{"id":6556,"date":"2025-07-01T14:27:58","date_gmt":"2025-07-01T14:27:58","guid":{"rendered":"https:\/\/www.urudata.com\/?p=6556"},"modified":"2026-01-14T15:01:24","modified_gmt":"2026-01-14T15:01:24","slug":"la-seguridad-que-la-organizacion-necesita","status":"publish","type":"post","link":"https:\/\/urudata.com\/en\/la-seguridad-que-la-organizacion-necesita\/","title":{"rendered":"The security the organization needs"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Situation<\/h2>\n\n\n\n<p>Information security has become a highly relevant topic in our country for some time now. This is largely due to the growing number of leaks and cyberattacks that have successfully targeted various companies, government agencies, and public institutions. A simple Google search reveals an abundance of news stories, suggesting that many are still not fully prepared to face today\u2019s cybersecurity challenges.<\/p>\n\n\n\n<p>These recent incidents not only create chaos, but also force organizations to undergo drastic changes. There\u2019s no greater motivator for improving security than a successful\u2014and especially public\u2014attack. It\u2019s a bit like that neighbor who suddenly installs bars on their windows even though they never had them before.<\/p>\n\n\n\n<p>It\u2019s also worth noting that security roles\u2014the professionals responsible for protecting organizations from cybercriminals\u2014have certain peculiarities that make them particularly challenging positions within the business context.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security controls<\/h2>\n\n\n\n<p>Implementing security controls, by definition, involves change\u2014and change is rarely\nfrictionless, especially when it affects day-to-day operations. Security measures in\nparticular often meet resistance, making those responsible for enforcing them some of\nthe least popular figures in an organization, as they tend to go against the ease and\nconvenience people are used to. It\u2019s similar to construction: years ago, workers might\nhave operated without helmets\u2014certainly more comfortable\u2014but today, allowing that\nwould be unthinkable.<\/p>\n\n\n\n<p>Sometimes, the balance tips too far in the other direction, and the business ends up\nworking for security rather than the other way around. The organization\u2019s core\npurpose\u2014whatever that may be\u2014gets lost. It\u2019s important to remember that security\nmust support the achievement of organizational goals. After all, without the business,\nthere\u2019s nothing to protect. We can\u2019t ban people from walking in public just because\ntraffic accidents are a risk; instead, we build traffic lights to help people move safely\ntoward their destinations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Proportionality<\/h2>\n\n\n\n<p>If security is meant to serve the business, but its approach is unrealistic, then it\u2019s not\nreally useful either. As with any aspect of life, proportionality is key\u2014in this case,\nproportional to risk.\nIdeally, it would be great to have the latest technologies and the most robust\n\nprocedures in place. However, the level of risk may not justify the time and financial\ninvestment required to implement those controls.\nWe can think that a reinforced steel door would be great for your home\u2014and sure, it\nwould\u2014but that doesn\u2019t mean it\u2019s practical or makes sense in most situations.<\/p>\n\n\n\n<p>The business. The business. The business always comes first.\nIn many cases, if the cost of a security initiative is lower than the potential risk, then it\nmay seem viable to implement it. That\u2019s a valid approach\u2014as long as all associated\ncosts are taken into account: financial, operational, organizational, maintenance-\nrelated, and more. As one might guess, all those elements that make up the total cost are also part of the\nbusiness\u2014and you can\u2019t afford to impact them without a solid reason.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Organizational culture<\/h2>\n\n\n\n<p>Someone once said that if you don\u2019t adapt to the organizational culture, it will consume\nyou. While this phrase is usually about individuals adapting, we can all recall a new\ninitiative or department within an organization that failed\u2014either because it was too\nambitious or it simply didn\u2019t fit in.<\/p>\n\n\n\n<p>Cybersecurity must adapt as well\u2014otherwise, it will be swallowed by the culture. It\u2019s a\nmutual agreement, but security must adapt more. Success in protection lies in this\nadaptability: instead of resisting how things work, security should accompany and\nenable change.<\/p>\n\n\n\n<p>We need to change how security is perceived within organizations. When done right, it\nisn\u2019t a burden\u2014it\u2019s a support. Rather than blocking the path, it should be the guardrail\nthat keeps us from going off the edge. For the business and in service of the business,\nthe right kind of security doesn\u2019t create discomfort\u2014it provides peace of mind.<\/p>","protected":false},"excerpt":{"rendered":"<p>Situaci\u00f3n La seguridad de la informaci\u00f3n est\u00e1 siendo un tema muy relevante desde hace un tiempo en nuestro pa\u00eds. Esto se debe a la creciente difusi\u00f3n de filtraciones y ataques que han tenido \u00e9xito en distintas empresas, organismos e instituciones del estado. Basta con hacer una b\u00fasqueda en Google para encontrarse con que abundan las [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6558,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-6556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":{"bajada":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Urudata &gt; La seguridad que la organizaci\u00f3n necesita<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudata.com\/en\/la-seguridad-que-la-organizacion-necesita\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urudata &gt; La seguridad que la organizaci\u00f3n necesita\" \/>\n<meta property=\"og:description\" content=\"Situaci\u00f3n La seguridad de la informaci\u00f3n est\u00e1 siendo un tema muy relevante desde hace un tiempo en nuestro pa\u00eds. Esto se debe a la creciente difusi\u00f3n de filtraciones y ataques que han tenido \u00e9xito en distintas empresas, organismos e instituciones del estado. Basta con hacer una b\u00fasqueda en Google para encontrarse con que abundan las [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudata.com\/en\/la-seguridad-que-la-organizacion-necesita\/\" \/>\n<meta