{"id":24656,"date":"2021-09-15T05:11:42","date_gmt":"2021-09-15T05:11:42","guid":{"rendered":"https:\/\/www.apen.es\/?p=24656"},"modified":"2025-02-28T10:52:50","modified_gmt":"2025-02-28T10:52:50","slug":"preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","title":{"rendered":"Preparation and planning: what you should consider for document cybersecurity in your company"},"content":{"rendered":"<p>Cyberattacks are becoming increasingly complex, and the damage they can cause to a company can be significant and debilitating.&nbsp;<a href=\"https:\/\/www.apen.es\/en\/\">document cybersecurity<\/a>&nbsp;It can help offset and reduce these risks by keeping cybercriminals at bay. However, the most important thing will be to keep company members vigilant and informed so they can respond to disasters or incidents.<\/p>\n\n\n\n<p>Employees must be familiar with standard operating procedures when online attacks occur. Failing to prepare is preparing to fail. These days, we cannot afford to ignore cyberattacks from phishing efforts, ransomware, and advanced persistent threats, nor can we afford to expose any vulnerabilities in our operations.<\/p>\n\n\n<style>.kb-image24656_c29edb-09 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image24656_c29edb-09\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/binary-2372130_1920.jpg\" alt=\"\" class=\"kb-img\"\/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Document cybersecurity: what to keep in mind<\/h2>\n\n\n\n<p>For the&nbsp;<strong>document cybersecurity<\/strong>&nbsp;At our company, preparedness is key. It&#039;s ideal to eliminate confusion by clearly outlining the steps to be taken when an incident occurs. Staff must remain calm under pressure in these situations to prevent further errors and complications.<\/p>\n\n\n\n<p>During emergencies, having a written response can help decision-makers act accordingly. When the procedures are documented, everyone will know their roles in communication, coordination, and investigation.<\/p>\n\n\n\n<p>It also helps eliminate uncertainty, guesswork, and chaos at a critical moment. These are playbooks that can help organizations have quick and efficient countermeasures against attacks. Furthermore, having an emergency number to contact experts at any time will ensure the best decision-making regarding countermeasures.&nbsp;<strong>cybersecurity for documents.<\/strong><\/p>\n\n\n\n<p>On the other hand, having cybersecurity documentation can only provide a solid defense if it is up-to-date. If these written references are outdated, they can cause more problems than they solve. More importantly, advanced persistent threats don&#039;t remain static. They expand, improvise, adapt, and evolve. If cybersecurity documentation isn&#039;t kept current, it will become obsolete and useless. Therefore, those responsible for this area must constantly stay updated on potential threats and present the most current information at all times.&nbsp;<strong>Document cybersecurity.<\/strong><\/p>\n\n\n\n<p>A critical factor for the success of a cybersecurity plan is that it must be tested. Without real-world testing, these plans can ultimately become irrelevant. They must undergo simulations beyond the computer desktop. Update them as needed to adapt to diverse situations and take into account all factors that may arise.<\/p>\n\n\n\n<p>It is also essential to document the aftermath of an incident. This knowledge is valuable for creating defense mechanisms should such events recur in the future.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are becoming increasingly complex, and the damage they can cause to a company can be significant and\u2026<\/p>","protected":false},"author":9,"featured_media":24658,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[417,147,494,256,194],"tags":[723],"class_list":["post-24656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad","category-ciberataques","category-phishing","category-ransomware","category-seguridad","tag-ciberseguridad-de-documentos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T05:11:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T10:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"carlos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"carlos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\"},\"author\":{\"name\":\"carlos\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/a4bf8e277f78c2513f5a77049a6a1423\"},\"headline\":\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa\",\"datePublished\":\"2021-09-15T05:11:42+00:00\",\"dateModified\":\"2025-02-28T10:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\"},\"wordCount\":524,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"keywords\":[\"ciberseguridad de documentos\"],\"articleSection\":[\"Actualidad\",\"Ciberataques\",\"Phishing\",\"Ransomware\",\"Seguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\",\"name\":\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"datePublished\":\"2021-09-15T05:11:42+00:00\",\"dateModified\":\"2025-02-28T10:52:50+00:00\",\"description\":\"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/guy-2558210_1920.