{"id":3976,"date":"2016-06-20T09:57:57","date_gmt":"2016-06-20T09:57:57","guid":{"rendered":"http:\/\/responsive.onlinevalles.es\/?p=3976"},"modified":"2025-03-04T11:59:04","modified_gmt":"2025-03-04T11:59:04","slug":"a-companys-information-security","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/a-companys-information-security\/","title":{"rendered":"Information security in a company"},"content":{"rendered":"<p>Information security hinges on integrity, availability, confidentiality, and auditing as fundamental pillars for the security of computer systems. For businesses, this security is paramount, which is why the market offers various solutions for achieving it.&nbsp;<strong>IT maintenance<\/strong>&nbsp;that ensures the systems are prepared for potential events that could affect a company&#039;s growth. One of the solutions we found is a&nbsp;<strong>information security management system<\/strong>. This system includes different topics such as security policies in computer systems, the assurance of business resources or security planning, and is made up of three distinct processes:&nbsp;<strong>planning, implementation, verification, and updating.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Planning<\/strong><\/h2>\n\n\n\n<p>This process within the design of the information security management system architecture helps to establish policies and solutions to achieve business objectives related to security and&nbsp;<strong>IT maintenance<\/strong>. The first step towards good planning is determining security requirements. These are established through the provision of security services, analysis of IT risks, and calculation of their potential impacts, the probability of occurrence, and the resources to be protected. To assess IT systems, two aspects must be considered: the function of the systems and their cost. In this way, specialized personnel in the&nbsp;<strong>IT maintenance<\/strong>&nbsp;and system security, will be able to determine those factors of greatest risk and offer adapted and personalized solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The implementation<\/strong><\/h2>\n\n\n\n<p>The second process is the implementation of the information security management system through the application of security controls and solutions. This process ensures that company personnel have the necessary knowledge and skills through training courses. These training programs must include aspects such as ensuring that personnel understand the importance of the security system through specific training. This training, in turn, must ensure the dissemination and comprehension of the knowledge, as well as empower users with the tools needed to resolve incidents and implement appropriate solutions. Furthermore, personnel must be aware of their roles within the information security management system and understand the processes and requirements for detecting and resolving security incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>System verification and update<\/strong><\/h2>\n\n\n\n<p>The final process involves verifying the performance and effectiveness of the information security management system, periodically checking for residual risks. This means clients must conduct internal and external audits to achieve the business objective. Meanwhile, the update process entails making the necessary changes to ensure the optimal performance of the management system. Both processes are typically carried out in parallel and integrate the work of&nbsp;<strong>IT maintenance<\/strong>&nbsp;of the system.<\/p>","protected":false},"excerpt":{"rendered":"<p>Information security relies on integrity, availability, confidentiality, and auditing as fundamental pillars for\u2026<\/p>","protected":false},"author":4,"featured_media":4302,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,66],"tags":[48,49],"class_list":["post-3976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-mantenimiento-informatico","tag-mantenimiento-informatico","tag-seguridad-en-ordenadores"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La seguridad de la informaci\u00f3n de una empresa - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"La seguridad de la informaci\u00f3n pasa por la integridad, la disponibilidad, la confidencialidad y la auditoria como pilares b\u00e1sicos para la seguridad de los\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/a-companys-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La seguridad de la informaci\u00f3n de una empresa - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"La seguridad de la informaci\u00f3n pasa por la integridad, la disponibilidad, la confidencialidad y la auditoria como pilares b\u00e1sicos para la seguridad de los\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/a-companys-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-20T09:57:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T11:59:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"La seguridad de la informaci\u00f3n de una empresa\",\"datePublished\":\"2016-06-20T09:57:57+00:00\",\"dateModified\":\"2025-03-04T11:59:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg\",\"keywords\":[\"Mantenimiento inform\u00e1tico\",\"Seguridad en ordenadores\"],\"articleSection\":[\"Apen\",\"Mantenimiento inform\u00e1tico\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/\",\"name\":\"La seguridad de la informaci\u00f3n de una empresa - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg\",\"datePublished\":\"2016-06-20T09:57:57+00:00\",\"dateModified\":\"2025-03-04T11:59:04+00:00\",\"description\":\"La seguridad de la informaci\u00f3n pasa por la integridad, la disponibilidad, la confidencialidad y la auditoria como pilares b\u00e1sicos para la seguridad de los\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/la-seguridad-de-la-informacion-de-una-empresa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La seguridad de la informaci\u00f3n de una empresa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security for a company - Apen Inform\u00e1tica","description":"Information security relies on integrity, availability, confidentiality, and auditing as fundamental pillars for the security of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/a-companys-information-security\/","og_locale":"en_US","og_type":"article","og_title":"La seguridad de la informaci\u00f3n de una empresa - Apen Inform\u00e1tica","og_description":"La seguridad de la informaci\u00f3n pasa por la integridad, la disponibilidad, la confidencialidad y la auditoria como pilares b\u00e1sicos para la seguridad de los","og_url":"https:\/\/www.apen.es\/en\/blog\/a-companys-information-security\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2016-06-20T09:57:57+00:00","article_modified_time":"2025-03-04T11:59:04+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"La seguridad de la informaci\u00f3n de una empresa","datePublished":"2016-06-20T09:57:57+00:00","dateModified":"2025-03-04T11:59:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/"},"wordCount":566,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg","keywords":["Mantenimiento inform\u00e1tico","Seguridad en ordenadores"],"articleSection":["Apen","Mantenimiento inform\u00e1tico"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/","url":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/","name":"Information security for a company - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg","datePublished":"2016-06-20T09:57:57+00:00","dateModified":"2025-03-04T11:59:04+00:00","description":"Information security relies on integrity, availability, confidentiality, and auditing as fundamental pillars for the security of","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/la-seguridad-de-la-informacion-de-una-empresa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"La seguridad de la informaci\u00f3n de una empresa"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":66,"label":"Mantenimiento inform\u00e1tico"}],"post_tag":[{"value":48,"label":"Mantenimiento inform\u00e1tico"},{"value":49,"label":"Seguridad en ordenadores"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/empresa-software-de-gesti\u00f3n-en-barcelona-1.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":66,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":66,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","term_order":"0","cat_ID":66,"category_count":78,"category_description":"","cat_name":"Mantenimiento inform\u00e1tico","category_nicename":"mantenimiento-informatico","category_parent":0}],"tag_info":[{"term_id":48,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":48,"taxonomy":"post_tag","description":"","parent":0,"count":50,"filter":"raw","term_order":"0"},{"term_id":49,"name":"Seguridad en ordenadores","slug":"seguridad-en-ordenadores","term_group":0,"term_taxonomy_id":49,"taxonomy":"post_tag","description":"","parent":0,"count":35,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/3976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=3976"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/3976\/revisions"}],"predecessor-version":[{"id":54194,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/3976\/revisions\/54194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/4302"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=3976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=3976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=3976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}