{"id":26768,"date":"2022-01-26T07:35:46","date_gmt":"2022-01-26T07:35:46","guid":{"rendered":"https:\/\/www.apen.es\/?p=26768"},"modified":"2025-02-28T10:27:34","modified_gmt":"2025-02-28T10:27:34","slug":"are-you-using-any-of-these-passwords","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/are-you-using-any-of-these-passwords\/","title":{"rendered":"Are you using any of these passwords? Change it NOW!"},"content":{"rendered":"<p>The&nbsp;<strong>passwords<\/strong>&nbsp;Stolen data is the fastest way to access all your information. And no company, no matter how large, is safe from cybercriminals who hack their systems and access our information. However, it is small and medium-sized businesses that suffer the most from these attacks. Our birthdates, the names of our children or pets, and even predictable numerical codes are often the targets.&nbsp;<strong>passwords<\/strong>&nbsp;most used by users and, in addition, we tend to repeat them in each of the accounts we create.<\/p>\n\n\n\n<p>At the company level, if our employees use this type of&nbsp;<strong>passwords<\/strong>&nbsp;Simple and weak systems put the entire company&#039;s equipment at risk, which is why training and awareness of the importance of choosing the right ones is so important.&nbsp;<strong>passwords<\/strong>&nbsp;more complex ones. These are some of the&nbsp;<strong>passwords<\/strong>&nbsp;Less secure and more commonly used by users during the past year\u2026 If you suspect your employees are using them or you identify yours on the list, change it immediately!<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>123456<\/strong><\/li>\n\n\n\n<li><strong>123456789<\/strong><\/li>\n\n\n\n<li><strong>picture1<\/strong><\/li>\n\n\n\n<li><strong>password<\/strong><\/li>\n\n\n\n<li><strong>12345678<\/strong><\/li>\n\n\n\n<li><strong>111111<\/strong><\/li>\n\n\n\n<li><strong>123123<\/strong><\/li>\n\n\n\n<li><strong>12345<\/strong><\/li>\n\n\n\n<li><strong>1234567890<\/strong><\/li>\n\n\n\n<li><strong>password<\/strong><\/li>\n\n\n\n<li><strong>1234567<\/strong><\/li>\n\n\n\n<li><strong>QWERTY<\/strong><\/li>\n\n\n\n<li><strong>abc123<\/strong><\/li>\n\n\n\n<li><strong>Million2<\/strong><\/li>\n\n\n\n<li><strong>000000<\/strong><\/li>\n\n\n\n<li><strong>1234<\/strong><\/li>\n\n\n\n<li><strong>I love you<\/strong><\/li>\n\n\n\n<li><strong>aaron431<\/strong><\/li>\n\n\n\n<li><strong>password1<\/strong><\/li>\n\n\n\n<li><strong>qqww1122<\/strong><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Follow these steps to make your passwords MORE secure<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use three random words that you can easily remember but that are not related to each other.<\/li>\n\n\n\n<li>It&#039;s almost impossible not to use the same one.\u00a0<strong>password<\/strong>\u00a0You might use the same password for multiple accounts, but in some cases, it&#039;s highly recommended that you don&#039;t reuse a password you&#039;ve already used. For example, with bank accounts, storage systems, email, or social media, it&#039;s best not to repeat passwords.\u00a0<strong>passwords<\/strong>.<\/li>\n\n\n\n<li>To increase security on social media or emails, we recommend implementing two-step authentication systems, meaning that in addition to the<strong>\u00a0password<\/strong>, The account requires a second access key, such as a temporary code or a security question.<\/li>\n\n\n\n<li>It is also advisable to use a manager\u00a0<strong>passwords<\/strong>, where you can safely store several of them.<\/li>\n\n\n\n<li>Do not use personal data or repeat your username in the\u00a0<strong>password<\/strong>. We also advise you to combine letters, numbers, symbols, and alternate uppercase and lowercase letters for added security.<\/li>\n<\/ul>\n\n\n\n<p>If you want to know the level of prevention you have in your company, in&nbsp;<a href=\"https:\/\/www.apen.es\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Apen&nbsp;<\/strong><\/a>We offer you personalized and FREE advice from a cybersecurity specialist.&nbsp;<a href=\"https:\/\/www.apen.es\/en\/landing-auditoria-ciberseguridad\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>REQUEST YOUR FREE APPOINTMENT HERE!<\/strong><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Stolen passwords are the fastest way to access all your information. And no company, no matter how large, is immune\u2026<\/p>","protected":false},"author":4,"featured_media":26771,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[417,147,754],"tags":[263,755],"class_list":["post-26768","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad","category-ciberataques","category-contrasenas","tag-ciberseguridad","tag-contrasenas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA! - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Las&nbsp;contrase\u00f1as&nbsp;robadas son el camino m\u00e1s r\u00e1pido a toda tu informaci\u00f3n. Y ninguna empresa, por grande que sea, se libra de los ciberdelincuentes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/are-you-using-any-of-these-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA! - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Las&nbsp;contrase\u00f1as&nbsp;robadas son el camino m\u00e1s r\u00e1pido a toda tu informaci\u00f3n. Y ninguna empresa, por grande que sea, se libra de los ciberdelincuentes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/are-you-using-any-of-these-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-26T07:35:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-28T10:27:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA!