{"id":63259,"date":"2026-02-23T09:23:29","date_gmt":"2026-02-23T09:23:29","guid":{"rendered":"https:\/\/www.apen.es\/?p=63259"},"modified":"2026-02-23T09:34:01","modified_gmt":"2026-02-23T09:34:01","slug":"ciberseguridad-identidad-pymes","status":"publish","type":"post","link":"https:\/\/www.apen.es\/ca\/blog\/ciberseguridad-identidad-pymes\/","title":{"rendered":"Ciberseguretat d&#039;identitat a pimes: com prevenir phishing i ransomware"},"content":{"rendered":"<p>El 2026, la <strong>ciberseguretat d&#039;identitat a pimes<\/strong> ha esdevingut una prioritat estrat\u00e8gica. En un entorn digital cada vegada m\u00e9s connectat, els ciberatacs ja no necessiten vulnerar complexes infraestructures t\u00e8cniques: nom\u00e9s cal comprometre una contrasenya, un correu electr\u00f2nic corporatiu o una sessi\u00f3 activa a Microsoft 365 per accedir a tota la xarxa empresarial.<\/p>\n\n\n\n<p>Les pimes que treballen amb eines al n\u00favol, acc\u00e9s remot, ERP online o entorns col\u00b7laboratius estan exposades di\u00e0riament a intents de pesca empresarial, frau del CEO, robatori de credencials i ransomware.<\/p>\n\n\n\n<p>La bona not\u00edcia \u00e9s que la majoria daquests incidents es poden prevenir mitjan\u00e7ant una estrat\u00e8gia clara de protecci\u00f3 didentitats digitals, combinant contrasenyes segures, doble autenticaci\u00f3 (MFA), control daccessos i formaci\u00f3 en ciberseguretat per a empleats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">El que descobrireu en aquest article sobre ciberseguretat d&#039;identitat<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Qu\u00e8 \u00e9s la ciberseguretat d&#039;identitat i per qu\u00e8 \u00e9s clau el 2026?<\/li>\n\n\n\n<li>Per qu\u00e8 les pimes s\u00f3n el principal objectiu dels ciberatacs?<\/li>\n\n\n\n<li>Com funcionen els atacs de pesca i ransomware?<\/li>\n\n\n\n<li>Com crear contrasenyes segures i evitar-ne el robatori?<\/li>\n\n\n\n<li>Per qu\u00e8 la doble autenticaci\u00f3 (MFA) \u00e9s imprescindible?<\/li>\n\n\n\n<li>Com aplicar correctament la regla 3-2-1 a c\u00f2pies de seguretat?<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Qu\u00e8 \u00e9s la ciberseguretat d&#039;identitat a pimes i per qu\u00e8 \u00e9s fonamental?<\/h2>\n\n\n\n<p><br>La <strong>ciberseguretat d&#039;identitat<\/strong> engloba totes les mesures destinades a protegir les credencials digitals dels usuaris: contrasenyes, accessos, permisos i sistemes d&#039;autenticaci\u00f3 que permeten entrar als sistemes de l&#039;empresa.<\/p>\n\n\n\n<p>En el model actual, basat en el n\u00favol i en l&#039;acc\u00e9s remot, el per\u00edmetre tradicional \u2013firewall, xarxa local o servidor f\u00edsic\u2013 ja no \u00e9s suficient. Avui el veritable punt de control no \u00e9s a la infraestructura, sin\u00f3 a la identitat de l&#039;usuari.<\/p>\n\n\n\n<p>L&#039;acc\u00e9s a:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Correu corporatiu<\/li>\n\n\n\n<li>Microsoft 365<\/li>\n\n\n\n<li>ERP i CRM<\/li>\n\n\n\n<li>VPN<\/li>\n\n\n\n<li>Plataformes col\u00b7laboratives<\/li>\n<\/ul>\n\n\n\n<p>dep\u00e8n directament de qui s&#039;autentica i amb quines credencials ho fa.<\/p>\n\n\n\n<p>Si un atacant aconsegueix una contrasenya v\u00e0lida, no cal vulnerar t\u00e8cnicament el sistema. Podeu entrar amb permisos leg\u00edtims, moure&#039;s dins de la xarxa i accedir a informaci\u00f3 sensible com si fos un empleat autoritzat.