{"id":21304,"date":"2020-12-14T11:28:25","date_gmt":"2020-12-14T11:28:25","guid":{"rendered":"https:\/\/www.apen.es\/?p=21304"},"modified":"2026-04-10T12:09:40","modified_gmt":"2026-04-10T12:09:40","slug":"perque-necessites-una-politica-de-seguretat-amb-el-sistema-de-treball-byod","status":"publish","type":"post","link":"https:\/\/www.apen.es\/ca\/bloc\/perque-necessites-una-politica-de-seguretat-amb-el-sistema-de-treball-byod\/","title":{"rendered":"Per qu\u00e8 necessites una pol\u00edtica de seguretat amb el sistema de treball BYOD?"},"content":{"rendered":"<p>BYOD (Bring Your Own Device) significa \u201cporta el teu propi dispositiu\u201d, fent refer\u00e8ncia a una tend\u00e8ncia cada cop m\u00e9s utilitzada en l&#039;\u00e0mbit de l&#039;empresa, en qu\u00e8 els treballadors poden portar els seus dispositius i utilitzar-los per accedir als recursos que ofereix la companyia.<\/p>\n\n\n\n<p>BYOD es converteix en la millor manera d&#039;unificar tots els dispositius intel\u00b7ligents en un, per no duplicar eines semblants.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>BYOD \u00e9s una eina perfecta per al teletreball<\/strong><\/h3>\n\n\n\n<p>Connectar-te amb el teu propi ordinador port\u00e0til, centralitzar la informaci\u00f3 de la teva empresa al teu smartphone per no haver de portar dos m\u00f2bils o accedir a la xarxa corporativa des de casa teva s\u00f3n alguns avantatges que presenta BYOD. Aix\u00f2 suposa un gran aven\u00e7 per tenir tota la informaci\u00f3 que necessites al teu dispositiu, del que pots disposar tant a l&#039;empresa com des de casa teva.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Per\u00f2... Quins riscos pot presentar aquesta nova manera de treballar?<\/strong><\/h3>\n\n\n\n<p>Qu\u00e8 passa si perdem el dispositiu o l&#039;equip amb la informaci\u00f3 empresarial? Qu\u00e8 passa si ens treuen o ens veuen alguna contrasenya? I si ens connectem a una xarxa wifi p\u00fablica no segura i ens copien informaci\u00f3? I si la geolocalitzaci\u00f3 queda activada i saben on som a cada moment? d&#039;empresa?<\/p>\n\n\n\n<p>BYOD pot ser molt \u00fatil, per\u00f2 alhora molt perill\u00f3s, perqu\u00e8 es poden compartir dispositius per a tasques professionals i dom\u00e8stiques, per\u00f2 si establim una pol\u00edtica de seguretat fiable podem solucionar aquests possibles riscos, per treballar de manera segura i aprofitar tots els avantatges que ofereix aquesta nova tecnologia.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>La pol\u00edtica de seguretat<\/strong><\/h3>\n\n\n\n<p>La pol\u00edtica de seguretat \u00e9s una normativa amb restriccions i permisos que s&#039;estableixen a tots els dispositius personals, per assegurar un \u00fas empresarial segur d&#039;aquesta eina. Aquest document inclour\u00e0 restriccions d&#039;\u00fas, categories d&#039;aplicacions que podem instal\u00b7lar, llocs on no podrem navegar, connexions que no podrem fer servir, etc. Tot i que no tot seran prohibicions, sin\u00f3 m\u00e9s aviat recomanacions d&#039;\u00fas preventives, ja que es potenciar\u00e0 una cultura d&#039;usuari on estigui informat dels perills i aconsegueixi un comportament i uns h\u00e0bits de treball que estiguin basats en una premissa de prud\u00e8ncia, per evitar tots els perills que hem esmentat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Qu\u00e8 podem fer com a administradors del sistema?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Podem establir una pol\u00edtica d&#039;aplicacions autoritzades perqu\u00e8 els usuaris en facin \u00fas.<\/li>\n\n\n\n<li>Crear un repositori oficial de l&#039;organitzaci\u00f3 al n\u00favol, per assegurar el control de la informaci\u00f3 i tamb\u00e9 la seguretat de l&#039;acc\u00e9s<\/li>\n\n\n\n<li>Fer c\u00f2pies de seguretat al n\u00favol amb certa freq\u00fc\u00e8ncia, adequada a la variaci\u00f3 de la informaci\u00f3 i amb un sistema de versions per accedir en cas de p\u00e8rdua puntual<\/li>\n\n\n\n<li>Activar el xifratge de dades als dispositius m\u00f2bils<\/li>\n\n\n\n<li>Comptar amb un antivirus eficient<\/li>\n\n\n\n<li>Controlar quins dispositius tenim amb un MDM perqu\u00e8 ens ajudi en cas de p\u00e8rdua amb la localitzaci\u00f3 o la desactivaci\u00f3 o eliminaci\u00f3 de la informaci\u00f3.<\/li>\n\n\n\n<li>Hem de garantir una seguretat perimetral completa de la xarxa i utilitzar connexions segures com la xarxa privada virtual VPN als dispositius m\u00f2bils.<\/li>\n<\/ul>\n\n\n\n<p>Per a m\u00e9s informaci\u00f3 posa&#039;t en contacte amb nosaltres.<\/p>","protected":false},"excerpt":{"rendered":"<p>BYOD (Bring Your Own Device) significa \u201ctrae tu propio dispositivo\u201d, haciendo referencia a una tendencia cada vez m\u00e1s utilizada en&#8230;<\/p>","protected":false},"author":4,"featured_media":21305,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[417,47,147,836,194],"tags":[644],"class_list":["post-21304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad","category-apen","category-ciberataques","category-ciberseguridad","category-seguridad","tag-byod"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD? - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"BYOD (Bring Your Own Device) significa \u201ctrae tu propio dispositivo\u201d, haciendo referencia a una tendencia cada vez m\u00e1s utilizada en el \u00e1mbito de la\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/ca\/bloc\/perque-necessites-una-politica-de-seguretat-amb-el-sistema-de-treball-byod\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD? - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"BYOD (Bring Your Own Device) significa \u201ctrae tu propio dispositivo\u201d, haciendo referencia a una tendencia cada vez m\u00e1s utilizada en el \u00e1mbito de la\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/ca\/bloc\/perque-necessites-una-politica-de-seguretat-amb-el-sistema-de-treball-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-14T11:28:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T12:09:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"672\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD?