{"id":4749,"date":"2016-09-07T12:17:57","date_gmt":"2016-09-07T12:17:57","guid":{"rendered":"https:\/\/www.apen.es\/?p=4749"},"modified":"2025-03-04T11:55:35","modified_gmt":"2025-03-04T11:55:35","slug":"where-the-antivirus-doesnt-reach","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/where-the-antivirus-doesnt-reach\/","title":{"rendered":"Where the antivirus doesn&#039;t reach\u2026"},"content":{"rendered":"<p>The&nbsp;<a href=\"https:\/\/www.apen.es\/en\/computer-maintenance\/\"><strong>cybersecurity<\/strong><\/a>&nbsp;It&#039;s in the spotlight; users are starting to think that all the personal data they&#039;ve uploaded to the cloud is in an inhospitable place, with the possibility of being hacked from one day to the next.<\/p>\n\n\n\n<p>Digital jargon has become ingrained in our society with words like malware, cybercrime, or cyberattack\u2014words that sound familiar but whose hidden dangers and how to deal with them remain unknown.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Measures to keep your PC safe<\/strong><\/h3>\n\n\n\n<p><strong>&nbsp;<\/strong>If we put some into practice&nbsp;<a href=\"http:\/\/rootear.com\/windows\/consejos-ordenador-seguro\"><strong>maintenance tips<\/strong><\/a>, We will be able to browse the web safely, knowing at all times what is recommended and what is best to avoid, so as not to take too many risks.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"452\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/2.jpg\" alt=\"2\" class=\"wp-image-4751\" style=\"width:395px;height:auto\" srcset=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/2.jpg 640w, https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/2-300x212.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Download software from trusted sources;\u00a0<strong>Avoid downloads from CNET or Softonic<\/strong>, because the installer that we download with the desired application usually includes\u00a0<em>crapware<\/em>This packaging can range from hijacking our browser&#039;s search engine to tracking our searches, or even spying on our sensitive passwords such as banking information.<\/li>\n\n\n\n<li>Use a\u00a0<strong>anti-spy program<\/strong>; that they can\u00a0<strong>help us delve a little deeper into the search for potential threats<\/strong><strong>.<\/strong><\/li>\n\n\n\n<li>Use a good\u00a0<strong>antivirus<\/strong>, which will protect our computer from all those viruses that want to enter.<\/li>\n\n\n\n<li>The\u00a0<a href=\"http:\/\/www.gadae.com\/blog\/7-consejos-para-el-mantenimiento-preventivo-de-tu-ordenador\"><strong>program update<\/strong><\/a>\u00a0It is an essential element to keep your programs secure; there is malware that can sneak into your PC without the antivirus being able to act.<\/li>\n\n\n\n<li>Use a good\u00a0<strong>firewall<\/strong>, which will prevent malicious applications from connecting to the Internet.<\/li>\n\n\n\n<li>Another piece of advice is\u00a0<strong>Do not use public WiFi networks<\/strong>\u00a0Because your data can be easily intercepted, it&#039;s best to browse with the HTTPSSS protocol enabled.<\/li>\n\n\n\n<li>If you don&#039;t want your password stolen and your personal data accessed, you need to create different and secure passwords for all your important services, and you can even use different usernames. It also helps to...\u00a0<strong>changing passwords periodically<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Control your social media profile<\/strong><\/h3>\n\n\n\n<p><strong>&nbsp;<\/strong>In your&nbsp;<strong>social media profiles<\/strong>&nbsp;There&#039;s too much personal information to risk not protecting it properly. Here you have it.&nbsp;<a href=\"http:\/\/www.pantallasamigas.net\/proteccion-infancia-consejos-articulos\/seis-recomendaciones-para-la-proteccion-de-la-privacidad-de-los-adolescentes-en-las-redes-sociales.shtm\"><strong>some recommendations<\/strong><\/a>&nbsp;&nbsp;to avoid unpleasant surprises.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To know and configure in detail the options of\u00a0<strong>privacy<\/strong><\/li>\n\n\n\n<li>Identify the functions and effects of each action<\/li>\n\n\n\n<li><strong>Protect<\/strong>\u00a0personal data<\/li>\n\n\n\n<li>Personally protect your data<\/li>\n\n\n\n<li>Maintain a proactive attitude in defending your own data<\/li>\n\n\n\n<li><strong>Distrust<\/strong>\u00a0from suggestions of unknown friends<\/li>\n\n\n\n<li>Change your passwords regularly<\/li>\n\n\n\n<li>Having different users on each social network<\/li>\n\n\n\n<li>Evaluate the attitudes and privacy conditions of the contacts<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"704\" height=\"497\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/3.jpg\" alt=\"3\" class=\"wp-image-4752\" style=\"width:420px;height:auto\" srcset=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/3.jpg 704w, https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/3-300x212.jpg 300w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Apen, specialists in network security<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.apen.es\/en\/company\/\"><strong>Apen<\/strong><\/a>&nbsp;, specialist in&nbsp;<strong>IT services<\/strong>, They can help you solve all these problems. They are experts in the&nbsp;<strong>network security<\/strong>&nbsp;as well as antivirus, electrical protection of our equipment and a structured and certified network that guarantees uninterrupted work.