<\/p>\n\n\n\n<p>Per aix\u00f2, en el context actual, protegir la identitat digital no \u00e9s una mesura t\u00e8cnica m\u00e9s: \u00e9s protegir la continu\u00eftat, reputaci\u00f3 i estabilitat de l&#039;empresa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Per qu\u00e8 les pimes s\u00f3n objectiu prioritari dels ciberatacs?<br><\/h2>\n\n\n\n<p>Molts directius continuen pensant que els ciberatacs afecten \u00fanicament grans corporacions o organismes p\u00fablics. Tot i aix\u00f2, la realitat actual demostra just el contrari: <strong>les pimes han esdevingut un dels principals objectius dels ciberdelinq\u00fcents<\/strong>.<\/p>\n\n\n\n<p>El motiu \u00e9s senzill. Avui dia els atacs no s\u00f3n manuals ni personalitzats; s\u00f3n automatitzats, massius i escalables. Es llancen milers d&#039;intents diaris mitjan\u00e7ant bots i eines avan\u00e7ades que busquen vulnerabilitats de manera sistem\u00e0tica, sense discriminar per mida d&#039;empresa.<\/p>\n\n\n\n<p>En aquest context, les pimes presenten factors que les fan especialment atractives per a un atacant:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Solen destinar menys recursos a seguretat avan\u00e7ada.<\/li>\n\n\n\n<li>No sempre tenen protocols interns estrictes de verificaci\u00f3.<\/li>\n\n\n\n<li>La formaci\u00f3 en ciberseguretat dels empleats pot ser limitada.<\/li>\n\n\n\n<li>Gestionen dades financeres, personals i estrat\u00e8giques igualment valuoses.<\/li>\n<\/ul>\n\n\n\n<p>Per al ciberdelinq\u00fcent, la mida no \u00e9s determinant. El que \u00e9s rellevant \u00e9s l&#039;oportunitat. I si hi ha una porta oberta \u2014una contrasenya feble, un correu mal verificat o un acc\u00e9s sense doble autenticaci\u00f3\u2014 es produir\u00e0 l&#039;atac.<\/p>\n\n\n\n<p>L&#039;objectiu final gaireb\u00e9 sempre \u00e9s econ\u00f2mic: exigir un rescat, desviar una transfer\u00e8ncia o vendre informaci\u00f3 sensible al mercat il\u00b7l\u00edcit. Segons els <a href=\"https:\/\/www.incibe.es\">dades oficials d&#039;INCIBE sobre ciberseguretat a Espanya<\/a>, les petites i mitjanes empreses segueixen sent un dels principals objectius dels ciberdelinq\u00fcents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Principals amenaces a la identitat digital a empreses<\/h2>\n\n\n\n<p>Dins una estrat\u00e8gia s\u00f2lida de <strong>ciberseguretat d&#039;identitat a pimes<\/strong>, \u00e9s fonamental comprendre quines s\u00f3n les principals amenaces que poden comprometre les credencials digitals i posar en risc la continu\u00eftat del negoci.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing empresarial: com funciona i com detectar-ho<\/h3>\n\n\n\n<p>El <strong>phishing empresarial<\/strong> \u00e9s actualment latac m\u00e9s freq\u00fcent contra la identitat digital de les empreses. No necessita vulnerar servidors ni trencar sistemes complexos: nom\u00e9s requereix que un usuari faci clic on no ho ha de fer.<\/p>\n\n\n\n<p>Aquest tipus d&#039;atac consisteix a enviar un correu electr\u00f2nic que aparenta procedir d&#039;una entitat leg\u00edtima \u2014com el banc, l&#039;Ag\u00e8ncia Tribut\u00e0ria, la DGT o un prove\u00efdor habitual\u2014 amb l&#039;objectiu de generar confian\u00e7a. El missatge sol incloure un enlla\u00e7 o fitxer adjunt que, en obrir-se, permet el <strong>robatori de credencials<\/strong>, la instal\u00b7laci\u00f3 de <strong>malware<\/strong> o l&#039;acc\u00e9s no autoritzat al correu corporatiu.<\/p>\n\n\n\n<p>La sofisticaci\u00f3 daquests atacs ha augmentat. Ja no sempre presenten errors ortogr\u00e0fics evidents. Per aix\u00f2 \u00e9s fonamental saber identificar els senyals d&#039;alerta m\u00e9s habituals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>El domini del remitent \u00e9s gaireb\u00e9 id\u00e8ntic al original, per\u00f2 inclou petites variacions.