{"id":1144,"date":"2025-12-02T19:13:24","date_gmt":"2025-12-02T18:13:24","guid":{"rendered":"https:\/\/bprot.com\/?page_id=1144"},"modified":"2025-12-10T20:44:58","modified_gmt":"2025-12-10T19:44:58","slug":"bprotrp2026","status":"publish","type":"page","link":"https:\/\/bprot.com\/en\/bprotrp2026\/","title":{"rendered":"bprotrp2026"},"content":{"rendered":"<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-3fd5620 stk-block-background stk--has-background-overlay\" data-block-id=\"3fd5620\"><style>.stk-3fd5620 {background-image:url(https:\/\/bprot.com\/wp-content\/uploads\/2025\/09\/cabecera-2.webp) !important;min-height:var(--stk--preset--block-height--none, 0px) !important;padding-top:0px !important;padding-right:0px !important;padding-bottom:0px !important;padding-left:0px !important;margin-top:-200px !important;margin-bottom:var(--stk--preset--spacing--none, 0px) !important;}.stk-3fd5620-column{--stk-column-gap:35px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-3fd5620-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-5ee2a41\" data-v=\"4\" data-block-id=\"5ee2a41\"><style>.stk-5ee2a41-container{margin-top:var(--stk--preset--spacing--none, 0px) !important;margin-right:var(--stk--preset--spacing--none, 0px) !important;margin-bottom:var(--stk--preset--spacing--none, 0px) !important;margin-left:var(--stk--preset--spacing--none, 0px) !important;min-height:var(--stk--preset--block-height--none, 0px) !important;}.stk-5ee2a41-inner-blocks{column-gap:29px !important;}.stk-5ee2a41 {min-height:var(--stk--preset--block-height--x-large, 24rem) !important;}@media screen and (min-width:690px){.stk-5ee2a41 {flex:var(--stk-flex-grow, 1) 1 calc(45% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-5ee2a41-container stk--no-background stk--no-padding\"><div class=\"stk--block-horizontal-flex stk-block-content stk-inner-blocks stk-5ee2a41-inner-blocks\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-4ac8693\" data-v=\"4\" data-block-id=\"4ac8693\"><style>@media screen and (min-width:690px){.stk-4ac8693 {flex:var(--stk-flex-grow, 1) 1 calc(55% - var(--stk-column-gap, 0px) * 1 \/ 2 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-4ac8693-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-4ac8693-inner-blocks\"><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/bprot.com\/wp-content\/uploads\/2025\/12\/reportes-3-1024x1024.webp\" alt=\"\" class=\"wp-image-1151 size-full\" srcset=\"\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" data-srcset=\"\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-45e21d7\" data-block-id=\"45e21d7\"><style>.stk-45e21d7 .stk-block-text__text{font-size:var(--stk--preset--font-size--x-large, 50px) !important;}@media screen and (max-width:999px){.stk-45e21d7 .stk-block-text__text{font-size:var(--stk--preset--font-size--x-large, 50px) !important;}}<\/style><p class=\"stk-block-text__text\">\u00a1<strong>Welcome!<\/strong><\/p><\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Here you will find information about the indicators shown in your <\/span><span style=\"color: #ff6900;\" class=\"stk-highlight\">Performance <\/span><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">and <\/span><span style=\"color: #ff6900;\" class=\"stk-highlight\">Protection<\/span><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">.<\/span><\/h5>\n\n\n\n<p>If you have any questions, please contact us.<\/p>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-d0c9662\" data-block-id=\"d0c9662\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-63ab08e\" data-block-id=\"63ab08e\"><style>.stk-63ab08e .stk-button{background:#ff6900 !important;}<\/style><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/bprot.com\/en\/contacto\/\"><span class=\"stk-button__inner-text\"><strong>CONTACT<\/strong><\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-f1db9b7\" data-block-id=\"f1db9b7\"><style>.stk-f1db9b7 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Blocked Threats<\/span><\/strong>:<\/p>\n\n\n\n<p>A<strong>menazas bloqueadas provenientes de Internet<\/strong> are any external, intentional or automated attempt to interact with a company\u2019s network for harmful purposes.<\/p>\n\n\n\n<p>They are signs that someone or something from outside is \u201cknocking on the company\u2019s door\u201d in a suspicious or dangerous way.<\/p>\n\n\n\n<p>They may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unauthorized access attempts<\/strong> to enter systems or servers.<\/li>\n\n\n\n<li><strong>Port scans<\/strong> to detect vulnerabilities.<\/li>\n\n\n\n<li><strong>Automated attacks<\/strong> that test weak passwords<\/li>\n\n\n\n<li><strong>Sending malware<\/strong> or malicious links.<\/li>\n\n\n\n<li><strong>Unusual traffic<\/strong> trying to exploit security flaws.<\/li>\n<\/ul>\n\n\n\n<p>These events don\u2019t always succeed in causing damage, but <strong>indicate hostile activity that must be monitored<\/strong>because they are the first step attackers use to compromise information, affect services, or gain access to the company network.