\",\"datePublished\":\"2020-12-14T11:28:25+00:00\",\"dateModified\":\"2026-04-10T12:09:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/\"},\"wordCount\":587,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/byod.jpg\",\"keywords\":[\"BYOD\"],\"articleSection\":[\"Actualidad\",\"Apen\",\"Ciberataques\",\"Ciberseguridad\",\"Seguridad\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/\",\"name\":\"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD? - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/byod.jpg\",\"datePublished\":\"2020-12-14T11:28:25+00:00\",\"dateModified\":\"2026-04-10T12:09:40+00:00\",\"description\":\"BYOD (Bring Your Own Device) significa \u201ctrae tu propio dispositivo\u201d, haciendo referencia a una tendencia cada vez m\u00e1s utilizada en el \u00e1mbito de la\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/byod.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/byod.jpg\",\"width\":1200,\"height\":672},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/ca\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Per qu\u00e8 necessites una pol\u00edtica de seguretat amb el sistema de treball BYOD? - Apen Inform\u00e0tica","description":"BYOD (Bring Your Own Device) significa \u201cporta el teu propi dispositiu\u201d, fent refer\u00e8ncia a una tend\u00e8ncia cada cop m\u00e9s utilitzada en l&#039;\u00e0mbit de la","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/ca\/bloc\/perque-necessites-una-politica-de-seguretat-amb-el-sistema-de-treball-byod\/","og_locale":"ca_ES","og_type":"article","og_title":"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD? - Apen Inform\u00e1tica","og_description":"BYOD (Bring Your Own Device) significa \u201ctrae tu propio dispositivo\u201d, haciendo referencia a una tendencia cada vez m\u00e1s utilizada en el \u00e1mbito de la","og_url":"https:\/\/www.apen.es\/ca\/bloc\/perque-necessites-una-politica-de-seguretat-amb-el-sistema-de-treball-byod\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2020-12-14T11:28:25+00:00","article_modified_time":"2026-04-10T12:09:40+00:00","og_image":[{"width":1200,"height":672,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"marqueting","Temps estimat de lectura":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD?","datePublished":"2020-12-14T11:28:25+00:00","dateModified":"2026-04-10T12:09:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/"},"wordCount":587,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod.jpg","keywords":["BYOD"],"articleSection":["Actualidad","Apen","Ciberataques","Ciberseguridad","Seguridad"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/","url":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/","name":"Per qu\u00e8 necessites una pol\u00edtica de seguretat amb el sistema de treball BYOD? - Apen Inform\u00e0tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod.jpg","datePublished":"2020-12-14T11:28:25+00:00","dateModified":"2026-04-10T12:09:40+00:00","description":"BYOD (Bring Your Own Device) significa \u201cporta el teu propi dispositiu\u201d, fent refer\u00e8ncia a una tend\u00e8ncia cada cop m\u00e9s utilitzada en l&#039;\u00e0mbit de la","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod.jpg","width":1200,"height":672},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/por-que-necesitas-una-politica-de-seguridad-con-el-sistema-de-trabajo-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"\u00bfPor qu\u00e9 necesitas una pol\u00edtica de seguridad con el sistema de trabajo BYOD?"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e0tica","description":"Manteniment inform\u00e0tic , programari de gesti\u00f3, solucions d&#039;impressi\u00f3","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: Solucions inform\u00e0tiques","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"m\u00e0rqueting","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":417,"label":"Actualidad"},{"value":47,"label":"Apen"},{"value":147,"label":"Ciberataques"},{"value":836,"label":"Ciberseguridad"},{"value":194,"label":"Seguridad"}],"post_tag":[{"value":644,"label":"BYOD"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2020\/12\/byod-1024x573.jpg",1024,573,true],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":417,"name":"Actualidad","slug":"actualidad","term_group":0,"term_taxonomy_id":417,"taxonomy":"category","description":"","parent":0,"count":83,"filter":"raw","term_order":"0","cat_ID":417,"category_count":83,"category_description":"","cat_name":"Actualidad","category_nicename":"actualidad","category_parent":0},{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":836,"name":"Ciberseguridad","slug":"ciberseguridad","term_group":0,"term_taxonomy_id":836,"taxonomy":"category","description":"","parent":0,"count":10,"filter":"raw","term_order":"0","cat_ID":836,"category_count":10,"category_description":"","cat_name":"Ciberseguridad","category_nicename":"ciberseguridad","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0}],"tag_info":[{"term_id":644,"name":"BYOD","slug":"byod","term_group":0,"term_taxonomy_id":644,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/21304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/comments?post=21304"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/21304\/revisions"}],"predecessor-version":[{"id":53614,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/21304\/revisions\/53614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media\/21305"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media?parent=21304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/categories?post=21304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/tags?post=21304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}