<\/li>\n\n\n\n<li>El missatge transmet una urg\u00e8ncia artificial (bloqueig de compte, multa immediata, pagament pendent).<\/li>\n\n\n\n<li>L&#039;enlla\u00e7 est\u00e0 escur\u00e7at o adre\u00e7a a una URL sospitosa.<\/li>\n\n\n\n<li>El contingut \u00e9s gen\u00e8ric i no inclou dades personalitzades verificables.<\/li>\n<\/ul>\n\n\n\n<p>El veritable risc no \u00e9s rebre el missatge, sin\u00f3 reaccionar sense validar. En un entorn empresarial, un sol clic pot comprometre contrasenyes, sistemes compartits i fins i tot la xarxa completa.<\/p>\n\n\n\n<p>Detectar el phishing a temps no \u00e9s una q\u00fcesti\u00f3 t\u00e8cnica, sin\u00f3 de cultura de ciberseguretat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ransomware a pimes: com afecta la identitat digital i la continu\u00eftat del negoci<\/h3>\n\n\n\n<p>El <strong>ransomware a pimes<\/strong> sol comen\u00e7ar amb alguna cosa aparentment inofensiva: la filtraci\u00f3 d&#039;unes credencials v\u00e0lides. Quan un atacant aconsegueix acc\u00e9s al correu oa la xarxa corporativa, ja no necessita for\u00e7ar sistemes; entra com si fos un usuari leg\u00edtim.<\/p>\n\n\n\n<p>A partir d&#039;aquell moment, es pot despla\u00e7ar lateralment per la infraestructura i xifrar actius cr\u00edtics com:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Documents compartits en xarxa.<\/li>\n\n\n\n<li>Bases de dades corporatives.<\/li>\n\n\n\n<li>Sistemes ERP i programari de gesti\u00f3.<\/li>\n\n\n\n<li>Servidors complets i entorns virtualitzats.<\/li>\n<\/ul>\n\n\n\n<p>L&#039;objectiu \u00e9s clar: bloquejar l&#039;acc\u00e9s a la informaci\u00f3 i exigir un rescat econ\u00f2mic per recuperar-lo.<\/p>\n\n\n\n<p>L&#039;impacte del ransomware no \u00e9s nom\u00e9s t\u00e8cnic. Afecta directament la <strong>identitat digital de l&#039;empresa<\/strong>, a la seva reputaci\u00f3 ia la seva capacitat operativa. Lactivitat pot quedar paralitzada durant dies o fins i tot setmanes, amb conseq\u00fc\u00e8ncies econ\u00f2miques, legals i comercials significatives.<\/p>\n\n\n\n<p>A m\u00e9s, molts atacs s&#039;executen estrat\u00e8gicament en cap de setmana o en per\u00edodes de vacances. En aquests moments hi ha menys supervisi\u00f3, menys capacitat de reacci\u00f3 i m\u00e9s temps perqu\u00e8 el xifratge es completi abans de ser detectat.<\/p>\n\n\n\n<p>Per aix\u00f2, la prevenci\u00f3 davant del ransomware no \u00e9s nom\u00e9s una q\u00fcesti\u00f3 tecnol\u00f2gica, sin\u00f3 estrat\u00e8gica. Protegir les credencials, implantar doble autenticaci\u00f3, comptar amb antivirus amb detecci\u00f3 avan\u00e7ada i mantenir c\u00f2pies de seguretat a\u00efllades s\u00f3n mesures clau per preservar la continu\u00eftat del negoci.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Suplantaci\u00f3 d&#039;identitat i frau del CEO: un dels riscos m\u00e9s grans per a les pimes<\/h3>\n\n\n\n<p>La <strong>suplantaci\u00f3 d&#039;identitat a empreses<\/strong>, tamb\u00e9 coneguda com <strong>frau del CEO<\/strong>, \u00e9s un dels atacs m\u00e9s perillosos i costosos per a les pimes.<\/p>\n\n\n\n<p>L&#039;escenari se sol repetir: el departament financer rep un correu aparentment enviat pel gerent o per un directiu. El missatge sol\u00b7licita una transfer\u00e8ncia urgent a un prove\u00efdor o un compte nou, al\u00b7legant confidencialitat o una operaci\u00f3 estrat\u00e8gica que no pot esperar.