{"id":705,"date":"2024-04-29T17:16:39","date_gmt":"2024-04-29T17:16:39","guid":{"rendered":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/?page_id=705"},"modified":"2024-05-24T19:24:08","modified_gmt":"2024-05-24T19:24:08","slug":"prevencion","status":"publish","type":"page","link":"https:\/\/urudataciberseguridad.com\/en\/prevencion\/","title":{"rendered":"Prevention"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"705\" class=\"elementor elementor-705\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c888d5 e-con-full e-flex e-con e-parent\" data-id=\"4c888d5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-46270b9 e-con-full e-flex e-con e-child\" data-id=\"46270b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2405d65 elementor-widget elementor-widget-heading\" data-id=\"2405d65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prevention<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17b716e elementor-widget elementor-widget-heading\" data-id=\"17b716e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">There is no better solution than prevention<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43670ee e-con-full e-flex e-con e-child\" data-id=\"43670ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1728628 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"1728628\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"513\" height=\"296\" src=\"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Group-1556.svg\" class=\"attachment-large size-large wp-image-1901\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1db3209 elementor-hidden-desktop elementor-widget elementor-widget-image\" data-id=\"1db3209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"421\" height=\"305\" src=\"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Group-1548.svg\" class=\"attachment-large size-large wp-image-1859\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0647bd1 e-con-full e-flex e-con e-parent\" data-id=\"0647bd1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6cf28b4 e-con-full e-flex e-con e-child\" data-id=\"6cf28b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74a665a elementor-widget elementor-widget-menu-anchor\" data-id=\"74a665a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Gobernanza\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d398fe elementor-widget elementor-widget-heading\" data-id=\"9d398fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Governance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-348c996 elementor-widget elementor-widget-heading\" data-id=\"348c996\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A regulatory framework tailored to your company<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d9065b elementor-widget elementor-widget-text-editor\" data-id=\"2d9065b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Governance is essential for the success of any security strategy. Working closely with our clients, we assess various aspects of their organization, from culture to the maturity level in the implementation of controls, in order to design a robust regulatory framework composed of policies and guidelines on which cybersecurity will be built. <br><br>\nThis detailed roadmap covers the short, medium, and long term, and serves as a guide for establishing an optimal and effective platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-befd388 elementor-widget elementor-widget-menu-anchor\" data-id=\"befd388\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"ConsultoriaSeguridadEmpresarial\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf65711 elementor-widget elementor-widget-heading\" data-id=\"cf65711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Business Security Consulting<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc71b93 elementor-widget elementor-widget-heading\" data-id=\"cc71b93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A safer, more resilient company, prepared for cyber threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-783816c elementor-widget elementor-widget-text-editor\" data-id=\"783816c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">It is very common in IT environments to follow the rule of \u201cif it works, don\u2019t touch it,\u201d assuming the risks. This often results in not correcting publicly known vulnerabilities already exploited by threats and fixed by the manufacturer.\n<br>\n<br>\nIn the IT world, this belief can be dangerous. Therefore, we perform comprehensive risk analysis. We detect vulnerabilities that could expose your company to attacks, assess threats and their potential impact, and focus on preventing incidents that could interrupt critical business processes. Finally, we offer recommendations and, if needed, support in implementing additional security measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb74790 elementor-widget elementor-widget-menu-anchor\" data-id=\"bb74790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"SeguridadOfensiva\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-869a0bf elementor-widget elementor-widget-heading\" data-id=\"869a0bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Offensive Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95d3d10 elementor-widget elementor-widget-heading\" data-id=\"95d3d10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Anticipate attackers\u2019 moves<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-856c153 elementor-widget elementor-widget-text-editor\" data-id=\"856c153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We understand that detecting vulnerabilities is not enough it is crucial to simulate how an attacker would exploit them. Our offensive security service recreates these scenarios, attempting to compromise your systems just as a real attacker would. We analyze how prepared your infrastructure is for potential attacks and provide recommendations to strengthen your security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1be2f04 elementor-widget elementor-widget-menu-anchor\" data-id=\"1be2f04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"concientizacionCiberseguridad\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd3040f elementor-widget elementor-widget-heading\" data-id=\"dd3040f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Awareness<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d1ead7 elementor-widget elementor-widget-heading\" data-id=\"3d1ead7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your company from the inside out<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3427a9c elementor-widget elementor-widget-text-editor\" data-id=\"3427a9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">At Urudata, we understand that the human factor is crucial in cybersecurity. Over 90% of intrusions are facilitated by deceived employees, making them the weakest link in the security chain. This is why we not only focus on technology but also on educating your staff.