{"id":6449,"date":"2017-04-20T15:55:28","date_gmt":"2017-04-20T15:55:28","guid":{"rendered":"https:\/\/www.apen.es\/?p=6449"},"modified":"2025-03-04T10:55:19","modified_gmt":"2025-03-04T10:55:19","slug":"ciberseguridad-en-las-pymes","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-en-las-pymes\/","title":{"rendered":"Cybersecurity in SMEs"},"content":{"rendered":"<p>The main mistake that small and medium-sized enterprises (SMEs) usually make is thinking that their organizational information is not of interest, and for this reason they neglect it.&nbsp;<strong>protection<\/strong>&nbsp;of their&nbsp;<strong>data<\/strong>. Nothing could be further from the truth, since that information can be very important for the&nbsp;<strong>hackers<\/strong>.<br>From&nbsp;<strong><a href=\"https:\/\/www.apen.es\/en\/systems-and-cloud-solutions\/#Redes-y-comunicaciones\" target=\"_blank\" rel=\"noreferrer noopener\">Apen<\/a><\/strong>&nbsp;We offer you the keys for your&nbsp;<strong>cybersecurity<\/strong>&nbsp;be more effective.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Risks<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>Investing in&nbsp;<strong>security<\/strong>&nbsp;Minimizing risks and knowing who will be responsible for managing them is very important. We need to be aware of the level of risk we are willing to take.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Updates<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>We shouldn&#039;t just buy a firewall and antivirus and forget about it until a problem arises. We need to update it whenever possible, and to speed things up, we can enable the &quot;automatic update&quot; option in the software.&nbsp;<strong>security<\/strong>&nbsp;of our teams.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Network protection<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>Our company&#039;s network must be protected from both external and internal attacks; therefore, it is advisable to confirm that our internet provider includes a firewall.<br>If we suspect that the&nbsp;<strong>security<\/strong>&nbsp;If our company&#039;s network has been compromised, it is very important to consult an expert.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Malware<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>It is vital to have a package of&nbsp;<strong>security&nbsp;<\/strong>A complete solution that globally protects our computers and networks from any malware, spyware, adware, etc\u2026<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>User privileges<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>It is very important to control who accesses our SME&#039;s network systems and where, and for this purpose, each employee must have a username and password. Each user&#039;s privileges on the system should be limited by the administrator, and it is recommended to keep sensitive data separate and monitored.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Removable devices<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>For a greater&nbsp;<strong>security<\/strong>&nbsp;It is advisable to use only CDs, DVDs, USB drives, or SD cards provided by the system administrator, and these should be scanned to prevent malware.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Monitoring<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>Currently, there are free tools available for&nbsp;<strong>monitoring<\/strong>&nbsp;or protocol analysis that helps us detect potential hardware failures or intrusions. If our company is larger and more complex, we can opt for other commercial options that include traffic analysis, IP usage, etc.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Good practice<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>We need to ensure that employees know and apply the policy of&nbsp;<strong>security<\/strong>&nbsp;of our company. We must periodically remind staff of good practices in&nbsp;<strong>security<\/strong>.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Employee mobile devices<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>It is essential that the mobile devices of company employees have the approval of the managers of&nbsp;<strong>security<\/strong>. We need to make sure they have anti-malware installed, that they are encrypted, and that we can track and remotely delete them in case of loss or theft.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Incident response procedure<\/strong><\/h2>\n\n\n\n<p>&nbsp;<br>Any setback that compromises the safety of our&nbsp;<strong>technological systems&nbsp;<\/strong>This is an incident that affects the company&#039;s normal operations. It is essential to be clear about what to do and what not to do if this occurs, and if we have any doubts, it is best to contact an external agent who can help us resolve the situation appropriately.<\/p>","protected":false},"excerpt":{"rendered":"<p>The main mistake that small and medium-sized enterprises (SMEs) usually make is thinking that their organization&#039;s information is not\u2026<\/p>","protected":false},"author":4,"featured_media":6450,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,194],"tags":[129,49],"class_list":["post-6449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-seguridad","tag-apen","tag-seguridad-en-ordenadores"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad en las pymes - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"El principal error que suelen cometer las peque\u00f1as y medianas empresas es pensar que la informaci\u00f3n de su organizaci\u00f3n no es de inter\u00e9s y por este motivo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-en-las-pymes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad en las pymes - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"El principal error que suelen cometer las peque\u00f1as y medianas empresas es pensar que la informaci\u00f3n de su organizaci\u00f3n no es de inter\u00e9s y por este motivo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-en-las-pymes\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-20T15:55:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T10:55:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Ciberseguridad en las pymes\",\"datePublished\":\"2017-04-20T15:55:28+00:00\",\"dateModified\":\"2025-03-04T10:55:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/\"},\"wordCount\":588,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/Ciberseguridad.png\",\"keywords\":[\"Apen\",\"Seguridad en ordenadores\"],\"articleSection\":[\"Apen\",\"Seguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/\",\"name\":\"Ciberseguridad en las pymes - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/Ciberseguridad.png\",\"datePublished\":\"2017-04-20T15:55:28+00:00\",\"dateModified\":\"2025-03-04T10:55:19+00:00\",\"description\":\"El principal error que suelen cometer las peque\u00f1as y medianas empresas es pensar que la informaci\u00f3n de su organizaci\u00f3n no es de inter\u00e9s y por este motivo\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/Ciberseguridad.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/Ciberseguridad.png\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/ciberseguridad-en-las-pymes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad en las pymes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in SMEs - Apen Inform\u00e1tica","description":"The main mistake that small and medium-sized enterprises usually make is thinking that their organizational information is not of interest, and for this reason","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-en-las-pymes\/","og_locale":"en_US","og_type":"article","og_title":"Ciberseguridad en las pymes - Apen Inform\u00e1tica","og_description":"El principal error que suelen cometer las peque\u00f1as y medianas empresas es pensar que la informaci\u00f3n de su organizaci\u00f3n no es de inter\u00e9s y por este motivo","og_url":"https:\/\/www.apen.es\/en\/blog\/ciberseguridad-en-las-pymes\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2017-04-20T15:55:28+00:00","article_modified_time":"2025-03-04T10:55:19+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png","type":"image\/png"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Ciberseguridad en las pymes","datePublished":"2017-04-20T15:55:28+00:00","dateModified":"2025-03-04T10:55:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/"},"wordCount":588,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png","keywords":["Apen","Seguridad en ordenadores"],"articleSection":["Apen","Seguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/","url":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/","name":"Cybersecurity in SMEs - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png","datePublished":"2017-04-20T15:55:28+00:00","dateModified":"2025-03-04T10:55:19+00:00","description":"The main mistake that small and medium-sized enterprises usually make is thinking that their organizational information is not of interest, and for this reason","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/ciberseguridad-en-las-pymes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad en las pymes"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":194,"label":"Seguridad"}],"post_tag":[{"value":129,"label":"Apen"},{"value":49,"label":"Seguridad en ordenadores"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2017\/04\/Ciberseguridad.png",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0}],"tag_info":[{"term_id":129,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":129,"taxonomy":"post_tag","description":"","parent":0,"count":51,"filter":"raw","term_order":"0"},{"term_id":49,"name":"Seguridad en ordenadores","slug":"seguridad-en-ordenadores","term_group":0,"term_taxonomy_id":49,"taxonomy":"post_tag","description":"","parent":0,"count":35,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/6449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=6449"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/6449\/revisions"}],"predecessor-version":[{"id":54118,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/6449\/revisions\/54118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/6450"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=6449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=6449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=6449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}