n de datos personales<\/h2>\n<ul data-start=\"1125\" data-end=\"1299\">\n<li data-section-id=\"1qh7jpd\" data-start=\"1125\" data-end=\"1175\">Orientaci\u00f3n sobre manejo seguro de informaci\u00f3n<\/li>\n<li data-section-id=\"p5ucwh\" data-start=\"1176\" data-end=\"1223\">Buenas pr\u00e1cticas en almacenamiento de datos<\/li>\n<li data-section-id=\"12chd25\" data-start=\"1224\" data-end=\"1254\">Prevenci\u00f3n de filtraciones<\/li>\n<li data-section-id=\"6wjzu4\" data-start=\"1255\" data-end=\"1299\">Uso responsable de plataformas digitales<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 33.333333%;\">\n<h2 data-section-id=\"9ep33q\" data-start=\"1306\" data-end=\"1348\">\ud83d\udea8 6. Respuesta ante amenazas digitales<\/h2>\n<ul data-start=\"1349\" data-end=\"1490\">\n<li data-section-id=\"14w8g77\" data-start=\"1349\" data-end=\"1377\">Contenci\u00f3n de incidentes<\/li>\n<li data-section-id=\"1s05x92\" data-start=\"1378\" data-end=\"1416\">Gu\u00eda paso a paso en caso de ataque<\/li>\n<li data-section-id=\"15xvjr1\" data-start=\"1417\" data-end=\"1460\">Coordinaci\u00f3n con UTI para gesti\u00f3n mayor<\/li>\n<li data-section-id=\"1unru28\" data-start=\"1461\" data-end=\"1490\">Seguimiento de incidentes<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Para cualquiera de estas consultas, las puedes realizar al correo: <a href=\"mailto:unidadti@udec.cl\">unidadti@udec.cl<\/a>\u00a0<\/p>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243;][et_pb_button button_text=&#8221;Revisa ciberseguridad.udec.cl&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; button_url=&#8221;https:\/\/ciberseguridad.udec.cl&#8221; url_new_window=&#8221;on&#8221; button_alignment=&#8221;center&#8221; button_text_size=&#8221;17px&#8221; button_border_width=&#8221;16px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><strong>Si tienes problemas con tu cuenta de correo puedes revisar lo siguiente:\u00a0<\/strong><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/03\/multifactor.png&#8221; title_text=&#8221;multifactor&#8221; url=&#8221;https:\/\/ciberseguridad.udec.cl\/autenticacion-de-multifactor\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/03\/phishin-quees.png&#8221; title_text=&#8221;phishin-quees&#8221; url=&#8221;https:\/\/ciberseguridad.udec.cl\/wp-content\/uploads\/2023\/10\/Phishing-y-correo-no-deseado.pdf&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/03\/phishin-reportar.png&#8221; title_text=&#8221;phishin-reportar&#8221; url=&#8221;https:\/\/ciberseguridad.udec.cl\/wp-content\/uploads\/2023\/10\/Phishing-y-correo-no-deseado.pdf&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/03\/correo-alternativo.png&#8221; title_text=&#8221;correo-alternativo&#8221; url=&#8221;https:\/\/ciberseguridad.udec.cl\/upload\/correo-alternativo.pdf&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(199,213,237,0.55)&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Vis\u00edtanos&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf3c5;||fa||900&#8243; icon_color=&#8221;#E09900&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;336f118a-5127-42e4-a3d9-e2cedd5a32b3&#8243; header_font=&#8221;Poppins||||||||&#8221; header_text_color=&#8221;#002e5a&#8221; body_font=&#8221;&#8211;et_global_body_font||||||||&#8221; body_text_color=&#8221;#002e5a&#8221; global_colors_info=&#8221;{%22gcid-d7cd5a78-aaef-4f36-82a3-4d3706015cba%22:%91%22link_text_color%22,%22link_text_color%22,%22link_text_color%22%93,%22gcid-1f1b4e15-7cc6-4e13-8154-74d77a956460%22:%91%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22,%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22%93}&#8221;]<\/p>\n<p><span>Juan Antonio Coloma #0201. Los \u00c1ngeles \/ Chile<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Fono&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe090;||divi||400&#8243; icon_color=&#8221;#002e5a&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;336f118a-5127-42e4-a3d9-e2cedd5a32b3&#8243; header_font=&#8221;&#8211;et_global_body_font||||||||&#8221; header_text_color=&#8221;#002e5a&#8221; body_text_color=&#8221;#002e5a&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-d7cd5a78-aaef-4f36-82a3-4d3706015cba%22:%91%22link_text_color%22,%22link_text_color%22,%22link_text_color%22%93,%22gcid-1f1b4e15-7cc6-4e13-8154-74d77a956460%22:%91%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22,%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22%93}&#8221;]<\/p>\n<p><span>+56 432 405114<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Email&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe076;||divi||400&#8243; icon_color=&#8221;gcid-4c79ba3d-a281-4fb6-9b14-02f9a4c793f2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;336f118a-5127-42e4-a3d9-e2cedd5a32b3&#8243; header_text_color=&#8221;#002e5a&#8221; body_font=&#8221;&#8211;et_global_body_font||||||||&#8221; body_text_color=&#8221;#002e5a&#8221; body_link_font=&#8221;&#8211;et_global_body_font||||||||&#8221; body_link_text_color=&#8221;#002e5a&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-d7cd5a78-aaef-4f36-82a3-4d3706015cba%22:%91%22link_text_color%22,%22link_text_color%22,%22link_text_color%22%93,%22gcid-1f1b4e15-7cc6-4e13-8154-74d77a956460%22:%91%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22,%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22%93,%22gcid-4c79ba3d-a281-4fb6-9b14-02f9a4c793f2%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p><a href=\"mailto:soportela@udec.cl\">soportela@udec.cl<\/a>\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Horario&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x7d;||divi||400&#8243; icon_color=&#8221;gcid-4c79ba3d-a281-4fb6-9b14-02f9a4c793f2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;336f118a-5127-42e4-a3d9-e2cedd5a32b3&#8243; header_text_color=&#8221;#002e5a&#8221; body_font=&#8221;&#8211;et_global_body_font||||||||&#8221; body_text_color=&#8221;#002e5a&#8221; body_link_font=&#8221;&#8211;et_global_body_font||||||||&#8221; body_link_text_color=&#8221;#002e5a&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-d7cd5a78-aaef-4f36-82a3-4d3706015cba%22:%91%22link_text_color%22,%22link_text_color%22,%22link_text_color%22%93,%22gcid-1f1b4e15-7cc6-4e13-8154-74d77a956460%22:%91%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22,%22link_text_color%22,%22quote_text_color%22,%22quote_border_color%22%93,%22gcid-4c79ba3d-a281-4fb6-9b14-02f9a4c793f2%22:%91%22icon_color%22%93}&#8221;]<\/p>\n<p>Lunes a Viernes<br \/><span>8:30 a 17:30<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;f66a0dc0-0499-4e50-90c7-88d4028cdccb&#8221; background_image=&#8221;https:\/\/informaticala.udec.cl\/wp-content\/uploads\/2026\/01\/Tecnologias-de-la-Informacion-scaled.jpg&#8221; parallax=&#8221;on&#8221; height=&#8221;300px&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp;\u00bfQui\u00e9n es Cipher? Cipher es la protectora digital del campus, encargada de resguardar la informaci\u00f3n, las cuentas y la seguridad de toda la comunidad universitaria. Naci\u00f3 a partir de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-283018","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/pages\/283018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/comments?post=283018"}],"version-history":[{"count":4,"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/pages\/283018\/revisions"}],"predecessor-version":[{"id":283054,"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/pages\/283018\/revisions\/283054"}],"wp:attachment":[{"href":"https:\/\/informaticala.udec.cl\/index.php\/wp-json\/wp\/v2\/media?parent=283018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}