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A primera vista, tot sembla leg\u00edtim.<\/li>\n\n\n\n<li>El nom del remitent coincideix.<\/li>\n\n\n\n<li>El domini \u00e9s gaireb\u00e9 id\u00e8ntic al real.<\/li>\n\n\n\n<li>El to \u00e9s professional i convincent.<\/li>\n<\/ul>\n\n\n\n<p>Tot i aix\u00f2, es tracta d&#039;una manipulaci\u00f3 acuradament dissenyada per generar pressi\u00f3 i accelerar la decisi\u00f3. L&#039;element clau del frau del CEO \u00e9s la urg\u00e8ncia: l&#039;atacant cerca que l&#039;empleat actu\u00ef abans de verificar-lo.<\/p>\n\n\n\n<p>Aquest tipus de <strong>suplantaci\u00f3 d&#039;identitat corporativa<\/strong> no requereix malware ni vulnerabilitats t\u00e8cniques. Es basa en enginyeria social i coneixement de l&#039;estructura interna de l&#039;empresa.<\/p>\n\n\n\n<p>La millor defensa no \u00e9s tecnol\u00f2gica sin\u00f3 procedimental.<br>Tota sol\u00b7licitud urgent de pagament, canvi de n\u00famero de compte o transfer\u00e8ncia extraordin\u00e0ria s&#039;ha de verificar obligat\u00f2riament per un segon canal independent: trucada telef\u00f2nica directa, confirmaci\u00f3 presencial o validaci\u00f3 interna formal.<\/p>\n\n\n\n<p>En ciberseguretat empresarial, desconfiar de la urg\u00e8ncia \u00e9s una mesura de protecci\u00f3.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Com protegir la identitat digital a la teva empresa pas a pas<\/h2>\n\n\n\n<p>Implementar correctament la <strong>ciberseguretat d&#039;identitat a pimes<\/strong> requereix combinar tecnologia, processos interns i formaci\u00f3 continuada dels empleats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Com crear contrasenyes segures per a empreses<\/h3>\n\n\n\n<p>Una de les bases de la <strong>ciberseguretat d&#039;identitat a empreses<\/strong> \u00e9s la correcta gesti\u00f3 de contrasenyes. Una contrasenya empresarial feble pot convertir-se en la porta dentrada a un atac de ransomware oa una suplantaci\u00f3 didentitat.<\/p>\n\n\n\n<p>Una <strong>contrasenya segura per a empreses<\/strong> ha de complir aquests requisits:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tenir un m\u00ednim de 12 car\u00e0cters (essent recomanable 16 o m\u00e9s).<\/li>\n\n\n\n<li>Combinar lletres maj\u00fascules, min\u00fascules, n\u00fameros i s\u00edmbols.<\/li>\n\n\n\n<li>No reutilitzar-se en diferents serveis o plataformes.<\/li>\n\n\n\n<li>No basar-se en dades personals, noms propis o dates conegudes.<\/li>\n<\/ul>\n\n\n\n<p>Les contrasenyes curtes o previsibles es poden desxifrar en poques hores mitjan\u00e7ant atacs automatitzats de for\u00e7a bruta. Avui dia, els ciberdelinq\u00fcents utilitzen eines capaces de provar milers de combinacions per segon, cosa que fa imprescindible elevar el nivell de complexitat.<\/p>\n\n\n\n<p>Invertir en una pol\u00edtica s\u00f2lida de contrasenyes no \u00e9s una mesura t\u00e8cnica avan\u00e7ada, sin\u00f3 una decisi\u00f3 estrat\u00e8gica de protecci\u00f3 empresarial.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Utilitzar un gestor de contrasenyes corporatiu<\/h3>\n\n\n\n<p>Implementar un <strong>gestor de contrasenyes corporatiu<\/strong> \u00e9s una de les mesures m\u00e9s eficaces per refor\u00e7ar la seguretat digital duna empresa.<\/p>\n\n\n\n<p>Un gestor de contrasenyes permet:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generar claus robustes de manera autom\u00e0tica.<\/li>\n\n\n\n<li>Assignar una contrasenya diferent de cada servei.<\/li>\n\n\n\n<li>Evitar anotacions insegures en documents o post-its.