{"id":24656,"date":"2021-09-15T05:11:42","date_gmt":"2021-09-15T05:11:42","guid":{"rendered":"https:\/\/www.apen.es\/?p=24656"},"modified":"2025-02-28T10:52:50","modified_gmt":"2025-02-28T10:52:50","slug":"preparacio-i-planificacion-el-que-ha-de-tenir-en-compte-per-a-la-ciberseguretat-de-documents-a-la-seva-empresa","status":"publish","type":"post","link":"https:\/\/www.apen.es\/ca\/bloc\/preparacio-i-planificacion-el-que-ha-de-tenir-en-compte-per-a-la-ciberseguretat-de-documents-a-la-seva-empresa\/","title":{"rendered":"Preparaci\u00f3 i planificaci\u00f3: el que heu de tenir en compte per a la ciberseguretat de documents a la vostra empresa"},"content":{"rendered":"<p>Els ciberatacs s\u00f3n cada cop m\u00e9s complexos i el dany que poden causar en una empresa pot ser significatiu i debilitant. La&nbsp;<a href=\"https:\/\/www.apen.es\/ca\/\">ciberseguretat de documents<\/a>&nbsp;pot ajudar a compensar i reduir aquests riscos en mantenir a ratlla els ciberdelinq\u00fcents. Tot i aix\u00f2, el m\u00e9s important ser\u00e0 mantenir atents i informats els membres de l&#039;empresa perqu\u00e8 puguin respondre a desastres o incidents.<\/p>\n\n\n\n<p>Els treballadors han de con\u00e8ixer els procediments operatius est\u00e0ndard quan ocorren atacs en l\u00ednia. No preparar-se \u00e9s preparar-se per fallar. En aquests dies, no ens podem permetre ignorar els ciberatacs dels esfor\u00e7os de phishing, ransomware i amenaces persistents avan\u00e7ades, ni presentar cap vulnerabilitat en les nostres operacions.<\/p>\n\n\n<style>.kb-image24656_c29edb-09 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image24656_c29edb-09\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/binary-2372130_1920.jpg\" alt=\"\" class=\"kb-img\"\/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Ciberseguretat de documents, el que cal tenir en compte<\/h2>\n\n\n\n<p>Per a la&nbsp;<strong>ciberseguretat de documents<\/strong>&nbsp;de la nostra empresa, la preparaci\u00f3 \u00e9s la clau. \u00c9s ideal eliminar la confusi\u00f3 en descriure clarament els passos que cal seguir a l&#039;empresa quan es produeix un incident. El personal ha de mantenir la calma sota pressi\u00f3 quan ocorren aquestes situacions per evitar m\u00e9s errors i complicacions.<\/p>\n\n\n\n<p>Durant les emerg\u00e8ncies, comptar amb una resposta per escrit pot ajudar els responsables de la presa de decisions a actuar en conseq\u00fc\u00e8ncia. Quan les mesures estiguin escrites, tots coneixeran els seus rols en la comunicaci\u00f3, la coordinaci\u00f3 i la investigaci\u00f3.<\/p>\n\n\n\n<p>Tamb\u00e9 ajuda a eliminar la incertesa, les conjectures i el caos en un moment molt cr\u00edtic. Aquests s\u00f3n llibres de jugades que poden ajudar les organitzacions a tenir contramesures r\u00e0pides i eficients contra els atacs. A m\u00e9s, comptar amb un n\u00famero d&#039;emerg\u00e8ncia per poder contactar els experts en qualsevol moment assegurar\u00e0 la millor presa de decisions en les mesures de&nbsp;<strong>ciberseguretat per a documents.<\/strong><\/p>\n\n\n\n<p>D&#039;altra banda, tenir documentaci\u00f3 de ciberseguretat nom\u00e9s pot proporcionar una defensa s\u00f2lida si est\u00e0 actualitzada. Si aquestes refer\u00e8ncies escrites estan desactualitzades, poden causar m\u00e9s problemes dels que resolen. M\u00e9s important encara, les amenaces persistents avan\u00e7ades no estan estancades. S&#039;amplien, improvisen, s&#039;adapten i s&#039;evolucionen. Si la documentaci\u00f3 de ciberseguretat no es mant\u00e9 al dia, ser\u00e0 obsoleta i in\u00fatil. Davant d&#039;aix\u00f2, els encarregats d&#039;aquesta \u00e0rea han d&#039;estar en constant actualitzaci\u00f3 de les possibles amenaces i presentar la informaci\u00f3 m\u00e9s actualitzada en tot moment per a la&nbsp;<strong>ciberseguretat de documents.<\/strong><\/p>\n\n\n\n<p>Un factor cr\u00edtic per a l\u00e8xit dun pla de ciberseguretat \u00e9s que shan de sotmetre a proves. Sense cap prova basada en la realitat, aquests plans poden, en \u00faltima inst\u00e0ncia, tornar-se irrellevants. Heu d&#039;experimentar la simulaci\u00f3 m\u00e9s enll\u00e0 de l&#039;escriptori de l&#039;ordinador. Actualitzi, segons calgui per adaptar-se a diverses situacions i tingui en compte tots els factors que es poden presentar en el moment.<\/p>\n\n\n\n<p>Tamb\u00e9 \u00e9s essencial crear documentaci\u00f3 de les seq\u00fceles d\u201fun incident. Aquests coneixements s\u00f3n valuosos per crear mecanismes de defensa en cas que aquests esdeveniments tornin a passar en el futur.<\/p>","protected":false},"excerpt":{"rendered":"<p>Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y&#8230;<\/p>","protected":false},"author":9,"featured_media":24658,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[417,147,494,256,194],"tags":[723],"class_list":["post-24656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad","category-ciberataques","category-phishing","category-ransomware","category-seguridad","tag-ciberseguridad-de-documentos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/ca\/bloc\/preparacio-i-planificacion-el-que-ha-de-tenir-en-compte-per-a-la-ciberseguretat-de-documents-a-la-seva-empresa\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/ca\/bloc\/preparacio-i-planificacion-el-que-ha-de-tenir-en-compte-per-a-la-ciberseguretat-de-documents-a-la-seva-empresa\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T05:11:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T10:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"carlos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"carlos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\"},\"author\":{\"name\":\"carlos\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/a4bf8e277f78c2513f5a77049a6a1423\"},\"headline\":\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa\",\"datePublished\":\"2021-09-15T05:11:42+00:00\",\"dateModified\":\"2025-02-28T10:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\"},\"wordCount\":524,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"keywords\":[\"ciberseguridad