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-7cb4a74\" data-block-id=\"7cb4a74\"><style>.stk-7cb4a74 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Critical Incidents Mitigated:<\/span><\/strong>: <\/p>\n\n\n\n<p>I<strong>ncidentes cr\u00edticos<\/strong> que se generan <em>desde la empresa hacia Internet<\/em> son situaciones donde los propios equipos, usuarios o sistemas internos realizan acciones que representan un riesgo grave para la seguridad o la operaci\u00f3n del negocio.<\/p>\n\n\n\n<p class=\"translation-block\">Something inside the company begins to behave dangerously outwardly, which may indicate a serious problem.<\/p>\n\n\n\n<p>They may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Internal devices trying to connect to malicious sites<\/strong>  often a sign of malware infection.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Compromised devices sending sensitive data to the Internet<\/strong> without authorization.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Unusual or massive traffic<\/strong> that could indicate participation in attacks (e.g. a device turned into a bot).<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Internal apps or users uploading confidential information<\/strong> to unauthorized services.<\/li>\n<\/ul>\n\n\n\n<p class=\"translation-block\">These incidents are critical because they often reflect that <strong>there is already a breach, active malware, or unsafe behavior inside<\/strong> the network \u2014 which can lead to data leak, reputational damage or deeper compromises if not addressed immediately.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-ba3e15c\" data-block-id=\"ba3e15c\"><style>.stk-ba3e15c hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Daily trend of blocked threats<\/span><\/strong>:<\/p>\n\n\n\n<p>A graph showing the number of threats blocked per day during the period covered in the report.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-17c395e\" data-block-id=\"17c395e\"><style>.stk-17c395e hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Top 3 Risky Applications Used:<\/span><\/strong>: <\/p>\n\n\n\n<p><strong>Aplicaciones riesgosas<\/strong> son programas, servicios o sitios web que, por su funcionamiento o reputaci\u00f3n, pueden representar una amenaza para la seguridad de la empresa.<\/p>\n\n\n\n<p class=\"translation-block\">In short: they are applications that <strong>could expose data, create vulnerabilities, or facilitate attacks<\/strong> even if they are not malicious by design.<\/p>\n\n\n\n<p>They can be considered risky when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>They are not trustworthy or don\u2019t have a good security reputation.<\/strong><\/li>\n\n\n\n<li><strong>They request excessive permissions<\/strong> or access to sensitive data.<\/li>\n\n\n\n<li><strong>They transmit information unencrypted<\/strong>which facilitates data theft.<\/li>\n\n\n\n<li><strong>They don\u2019t receive updates<\/strong> and may have known flaws.<\/li>\n\n\n\n<li><strong>They operate outside corporate controls<\/strong>, like unauthorized cloud storage apps.<\/li>\n\n\n\n<li><strong>They can be used to evade security<\/strong>, like proxies or anonymization tools.<\/li>\n<\/ul>\n\n\n\n<p>Identifying them is important to <strong>prevent users \u2014 inadvertently \u2014 from creating security breaches or exposing critical<\/strong> company information.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-c4408b2\" data-block-id=\"c4408b2\"><style>.stk-c4408b2 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Top 3 Threats Faced:<\/span><\/strong>:<\/p>\n\n\n\n<p><strong>Amenazas<\/strong> son cualquier tipo de acci\u00f3n, t\u00e9cnica o contenido malicioso que busca enga\u00f1ar, infectar o comprometer a una empresa. Son los \u201cpeligros\u201d reales que los atacantes usan para robar informaci\u00f3n, afectar servicios o tomar control de sistemas.<\/p>\n\n\n\n<p class=\"translation-block\">Things that <strong>can cause harm<\/strong>, either through deception, infection, or misuse of information.<\/p>\n\n\n\n<p>Common examples:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing:<\/strong> fake emails or messages that try to trick a user into giving sensitive data or clicking malicious links.<\/li>\n\n\n\n<li><strong>Malware:<\/strong> software designed to infiltrate machines (like trojans or ransomware).<\/li>\n\n\n\n<li><strong>Virus y spam:<\/strong> unwanted files or emails that can infect machines or serve as a gateway for larger attacks.<\/li>\n\n\n\n<li><strong>Activities related to the deep web:<\/strong> traffic or connections to hidden areas of the Internet where malware, stolen data or other illegal services are distributed.<\/li>\n\n\n\n<li><strong>Emerging threats:<\/strong> Any type of activity reported as malicious that hasn\u2019t yet been classified into a specific category.