{"id":24059,"date":"2023-01-04T17:54:00","date_gmt":"2023-01-04T17:54:00","guid":{"rendered":"http:\/\/35.157.126.229\/modulos-del-primer-nivel\/"},"modified":"2024-09-09T09:10:51","modified_gmt":"2024-09-09T09:10:51","slug":"cyber-guru-awareness-modulos-del-primer-nivel","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/","title":{"rendered":"M\u00f3dulos del primer nivel"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb150px||||false|false\u00bb custom_padding=\u00bb|||10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>M\u00f3dulos del primer nivel<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Security Awareness Training \/ <span style=\"color: #f18a00;\">M\u00f3dulos del primer nivel<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb custom_padding_tablet=\u00bb0px||0px||true|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Phishing.webp\u00bb title_text=\u00bbphishing\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>El PHISHING es la t\u00e9cnica de ataque m\u00e1s com\u00fan utilizada por los ciberdelincuentes. <span>Es especialmente enrevesado porque se basa en el enga\u00f1o, al intentar inducir a la posible v\u00edctima a realizar una acci\u00f3n que permita al delincuente lanzar su ataque. Reconocerlo para tomar las medidas necesarias es fundamental.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Password.webp\u00bb title_text=\u00bbpassword\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Uno de los pilares de la ciberseguridad es la CONTRASE\u00d1A, la clave de acceso a todos aquellos recursos inform\u00e1ticos a los que hay que garantizar un acceso seguro y confidencial. La gesti\u00f3n de las propias CONTRASE\u00d1AS se convierte as\u00ed en un elemento b\u00e1sico de las estrategias defensivas de las personas y de las empresas. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Social-Media.webp\u00bb title_text=\u00bbsocial-media\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Las REDES SOCIALES son una nueva forma de socializaci\u00f3n que esconde m\u00faltiples riesgos. U<span>sar de forma consciente estas herramientas es la \u00fanica soluci\u00f3n para protegernos a nosotros y a nuestra organizaci\u00f3n de los riesgos que el intercambio en red de contenido personales y profesionales puede generar<\/span>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Privacy-Personal-Data.png\u00bb title_text=\u00bbPrivacy &#038; Personal Data\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb alt=\u00bbPrivacy &#038; Personal Data\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>La introducci\u00f3n del Reglamento de Protecci\u00f3n de Datos europeo ha aumentado la sensibilidad de las organizaciones en lo que respecta a la PRIVACIDAD y la protecci\u00f3n de los datos confidenciales. <span>Es importante que todos los miembros de cualquier organizaci\u00f3n tomen a\u00fan m\u00e1s conciencia de la protecci\u00f3n de datos.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Mobile-App.webp\u00bb title_text=\u00bbmobile-app\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Los DISPOSITIVOS M\u00d3VILES son herramientas cada vez m\u00e1s cr\u00edticas y representan la m\u00e1xima expresi\u00f3n de la arriesgada superposici\u00f3n entre las dimensiones personal y profesional. Solo <span>fomentando pr\u00e1cticas de uso recomendadas se puede aumentar el nivel de seguridad y de protecci\u00f3n de los datos.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Modulo-AI.png\u00bb title_text=\u00bbModulo AI\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb alt=\u00bbArtificial Intelligence\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]El uso de herramientas de IA puede plantear riesgos para la ciberseguridad, ya sea potenciando las amenazas ya existentes o generando otras nuevas. En el m\u00f3dulo se recuerdan algunas buenas pr\u00e1cticas que hacen hincapi\u00e9 en el papel decisivo del factor humano en la prevenci\u00f3n.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/USB-Storage.webp\u00bb title_text=\u00bbUSB-storage\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Todos los dispositivos USB y, en particular, los dispositivos de almacenamiento, pueden convertirse en un punto cr\u00edtico ante la necesidad de proteger la informaci\u00f3n confidencial. Saber cu\u00e1les son <span>los riesgos asociados a los dispositivos USB es el punto de partida para evitar incurrir en fen\u00f3menos de robo de datos.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/malware.webp\u00bb title_text=\u00bbmalware\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>El \u00abMALWARE\u00bb en general y el \u00abRANSOMWARE\u00bb en particular han sido noticia r\u00e1pidamente, lo que evidencia su peligrosidad. Para infectar cualquier dispositivo, basta con hacer un solo clic inconscientemente y ning\u00fan <span>programa antivirus puede garantizarnos una protecci\u00f3n total contra los programas maliciosos.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/e-mail-security.webp\u00bb title_text=\u00bbe-mail-security\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>El CORREO ELECTR\u00d3NICO es una herramienta cada vez m\u00e1s importante que desempe\u00f1a un papel fundamental y especialmente cr\u00edtico en el \u00e1mbito profesional. Se suele intercambiar informaci\u00f3n sensible por CORREO ELECTR\u00d3NICO. Subestimar el aspecto de la seguridad puede conllevar graves riesgos para las personas y sus organizaciones.