{"id":6055,"date":"2017-02-22T18:26:17","date_gmt":"2017-02-22T18:26:17","guid":{"rendered":"https:\/\/www.apen.es\/?p=6055"},"modified":"2025-03-04T11:15:17","modified_gmt":"2025-03-04T11:15:17","slug":"cuanto-le-puede-costar-un-ciberataque-a-tu-empresa","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/","title":{"rendered":"How much could a cyberattack cost your company?"},"content":{"rendered":"<p>No company, however small, is exempt from being a victim of&nbsp;<strong>cybercrime<\/strong>.<br>In fact, an SME runs the same risks as a large company, or even more because they are usually less protected.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Because?<\/h2>\n\n\n\n<p>&nbsp;<br>Today, information is extremely valuable, and any organization possesses data that is highly prized on the black market.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can they do with that information?<\/h2>\n\n\n\n<p>&nbsp;<br>Crime breeds more crime, so their objectives include carrying out cyber espionage or financing other criminal activities such as extortion, robbery, etc.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the price of cybercrime?<\/h2>\n\n\n\n<p>&nbsp;<br>The&nbsp;<strong>cybercrime<\/strong>&nbsp;It&#039;s a big business and it costs the global economy up to&nbsp;<strong>400 billion euros<\/strong>, increasing in the last five years by 200%.<br>What you&#039;re probably most interested in knowing is how much it might cost your company a&nbsp;<strong>cyberattack<\/strong>, Although it is impossible to give an exact figure, we will give some examples that demonstrate the importance of considering cybersecurity as an investment.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware \/ Ransomware<\/h2>\n\n\n\n<p>&nbsp;<br>One of the most widespread malware programs is the&nbsp;<strong>CryptoLocker<\/strong>. We can receive it as an email attachment, and once activated, it encrypts files on local drives or network drives. To return the data, the criminals demand a certain amount from the victims.&nbsp;<strong>800 euros<\/strong>. Initially, cybercriminals would restore victims&#039; access to their files, but in many cases, they no longer do so. In other words, we&#039;re left without money and without information.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing<\/h2>\n\n\n\n<p>&nbsp;<br>It is based on the&nbsp;<strong>identity theft<\/strong>&nbsp;and it is usually carried out via email.&nbsp;<strong>cybercriminals<\/strong>&nbsp;They can impersonate a regular supplier and request that payments be deposited into an account number they provide.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DDoS<\/h2>\n\n\n\n<p>&nbsp;<br>If your main source of income is your website,&nbsp;<strong>the denial-of-service attack<\/strong>, This is one of the issues that can affect you the most because it can overwhelm your network and make it inaccessible to users. The financial loss will be directly proportional to the length of time the service is down.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Economic penalties for non-compliance with the LOPD<\/h2>\n\n\n\n<p>&nbsp;<br>These cyberattacks can expose legal breaches by the victim. That is, the losses that a&nbsp;<strong>cyberattack<\/strong>, In addition, we would have to consider significant financial penalties. For example, storing files containing personal data on unprotected equipment can result in a fine of up to&nbsp;<strong>600,000 euros<\/strong>. Throwing away documents without destroying them, fraudulently collecting information, sharing data outside of permitted cases, etc\u2026 These are just some examples of&nbsp;<strong>cyberattacks<\/strong>&nbsp;and violations of the law, but there are many more.<br>&nbsp;<br>Nowadays, having an active company is almost a guarantee of&nbsp;<strong>cyberattack<\/strong>&nbsp;And for all these reasons, it is necessary for business owners and the self-employed to become aware of the importance of&nbsp;<strong>cybersecurity<\/strong>.<\/p>","protected":false},"excerpt":{"rendered":"<p>No company, no matter how small, is exempt from becoming a victim of cybercrime. In fact, an SME faces the same risks as\u2026<\/p>","protected":false},"author":4,"featured_media":6056,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,147],"tags":[67,68],"class_list":["post-6055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-ciberataques","tag-antivirus","tag-troyanos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque? - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Ninguna empresa, por peque\u00f1a que sea, est\u00e1 exenta de ser v\u00edctima del&nbsp;cibercrimen.De hecho, una pyme corre los mismos riesgos que una gran compa\u00f1\u00eda, o\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque? - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Ninguna empresa, por peque\u00f1a que sea, est\u00e1 exenta de ser v\u00edctima del&nbsp;cibercrimen.De hecho, una pyme corre los mismos riesgos que una gran compa\u00f1\u00eda, o\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-22T18:26:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T11:15:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque?\",\"datePublished\":\"2017-02-22T18:26:17+00:00\",\"dateModified\":\"2025-03-04T11:15:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/\"},\"wordCount\":563,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Ciberataque.png\",\"keywords\":[\"Antivirus\",\"Troyanos\"],\"articleSection\":[\"Apen\",\"Ciberataques\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/\",\"name\":\"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque? - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Ciberataque.png\",\"datePublished\":\"2017-02-22T18:26:17+00:00\",\"dateModified\":\"2025-03-04T11:15:17+00:00\",\"description\":\"Ninguna empresa, por peque\u00f1a que sea, est\u00e1 exenta de ser v\u00edctima del&nbsp;cibercrimen.De hecho, una pyme corre los mismos riesgos que una gran compa\u00f1\u00eda, o\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Ciberataque.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/Ciberataque.png\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How much could a cyberattack cost your company? - Apen Inform\u00e1tica","description":"No company, however small, is exempt from becoming a victim of cybercrime. In fact, an SME faces the same risks as a large company, or","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque? - Apen Inform\u00e1tica","og_description":"Ninguna empresa, por peque\u00f1a que sea, est\u00e1 exenta de ser v\u00edctima del&nbsp;cibercrimen.De hecho, una pyme corre los mismos riesgos que una gran compa\u00f1\u00eda, o","og_url":"https:\/\/www.apen.es\/en\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2017-02-22T18:26:17+00:00","article_modified_time":"2025-03-04T11:15:17+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png","type":"image\/png"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque?","datePublished":"2017-02-22T18:26:17+00:00","dateModified":"2025-03-04T11:15:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/"},"wordCount":563,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png","keywords":["Antivirus","Troyanos"],"articleSection":["Apen","Ciberataques"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/","url":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/","name":"How much could a cyberattack cost your company? - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png","datePublished":"2017-02-22T18:26:17+00:00","dateModified":"2025-03-04T11:15:17+00:00","description":"No company, however small, is exempt from becoming a victim of cybercrime. In fact, an SME faces the same risks as a large company, or","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/cuanto-le-puede-costar-un-ciberataque-a-tu-empresa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"\u00bfCu\u00e1nto le puede costar a tu empresa un ciberataque?"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":147,"label":"Ciberataques"}],"post_tag":[{"value":67,"label":"Antivirus"},{"value":68,"label":"Troyanos"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2017\/02\/Ciberataque.png",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0}],"tag_info":[{"term_id":67,"name":"Antivirus","slug":"antivirus","term_group":0,"term_taxonomy_id":67,"taxonomy":"post_tag","description":"","parent":0,"count":14,"filter":"raw","term_order":"0"},{"term_id":68,"name":"Troyanos","slug":"troyanos","term_group":0,"term_taxonomy_id":68,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/6055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=6055"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/6055\/revisions"}],"predecessor-version":[{"id":54145,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/6055\/revisions\/54145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/6056"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=6055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=6055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=6055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}