<\/li>\n<\/ul>\n\n\n\n<p>Detecting and blocking them is key because they show direct attempts to compromise the network, infect machines or deceive users.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-1fca4c7\" data-block-id=\"1fca4c7\"><style>.stk-1fca4c7 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Infrastructure Health<\/span><\/strong>:<\/p>\n\n\n\n<p class=\"translation-block\">In a vulnerability analysis,<strong> \u201cproblems\u201d<\/strong> and <strong>\u201cwarnings\u201d<\/strong> represent two different risk levels, and help to understand how urgent it is to fix each finding.<\/p>\n\n\n\n<p><strong>Problems<\/strong><\/p>\n\n\n\n<p>They are detections that <strong>represent a real and concrete risk<\/strong> to the company\u2019s security.<br>In simple terms: <strong>something is wrong and can be exploited by an attacker.<\/strong>.<\/p>\n\n\n\n<p>They may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Known and exploitable vulnerabilities.<\/li>\n\n\n\n<li>Insecure configurations.<\/li>\n\n\n\n<li>Outdated versions with critical flaws.<\/li>\n\n\n\n<li>Exposed services without protection.<\/li>\n<\/ul>\n\n\n\n<p>They require <strong>immediate or priority action<\/strong>, because they may lead to unauthorized access, information theft or operational failures.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Warnings<\/strong><\/p>\n\n\n\n<p>These are situations that <strong>do not represent a direct risk<\/strong>, but could become a problem if not addressed.<br>In short: <strong>it\u2019s not a serious flaw, but a sign that something could be improved<\/strong>.<\/p>\n\n\n\n<p>They may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Services that could be configured more securely.<\/li>\n\n\n\n<li>Practices that are not ideal, but don\u2019t open a breach by themselves.<\/li>\n\n\n\n<li>Versions that are not critical but should be updated.<\/li>\n<\/ul>\n\n\n\n<p>They require <strong>revisi\u00f3n y mejora<\/strong>, pero no son urgentes.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-5385030\" data-block-id=\"5385030\"><style>.stk-5385030 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Remote Access Protection<\/span><\/strong>:<\/p>\n\n\n\n<p>A <strong>remote access attempt<\/strong> is when someone tries to connect to a company\u2019s computer or system from another place, through Internet or an external network.<\/p>\n\n\n\n<p>Attempts to \u201center\u201d a company computer or server without being physically there.<\/p>\n\n\n\n<p>They may be:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authorized but failed<\/strong>e.g. an employee typed the password wrong.<\/li>\n\n\n\n<li><strong>Intentional<\/strong>when a user \u2014 for dissatisfaction or economic reasons \u2014 offers access to external attackers.<\/li>\n\n\n\n<li><strong>Unauthorized<\/strong>when an attacker tries to get in using stolen credentials or brute-force techniques.<\/li>\n\n\n\n<li><strong>Automated<\/strong>carried out by bots that try thousands of combinations to gain access.<\/li>\n<\/ul>\n\n\n\n<p>They are important to monitor because they can indicate <strong>someone is trying to take control of internal systems<\/strong>, access sensitive information, or move within the company network.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-fc8dad4\" data-block-id=\"fc8dad4\"><style>.stk-fc8dad4 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Top 3 Devices by Consumption<\/span><\/strong>:<\/p>\n\n\n\n<p>Shows the devices connected to the network that used the most Internet during the period.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-ab95b92\" data-block-id=\"ab95b92\"><style>.stk-ab95b92 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Top 3 Most Used Applications:<\/span><\/strong>:<\/p>\n\n\n\n<p>Shows the applications most used by users connected to the company network during the period.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-7e8919f\" data-block-id=\"7e8919f\"><style>.stk-7e8919f hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Top <\/span>5<\/strong> <strong>Popular Browsing Destinations:<\/strong><\/p>\n\n\n\n<p>Shows the websites most visited by users connected to the company network during the period.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-10434da\" data-block-id=\"10434da\"><style>.stk-10434da hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Top <\/span>3 Blocked Source Countries<\/strong><\/p>\n\n\n\n<p>Shows the countries from which <strong>BPROT<\/strong> has intercepted the greatest number of dangerous incidents directed at the company.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-a1d7f5f\" data-block-id=\"a1d7f5f\"><style>.stk-a1d7f5f hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">BPROT Status<\/span><\/strong>:<\/p>\n\n\n\n<p>Indicates the overall status of <strong>BPROT<\/strong>, the modules contracted by the company, remaining days of annual license, version and automatic update number.