{"id":98047,"date":"2019-12-13T16:03:14","date_gmt":"2019-12-14T00:03:14","guid":{"rendered":"\/blogs\/?p=98047"},"modified":"2022-03-08T10:37:34","modified_gmt":"2022-03-08T18:37:34","slug":"15-consejos-para-crear-una-mejor-contrasena-de-seguridad","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/","title":{"rendered":"15 consejos para crear una mejor contrase\u00f1a de seguridad"},"content":{"rendered":"<p><span data-contrast=\"auto\">A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son v\u00e1lidas cuando se trata de acceder a sus cuentas en l\u00ednea. No es de extra\u00f1ar que los usuarios de Internet reclamen que les da fatiga ingresar la contrase\u00f1a, ya que se estima que un empleado promedio ocupa entre <\/span><a href=\"https:\/\/jumpcloud.com\/blog\/password-fatigue\/\"><span data-contrast=\"none\">10 horas al a\u00f1o<\/span><\/a><span data-contrast=\"auto\">\u00a0solo para\u00a0ingresar\u00a0a\u00a0diferentes\u00a0cuentas.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sin embargo, dado que los\u00a0hackers\u00a0que\u00a0toman\u00a0ventaja\u00a0de\u00a0contrase\u00f1as\u00a0d\u00e9biles\u00a0o\u00a0reutilizadas\u00a0todav\u00eda\u00a0infringen\u00a0el\u00a0<\/span><a href=\"https:\/\/blog.lastpass.com\/2019\/05\/passwords-still-problem-according-2019-verizon-data-breach-investigations-report.html\/\"><span data-contrast=\"none\">81 % de los datos<\/span><\/a><span data-contrast=\"auto\">,\u00a0debemos\u00a0encontrar\u00a0mejores\u00a0maneras\u00a0de\u00a0crear\u00a0contrase\u00f1as\u00a0m\u00e1s\u00a0seguras\u00a0y\u00a0comprometernos\u00a0con\u00a0ellas.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Primero,\u00a0t\u00f3mese\u00a0un\u00a0tiempo\u00a0para\u00a0aprender\u00a0c\u00f3mo\u00a0y por\u00a0qu\u00e9\u00a0los hackers\u00a0obtienen\u00a0buenos\u00a0resultados\u00a0al\u00a0descifrar\u00a0contrase\u00f1as\u00a0d\u00e9biles.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">C\u00f3mo\u00a0ingresan\u00a0los hackers:<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<h3><b><span data-contrast=\"auto\">Ataques\u00a0de\u00a0diccionario<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Esto sucede cuando un agresor utiliza un script que b\u00e1sicamente se ejecuta mediante palabras en el diccionario, al combinarlas con n\u00fameros y otras variantes hasta que obtienen su contrase\u00f1a. Por eso es tan importante crear una contrase\u00f1a compleja que no se pueda adivinar en <\/span><a href=\"https:\/\/www.useapassphrase.com\/\"><span data-contrast=\"none\">una fracci\u00f3n de segundos<\/span><\/a><span data-contrast=\"auto\">\u00a0con\u00a0herramientas\u00a0de\u00a0cifrado\u00a0como\u00a0<\/span><a href=\"http:\/\/en.wikipedia.org\/wiki\/John_the_Ripper\"><span data-contrast=\"none\">John the Ripper<\/span><\/a><span data-contrast=\"auto\">\u00a0que se\u00a0descargan\u00a0de Internet.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><span data-contrast=\"auto\">Para\u00a0evitar\u00a0los\u00a0ataques\u00a0de\u00a0diccionario, evite\u00a0combinaciones\u00a0de\u00a0teclado\u00a0consecutivas\u00a0como\u00a0\u201cqwerty\u201d o \u201casdfg\u201d. No\u00a0utilice\u00a0palabras del\u00a0diccionario,\u00a0t\u00e9rminos\u00a0de la\u00a0jerga\u00a0callejera,\u00a0errores\u00a0ortogr\u00e1ficos\u00a0comunes\u00a0o palabras\u00a0escritas\u00a0al\u00a0rev\u00e9s.\u00a0<\/span><br \/>\n<span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Descifrar\u00a0preguntas\u00a0de\u00a0seguridad<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Cuando hace clic sobre el enlace &#8220;olvid\u00f3 su contrase\u00f1a&#8221;, se le suele pedir que responda unas preguntas. Evite respuestas que utilicen nombres de familiares o mascotas y otra informaci\u00f3n que se puede encontrar en su perfil de redes sociales. Recuerde que las respuestas no tienen que ser verdaderas, sino algo que tiene que recordar, as\u00ed que escoja respuestas al azar que hagan pensar a los hackers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Contrase\u00f1as simples y reutilizaci\u00f3n de contrase\u00f1as:<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Aunque\u00a0parezca\u00a0dif\u00edcil\u00a0de\u00a0creer, \u201c123456\u201d y \u201c111111\u201d\u00a0todav\u00eda\u00a0son\u00a0algunas\u00a0de las\u00a0<\/span><a href=\"https:\/\/edition.cnn.com\/2019\/04\/22\/uk\/most-common-passwords-scli-gbr-intl\/index.html\"><span data-contrast=\"none\">contrase\u00f1as m\u00e1s populares<\/span><\/a><span data-contrast=\"auto\"> que utilizan las personas, lo que permite a los hackers descifrarlas de inmediato. En su lugar, escoja algo complejo y no use informaci\u00f3n personal como su nombre, edad, fecha de nacimiento, nombre de su hijo, nombre de su mascota o su color o canci\u00f3n favorita, ya que se pueden adivinar con facilidad.