{"id":18450,"date":"2020-08-18T10:49:57","date_gmt":"2020-08-18T10:49:57","guid":{"rendered":"https:\/\/www.apen.es\/?p=18450"},"modified":"2025-02-28T11:24:54","modified_gmt":"2025-02-28T11:24:54","slug":"ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/","title":{"rendered":"Corporate cybersecurity: behaviors you should avoid"},"content":{"rendered":"<p>The&nbsp;<strong>cybersecurity<\/strong>&nbsp;It has become a serious concern for any company. From attacks and data theft to ransomware and identity theft, these are just some of the crimes that can occur in businesses if the necessary measures are not taken.&nbsp;<strong>cybersecurity<\/strong>&nbsp;appropriate.<\/p>\n\n\n\n<p>Therefore, it is important that each worker is prepared to understand how the system works.&nbsp;<strong>cybersecurity<\/strong>&nbsp;and avoid performing tasks that could put the company at risk. This year, remote work has become more popular, so today, more than ever, it is necessary for every employee to know the preventive measures they must take to maintain safety protocols.&nbsp;<strong>cybersecurity<\/strong>&nbsp;of the company.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>It all comes down to education<\/strong><\/h2>\n\n\n\n<p>The reality is that 80% of the incidents related to&nbsp;<strong>cybersecurity<\/strong>&nbsp;In companies, cyberattacks are often related to human error. Many everyday actions need to be modified to minimize the risk of cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Beware of external equipment<\/strong><\/h2>\n\n\n\n<p>The use of external memory devices, or USB drives, poses a significant danger to the&nbsp;<strong>cybersecurity<\/strong>&nbsp;From the company. Whether used at home, in the office, or only among employees, all devices must be scanned and formatted before each use to prevent malware from entering the systems. Sharing documents in the cloud will always be the safest option.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The dangers of social media<\/strong><\/h2>\n\n\n\n<p>Few people know that the use of social media on company computers can pose a danger to...&nbsp;<strong>cybersecurity.<\/strong>&nbsp;Handling messages, downloading files from unverified sources, and posting information can be an entry point for cybercriminals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Beware of corporate mobile phones<\/strong><\/h2>\n\n\n\n<p>Mobile phones have become one of the main concerns when we talk about the&nbsp;<strong>cybersecurity<\/strong>&nbsp;Companies are vulnerable to cyberattacks. Adding company email to a mobile phone and subsequently connecting to public Wi-Fi networks can expose sensitive organizational data to cybercriminals. Similarly, the use of instant messaging services and file sharing can lead to mobile phones being hacked, where important company information such as passwords, company data, and customer information is stored.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Forgetting to log out<\/strong><\/h2>\n\n\n\n<p>If we take a break or finish the workday, the automatic locking systems for company computers must be activated. Another key security measure is to remember that passwords must be strong and secure, and that computers must be shut down completely, logging out of all programs that may have been used.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Be careful with your email<\/strong><\/h2>\n\n\n\n<p>Personal emails continue to be a major problem&nbsp;<strong>cybersecurity<\/strong>In companies, it is recommended that personal email not be accessed on company computers, but if it is done, file downloads should be avoided and, if necessary, everything should be scanned by corporate antivirus software.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has become a critical issue for any company. From attacks and data theft to ransomware and identity theft\u2026<\/p>","protected":false},"author":4,"featured_media":18451,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[417,147,194],"tags":[],"class_list":["post-18450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad","category-ciberataques","category-seguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad de empresas: los comportamientos que debes evitar - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"La&nbsp;ciberseguridad&nbsp;se ha convertido en un tema de cuidado para cualquier empresa. Desde ataques, hasta robo de datos, ransomware y suplantaci\u00f3n\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad de empresas: los comportamientos que debes evitar - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"La&nbsp;ciberseguridad&nbsp;se ha convertido en un tema de cuidado para cualquier empresa. Desde ataques, hasta robo de datos, ransomware y suplantaci\u00f3n\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T10:49:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T11:24:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Ciberseguridad de empresas: los comportamientos que debes evitar\",\"datePublished\":\"2020-08-18T10:49:57+00:00\",\"dateModified\":\"2025-02-28T11:24:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/\"},\"wordCount\":547,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ciberseguridad-apen.jpg\",\"articleSection\":[\"Actualidad\",\"Ciberataques\",\"Seguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/\",\"name\":\"Ciberseguridad de empresas: los comportamientos que debes evitar - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ciberseguridad-apen.jpg\",\"datePublished\":\"2020-08-18T10:49:57+00:00\",\"dateModified\":\"2025-02-28T11:24:54+00:00\",\"description\":\"La&nbsp;ciberseguridad&nbsp;se ha convertido en un tema de cuidado para cualquier empresa. Desde ataques, hasta robo de datos, ransomware y suplantaci\u00f3n\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ciberseguridad-apen.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ciberseguridad-apen.jpg\",\"width\":640,\"height\":272},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad de empresas: los comportamientos que debes evitar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for businesses: behaviors to avoid - Apen Inform\u00e1tica","description":"Cybersecurity has become a critical issue for any company. From attacks and data theft to ransomware and identity theft, cybersecurity is a serious concern.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/","og_locale":"en_US","og_type":"article","og_title":"Ciberseguridad de empresas: los comportamientos que debes evitar - Apen Inform\u00e1tica","og_description":"La&nbsp;ciberseguridad&nbsp;se ha convertido en un tema de cuidado para cualquier empresa. Desde ataques, hasta robo de datos, ransomware y suplantaci\u00f3n","og_url":"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2020-08-18T10:49:57+00:00","article_modified_time":"2025-02-28T11:24:54+00:00","og_image":[{"width":640,"height":272,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Ciberseguridad de empresas: los comportamientos que debes evitar","datePublished":"2020-08-18T10:49:57+00:00","dateModified":"2025-02-28T11:24:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/"},"wordCount":547,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg","articleSection":["Actualidad","Ciberataques","Seguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/","url":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/","name":"Cybersecurity for businesses: behaviors to avoid - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg","datePublished":"2020-08-18T10:49:57+00:00","dateModified":"2025-02-28T11:24:54+00:00","description":"Cybersecurity has become a critical issue for any company. From attacks and data theft to ransomware and identity theft, cybersecurity is a serious concern.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg","width":640,"height":272},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-de-empresas-los-comportamientos-que-debes-evitar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad de empresas: los comportamientos que debes evitar"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":417,"label":"Actualidad"},{"value":147,"label":"Ciberataques"},{"value":194,"label":"Seguridad"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2020\/08\/ciberseguridad-apen.jpg",640,272,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":417,"name":"Actualidad","slug":"actualidad","term_group":0,"term_taxonomy_id":417,"taxonomy":"category","description":"","parent":0,"count":83,"filter":"raw","term_order":"0","cat_ID":417,"category_count":83,"category_description":"","cat_name":"Actualidad","category_nicename":"actualidad","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/18450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=18450"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/18450\/revisions"}],"predecessor-version":[{"id":53627,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/18450\/revisions\/53627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/18451"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=18450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=18450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=18450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}