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-be46b32\" data-block-id=\"be46b32\"><style>.stk-be46b32 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">License Capacity<\/span><\/strong>:<\/p>\n\n\n\n<p>Indicates whether the number of devices connected to the network detected by <strong>BPROT<\/strong> falls within the licensing tier contracted by the company.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-a0c42f2\" data-block-id=\"a0c42f2\"><style>.stk-a0c42f2 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Protection Status<\/span><\/strong>:<\/p>\n\n\n\n<p class=\"translation-block\"><strong>BPROT's<\/strong> automatic updates include lists of malicious sites and actors; this indicator shows whether your company has the latest available update at the time of report generation.<\/p>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Identified Malicious Sites<\/span><\/strong>:<\/p>\n\n\n\n<p>These are <strong>websites created or used to carry out harmful actions.<\/strong>.<br>In short: <strong>they are dangerous places on the Internet.<\/strong>.<\/p>\n\n\n\n<p>They may serve to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Steal passwords (phishing).<\/li>\n\n\n\n<li>Install malware.<\/li>\n\n\n\n<li>Distribute viruses or infected files.<\/li>\n\n\n\n<li>Trick the user into giving personal or corporate information.<\/li>\n<\/ul>\n\n\n\n<p>The site is the <strong>vehicle for the attack.<\/strong>.<\/p>\n\n\n\n<p><strong>BPROT <\/strong>updates its lists of malicious sites daily \u2014 these are reported as generating dangerous activity from top-tier repositories.<\/p>\n\n\n\n<p><strong><span style=\"color: var(--theme-palette-color-3, #4d5d6d);\" class=\"stk-highlight\">Identified Malicious Actors:<\/span><\/strong>:<\/p>\n\n\n\n<p>Refers to <strong>malicious IP addresses<\/strong> simply <strong>addresses on the Internet that have been identified as dangerous<\/strong> because they are associated with harmful activities.<\/p>\n\n\n\n<p>They can belong to computers, servers or networks that carry out actions such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sending <strong>virus<\/strong>, <strong>malware<\/strong> or <strong>phishing<\/strong><\/li>\n\n\n\n<li>Attempting to <strong>hack<\/strong> systems or steal information.<\/li>\n\n\n\n<li>Distributing <strong>spam<\/strong><\/li>\n\n\n\n<li>Being part of <strong>botnets<\/strong> (infected devices acting in a coordinated way)<\/li>\n<\/ul>\n\n\n\n<p>When the system detects a \"malicious IP\", it means that address is on blacklists or in security databases for harmful behavior. Blocking them helps avoid attacks and protect the network.<\/p>\n\n\n\n<p><strong>BPROT <\/strong>updates its lists of malicious actors daily \u2014 these are reported as generating dangerous activity from top-tier repositories.<\/p>\n\n\n\n<div class=\"wp-block-stackable-divider stk-block-divider stk-block stk-808b344\" data-block-id=\"808b344\"><style>.stk-808b344 hr.stk-block-divider__hr{background:var(--theme-palette-color-1, #44a0e7) !important;width:31% !important;}<\/style><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-d52eec9\" data-block-id=\"d52eec9\"><style>.stk-d52eec9 {height:150px !important;}<\/style><\/div>","protected":false},"excerpt":{"rendered":"<p>Amenazas Bloqueadas: Amenazas bloqueadas provenientes de Internet son cualquier intento externo, intencional o automatizado, de interactuar con la red de una empresa con fines da\u00f1inos. Son se\u00f1ales de que alguien o algo desde afuera est\u00e1 \u201ctocando la puerta\u201d de la empresa de manera sospechosa o peligrosa. Pueden incluir: Estos eventos no siempre logran causar da\u00f1o, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1144","page","type-page","status-publish","hentry"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>bprotrp2026 - Bprot<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bprot.com\/en\/bprotrp2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"bprotrp2026 - Bprot\" \/>\n<meta property=\"og:description\" content=\"Amenazas Bloqueadas: Amenazas bloqueadas provenientes de Internet son cualquier intento externo, intencional o automatizado, de interactuar con la red de una empresa con fines da\u00f1inos. Son se\u00f1ales de que alguien o algo desde afuera est\u00e1 \u201ctocando la puerta\u201d de la empresa de manera sospechosa o peligrosa. Pueden incluir: Estos eventos no siempre logran causar da\u00f1o, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bprot.com\/en\/bprotrp2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Bprot\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/bprot_global\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T19:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bprot.com\/wp-content\/uploads\/2025\/12\/reportes-3.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/\",\"url\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/\",\"name\":\"bprotrp2026 - Bprot\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bprot.