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Adem\u00e1s, ya deber\u00edamos saber que no se deben reutilizar las contrase\u00f1as, en especial para el correo electr\u00f3nico, la banca y las cuentas de medios sociales, ya que esto puede conducir al robo de identidad. A\u00fan as\u00ed, <\/span><a href=\"https:\/\/www.darkreading.com\/informationweek-home\/password-reuse-abounds-new-survey-shows\/d\/d-id\/1331689\"><span data-contrast=\"none\">m\u00e1s de la mitad<\/span><\/a><span data-contrast=\"auto\">\u00a0de\u00a0nosotros\u00a0seguimos\u00a0cometiendo\u00a0estos\u00a0errores.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Ingenier\u00eda social<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">La ingenier\u00eda social es un tipo de mentira elaborada. Es una forma alternativa al ciberataque tradicional y constituye la manipulaci\u00f3n de otras personas para llevar a cabo determinadas acciones o divulgar informaci\u00f3n confidencial.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">C\u00f3mo\u00a0asegurar\u00a0sus\u00a0contrase\u00f1as:<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<ol>\n<li><span data-contrast=\"auto\">Utiliceun\u00a0<\/span><b><span data-contrast=\"auto\">administrador\u00a0de\u00a0contrase\u00f1as<\/span><\/b><span data-contrast=\"auto\">\u00a0que\u00a0pueda\u00a0crear\u00a0contrase\u00f1as\u00a0fuertes\u00a0y\u00a0complejas\u00a0y\u00a0recu\u00e9rdelas. Si\u00a0elige\u00a0un\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog\/mtp_521\/mcafee-total-protection.html\"><span data-contrast=\"none\">software de seguridad robusto<\/span><\/a><span data-contrast=\"auto\">,\u00a0muchas\u00a0veces\u00a0suele\u00a0incluir\u00a0un\u00a0administrador\u00a0de\u00a0contrase\u00f1as.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><span data-contrast=\"auto\"> Si noutilizaun\u00a0administrador\u00a0de\u00a0contrase\u00f1as,\u00a0aprenda\u00a0a\u00a0<\/span><b><span data-contrast=\"auto\">utilizar\u00a0frases\u00a0de\u00a0contrase\u00f1a<\/span><\/b><span data-contrast=\"auto\">\u00a0que\u00a0sean\u00a0m\u00e1s\u00a0extensas\u00a0y\u00a0complejas\u00a0que una\u00a0contrase\u00f1a\u00a0tradicional,\u00a0pero\u00a0que\u00a0sean\u00a0m\u00e1s\u00a0f\u00e1ciles\u00a0de\u00a0recordar. Por lo general, una\u00a0frase\u00a0de\u00a0contrase\u00f1a\u00a0es una\u00a0cadena\u00a0de palabras que\u00a0est\u00e1n\u00a0intercaladas\u00a0con\u00a0n\u00fameros\u00a0y\u00a0s\u00edmbolos. Por\u00a0ejemplo, la\u00a0frase\u00a0\u201cMelville\u2019s Moby Dick Has Over 94,000 words\u201d se\u00a0puede\u00a0cambiar\u00a0a\u00a0algo\u00a0como\u00a0M&#8217;sMDho9*4000wds!!.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"3\">\n<li><span data-contrast=\"auto\">Tambi\u00e9npuede\u00a0utilizar\u00a0el\u00a0teclado\u00a0como\u00a0paleta para\u00a0crear\u00a0formas. Por\u00a0ejemplo,\u00a0intente\u00a0trazar\u00a0%tgbHU8* en\u00a0su\u00a0teclado. Es la\u00a0letra\u00a0V.\u00a0Puede\u00a0dibujar\u00a0la\u00a0letra\u00a0V a\u00a0partir\u00a0de\u00a0cualquier\u00a0tecla\u00a0superior. Para\u00a0cambiarla\u00a0de\u00a0manera\u00a0regular,\u00a0puede\u00a0desplegarlas\u00a0por\u00a0todo\u00a0el\u00a0teclado.\u00a0Utilice\u00a0la W\u00a0si\u00a0quiere\u00a0que\u00a0sea\u00a0m\u00e1s\u00a0compleja.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"4\">\n<li><span data-contrast=\"auto\">Aseg\u00faresede\u00a0utilizar\u00a0diferentes\u00a0contrase\u00f1as\u00a0para\u00a0cada\u00a0una de sus\u00a0cuentas.<\/span><br \/>\n<span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Aseg\u00faresede que\u00a0nadie\u00a0lo observe\u00a0cuando\u00a0ingresa\u00a0la\u00a0contrase\u00f1a.