<\/li>\n\n\n\n<li>Reduir lerror hum\u00e0 en la gesti\u00f3 daccessos.<\/li>\n<\/ul>\n\n\n\n<p>El risc principal a les empreses no \u00e9s la manca d&#039;eines, sin\u00f3 la reutilitzaci\u00f3 de contrasenyes. Quan un empleat utilitza la mateixa clau en diversos serveis i un pateix una filtraci\u00f3, la resta queda autom\u00e0ticament compromesa.<\/p>\n\n\n\n<p>L&#039;\u00fas d&#039;un gestor elimina aquest problema d&#039;arrel i en refor\u00e7a <strong>ciberseguretat d&#039;identitat corporativa<\/strong> sense augmentar la complexitat per a lusuari.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Activar la doble autenticaci\u00f3 (MFA) a tots els accessos cr\u00edtics<br><\/h3>\n\n\n\n<p>La <strong>doble autenticaci\u00f3 (MFA)<\/strong> afegeix una capa addicional de protecci\u00f3 en requerir un segon factor de verificaci\u00f3, generalment a trav\u00e9s del m\u00f2bil o una aplicaci\u00f3 d&#039;autenticaci\u00f3.<\/p>\n\n\n\n<p>S&#039;ha d&#039;activar obligat\u00f2riament a tots els accessos cr\u00edtics de l&#039;empresa, com ara:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Correu corporatiu.<\/li>\n\n\n\n<li>Microsoft 365.<\/li>\n\n\n\n<li>VPN i accessos remots.<\/li>\n\n\n\n<li>CRM i ERP.<\/li>\n\n\n\n<li>Xarxes socials empresarials.<\/li>\n\n\n\n<li>Banca en l\u00ednia.<\/li>\n<\/ul>\n\n\n\n<p>Amb l&#039;MFA actiu, encara que un atacant aconsegueixi la contrasenya, no hi podr\u00e0 accedir sense el segon factor de validaci\u00f3. Aquesta mesura redueix dr\u00e0sticament el risc d&#039;acc\u00e9s no autoritzat i actualment \u00e9s un est\u00e0ndard m\u00ednim en qualsevol estrat\u00e8gia de ciberseguretat empresarial.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Aplicar la regla 3-2-1 a c\u00f2pies de seguretat empresarials<\/h3>\n\n\n\n<p>En cas d&#039;un atac de ransomware, la capacitat de recuperaci\u00f3 dependr\u00e0 directament de l&#039;estrat\u00e8gia de c\u00f2pies de seguretat implantades.<\/p>\n\n\n\n<p>La recomanaci\u00f3 estrat\u00e8gica \u00e9s aplicar la <strong>regla 3-2-1 en c\u00f2pies de seguretat empresarials<\/strong>, ampliada a entorns moderns:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3 c\u00f2pies de les dades.<\/li>\n\n\n\n<li>2 formats diferents (per exemple, n\u00favol i emmagatzematge f\u00edsic).<\/li>\n\n\n\n<li>1 c\u00f2pia emmagatzemada fora de lempresa.<\/li>\n\n\n\n<li>1 c\u00f2pia desconnectada o amb sistema d&#039;immutabilitat.<\/li>\n<\/ul>\n\n\n\n<p>A m\u00e9s, les c\u00f2pies de seguretat s&#039;han de provar peri\u00f2dicament per garantir que la restauraci\u00f3 funciona correctament. No n&#039;hi ha prou amb fer el backup; \u00e9s imprescindible verificar-ne la integritat i el temps real de recuperaci\u00f3.<\/p>\n\n\n\n<p>Una pol\u00edtica de c\u00f2pies de seguretat ben dissenyada no evita l&#039;atac, per\u00f2 s\u00ed que evita la paralitzaci\u00f3 del negoci.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusi\u00f3: la ciberseguretat didentitat \u00e9s la base de la continu\u00eftat empresarial<\/h2>\n\n\n\n<p>El 2026, la <strong>ciberseguretat d&#039;identitat a pimes<\/strong> ja no \u00e9s una opci\u00f3 t\u00e8cnica, sin\u00f3 una decisi\u00f3 estrat\u00e8gica. El nou per\u00edmetre de seguretat no est\u00e0 \u00fanicament als servidors o al firewall, sin\u00f3 al control de les credencials, els accessos i la protecci\u00f3 de la identitat digital corporativa.