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bprot.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/reportes-3-1024x1024.webp\",\"datePublished\":\"2025-12-02T18:13:24+00:00\",\"dateModified\":\"2025-12-10T19:44:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bprot.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/reportes-3-1024x1024.webp\",\"contentUrl\":\"https:\\\/\\\/bprot.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/reportes-3-1024x1024.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bprot.com\\\/bprotrp2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/bprot.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"bprotrp2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bprot.com\\\/#website\",\"url\":\"https:\\\/\\\/bprot.com\\\/\",\"name\":\"Bprot\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bprot.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bprot.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bprot.com\\\/#organization\",\"name\":\"Bprot\",\"url\":\"https:\\\/\\\/bprot.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bprot.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bprot.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cropped-brot-isotipo.jpg\",\"contentUrl\":\"https:\\\/\\\/bprot.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cropped-brot-isotipo.jpg\",\"width\":512,\"height\":512,\"caption\":\"Bprot\"},\"image\":{\"@id\":\"https:\\\/\\\/bprot.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/bprot_global\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@Bprot\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"bprotrp2026 - Bprot","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bprot.com\/en\/bprotrp2026\/","og_locale":"en_US","og_type":"article","og_title":"bprotrp2026 - Bprot","og_description":"Amenazas Bloqueadas: Amenazas bloqueadas provenientes de Internet son cualquier intento externo, intencional o automatizado, de interactuar con la red de una empresa con fines da\u00f1inos. Son se\u00f1ales de que alguien o algo desde afuera est\u00e1 \u201ctocando la puerta\u201d de la empresa de manera sospechosa o peligrosa. Pueden incluir: Estos eventos no siempre logran causar da\u00f1o, [&hellip;]","og_url":"https:\/\/bprot.com\/en\/bprotrp2026\/","og_site_name":"Bprot","article_publisher":"https:\/\/www.instagram.com\/bprot_global\/","article_modified_time":"2025-12-10T19:44:58+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/bprot.com\/wp-content\/uploads\/2025\/12\/reportes-3.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bprot.com\/bprotrp2026\/","url":"https:\/\/bprot.com\/bprotrp2026\/","name":"bprotrp2026 - Bprot","isPartOf":{"@id":"https:\/\/bprot.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bprot.com\/bprotrp2026\/#primaryimage"},"image":{"@id":"https:\/\/bprot.com\/bprotrp2026\/#primaryimage"},"thumbnailUrl":"https:\/\/bprot.com\/wp-content\/uploads\/2025\/12\/reportes-3-1024x1024.webp","datePublished":"2025-12-02T18:13:24+00:00","dateModified":"2025-12-10T19:44:58+00:00","breadcrumb":{"@id":"https:\/\/bprot.com\/bprotrp2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bprot.com\/bprotrp2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bprot.com\/bprotrp2026\/#primaryimage","url":"https:\/\/bprot.com\/wp-content\/uploads\/2025\/12\/reportes-3-1024x1024.webp","contentUrl":"https:\/\/bprot.com\/wp-content\/uploads\/2025\/12\/reportes-3-1024x1024.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/bprot.com\/bprotrp2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/bprot.com\/"},{"@type":"ListItem","position":2,"name":"bprotrp2026"}]},{"@type":"WebSite","@id":"https:\/\/bprot.com\/#website","url":"https:\/\/bprot.com\/","name":"Bprot","description":"","publisher":{"@id":"https:\/\/bprot.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bprot.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bprot.com\/#organization","name":"Bprot","url":"https:\/\/bprot.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bprot.com\/#\/schema\/logo\/image\/","url":"https:\/\/bprot.com\/wp-content\/uploads\/2025\/08\/cropped-brot-isotipo.jpg","contentUrl":"https:\/\/bprot.com\/wp-content\/uploads\/2025\/08\/cropped-brot-isotipo.jpg","width":512,"height":512,"caption":"Bprot"},"image":{"@id":"https:\/\/bprot.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/bprot_global\/","https:\/\/www.youtube.com\/@Bprot"]}]}},"_links":{"self":[{"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/pages\/1144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/comments?post=1144"}],"version-history":[{"count":5,"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/pages\/1144\/revisions"}],"predecessor-version":[{"id":1154,"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/pages\/1144\/revisions\/1154"}],"wp:attachment":[{"href":"https:\/\/bprot.com\/en\/wp-json\/wp\/v2\/media?parent=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}