property=\"og:site_name\" content=\"Urudata\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/urudatasa\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-01T14:27:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T15:01:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daniel Alano\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Alano\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/\"},\"author\":{\"name\":\"Daniel Alano\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/69554d3592345fa79742a955a3ad0c07\"},\"headline\":\"La seguridad que la organizaci\u00f3n necesita\",\"datePublished\":\"2025-07-01T14:27:58+00:00\",\"dateModified\":\"2026-01-14T15:01:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/\"},\"wordCount\":733,\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/\",\"url\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/\",\"name\":\"Urudata > La seguridad que la organizaci\u00f3n necesita\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1\",\"datePublished\":\"2025-07-01T14:27:58+00:00\",\"dateModified\":\"2026-01-14T15:01:24+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/la-seguridad-que-la-organizacion-necesita\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1\",\"width\":768,\"height\":512},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"name\":\"Urudata\",\"description\":\"Integramos soluciones innovadoras\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudata.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\",\"name\":\"Urudata\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"width\":512,\"height\":123,\"caption\":\"Urudata\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/urudatasa\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/69554d3592345fa79742a955a3ad0c07\",\"name\":\"Daniel Alano\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d14574afc6eff192b6a71ff1f9168bf8474dad02f9e740f7c8949e052bd452da?s=96&d=simple_local_avatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d14574afc6eff192b6a71ff1f9168bf8474dad02f9e740f7c8949e052bd452da?s=96&d=simple_local_avatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d14574afc6eff192b6a71ff1f9168bf8474dad02f9e740f7c8949e052bd452da?s=96&d=simple_local_avatar&r=g\",\"caption\":\"Daniel Alano\"},\"description\":\"Chief Information Security Office (CISCO)\",\"url\":\"https:\\\/\\\/urudata.com\\\/en\\\/author\\\/danielalano\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Urudata > La seguridad que la organizaci\u00f3n necesita","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudata.com\/en\/la-seguridad-que-la-organizacion-necesita\/","og_locale":"en_US","og_type":"article","og_title":"Urudata > La seguridad que la organizaci\u00f3n necesita","og_description":"Situaci\u00f3n La seguridad de la informaci\u00f3n est\u00e1 siendo un tema muy relevante desde hace un tiempo en nuestro pa\u00eds. Esto se debe a la creciente difusi\u00f3n de filtraciones y ataques que han tenido \u00e9xito en distintas empresas, organismos e instituciones del estado. Basta con hacer una b\u00fasqueda en Google para encontrarse con que abundan las [&hellip;]","og_url":"https:\/\/urudata.com\/en\/la-seguridad-que-la-organizacion-necesita\/","og_site_name":"Urudata","article_publisher":"https:\/\/www.facebook.com\/urudatasa","article_published_time":"2025-07-01T14:27:58+00:00","article_modified_time":"2026-01-14T15:01:24+00:00","og_image":[{"width":768,"height":512,"url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1","type":"image\/png"}],"author":"Daniel Alano","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Alano","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/#article","isPartOf":{"@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/"},"author":{"name":"Daniel Alano","@id":"https:\/\/urudata.com\/#\/schema\/person\/69554d3592345fa79742a955a3ad0c07"},"headline":"La seguridad que la organizaci\u00f3n necesita","datePublished":"2025-07-01T14:27:58+00:00","dateModified":"2026-01-14T15:01:24+00:00","mainEntityOfPage":{"@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/"},"wordCount":733,"publisher":{"@id":"https:\/\/urudata.com\/#organization"},"image":{"@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/","url":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/","name":"Urudata > La seguridad que la organizaci\u00f3n necesita","isPartOf":{"@id":"https:\/\/urudata.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/#primaryimage"},"image":{"@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1","datePublished":"2025-07-01T14:27:58+00:00","dateModified":"2026-01-14T15:01:24+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/la-seguridad-que-la-organizacion-necesita\/#primaryimage","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1","width":768,"height":512},{"@type":"WebSite","@id":"https:\/\/urudata.com\/#website","url":"https:\/\/urudata.com\/","name":"Urudata","description":"Integramos soluciones innovadoras","publisher":{"@id":"https:\/\/urudata.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudata.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudata.com\/#organization","name":"Urudata","url":"https:\/\/urudata.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","width":512,"height":123,"caption":"Urudata"},"image":{"@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/urudatasa"]},{"@type":"Person","@id":"https:\/\/urudata.com\/#\/schema\/person\/69554d3592345fa79742a955a3ad0c07","name":"Daniel Alano","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d14574afc6eff192b6a71ff1f9168bf8474dad02f9e740f7c8949e052bd452da?s=96&d=simple_local_avatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d14574afc6eff192b6a71ff1f9168bf8474dad02f9e740f7c8949e052bd452da?s=96&d=simple_local_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d14574afc6eff192b6a71ff1f9168bf8474dad02f9e740f7c8949e052bd452da?s=96&d=simple_local_avatar&r=g","caption":"Daniel Alano"},"description":"Chief Information Security Office (CISCO)","url":"https:\/\/urudata.com\/en\/author\/danielalano\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/07\/Batman_-El-caballero-de-la-noche-cumple-diez-anos-LA-NACION.png?fit=768%2C512&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/comments?post=6556"}],"version-history":[{"count":2,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6556\/revisions"}],"predecessor-version":[{"id":6560,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6556\/revisions\/6560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media\/6558"}],"wp:attachment":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media?parent=6556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/categories?post=6556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/tags?post=6556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}