{"id":18728,"date":"2023-07-11T13:00:20","date_gmt":"2023-07-11T13:00:20","guid":{"rendered":"https:\/\/www.criteo.com\/es\/security\/"},"modified":"2023-07-11T13:00:20","modified_gmt":"2023-07-11T13:00:20","slug":"security","status":"publish","type":"page","link":"https:\/\/www.criteo.com\/es\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>At Criteo, we\u2019re committed to providing the best security standards in every part of our business and products. We protect our systems against threats and maintain a strong vulnerability and incident management culture.<\/p>\n<p>We run a private bug bounty program which increases our detection capabilities and maintain a high level of security. We are paying bounties for confirmed vulnerabilities that are in scope of the program. Please contact us\u00a0at\u00a0<a href=\"mailto:security@criteo.com\">security@criteo.com<\/a>\u00a0if you want to join the program.<\/p>\n<p>In addition, we regularly conduct penetration tests to identify and address any potential weaknesses in our systems.<\/p>\n<p>Besides technology, we infuse a security-conscious culture throughout our organization where each employee knows that security is everyone\u2019s responsability. Everyone at Criteo gets trained in IT Security and we conduct awareness campaigns about the latest threats and best practices.<\/p>\n<p>Please refer to our dedicated sections to know more about Cybersecurity at Criteo and how to protect your data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Criteo, we\u2019re committed to providing the best security standards in every part of our business and products. We protect our systems against threats and maintain a strong vulnerability and incident management culture. We run a private bug bounty program which increases our detection capabilities and maintain a high level of security. We are paying [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/basic.php","meta":{"_acf_changed":false,"footnotes":""},"coauthors":[544],"class_list":["post-18728","page","type-page","status-publish"],"acf":{"layout_mode":"security-2023","has_more_content":false,"storetail_optout":false,"stae_popup_enable":false,"track_page_in_segment":false,"segment_page_name":"","additional_code":"","toc_order":"0"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to spot fake, fraudulent, spoof, or phishing emails and messages<\/title>\n<meta name=\"description\" content=\"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.criteo.com\/es\/security\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to spot fake, fraudulent, spoof, or phishing emails and messages\" \/>\n<meta property=\"og:description\" content=\"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.criteo.com\/es\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"ES - Criteo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/es\/security\/\",\n\t            \"url\": \"https:\/\/www.criteo.com\/es\/security\/\",\n\t            \"name\": \"How to spot fake, fraudulent, spoof, or phishing emails and messages\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/es\/#website\"\n\t            },\n\t            \"datePublished\": \"2023-07-11T13:00:20+00:00\",\n\t            \"description\": \"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/es\/security\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"es-ES\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.criteo.com\/es\/security\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/es\/security\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.criteo.com\/es\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Security\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/es\/#website\",\n\t            \"url\": \"https:\/\/www.criteo.com\/es\/\",\n\t            \"name\": \"ES - Criteo\",\n\t            \"description\": \"\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/es\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.criteo.com\/es\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"es-ES\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/www.criteo.com\/es\/#organization\",\n\t            \"name\": \"Criteo\",\n\t            \"alternateName\": \"Criteo corp\",\n\t            \"url\": \"https:\/\/www.criteo.com\/es\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"es-ES\",\n\t                \"@id\": \"https:\/\/www.criteo.com\/es\/#\/schema\/logo\/image\/\",\n\t                \"url\": \"https:\/\/www.criteo.com\/es\/wp-content\/uploads\/sites\/8\/2024\/02\/Criteo-Logo.svg\",\n\t                \"contentUrl\": \"https:\/\/www.criteo.com\/es\/wp-content\/uploads\/sites\/8\/2024\/02\/Criteo-Logo.svg\",\n\t                \"width\": 118,\n\t                \"height\": 24,\n\t                \"caption\": \"Criteo\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.criteo.com\/es\/#\/schema\/logo\/image\/\"\n\t            }\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to spot fake, fraudulent, spoof, or phishing emails and messages","description":"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.criteo.com\/es\/security\/","og_locale":"es_ES","og_type":"article","og_title":"How to spot fake, fraudulent, spoof, or phishing emails and messages","og_description":"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.","og_url":"https:\/\/www.criteo.com\/es\/security\/","og_site_name":"ES - Criteo","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.criteo.com\/es\/security\/","url":"https:\/\/www.criteo.com\/es\/security\/","name":"How to spot fake, fraudulent, spoof, or phishing emails and messages","isPartOf":{"@id":"https:\/\/www.criteo.com\/es\/#website"},"datePublished":"2023-07-11T13:00:20+00:00","description":"Hackers use emails and messages to deceive people into handing over sensitive personal information. Get advice on how to stay safe.","breadcrumb":{"@id":"https:\/\/www.criteo.com\/es\/security\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.criteo.com\/es\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.criteo.com\/es\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.criteo.com\/es\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/www.criteo.com\/es\/#website","url":"https:\/\/www.criteo.com\/es\/","name":"ES - Criteo","description":"","publisher":{"@id":"https:\/\/www.criteo.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.criteo.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.criteo.com\/es\/#organization","name":"Criteo","alternateName":"Criteo corp","url":"https:\/\/www.criteo.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.criteo.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.criteo.com\/es\/wp-content\/uploads\/sites\/8\/2024\/02\/Criteo-Logo.svg","contentUrl":"https:\/\/www.criteo.com\/es\/wp-content\/uploads\/sites\/8\/2024\/02\/Criteo-Logo.svg","width":118,"height":24,"caption":"Criteo"},"image":{"@id":"https:\/\/www.criteo.com\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/pages\/18728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/comments?post=18728"}],"version-history":[{"count":0,"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/pages\/18728\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/media?parent=18728"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.criteo.com\/es\/wp-json\/wp\/v2\/coauthors?post=18728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}