de documentos\"],\"articleSection\":[\"Actualidad\",\"Ciberataques\",\"Phishing\",\"Ransomware\",\"Seguridad\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\",\"name\":\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"datePublished\":\"2021-09-15T05:11:42+00:00\",\"dateModified\":\"2025-02-28T10:52:50+00:00\",\"description\":\"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/a4bf8e277f78c2513f5a77049a6a1423\",\"name\":\"carlos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g\",\"caption\":\"carlos\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/ca\\\/blog\\\/author\\\/carlos\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparaci\u00f3 i planificaci\u00f3: el que heu de tenir en compte per a la ciberseguretat de documents a la vostra empresa - Apen Inform\u00e0tica","description":"Els ciberatacs s\u00f3n cada cop m\u00e9s complexos i el dany que poden causar en una empresa pot ser significatiu i debilitant. La ciberseguretat de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/ca\/bloc\/preparacio-i-planificacion-el-que-ha-de-tenir-en-compte-per-a-la-ciberseguretat-de-documents-a-la-seva-empresa\/","og_locale":"ca_ES","og_type":"article","og_title":"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica","og_description":"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de","og_url":"https:\/\/www.apen.es\/ca\/bloc\/preparacio-i-planificacion-el-que-ha-de-tenir-en-compte-per-a-la-ciberseguretat-de-documents-a-la-seva-empresa\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2021-09-15T05:11:42+00:00","article_modified_time":"2025-02-28T10:52:50+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","type":"image\/jpeg"}],"author":"carlos","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"carlos","Temps estimat de lectura":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/"},"author":{"name":"carlos","@id":"https:\/\/www.apen.es\/#\/schema\/person\/a4bf8e277f78c2513f5a77049a6a1423"},"headline":"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa","datePublished":"2021-09-15T05:11:42+00:00","dateModified":"2025-02-28T10:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/"},"wordCount":524,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","keywords":["ciberseguridad de documentos"],"articleSection":["Actualidad","Ciberataques","Phishing","Ransomware","Seguridad"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","url":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","name":"Preparaci\u00f3 i planificaci\u00f3: el que heu de tenir en compte per a la ciberseguretat de documents a la vostra empresa - Apen Inform\u00e0tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","datePublished":"2021-09-15T05:11:42+00:00","dateModified":"2025-02-28T10:52:50+00:00","description":"Els ciberatacs s\u00f3n cada cop m\u00e9s complexos i el dany que poden causar en una empresa pot ser significatiu i debilitant. La ciberseguretat de","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e0tica","description":"Manteniment inform\u00e0tic , programari de gesti\u00f3, solucions d&#039;impressi\u00f3","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: Solucions inform\u00e0tiques","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/a4bf8e277f78c2513f5a77049a6a1423","name":"carlos","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g","caption":"carlos"},"url":"https:\/\/www.apen.es\/ca\/blog\/author\/carlos\/"}]}},"taxonomy_info":{"category":[{"value":417,"label":"Actualidad"},{"value":147,"label":"Ciberataques"},{"value":494,"label":"Phishing"},{"value":256,"label":"Ransomware"},{"value":194,"label":"Seguridad"}],"post_tag":[{"value":723,"label":"ciberseguridad de documentos"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920-1024x683.jpg",1024,683,true],"author_info":{"display_name":"carlos","author_link":"https:\/\/www.apen.es\/ca\/blog\/author\/carlos\/"},"comment_info":0,"category_info":[{"term_id":417,"name":"Actualidad","slug":"actualidad","term_group":0,"term_taxonomy_id":417,"taxonomy":"category","description":"","parent":0,"count":83,"filter":"raw","term_order":"0","cat_ID":417,"category_count":83,"category_description":"","cat_name":"Actualidad","category_nicename":"actualidad","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":494,"name":"Phishing","slug":"phishing","term_group":0,"term_taxonomy_id":494,"taxonomy":"category","description":"","parent":0,"count":5,"filter":"raw","term_order":"0","cat_ID":494,"category_count":5,"category_description":"","cat_name":"Phishing","category_nicename":"phishing","category_parent":0},{"term_id":256,"name":"Ransomware","slug":"ransomware","term_group":0,"term_taxonomy_id":256,"taxonomy":"category","description":"","parent":0,"count":6,"filter":"raw","term_order":"0","cat_ID":256,"category_count":6,"category_description":"","cat_name":"Ransomware","category_nicename":"ransomware","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0}],"tag_info":[{"term_id":723,"name":"ciberseguridad de documentos","slug":"ciberseguridad-de-documentos","term_group":0,"term_taxonomy_id":723,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/24656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/comments?post=24656"}],"version-history":[{"count":2,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/24656\/revisions"}],"predecessor-version":[{"id":53596,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/24656\/revisions\/53596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media\/24658"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media?parent=24656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/categories?post=24656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/tags?post=24656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}