\u00a0Descon\u00e9ctese\u00a0siempre\u00a0si\u00a0deja\u00a0el\u00a0dispositivo\u00a0y hay\u00a0alguien\u00a0cerca; solo le\u00a0llevar\u00e1\u00a0un\u00a0momento\u00a0a\u00a0alguien\u00a0robar\u00a0o\u00a0cambiar\u00a0la\u00a0contrase\u00f1a.<\/span><br \/>\n<span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Utiliceun software de\u00a0seguridad\u00a0integral<\/span><\/b><span data-contrast=\"auto\">\u00a0y\u00a0actual\u00edcelo\u00a0para\u00a0evitar\u00a0<\/span><a href=\"http:\/\/home.mcafee.com\/VirusInfo\/Glossary.aspx#K\"><span data-contrast=\"none\">keyloggers<\/span><\/a><span data-contrast=\"auto\">\u00a0y\u00a0otros\u00a0<\/span><a href=\"http:\/\/home.mcafee.com\/VirusInfo\/Glossary.aspx#M\"><span data-contrast=\"none\">malware<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"7\">\n<li><span data-contrast=\"auto\"> Eviteingresarlas\u00a0contrase\u00f1as\u00a0en\u00a0computadoras\u00a0a las que no\u00a0tiene\u00a0control (como\u00a0computadoras\u00a0en un\u00a0cibercaf\u00e9\u00a0o una\u00a0bilblioteca),\u00a0ya\u00a0que es\u00a0posible\u00a0que\u00a0tengan\u00a0malware\u00a0instalado\u00a0y\u00a0robarle\u00a0la\u00a0contrase\u00f1a.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"8\">\n<li><span data-contrast=\"auto\"> Eviteingresarlas\u00a0contrase\u00f1as\u00a0con\u00a0conexiones\u00a0Wi-Fi no\u00a0seguras\u00a0(como\u00a0aeropuertos\u00a0o\u00a0cafeter\u00edas),\u00a0ya\u00a0que los hackers\u00a0pueden\u00a0interceptar\u00a0las\u00a0contrase\u00f1as\u00a0y los\u00a0datos\u00a0que se\u00a0env\u00edan\u00a0por\u00a0conexiones\u00a0no\u00a0seguras.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"9\">\n<li><span data-contrast=\"auto\"> Nocompartasu\u00a0contrase\u00f1a\u00a0con\u00a0nadie.\u00a0Su\u00a0amigo de\u00a0confianza\u00a0puede\u00a0no\u00a0serlo\u00a0en el\u00a0futuro.\u00a0Resguarde\u00a0sus\u00a0contrase\u00f1as\u00a0solo para\u00a0usted.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Seg\u00fan\u00a0la\u00a0confidencialidad\u00a0de la\u00a0informaci\u00f3n\u00a0protegida,\u00a0deber\u00e1\u00a0cambiar\u00a0sus\u00a0contrase\u00f1as\u00a0regularmente.<\/span><br \/>\n<span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol start=\"10\">\n<li><span data-contrast=\"auto\">Est\u00e1bien\u00a0escribir\u00a0sus\u00a0contrase\u00f1as,\u00a0pero\u00a0debe\u00a0mantenerlas\u00a0lejos\u00a0de\u00a0su\u00a0computadora\u00a0y\u00a0mezclarlas\u00a0con\u00a0n\u00fameros\u00a0y\u00a0letras\u00a0para que no\u00a0parezcan\u00a0una\u00a0contrase\u00f1a.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"11\">\n<li><span data-contrast=\"auto\">Tambi\u00e9npuede\u00a0escribir\u00a0una &#8220;hoja de\u00a0consejos&#8221; que le\u00a0dar\u00e1\u00a0una\u00a0pista\u00a0para\u00a0poder\u00a0recordar\u00a0su\u00a0contrase\u00f1a,\u00a0pero\u00a0que, en\u00a0realidad,<\/span><span data-contrast=\"auto\">no\u00a0tenga\u00a0su\u00a0contrase\u00f1a. Por\u00a0ejemplo, con\u00a0respecto\u00a0al\u00a0ejemplo\u00a0anterior,\u00a0su\u00a0hoja de\u00a0consejos\u00a0podr\u00eda\u00a0decir\u00a0\u201cMelville\u201d.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol start=\"12\">\n<li><span data-contrast=\"auto\">Compruebela\u00a0seguridad\u00a0de\u00a0su\u00a0contrase\u00f1a. Si el sitio en el que\u00a0inicia\u00a0sesi\u00f3n\u00a0ofrece\u00a0un\u00a0analizador\u00a0de\u00a0seguridad\u00a0de\u00a0contrase\u00f1a,\u00a0acepte.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><i><span data-contrast=\"auto\">Robert Siciliano es\u00a0asesor\u00a0y\u00a0experto\u00a0en\u00a0robo\u00a0de\u00a0identidad\u00a0de McAfee.\u00a0Consulte\u00a0su\u00a0an\u00e1lisis\u00a0sobre\u00a0<\/span><\/i><a href=\"http:\/\/www.youtube.com\/watch?v=efM4cBtkrOo\"><i><span data-contrast=\"auto\">c\u00f3mo protegerse del robo de identidad\u00a0<\/span><\/i><\/a><i><span data-contrast=\"auto\">en CounterIdentityTheft.com.