<\/p>\n\n\n\n<p>Les empreses que implementen una estrat\u00e8gia s\u00f2lida basada en contrasenyes segures, gestor de contrasenyes corporatiu, doble autenticaci\u00f3 (MFA) i c\u00f2pies de seguretat sota la regla 3-2-1 no nom\u00e9s redueixen incidents per pesca o suplantaci\u00f3 d&#039;identitat. Tamb\u00e9 prevenen el frau financer, minimitzen l&#039;impacte del ransomware i garanteixen la continu\u00eftat operativa fins i tot davant d&#039;un atac.<\/p>\n\n\n\n<p>A m\u00e9s, una estrat\u00e8gia de ciberseguretat d&#039;identitat correcta permet protegir la reputaci\u00f3 empresarial i complir amb la normativa de protecci\u00f3 de dades, evitant sancions i danys d&#039;imatge dif\u00edcils de reparar.<\/p>\n\n\n\n<p>La tecnologia ajuda, per\u00f2 la cultura interna de seguretat \u00e9s la veritable primera i darrera l\u00ednia de defensa. Formar els empleats en detecci\u00f3 de pesca, gesti\u00f3 de contrasenyes segures i \u00fas de doble autenticaci\u00f3 redueix dr\u00e0sticament el risc d&#039;incidents. Sense una estrat\u00e8gia s\u00f2lida de <strong>ciberseguretat d&#039;identitat a pimes<\/strong>, qualsevol credencial compromesa pot esdevenir una bretxa de seguretat cr\u00edtica.<\/p>\n\n\n\n<p>Si la teva empresa vol implantar una estrat\u00e8gia real de <strong>ciberseguretat d&#039;identitat a pimes<\/strong>, des d&#039;APEN oferim un pack espec\u00edfic de formaci\u00f3 i conscienciaci\u00f3 adaptat a l&#039;entorn empresarial.<\/p>\n\n\n\n<p>\ud83d\udc49 <a href=\"https:\/\/www.apen.es\/ca\/ciberseguridad\/identidad\/#pack\">Coneix el nostre Pack de Formaci\u00f3 en Ciberseguretat d&#039;Identitat<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preguntes freq\u00fcents sobre ciberseguretat d&#039;identitat a empreses<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Un hacker pot accedir a la meva empresa nom\u00e9s amb una contrasenya?<\/h3>\n\n\n\n<p>S\u00ed. Si un atacant obt\u00e9 una contrasenya v\u00e0lida i no hi ha doble autenticaci\u00f3 (MFA), podeu accedir als sistemes com si fos un usuari leg\u00edtim. Per aix\u00f2, la protecci\u00f3 de credencials \u00e9s una de les bases de la ciberseguretat didentitat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00c9s suficient tenir antivirus per protegir la meva empresa?<\/h3>\n\n\n\n<p>No. L&#039;antivirus \u00e9s una capa m\u00e9s dins de l&#039;estrat\u00e8gia de seguretat. Si es roben credencials v\u00e0lides, l&#039;acc\u00e9s es pot fer sense activar alertes tradicionals. La protecci\u00f3 ha de combinar antivirus avan\u00e7at, doble autenticaci\u00f3 i control daccessos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Qu\u00e8 cal fer si es compromet una contrasenya corporativa?<\/h3>\n\n\n\n<p>\u00c9s fonamental actuar immediatament:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Canviar la contrasenya afectada.<\/li>\n\n\n\n<li>Activar o revisar la doble autenticaci\u00f3 (MFA).<\/li>\n\n\n\n<li>Analitzar accessos recents i activitat sospitosa.<\/li>\n\n\n\n<li>Informar el responsable IT o prove\u00efdor tecnol\u00f2gic.<\/li>\n\n\n\n<li>Reviseu si la contrasenya s&#039;ha reutilitzat en altres serveis.<\/li>\n<\/ul>\n\n\n\n<p>La rapidesa en la resposta pot evitar un incident m\u00e9s gran.