\n<br>\nOur experts provide dynamic and accessible training, using audiovisual resources and simple language. We focus on raising awareness about risks and consequences, adopting innovative strategies to ensure understanding and action.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Prevenci\u00f3n No hay mejor soluci\u00f3n que la prevenci\u00f3n Gobernanza Plataforma normativa adaptada a tu empresa La gobernanza es fundamental para el \u00e9xito de cualquier estrategia de seguridad. En colaboraci\u00f3n estrecha con nuestros clientes, evaluamos diversos aspectos de su organizaci\u00f3n, desde su cultura hasta su nivel de madurez en la implementaci\u00f3n de controles para dise\u00f1ar una [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-705","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prevenci\u00f3n - Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudataciberseguridad.com\/en\/prevencion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prevenci\u00f3n - Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Prevenci\u00f3n No hay mejor soluci\u00f3n que la prevenci\u00f3n Gobernanza Plataforma normativa adaptada a tu empresa La gobernanza es fundamental para el \u00e9xito de cualquier estrategia de seguridad. En colaboraci\u00f3n estrecha con nuestros clientes, evaluamos diversos aspectos de su organizaci\u00f3n, desde su cultura hasta su nivel de madurez en la implementaci\u00f3n de controles para dise\u00f1ar una [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudataciberseguridad.com\/en\/prevencion\/\" \/>\n<meta property=\"og:site_name\" content=\"Ciberseguridad\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-24T19:24:08+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/05\/Group-1556.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/\",\"name\":\"Prevenci\u00f3n - Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/emq.qck.mybluehost.me\\\/website_42b9569b\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Group-1556.svg\",\"datePublished\":\"2024-04-29T17:16:39+00:00\",\"dateModified\":\"2024-05-24T19:24:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/#primaryimage\",\"url\":\"http:\\\/\\\/emq.qck.mybluehost.me\\\/website_42b9569b\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Group-1556.svg\",\"contentUrl\":\"http:\\\/\\\/emq.qck.mybluehost.me\\\/website_42b9569b\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Group-1556.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/prevencion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prevenci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"name\":\"Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudataciberseguridad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\",\"name\":\"Ciberseguridad\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"contentUrl\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"width\":185,\"height\":27,\"caption\":\"Ciberseguridad\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prevenci\u00f3n - Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudataciberseguridad.com\/en\/prevencion\/","og_locale":"en_US","og_type":"article","og_title":"Prevenci\u00f3n - Ciberseguridad","og_description":"Prevenci\u00f3n No hay mejor soluci\u00f3n que la prevenci\u00f3n Gobernanza Plataforma normativa adaptada a tu empresa La gobernanza es fundamental para el \u00e9xito de cualquier estrategia de seguridad. En colaboraci\u00f3n estrecha con nuestros clientes, evaluamos diversos aspectos de su organizaci\u00f3n, desde su cultura hasta su nivel de madurez en la implementaci\u00f3n de controles para dise\u00f1ar una [&hellip;]","og_url":"https:\/\/urudataciberseguridad.com\/en\/prevencion\/","og_site_name":"Ciberseguridad","article_modified_time":"2024-05-24T19:24:08+00:00","og_image":[{"url":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/05\/Group-1556.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/urudataciberseguridad.com\/prevencion\/","url":"https:\/\/urudataciberseguridad.com\/prevencion\/","name":"Prevenci\u00f3n - Ciberseguridad","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/prevencion\/#primaryimage"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/prevencion\/#primaryimage"},"thumbnailUrl":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/05\/Group-1556.svg","datePublished":"2024-04-29T17:16:39+00:00","dateModified":"2024-05-24T19:24:08+00:00","breadcrumb":{"@id":"https:\/\/urudataciberseguridad.com\/prevencion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudataciberseguridad.com\/prevencion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/prevencion\/#primaryimage","url":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/05\/Group-1556.svg","contentUrl":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/wp-content\/uploads\/2024\/05\/Group-1556.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/urudataciberseguridad.com\/prevencion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/urudataciberseguridad.com\/"},{"@type":"ListItem","position":2,"name":"Prevenci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/urudataciberseguridad.com\/#website","url":"https:\/\/urudataciberseguridad.com\/","name":"Ciberseguridad","description":"","publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudataciberseguridad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudataciberseguridad.com\/#organization","name":"Ciberseguridad","url":"https:\/\/urudataciberseguridad.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/","url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","contentUrl":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","width":185,"height":27,"caption":"Ciberseguridad"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages\/705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/comments?post=705"}],"version-history":[{"count":5,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages\/705\/revisions"}],"predecessor-version":[{"id":3199,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/pages\/705\/revisions\/3199"}],"wp:attachment":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media?parent=705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}