{"id":692,"date":"2024-04-29T16:42:13","date_gmt":"2024-04-29T16:42:13","guid":{"rendered":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/?page_id=692"},"modified":"2024-05-21T16:27:57","modified_gmt":"2024-05-21T16:27:57","slug":"respuesta","status":"publish","type":"page","link":"https:\/\/urudataciberseguridad.com\/en\/respuesta\/","title":{"rendered":"Response"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"692\" class=\"elementor elementor-692\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c888d5 e-con-full e-flex e-con e-parent\" data-id=\"4c888d5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-46270b9 e-con-full e-flex e-con e-child\" data-id=\"46270b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2405d65 elementor-widget elementor-widget-heading\" data-id=\"2405d65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17b716e elementor-widget elementor-widget-heading\" data-id=\"17b716e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We act quickly to handle the consequences of a potential incident as effectively as possible\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43670ee e-con-full e-flex e-con e-child\" data-id=\"43670ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1728628 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"1728628\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"513\" height=\"296\" src=\"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/Group-1556.png?fit=513%2C296&amp;ssl=1\" class=\"attachment-large size-large wp-image-489\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/Group-1556.png?w=513&amp;ssl=1 513w, https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/Group-1556.png?resize=300%2C173&amp;ssl=1 300w\" sizes=\"(max-width: 513px) 100vw, 513px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55ba3d7 elementor-hidden-desktop elementor-widget elementor-widget-image\" data-id=\"55ba3d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"421\" height=\"305\" src=\"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Group-1548.svg\" class=\"attachment-large size-large wp-image-1859\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-980bfbb e-flex e-con-boxed e-con e-parent\" data-id=\"980bfbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0d368ed e-con-full e-flex e-con e-child\" data-id=\"0d368ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65836f7 elementor-widget elementor-widget-heading\" data-id=\"65836f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Response Consulting<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dbbc88 elementor-widget elementor-widget-text-editor\" data-id=\"6dbbc88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">We have highly specialized professionals ready to respond to incidents and active breaches, understanding that once an incident is detected, every minute counts.\n<br>\nOnce the incident has been eradicated, we focus on strengthening security operations for future detection and response.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Respuesta Actuamos con celeridad para sortear de la mejor manera posible los estragos de un potencial incidente Consultor\u00eda en respuesta de Incidentes Contamos con profesionales altamente capacitados para responder ante incidentes yvulneraciones activas, entendiendo que una vez detectado un incidente cada minuto cuenta. Luego de erradicado el evento de desastre nos enfocamos en reforzar las [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-692","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Respuesta - Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudataciberseguridad.com\/en\/respuesta\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Respuesta - Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Respuesta Actuamos con celeridad para sortear de la mejor manera posible los estragos de un potencial incidente Consultor\u00eda en respuesta de Incidentes Contamos con profesionales altamente capacitados para responder ante incidentes yvulneraciones activas, entendiendo que una vez detectado un incidente cada minuto cuenta. Luego de erradicado el evento de desastre nos enfocamos en reforzar las [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudataciberseguridad.com\/en\/respuesta\/\" \/>\n<meta property=\"og:site_name\" content=\"Ciberseguridad\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-21T16:27:57+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/04\/Group-1556.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/\",\"name\":\"Respuesta - Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/emq.qck.mybluehost.me\\\/website_42b9569b\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Group-1556.png\",\"datePublished\":\"2024-04-29T16:42:13+00:00\",\"dateModified\":\"2024-05-21T16:27:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/#primaryimage\",\"url\":\"http:\\\/\\\/emq.qck.mybluehost.me\\\/website_42b9569b\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Group-1556.png\",\"contentUrl\":\"http:\\\/\\\/emq.qck.mybluehost.me\\\/website_42b9569b\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Group-1556.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/respuesta\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Respuesta\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"name\":\"Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudataciberseguridad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\",\"name\":\"Ciberseguridad\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"contentUrl\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"width\":185,\"height\":27,\"caption\":\"Ciberseguridad\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Respuesta - Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudataciberseguridad.com\/en\/respuesta\/","og_locale":"en_US","og_type":"article","og_title":"Respuesta - Ciberseguridad","og_description":"Respuesta Actuamos con celeridad para sortear de la mejor manera posible los estragos de un potencial incidente Consultor\u00eda en respuesta de Incidentes Contamos con profesionales altamente capacitados para responder ante incidentes yvulneraciones activas, entendiendo que una vez detectado un incidente cada minuto cuenta. Luego de erradicado el evento de desastre nos enfocamos en reforzar las [&hellip;]","og_url":"https:\/\/urudataciberseguridad.com\/en\/respuesta\/","og_site_name":"Ciberseguridad","article_modified_time":"2024-05-21T16:27:57+00:00","og_image":[{"url":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/04\/Group-1556.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/urudataciberseguridad.com\/respuesta\/","url":"https:\/\/urudataciberseguridad.com\/respuesta\/","name":"Respuesta - Ciberseguridad","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/respuesta\/#primaryimage"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/respuesta\/#primaryimage"},"thumbnailUrl":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/04\/Group-1556.png","datePublished":"2024-04-29T16:42:13+00:00","dateModified":"2024-05-21T16:27:57+00:00","breadcrumb":{"@id":"https:\/\/urudataciberseguridad.com\/respuesta\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudataciberseguridad.com\/respuesta\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/respuesta\/#primaryimage","url":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/04\/Group-1556.png","contentUrl":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/04\/Group-1556.png"},{"@type":"BreadcrumbList","@id":"https:\/\/urudataciberseguridad.com\/respuesta\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/urudataciberseguridad.com\/"},{"@type":"ListItem","position":2,"name":"Respuesta"}]},{"@type":"WebSite","@id":"https:\/\/urudataciberseguridad.com\/#website","url":"https:\/\/urudataciberseguridad.com\/","name":"Ciberseguridad","description":"","publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudataciberseguridad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudataciberseguridad.com\/#organization","name":"Ciberseguridad","url":"https:\/\/urudataciberseguridad.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/","url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","contentUrl":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","width":185,"height":27,"caption":"Ciberseguridad"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages\/692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/comments?post=692"}],"version-history":[{"count":5,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages\/692\/revisions"}],"predecessor-version":[{"id":3066,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages\/692\/revisions\/3066"}],"wp:attachment":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media?parent=692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}