{"id":12426,"date":"2026-01-20T22:13:45","date_gmt":"2026-01-20T22:13:45","guid":{"rendered":"https:\/\/blog.clickpanda.com\/?p=12426"},"modified":"2026-01-20T22:35:50","modified_gmt":"2026-01-20T22:35:50","slug":"microsoft-marca-mas-imitada-phishing","status":"publish","type":"post","link":"https:\/\/blog.clickpanda.com\/en\/security\/microsoft-most-imitated-brand-phishing\/","title":{"rendered":"Microsoft remains the most imitated brand in phishing attacks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"12426\" class=\"elementor elementor-12426\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2093a0c1 e-flex e-con-boxed e-con e-parent\" data-id=\"2093a0c1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c781946 elementor-widget elementor-widget-global elementor-global-10391 elementor-widget-heading\" data-id=\"c781946\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Introduction<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-458f76b0 elementor-widget elementor-widget-text-editor\" data-id=\"458f76b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Have you ever received an email that <\/span><strong>looks like Microsoft<\/strong><span style=\"font-weight: 400;\">asks you <span style=\"color: #ff6600;\">\"verify your account\"<\/span> and does it generate urgency? <\/span><span style=\"font-weight: 400;\">You are not alone. And the most worrying thing is that <\/span><strong>These emails are becoming increasingly difficult to detect.<\/strong><\/p><p><span style=\"font-weight: 400;\">According to recent cybersecurity reports, <\/span><strong>Microsoft continues to be the most impersonated brand in phishing attacks worldwide<\/strong><span style=\"font-weight: 400;\">even surpassing banks and financial platforms. <\/span><\/p><h5>The reason?<\/h5><p><span style=\"font-weight: 400;\">Millions of businesses rely on Microsoft 365, Outlook and cloud services to operate on a daily basis.<\/span><\/p><p><span style=\"font-weight: 400;\">The problem is not only fraudulent mail. <\/span><span style=\"font-weight: 400;\">The real risk is in what comes next: <\/span><strong>credential theft, unauthorized access, identity theft, financial loss and reputational damage.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0611079 elementor-widget elementor-widget-text-editor\" data-id=\"0611079\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In this article we explain:<\/span><\/p><p><strong>\u2705 Why Microsoft is a prime phishing target<\/strong><\/p><p><strong>\u2705<\/strong><strong>How these attacks actually work<\/strong><\/p><p><strong>\u2705 What risks your business faces<\/strong><\/p><p><span style=\"font-weight: 400;\"><strong>\u2705 <\/strong>And, most importantly, <\/span><strong>how to protect yourself from the ground up with ClickPanda<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0452fdc elementor-widget elementor-widget-global elementor-global-10444 elementor-widget-table-of-contents\" data-id=\"0452fdc\" data-element_type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t<div id=\"elementor-toc__0452fdc\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce7660e elementor-widget elementor-widget-heading\" data-id=\"ce7660e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is Microsoft the most imitated brand in phishing?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7154b06 elementor-widget elementor-widget-text-editor\" data-id=\"7154b06\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Attackers do not choose at random. <strong>Microsoft<\/strong> has become the ideal target for several reasons:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f776e elementor-widget elementor-widget-text-editor\" data-id=\"21f776e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>1. Massive use in companies<\/h3><p><span style=\"font-weight: 400;\">Outlook, Microsoft 365, Teams and OneDrive are critical tools in organizations of all sizes. A single compromised login can open the door to the entire enterprise.<\/span><\/p><h3>2. Automatic user confidence<\/h3><p><span style=\"font-weight: 400;\">When an email says \"Microsoft Support\" or \"Unusual activity on your account,\" many people <\/span><strong>do not hesitate<\/strong><span style=\"font-weight: 400;\"><strong>.<\/strong> The logo, design and language generate immediate trust.<\/span><\/p><h3>3. Centralized access<\/h3><p><span style=\"font-weight: 400;\">A single password can give access to mail, files, meetings and sensitive data. For an attacker, it's a jackpot.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f49dd5 elementor-widget elementor-widget-image\" data-id=\"4f49dd5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"713\" src=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/Captura-de-pantalla-2026-01-20-171443-1024x713.png\" class=\"attachment-large size-large wp-image-12429\" alt=\"microsoft login\" srcset=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/Captura-de-pantalla-2026-01-20-171443-1024x713.png 1024w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/Captura-de-pantalla-2026-01-20-171443-300x209.png 300w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/Captura-de-pantalla-2026-01-20-171443-768x535.png 768w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/Captura-de-pantalla-2026-01-20-171443-18x12.png 18w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/Captura-de-pantalla-2026-01-20-171443.png 1111w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7347ba1 elementor-widget elementor-widget-heading\" data-id=\"7347ba1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How do phishing attacks work today?