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>En 2026, la ciberseguridad de identidad en pymes se ha convertido en una prioridad estrat\u00e9gica. En un entorno digital cada&#8230;<\/p>","protected":false},"author":4,"featured_media":63260,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[489,147,836,754,149,194],"tags":[],"class_list":["post-63259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-antivirus","category-ciberataques","category-ciberseguridad","category-contrasenas","category-copia-de-seguridad","category-seguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware - Apen Inform\u00e1tica %<\/title>\n<meta name=\"description\" content=\"La ciberseguridad de identidad en pymes es clave para prevenir phishing y ransomware. Aprende c\u00f3mo proteger tu empresa en 2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/ca\/blog\/ciberseguridad-identidad-pymes\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware - Apen Inform\u00e1tica %\" \/>\n<meta property=\"og:description\" content=\"La ciberseguridad de identidad en pymes es clave para prevenir phishing y ransomware. Aprende c\u00f3mo proteger tu empresa en 2026.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/ca\/blog\/ciberseguridad-identidad-pymes\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-23T09:23:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-23T09:34:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1752\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware\",\"datePublished\":\"2026-02-23T09:23:29+00:00\",\"dateModified\":\"2026-02-23T09:34:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/\"},\"wordCount\":2479,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg\",\"articleSection\":[\"Antivirus\",\"Ciberataques\",\"Ciberseguridad\",\"Contrase\u00f1as\",\"Copia de seguridad\",\"seguridad\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/\",\"name\":\"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware - Apen Inform\u00e1tica %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg\",\"datePublished\":\"2026-02-23T09:23:29+00:00\",\"dateModified\":\"2026-02-23T09:34:01+00:00\",\"description\":\"La ciberseguridad de identidad en pymes es clave para prevenir phishing y ransomware. Aprende c\u00f3mo proteger tu empresa en 2026.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg\",\"width\":2560,\"height\":1752},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-identidad-pymes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/ca\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware - Apen Inform\u00e1tica %","description":"La ciberseguridad de identidad en pymes es clave para prevenir phishing y ransomware. Aprende c\u00f3mo proteger tu empresa en 2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/ca\/blog\/ciberseguridad-identidad-pymes\/","og_locale":"ca_ES","og_type":"article","og_title":"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware - Apen Inform\u00e1tica %","og_description":"La ciberseguridad de identidad en pymes es clave para prevenir phishing y ransomware. Aprende c\u00f3mo proteger tu empresa en 2026.","og_url":"https:\/\/www.apen.es\/ca\/blog\/ciberseguridad-identidad-pymes\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2026-02-23T09:23:29+00:00","article_modified_time":"2026-02-23T09:34:01+00:00","og_image":[{"width":2560,"height":1752,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"marqueting","Temps estimat de lectura":"11 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware","datePublished":"2026-02-23T09:23:29+00:00","dateModified":"2026-02-23T09:34:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/"},"wordCount":2479,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg","articleSection":["Antivirus","Ciberataques","Ciberseguridad","Contrase\u00f1as","Copia de seguridad","seguridad"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/","url":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/","name":"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware - Apen Inform\u00e1tica %","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg","datePublished":"2026-02-23T09:23:29+00:00","dateModified":"2026-02-23T09:34:01+00:00","description":"La ciberseguridad de identidad en pymes es clave para prevenir phishing y ransomware. Aprende c\u00f3mo proteger tu empresa en 2026.