\",\"datePublished\":\"2022-01-26T07:35:46+00:00\",\"dateModified\":\"2025-02-28T10:27:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/\"},\"wordCount\":433,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Contrasenya-post.jpg\",\"keywords\":[\"ciberseguridad\",\"Contrase\u00f1as\"],\"articleSection\":[\"Actualidad\",\"Ciberataques\",\"Contrase\u00f1as\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/\",\"name\":\"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA! - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Contrasenya-post.jpg\",\"datePublished\":\"2022-01-26T07:35:46+00:00\",\"dateModified\":\"2025-02-28T10:27:34+00:00\",\"description\":\"Las&nbsp;contrase\u00f1as&nbsp;robadas son el camino m\u00e1s r\u00e1pido a toda tu informaci\u00f3n. Y ninguna empresa, por grande que sea, se libra de los ciberdelincuentes\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Contrasenya-post.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Contrasenya-post.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/estas-usando-alguna-de-estas-contrasenas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you using any of these passwords? Change it NOW! - Apen Inform\u00e1tica","description":"Stolen passwords are the fastest way to access all your information. And no company, no matter how large, is safe from cybercriminals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/are-you-using-any-of-these-passwords\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA! - Apen Inform\u00e1tica","og_description":"Las&nbsp;contrase\u00f1as&nbsp;robadas son el camino m\u00e1s r\u00e1pido a toda tu informaci\u00f3n. Y ninguna empresa, por grande que sea, se libra de los ciberdelincuentes","og_url":"https:\/\/www.apen.es\/en\/blog\/are-you-using-any-of-these-passwords\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2022-01-26T07:35:46+00:00","article_modified_time":"2025-02-28T10:27:34+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA!","datePublished":"2022-01-26T07:35:46+00:00","dateModified":"2025-02-28T10:27:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/"},"wordCount":433,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg","keywords":["ciberseguridad","Contrase\u00f1as"],"articleSection":["Actualidad","Ciberataques","Contrase\u00f1as"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/","url":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/","name":"Are you using any of these passwords? Change it NOW! - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg","datePublished":"2022-01-26T07:35:46+00:00","dateModified":"2025-02-28T10:27:34+00:00","description":"Stolen passwords are the fastest way to access all your information. And no company, no matter how large, is safe from cybercriminals.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/estas-usando-alguna-de-estas-contrasenas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"\u00bfEst\u00e1s usando alguna de estas contrase\u00f1as? \u00a1C\u00e1mbiala YA!"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":417,"label":"Actualidad"},{"value":147,"label":"Ciberataques"},{"value":754,"label":"Contrase\u00f1as"}],"post_tag":[{"value":263,"label":"ciberseguridad"},{"value":755,"label":"Contrase\u00f1as"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2022\/01\/Contrasenya-post.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":417,"name":"Actualidad","slug":"actualidad","term_group":0,"term_taxonomy_id":417,"taxonomy":"category","description":"","parent":0,"count":83,"filter":"raw","term_order":"0","cat_ID":417,"category_count":83,"category_description":"","cat_name":"Actualidad","category_nicename":"actualidad","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":754,"name":"Contrase\u00f1as","slug":"contrasenas","term_group":0,"term_taxonomy_id":754,"taxonomy":"category","description":"","parent":0,"count":3,"filter":"raw","term_order":"0","cat_ID":754,"category_count":3,"category_description":"","cat_name":"Contrase\u00f1as","category_nicename":"contrasenas","category_parent":0}],"tag_info":[{"term_id":263,"name":"ciberseguridad","slug":"ciberseguridad","term_group":0,"term_taxonomy_id":263,"taxonomy":"post_tag","description":"","parent":0,"count":15,"filter":"raw","term_order":"0"},{"term_id":755,"name":"Contrase\u00f1as","slug":"contrasenas","term_group":0,"term_taxonomy_id":755,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/26768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=26768"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/26768\/revisions"}],"predecessor-version":[{"id":53563,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/26768\/revisions\/53563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/26771"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=26768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=26768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=26768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}