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1e5685 elementor-widget elementor-widget-text-editor\" data-id=\"e1e5685\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Phishing is no longer a poorly written email with obvious errors. Today it is <\/span><strong>professional, clean and almost identical to the original.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4427de elementor-widget elementor-widget-heading\" data-id=\"b4427de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Step by step of a typical attack:\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-432b036 elementor-widget elementor-widget-text-editor\" data-id=\"432b036\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Fake mail<\/strong><b><br \/><\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> Pretend to be Microsoft: security warning, account lockout or mandatory update.<\/span><\/span><p>\u00a0<\/p><\/li><li><strong>Malicious link<\/strong><b><br \/><\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> It directs to a cloned page that looks like Outlook or Microsoft 365.<\/span><\/span><p>\u00a0<\/p><\/li><li><strong>Credential theft<\/strong><br \/><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> The user enters his email and password without noticing it.<\/span><\/span><p>\u00a0<\/p><\/li><li><strong>Actual account access<\/strong><b><br \/><\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> The attacker logs in, changes passwords or uses the account for new attacks.<\/span><\/span><p>\u00a0<\/p><\/li><li><strong>Internal propagation<\/strong><br \/>Emails are sent from the real account to other contacts in the company.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecec552 elementor-widget elementor-widget-heading\" data-id=\"ecec552\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Real risks for your business<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caca033 elementor-widget elementor-widget-text-editor\" data-id=\"caca033\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">If you think \"that only happens to big companies\", this is the critical point.<\/span><\/p><p><strong>\u00a0 \u00a0 \u274c Loss of access to corporate emails.<\/strong><\/p><p><strong>\u00a0 \u00a0 \u274c Theft of sensitive information<\/strong><\/p><p><strong>\u00a0 \u00a0 \u274c Sending fraudulent emails from your domain.<\/strong><\/p><p><strong>\u00a0 \u00a0 \u274c Blocking of IPs and domains for spam.<\/strong><\/p><p><strong>\u00a0 \u00a0 \u274c Damage to your brand reputation.<\/strong><\/p><p><strong>\u00a0 \u00a0 \u274c Direct economic losses<\/strong><\/p><p><span style=\"font-weight: 400;\">A single click can cost you <\/span><strong><span style=\"color: #ff6600;\">months of work and trust.<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3f26da elementor-widget elementor-widget-heading\" data-id=\"b3f26da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to protect your company from the ground up (not just with antivirus)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-751817f elementor-widget elementor-widget-text-editor\" data-id=\"751817f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This is where many companies fail: <\/span><strong>try to protect themselves late<\/strong><span style=\"font-weight: 400;\"><strong>,<\/strong> when the problem has already occurred.<\/span><\/p><p><span style=\"font-weight: 400;\">Safety starts with infrastructure.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f174b02 elementor-widget elementor-widget-text-editor\" data-id=\"f174b02\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>1. Use corporate e-mails with your own domain name.<\/h3><p><span style=\"font-weight: 400;\">Generic emails (Gmail, Hotmail) are easier to spoof.<\/span><\/p><h5><span style=\"color: #ff6600;\">With ClickPanda you get:<\/span><\/h5><p><strong>\u2705 Corporate e-mails with your domain name<\/strong><\/p><p><strong>Correct configuration of SPF, DKIM and DMARC<\/strong><\/p><p><strong>\u2705 Increased confidence for suppliers and customers<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21a9c42 elementor-widget elementor-widget-text-editor\" data-id=\"21a9c42\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>2. Well managed and protected domains<\/h3><p><span style=\"font-weight: 400;\">A misconfigured domain is a risk.