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Web-Browsing.webp\u00bb title_text=\u00bbweb-browsing\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Navegar por la WEB puede encerrar muchos riesgos. <span>Un buen conocimiento de algunas caracter\u00edsticas particulares de los sitios web y de los navegadores en concreto puede ayudar a reducir considerablemente el nivel de riesgo. Adquirir los elementos cognitivos necesarios para navegar por la WEB de forma segura es una condici\u00f3n fundamental para evitar los riesgos cibern\u00e9ticos.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Deepfake.png\u00bb title_text=\u00bbDeepfake\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb alt=\u00bbDeepfake\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]Los deepfakes son una t\u00e9cnica avanzada que utiliza la inteligencia artificial para crear contenidos digitales falsos pero extremadamente realistas. Se analizan los riesgos asociados al uso de esta tecnolog\u00eda, incluidos los posibles abusos en los \u00e1mbitos personal y profesional, y se proponen consejos pr\u00e1cticos para reconocer y protegerse de los deepfakes.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Social-Engineering-1.webp\u00bb title_text=\u00bbsocial-engineering-1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>La ingenier\u00eda social o \u00absocial engineering\u00bb es la madre de todas las estrategias de ciberataque. Es una estrategia que se basa en el enga\u00f1o y la manipulaci\u00f3n <span>psicol\u00f3gica con fines maliciosos. Para que el ataque sea m\u00e1s eficaz, el eje central de esta estrategia es la adquisici\u00f3n de informaci\u00f3n sobre la v\u00edctima se\u00f1alada. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s\u00bb title_text=\u00bbM\u00e1s\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbL\u00ednea\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuieres m\u00e1s informaci\u00f3n al respecto?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONTACTA CON NOSOTROS\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik||||||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MTUzIn19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbDESCARGA LA PRESENTACI\u00d3N\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik||||||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITA UNA DEMO\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik||||||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bb\u00bfQuieres informaci\u00f3n al respecto?\u00bb title_text=\u00bb\u00bfQuieres informaci\u00f3n al respecto?\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u00f3dulos del primer nivelSecurity Awareness Training \/ M\u00f3dulos del primer nivelEl PHISHING es la t\u00e9cnica de ataque m\u00e1s com\u00fan utilizada por los ciberdelincuentes. Es especialmente enrevesado porque se basa en el enga\u00f1o, al intentar inducir a la posible v\u00edctima a realizar una acci\u00f3n que permita al delincuente lanzar su ataque. Reconocerlo para tomar las medidas [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24059","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>M\u00f3dulos del primer nivel - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Descubre la lista de m\u00f3dulos del primer a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M\u00f3dulos del primer nivel\" \/>\n<meta property=\"og:description\" content=\"Descubre la lista de m\u00f3dulos del primer a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T09:10:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-primer-nivel\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-primer-nivel\\\/\",\"name\":\"M\u00f3dulos del primer nivel - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2023-01-04T17:54:00+00:00\",\"dateModified\":\"2024-09-09T09:10:51+00:00\",\"description\":\"Descubre la lista de m\u00f3dulos del primer a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-primer-nivel\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-primer-nivel\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-primer-nivel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"M\u00f3dulos del primer nivel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"M\u00f3dulos del primer nivel - Cyber Guru","description":"Descubre la lista de m\u00f3dulos del primer a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/","og_locale":"es_ES","og_type":"article","og_title":"M\u00f3dulos del primer nivel","og_description":"Descubre la lista de m\u00f3dulos del primer a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness","og_url":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T09:10:51+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/","url":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/","name":"M\u00f3dulos del primer nivel - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2023-01-04T17:54:00+00:00","dateModified":"2024-09-09T09:10:51+00:00","description":"Descubre la lista de m\u00f3dulos del primer a\u00f1o de aprendizaje del programa de formaci\u00f3n cognitiva de Cyber Guru Awareness","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-primer-nivel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"M\u00f3dulos del primer nivel"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/24059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=24059"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/24059\/revisions"}],"predecessor-version":[{"id":39608,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/24059\/revisions\/39608"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=24059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}