{"id":8472,"date":"2017-12-21T10:29:51","date_gmt":"2017-12-21T10:29:51","guid":{"rendered":"https:\/\/www.apen.es\/?p=8472"},"modified":"2025-03-04T10:13:59","modified_gmt":"2025-03-04T10:13:59","slug":"google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","title":{"rendered":"Google warns users about the most common methods hackers use to access your Gmail account"},"content":{"rendered":"<p>Google, in collaboration with the University of California, has studied the ecosystem of credential theft and trading in dark web markets, one of the preferred methods of cybercriminals, and was able to identify 788,000 potential victims of keyloggers, that is, those programs that capture what the user is typing or what they see through their screen, in order to send it to an external server that is controlled by the hacker himself.<\/p>\n\n\n\n<p>This practice, used by cybercriminals to trick users into entering their data on a website controlled by the attacker, is called phishing. It is the biggest threat to users, followed by keyloggers and security breaches in third-party services. Users leave their trail on the internet in many places; their digital footprint can be seen on social media, forms, financial records, photos, or files uploaded to the cloud.<\/p>\n\n\n\n<p>Often, access to all these online platforms is through our email address and a password, which is sometimes insufficient for these types of risks. In fact, a cybercriminal can find our password if it&#039;s not very secure, or even through the security questions that allow you to find or reset your password. Once they&#039;ve logged in with your credentials, they have access to your banking information, personal files, and so on.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"600\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720.png\" alt=\"\" class=\"wp-image-8478\" srcset=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720.png 960w, https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720-300x188.png 300w, https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720-768x480.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity is increasing<\/h2>\n\n\n\n<p>Two-step verification is the most effective and immediate way, along with complementary security measures, promoted by services like Gmail, to prevent immediate account hijacking, but it&#039;s often not enough. Cybercriminals may have all sorts of tools ready to intercept two-step verification SMS messages or even the device&#039;s geolocation.<\/p>\n\n\n\n<p>Therefore, it&#039;s more advisable to use more specific authentication methods, such as Google Authenticator or the Twitter app. But if you want to increase security, you can opt for newer options like facial recognition or fingerprint readers, which can be found, for example, in the new iPhone X.<\/p>","protected":false},"excerpt":{"rendered":"<p>Google, in collaboration with the University of California, has studied the ecosystem of credential theft and trading in\u2026<\/p>","protected":false},"author":4,"featured_media":8473,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,147,149,194,88],"tags":[173,324,152,323,73,325],"class_list":["post-8472","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-ciberataques","category-copia-de-seguridad","category-seguridad","category-web","tag-gmail","tag-hacker","tag-privacidad","tag-seguridad","tag-seguridad-informatica","tag-servicios-de-seguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-21T10:29:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T10:13:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail\",\"datePublished\":\"2017-12-21T10:29:51+00:00\",\"dateModified\":\"2025-03-04T10:13:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"keywords\":[\"Gmail\",\"hacker\",\"Privacidad\",\"seguridad\",\"Seguridad inform\u00e1tica\",\"servicios de seguridad\"],\"articleSection\":[\"Apen\",\"Ciberataques\",\"Copia de seguridad\",\"Seguridad\",\"WEB\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\",\"name\":\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"datePublished\":\"2017-12-21T10:29:51+00:00\",\"dateModified\":\"2025-03-04T10:13:59+00:00\",\"description\":\"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google warns users about the most common methods hackers use to access your Gmail account - Apen Inform\u00e1tica","description":"Google, in collaboration with the University of California, has studied the ecosystem of credential theft and trading on black markets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","og_locale":"en_US","og_type":"article","og_title":"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica","og_description":"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de","og_url":"https:\/\/www.apen.es\/en\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2017-12-21T10:29:51+00:00","article_modified_time":"2025-03-04T10:13:59+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail","datePublished":"2017-12-21T10:29:51+00:00","dateModified":"2025-03-04T10:13:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/"},"wordCount":422,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","keywords":["Gmail","hacker","Privacidad","seguridad","Seguridad inform\u00e1tica","servicios de seguridad"],"articleSection":["Apen","Ciberataques","Copia de seguridad","Seguridad","WEB"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","url":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","name":"Google warns users about the most common methods hackers use to access your Gmail account - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","datePublished":"2017-12-21T10:29:51+00:00","dateModified":"2025-03-04T10:13:59+00:00","description":"Google, in collaboration with the University of California, has studied the ecosystem of credential theft and trading on black markets.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":147,"label":"Ciberataques"},{"value":149,"label":"Copia de seguridad"},{"value":194,"label":"Seguridad"},{"value":88,"label":"WEB"}],"post_tag":[{"value":173,"label":"Gmail"},{"value":324,"label":"hacker"},{"value":152,"label":"Privacidad"},{"value":323,"label":"seguridad"},{"value":73,"label":"Seguridad inform\u00e1tica"},{"value":325,"label":"servicios de seguridad"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":149,"name":"Copia de seguridad","slug":"copia-de-seguridad","term_group":0,"term_taxonomy_id":149,"taxonomy":"category","description":"","parent":0,"count":19,"filter":"raw","term_order":"0","cat_ID":149,"category_count":19,"category_description":"","cat_name":"Copia de seguridad","category_nicename":"copia-de-seguridad","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0},{"term_id":88,"name":"WEB","slug":"web","term_group":0,"term_taxonomy_id":88,"taxonomy":"category","description":"","parent":0,"count":121,"filter":"raw","term_order":"0","cat_ID":88,"category_count":121,"category_description":"","cat_name":"WEB","category_nicename":"web","category_parent":0}],"tag_info":[{"term_id":173,"name":"Gmail","slug":"gmail","term_group":0,"term_taxonomy_id":173,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw","term_order":"0"},{"term_id":324,"name":"hacker","slug":"hacker","term_group":0,"term_taxonomy_id":324,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":152,"name":"Privacidad","slug":"privacidad","term_group":0,"term_taxonomy_id":152,"taxonomy":"post_tag","description":"","parent":0,"count":5,"filter":"raw","term_order":"0"},{"term_id":323,"name":"seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":323,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw","term_order":"0"},{"term_id":73,"name":"Seguridad inform\u00e1tica","slug":"seguridad-informatica","term_group":0,"term_taxonomy_id":73,"taxonomy":"post_tag","description":"","parent":0,"count":28,"filter":"raw","term_order":"0"},{"term_id":325,"name":"servicios de seguridad","slug":"servicios-de-seguridad","term_group":0,"term_taxonomy_id":325,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=8472"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8472\/revisions"}],"predecessor-version":[{"id":54061,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8472\/revisions\/54061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/8473"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=8472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=8472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=8472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}