<\/span><\/p><h5><span style=\"color: #ff6600;\">At ClickPanda:<\/span><\/h5><p><strong>\u2705 Secure registration and renewal of domains<\/strong><\/p><p><strong>\u2705 Protection against domain seizure<\/strong><\/p><p><strong>\u2705 Real technical support (no bots)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6abc453 elementor-widget elementor-widget-text-editor\" data-id=\"6abc453\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>3. Secure and updated hosting<\/h3><p><span style=\"font-weight: 400;\">Many fake pages are hosted on insecure servers.<\/span><\/p><h5><span style=\"color: #ff6600;\">Our services include:<\/span><\/h5><p><strong>\u2705 Hosting with monitoring<\/strong><\/p><p><strong>Free SSL Certificates<\/strong><\/p><p><strong>\u2705 Optimized and secure environments.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8363f1f elementor-widget elementor-widget-text-editor\" data-id=\"8363f1f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>4. Human technical support<\/h3><p><span style=\"font-weight: 400;\">When an incident occurs, <\/span><b>you don't need a forum<\/b><span style=\"font-weight: 400;\">you need answers.<\/span><\/p><h5><span style=\"color: #ff6600;\">ClickPanda offers:<\/span><\/h5><p><strong>\u2705 Specialized technical support<\/strong><\/p><p><strong>\u2705 Actual assistance in security incidents<\/strong><\/p><p><strong>\u2705 Preventive accompaniment<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b484279 elementor-widget elementor-widget-global elementor-global-11789 elementor-widget-image\" data-id=\"b484279\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/es-es\/hosting-ssd?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner2\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-1024x576.png\" class=\"attachment-large size-large wp-image-11788\" alt=\"Promotion SSD 20% discount\" srcset=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-1024x576.png 1024w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-300x169.png 300w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-768x432.png 768w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-1536x864.png 1536w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD-18x10.png 18w, https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/Promo_SSD.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eef3da elementor-widget elementor-widget-heading\" data-id=\"9eef3da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quick comparison: ClickPanda vs. generic solutions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d9086 elementor-widget elementor-widget-text-editor\" data-id=\"78d9086\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table style=\"height: 389px;\" width=\"767\"><tbody><tr><td><p><strong>Features<\/strong><\/p><\/td><td><p><strong>ClickPanda<\/strong><\/p><\/td><td><p><strong>Generic suppliers<\/strong><\/p><\/td><\/tr><tr><td><p><strong>Corporate mailings<\/strong><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u2705 Yes, with own domain<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Limited or additional<\/span><\/p><\/td><\/tr><tr><td><p><strong>SPF\/DKIM\/DMARC configuration<\/strong><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u2705 Included<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Not included<\/span><\/p><\/td><\/tr><tr><td><p><strong>Human support<\/strong><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u2705 24\/7<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Automated<\/span><\/p><\/td><\/tr><tr><td><p><strong>Focus on safety<\/strong><\/p><\/td><td><p><span style=\"font-weight: 400;\"> Preventive<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">Reagent<\/span><\/p><\/td><\/tr><tr><td><p><strong>Personalized consulting<\/strong><\/p><\/td><td><p><span style=\"font-weight: 400;\">\u2705 Yes<\/span><\/p><\/td><td><p><span style=\"font-weight: 400;\">No<\/span><\/p><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b291c94 elementor-widget elementor-widget-image\" data-id=\"b291c94\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/es-co\/certificados-ssl?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner2\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"810\" height=\"170\" src=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2019\/11\/CTA-BLOG-SSL-4.gif\" class=\"attachment-large size-large wp-image-8815\" alt=\"CTA BLOG SSL 4\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfc5125 elementor-widget elementor-widget-heading\" data-id=\"cfc5125\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Don't wait until you are a victim to act<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9022d56 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"9022d56\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/clickpanda.com\/es-es\/dominios?utm_source=blog&#038;utm_medium=text&#038;utm_campaign=blog&#038;utm_term=blog&#038;utm_content=inline_link\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\ud83d\udc49 Protect your business today with ClickPanda<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7380bdc elementor-widget elementor-widget-text-editor\" data-id=\"7380bdc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u2728 Secure domains<\/strong><\/p><p><strong>\u2728Reliable corporate mailings.