<\/span><\/i><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros&#8230;<\/p>\n","protected":false},"author":674,"featured_media":97373,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11842,11851,11854],"tags":[16296],"coauthors":[16326,3973],"class_list":["post-98047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-family-safety","category-internet-security","category-tips-tricks","tag-robo-de-identidad-es-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>15 consejos para crear una mejor contrase\u00f1a de seguridad | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"15 consejos para crear una mejor contrase\u00f1a de seguridad | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-14T00:03:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-08T18:37:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1265\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"15 consejos para crear una mejor contrase\u00f1a de seguridad\",\"datePublished\":\"2019-12-14T00:03:14+00:00\",\"dateModified\":\"2022-03-08T18:37:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/\"},\"wordCount\":955,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"keywords\":[\"robo de identidad\"],\"articleSection\":[\"Seguridad familiar\",\"Seguridad en Internet\",\"Consejos y trucos de seguridad\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/\",\"name\":\"15 consejos para crear una mejor contrase\u00f1a de seguridad | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"datePublished\":\"2019-12-14T00:03:14+00:00\",\"dateModified\":\"2022-03-08T18:37:34+00:00\",\"description\":\"A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg\",\"width\":1920,\"height\":1265,\"caption\":\"woman using her phone on the couch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad en Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"15 consejos para crear una mejor contrase\u00f1a de seguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"15 consejos para crear una mejor contrase\u00f1a de seguridad | Blog de McAfee","description":"A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"15 consejos para crear una mejor contrase\u00f1a de seguridad | Blog de McAfee","og_description":"A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son","og_url":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-12-14T00:03:14+00:00","article_modified_time":"2022-03-08T18:37:34+00:00","og_image":[{"width":1920,"height":1265,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"15 consejos para crear una mejor contrase\u00f1a de seguridad","datePublished":"2019-12-14T00:03:14+00:00","dateModified":"2022-03-08T18:37:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/"},"wordCount":955,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","keywords":["robo de identidad"],"articleSection":["Seguridad familiar","Seguridad en Internet","Consejos y trucos de seguridad"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/","name":"15 consejos para crear una mejor contrase\u00f1a de seguridad | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","datePublished":"2019-12-14T00:03:14+00:00","dateModified":"2022-03-08T18:37:34+00:00","description":"A pesar de las innovaciones como el uso de la huella digital y el reconocimiento facial para acceder a nuestros dispositivos, las contrase\u00f1as todav\u00eda son","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/11\/iStock-992099930-1-min.jpg","width":1920,"height":1265,"caption":"woman using her phone on the couch"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/15-consejos-para-crear-una-mejor-contrasena-de-seguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/"},{"@type":"ListItem","position":2,"name":"Seguridad en Internet","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/"},{"@type":"ListItem","position":3,"name":"15 consejos para crear una mejor contrase\u00f1a de seguridad"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/98047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/comments?post=98047"}],"version-history":[{"count":0,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/98047\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media\/97373"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media?parent=98047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/categories?post=98047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/tags?post=98047"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/coauthors?post=98047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}