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-scaled.jpg","width":2560,"height":1752},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-identidad-pymes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad de identidad en pymes: c\u00f3mo prevenir phishing y ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e0tica","description":"Manteniment inform\u00e0tic , programari de gesti\u00f3, solucions d&#039;impressi\u00f3","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: Solucions inform\u00e0tiques","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"m\u00e0rqueting","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":489,"label":"Antivirus"},{"value":147,"label":"Ciberataques"},{"value":836,"label":"Ciberseguridad"},{"value":754,"label":"Contrase\u00f1as"},{"value":149,"label":"Copia de seguridad"},{"value":194,"label":"seguridad"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2026\/02\/hacker-trabajando-en-un-sistema-informatico-con-multiples-pantallas-1024x701.jpg",1024,701,true],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":489,"name":"Antivirus","slug":"antivirus","term_group":0,"term_taxonomy_id":489,"taxonomy":"category","description":"","parent":0,"count":5,"filter":"raw","term_order":"0","cat_ID":489,"category_count":5,"category_description":"","cat_name":"Antivirus","category_nicename":"antivirus","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":836,"name":"Ciberseguridad","slug":"ciberseguridad","term_group":0,"term_taxonomy_id":836,"taxonomy":"category","description":"","parent":0,"count":10,"filter":"raw","term_order":"0","cat_ID":836,"category_count":10,"category_description":"","cat_name":"Ciberseguridad","category_nicename":"ciberseguridad","category_parent":0},{"term_id":754,"name":"Contrase\u00f1as","slug":"contrasenas","term_group":0,"term_taxonomy_id":754,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","term_order":"0","cat_ID":754,"category_count":3,"category_description":"","cat_name":"Contrase\u00f1as","category_nicename":"contrasenas","category_parent":0},{"term_id":149,"name":"Copia de seguridad","slug":"copia-de-seguridad","term_group":0,"term_taxonomy_id":149,"taxonomy":"category","description":"","parent":0,"count":19,"filter":"raw","term_order":"0","cat_ID":149,"category_count":19,"category_description":"","cat_name":"Copia de seguridad","category_nicename":"copia-de-seguridad","category_parent":0},{"term_id":194,"name":"seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"seguridad","category_nicename":"seguridad","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/63259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/comments?post=63259"}],"version-history":[{"count":3,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/63259\/revisions"}],"predecessor-version":[{"id":63264,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/63259\/revisions\/63264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media\/63260"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media?parent=63259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/categories?post=63259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/tags?post=63259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}