<\/strong><\/p><p><strong>\u2728Hosting protected<\/strong><\/p><p><strong>\u2728Real technical support<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e07948d elementor-widget elementor-widget-button\" data-id=\"e07948d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/clickpanda.com\/es-co\/correo-corporativo?utm_source=blog&#038;utm_medium=text&#038;utm_campaign=blog&#038;utm_term=blog&#038;utm_content=inline_link\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Sign up now at ClickPanda.com and strengthen your digital security from the ground up.<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e93908 elementor-widget elementor-widget-heading\" data-id=\"3e93908\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b411e0c elementor-widget elementor-widget-text-editor\" data-id=\"b411e0c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Phishing is not a problem of the future. <\/span><span style=\"font-weight: 400;\">It is a threat <\/span><strong>real, active and growing<\/strong><span style=\"font-weight: 400;\"><strong>,<\/strong> even for small businesses.<\/span><\/p><p><span style=\"font-weight: 400;\">Microsoft will continue to be imitated. <\/span><span style=\"font-weight: 400;\">The question is: <\/span><strong>is your company ready?<\/strong><\/p><p><span style=\"font-weight: 400;\">With ClickPanda you don't just hire services, <\/span><strong>you build a secure, reliable and professional digital foundation.<\/strong><\/p><p><span style=\"font-weight: 400;\">Grow your online presence with ClickPanda. <\/span><strong><span style=\"color: #ff6600;\">The time is now.<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction Have you ever received an email that looks like it's from Microsoft, asks you to \"verify your account\" and gives you a sense of urgency? You are not alone. And the most worrying thing is that these emails are becoming increasingly difficult to detect. According to recent cybersecurity reports, Microsoft continues to be the most impersonated brand in phishing attacks to [...]<\/p>","protected":false},"author":1,"featured_media":12428,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[118,120,127,131,125,123,117,130,116],"class_list":["post-12426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-ciberseguridad","tag-clickpanda","tag-dkim","tag-dmarc","tag-estafas-digitales","tag-hosting-seguro","tag-microsoft-365","tag-outlook","tag-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing<\/title>\n<meta name=\"description\" content=\"Microsoft lidera los ataques de phishing en 2025. Aprende por qu\u00e9 sucede, c\u00f3mo funcionan estas estafas y c\u00f3mo proteger tu dominio, correos y sitio web con ClickPanda\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.clickpanda.com\/en\/security\/microsoft-most-imitated-brand-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing\" \/>\n<meta property=\"og:description\" content=\"Microsoft lidera los ataques de phishing en 2025. Aprende por qu\u00e9 sucede, c\u00f3mo funcionan estas estafas y c\u00f3mo proteger tu dominio, correos y sitio web con ClickPanda\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.clickpanda.com\/en\/security\/microsoft-most-imitated-brand-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickPanda Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-20T22:13:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T22:35:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ClickPanda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ClickPanda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/\"},\"author\":{\"name\":\"ClickPanda\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/65b603e17cb666be4ef630cf37340185\"},\"headline\":\"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing\",\"datePublished\":\"2026-01-20T22:13:45+00:00\",\"dateModified\":\"2026-01-20T22:35:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/\"},\"wordCount\":787,\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png\",\"keywords\":[\"ciberseguridad\",\"clickpanda\",\"dkim\",\"dmarc\",\"estafas digitales\",\"hosting seguro\",\"microsoft 365\",\"outlook\",\"phishing\"],\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/\",\"url\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/\",\"name\":\"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png\",\"datePublished\":\"2026-01-20T22:13:45+00:00\",\"dateModified\":\"2026-01-20T22:35:50+00:00\",\"description\":\"Microsoft lidera los ataques de phishing en 2025. Aprende por qu\u00e9 sucede, c\u00f3mo funcionan estas estafas y c\u00f3mo proteger tu dominio, correos y sitio web con ClickPanda\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png\",\"width\":1024,\"height\":1024,\"caption\":\"Microsoft encabeza la lista de marcas m\u00e1s suplantadas en ataques de phishing durante 2025. Prot\u00e9gete con ClickPanda\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.clickpanda.