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/a4bf8e277f78c2513f5a77049a6a1423\",\"name\":\"carlos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g\",\"caption\":\"carlos\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/carlos\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparation and planning: what you should consider for document cybersecurity in your company - Apen Inform\u00e1tica","description":"Cyberattacks are becoming increasingly complex, and the damage they can cause to a company can be significant and debilitating. Cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","og_locale":"en_US","og_type":"article","og_title":"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa - Apen Inform\u00e1tica","og_description":"Los ciberataques son cada vez m\u00e1s complejos y el da\u00f1o que pueden causar en una empresa puede ser significativo y debilitante. La&nbsp;ciberseguridad de","og_url":"https:\/\/www.apen.es\/en\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2021-09-15T05:11:42+00:00","article_modified_time":"2025-02-28T10:52:50+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","type":"image\/jpeg"}],"author":"carlos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"carlos","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/"},"author":{"name":"carlos","@id":"https:\/\/www.apen.es\/#\/schema\/person\/a4bf8e277f78c2513f5a77049a6a1423"},"headline":"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa","datePublished":"2021-09-15T05:11:42+00:00","dateModified":"2025-02-28T10:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/"},"wordCount":524,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","keywords":["ciberseguridad de documentos"],"articleSection":["Actualidad","Ciberataques","Phishing","Ransomware","Seguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","url":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/","name":"Preparation and planning: what you should consider for document cybersecurity in your company - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","datePublished":"2021-09-15T05:11:42+00:00","dateModified":"2025-02-28T10:52:50+00:00","description":"Cyberattacks are becoming increasingly complex, and the damage they can cause to a company can be significant and debilitating. Cybersecurity","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/preparacion-y-planificacion-lo-que-debe-tener-en-cuenta-para-la-ciberseguridad-de-documentos-en-su-empresa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Preparaci\u00f3n y planificaci\u00f3n: lo que debe tener en cuenta para la ciberseguridad de documentos en su empresa"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/a4bf8e277f78c2513f5a77049a6a1423","name":"Carlos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab10b60551e807f6b37d54bb09e40bc41b08e3828d46504634ad6f35da1b46dc?s=96&d=mm&r=g","caption":"carlos"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/carlos\/"}]}},"taxonomy_info":{"category":[{"value":417,"label":"Actualidad"},{"value":147,"label":"Ciberataques"},{"value":494,"label":"Phishing"},{"value":256,"label":"Ransomware"},{"value":194,"label":"Seguridad"}],"post_tag":[{"value":723,"label":"ciberseguridad de documentos"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2021\/08\/guy-2558210_1920-1024x683.jpg",1024,683,true],"author_info":{"display_name":"carlos","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/carlos\/"},"comment_info":0,"category_info":[{"term_id":417,"name":"Actualidad","slug":"actualidad","term_group":0,"term_taxonomy_id":417,"taxonomy":"category","description":"","parent":0,"count":83,"filter":"raw","term_order":"0","cat_ID":417,"category_count":83,"category_description":"","cat_name":"Actualidad","category_nicename":"actualidad","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":494,"name":"Phishing","slug":"phishing","term_group":0,"term_taxonomy_id":494,"taxonomy":"category","description":"","parent":0,"count":5,"filter":"raw","term_order":"0","cat_ID":494,"category_count":5,"category_description":"","cat_name":"Phishing","category_nicename":"phishing","category_parent":0},{"term_id":256,"name":"Ransomware","slug":"ransomware","term_group":0,"term_taxonomy_id":256,"taxonomy":"category","description":"","parent":0,"count":6,"filter":"raw","term_order":"0","cat_ID":256,"category_count":6,"category_description":"","cat_name":"Ransomware","category_nicename":"ransomware","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0}],"tag_info":[{"term_id":723,"name":"ciberseguridad de documentos","slug":"ciberseguridad-de-documentos","term_group":0,"term_taxonomy_id":723,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/24656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=24656"}],"version-history":[{"count":2,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/24656\/revisions"}],"predecessor-version":[{"id":53596,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/24656\/revisions\/53596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/24658"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=24656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=24656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=24656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}