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is under scrutiny; users are starting to worry about all the personal data they&#039;ve uploaded\u2026<\/p>","protected":false},"author":4,"featured_media":4754,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[66],"tags":[48,69,49,73,68],"class_list":["post-4749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mantenimiento-informatico","tag-mantenimiento-informatico","tag-mantenimiento-informatico-barcelona","tag-seguridad-en-ordenadores","tag-seguridad-informatica","tag-troyanos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Donde el antivirus no llega\u2026 - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"La&nbsp;seguridad inform\u00e1tica&nbsp;est\u00e1 en el punto de mira, los usuarios empiezan a pensar que todos aquellos datos personales que han subido a la nube\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/where-the-antivirus-doesnt-reach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Donde el antivirus no llega\u2026 - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"La&nbsp;seguridad inform\u00e1tica&nbsp;est\u00e1 en el punto de mira, los usuarios empiezan a pensar que todos aquellos datos personales que han subido a la nube\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/where-the-antivirus-doesnt-reach\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-07T12:17:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T11:55:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Donde el antivirus no llega\u2026\",\"datePublished\":\"2016-09-07T12:17:57+00:00\",\"dateModified\":\"2025-03-04T11:55:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/\"},\"wordCount\":511,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/1-1.jpg\",\"keywords\":[\"Mantenimiento inform\u00e1tico\",\"Mantenimiento Inform\u00e1tico Barcelona\",\"Seguridad en ordenadores\",\"Seguridad inform\u00e1tica\",\"Troyanos\"],\"articleSection\":[\"Mantenimiento inform\u00e1tico\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/\",\"name\":\"Donde el antivirus no llega\u2026 - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/1-1.jpg\",\"datePublished\":\"2016-09-07T12:17:57+00:00\",\"dateModified\":\"2025-03-04T11:55:35+00:00\",\"description\":\"La&nbsp;seguridad inform\u00e1tica&nbsp;est\u00e1 en el punto de mira, los usuarios empiezan a pensar que todos aquellos datos personales que han subido a la nube\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/1-1.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/donde-el-antivirus-no-llega\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Donde el antivirus no llega\u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Where antivirus doesn&#039;t reach\u2026 - Apen Inform\u00e1tica","description":"Cybersecurity is in the spotlight; users are starting to worry about all the personal data they&#039;ve uploaded to the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/where-the-antivirus-doesnt-reach\/","og_locale":"en_US","og_type":"article","og_title":"Donde el antivirus no llega\u2026 - Apen Inform\u00e1tica","og_description":"La&nbsp;seguridad inform\u00e1tica&nbsp;est\u00e1 en el punto de mira, los usuarios empiezan a pensar que todos aquellos datos personales que han subido a la nube","og_url":"https:\/\/www.apen.es\/en\/blog\/where-the-antivirus-doesnt-reach\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2016-09-07T12:17:57+00:00","article_modified_time":"2025-03-04T11:55:35+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Donde el antivirus no llega\u2026","datePublished":"2016-09-07T12:17:57+00:00","dateModified":"2025-03-04T11:55:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/"},"wordCount":511,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg","keywords":["Mantenimiento inform\u00e1tico","Mantenimiento Inform\u00e1tico Barcelona","Seguridad en ordenadores","Seguridad inform\u00e1tica","Troyanos"],"articleSection":["Mantenimiento inform\u00e1tico"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/","url":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/","name":"Where antivirus doesn&#039;t reach\u2026 - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg","datePublished":"2016-09-07T12:17:57+00:00","dateModified":"2025-03-04T11:55:35+00:00","description":"Cybersecurity is in the spotlight; users are starting to worry about all the personal data they&#039;ve uploaded to the cloud.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/donde-el-antivirus-no-llega\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Donde el antivirus no llega\u2026"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":66,"label":"Mantenimiento inform\u00e1tico"}],"post_tag":[{"value":48,"label":"Mantenimiento inform\u00e1tico"},{"value":69,"label":"Mantenimiento Inform\u00e1tico Barcelona"},{"value":49,"label":"Seguridad en ordenadores"},{"value":73,"label":"Seguridad inform\u00e1tica"},{"value":68,"label":"Troyanos"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2016\/09\/1-1.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":66,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":66,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","term_order":"0","cat_ID":66,"category_count":78,"category_description":"","cat_name":"Mantenimiento inform\u00e1tico","category_nicename":"mantenimiento-informatico","category_parent":0}],"tag_info":[{"term_id":48,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":48,"taxonomy":"post_tag","description":"","parent":0,"count":50,"filter":"raw","term_order":"0"},{"term_id":69,"name":"Mantenimiento Inform\u00e1tico Barcelona","slug":"mantenimiento-informatico-barcelona","term_group":0,"term_taxonomy_id":69,"taxonomy":"post_tag","description":"","parent":0,"count":20,"filter":"raw","term_order":"0"},{"term_id":49,"name":"Seguridad en ordenadores","slug":"seguridad-en-ordenadores","term_group":0,"term_taxonomy_id":49,"taxonomy":"post_tag","description":"","parent":0,"count":35,"filter":"raw","term_order":"0"},{"term_id":73,"name":"Seguridad inform\u00e1tica","slug":"seguridad-informatica","term_group":0,"term_taxonomy_id":73,"taxonomy":"post_tag","description":"","parent":0,"count":28,"filter":"raw","term_order":"0"},{"term_id":68,"name":"Troyanos","slug":"troyanos","term_group":0,"term_taxonomy_id":68,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/4749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=4749"}],"version-history":[{"count":2,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/4749\/revisions"}],"predecessor-version":[{"id":54190,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/4749\/revisions\/54190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/4754"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=4749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=4749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=4749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}