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"name\":\"ClickPanda Blog\",\"description\":\"Noticias y novedades del mundo digital con ClickPanda\",\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\",\"name\":\"ClickPanda Blog\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"width\":1000,\"height\":541,\"caption\":\"ClickPanda Blog\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/65b603e17cb666be4ef630cf37340185\",\"name\":\"ClickPanda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82d37212d6d3a48c3a15ebca75a9a672f19a5a65ebcad578992e9a9467dd632a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82d37212d6d3a48c3a15ebca75a9a672f19a5a65ebcad578992e9a9467dd632a?s=96&d=mm&r=g\",\"caption\":\"ClickPanda\"},\"sameAs\":[\"https:\/\/blog.clickpanda.com\"],\"url\":\"https:\/\/blog.clickpanda.com\/en\/author\/clickpadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing","description":"Microsoft lidera los ataques de phishing en 2025. Aprende por qu\u00e9 sucede, c\u00f3mo funcionan estas estafas y c\u00f3mo proteger tu dominio, correos y sitio web con ClickPanda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.clickpanda.com\/en\/security\/microsoft-most-imitated-brand-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing","og_description":"Microsoft lidera los ataques de phishing en 2025. Aprende por qu\u00e9 sucede, c\u00f3mo funcionan estas estafas y c\u00f3mo proteger tu dominio, correos y sitio web con ClickPanda","og_url":"https:\/\/blog.clickpanda.com\/en\/security\/microsoft-most-imitated-brand-phishing\/","og_site_name":"ClickPanda Blog","article_published_time":"2026-01-20T22:13:45+00:00","article_modified_time":"2026-01-20T22:35:50+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png","type":"image\/png"}],"author":"ClickPanda","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ClickPanda","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#article","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/"},"author":{"name":"ClickPanda","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/65b603e17cb666be4ef630cf37340185"},"headline":"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing","datePublished":"2026-01-20T22:13:45+00:00","dateModified":"2026-01-20T22:35:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/"},"wordCount":787,"publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png","keywords":["ciberseguridad","clickpanda","dkim","dmarc","estafas digitales","hosting seguro","microsoft 365","outlook","phishing"],"articleSection":["Seguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/","url":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/","name":"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage"},"image":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png","datePublished":"2026-01-20T22:13:45+00:00","dateModified":"2026-01-20T22:35:50+00:00","description":"Microsoft lidera los ataques de phishing en 2025. Aprende por qu\u00e9 sucede, c\u00f3mo funcionan estas estafas y c\u00f3mo proteger tu dominio, correos y sitio web con ClickPanda","breadcrumb":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#primaryimage","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2026\/01\/phishing-microsoft-proteccion-clickpanda.png","width":1024,"height":1024,"caption":"Microsoft encabeza la lista de marcas m\u00e1s suplantadas en ataques de phishing durante 2025. Prot\u00e9gete con ClickPanda"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.clickpanda.com\/seguridad\/microsoft-marca-mas-imitada-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.clickpanda.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft sigue siendo la marca m\u00e1s imitada en ataques de phishing"}]},{"@type":"WebSite","@id":"https:\/\/blog.clickpanda.com\/en\/#website","url":"https:\/\/blog.clickpanda.com\/en\/","name":"ClickPanda Blog","description":"Noticias y novedades del mundo digital con ClickPanda","publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.clickpanda.com\/en\/#organization","name":"ClickPanda Blog","url":"https:\/\/blog.clickpanda.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","width":1000,"height":541,"caption":"ClickPanda Blog"},"image":{"@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/65b603e17cb666be4ef630cf37340185","name":"ClickPanda","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82d37212d6d3a48c3a15ebca75a9a672f19a5a65ebcad578992e9a9467dd632a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82d37212d6d3a48c3a15ebca75a9a672f19a5a65ebcad578992e9a9467dd632a?s=96&d=mm&r=g","caption":"ClickPanda"},"sameAs":["https:\/\/blog.clickpanda.com"],"url":"https:\/\/blog.clickpanda.com\/en\/author\/clickpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/12426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/comments?post=12426"}],"version-history":[{"count":10,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/12426\/revisions"}],"predecessor-version":[{"id":12439,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/12426\/revisions\/12439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media\/12428"}],"wp:attachment":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media?parent=12426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/categories?post=12426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/tags?post=12426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}