{"id":24065,"date":"2023-01-04T18:07:06","date_gmt":"2023-01-04T18:07:06","guid":{"rendered":"http:\/\/35.157.126.229\/modulos-del-segundo-nivel\/"},"modified":"2024-09-09T09:13:52","modified_gmt":"2024-09-09T09:13:52","slug":"cyber-guru-awareness-modulos-del-segundo-nivel","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/","title":{"rendered":"M\u00f3dulos del segundo nivel"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb150px||||false|false\u00bb custom_padding=\u00bb|||10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>M\u00f3dulos del segundo nivel<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]Security Awareness Training \/ <span style=\"color: #f18a00;\">M\u00f3dulos del segundo nivel<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb custom_padding_tablet=\u00bb0px||0px||true|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/13-clean-desk.webp\u00bb title_text=\u00bbclean-desk\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Prestar especial atenci\u00f3n al puesto de trabajo, evitando dejar informaci\u00f3n cr\u00edtica o incluso sensible a disposici\u00f3n de personas no autorizadas para acceder a ella, es una medida fundamental para garantizar la seguridad de la informaci\u00f3n, la protecci\u00f3n de los datos y el cumplimiento de las normativas relativas a la privacidad.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/14-smart-working.webp\u00bb title_text=\u00bbsmart-working\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Con el uso generalizado del \u00absmart working\u00bb, tambi\u00e9n conocido como teletrabajo o trabajo a distancia, resulta necesario centrar la atenci\u00f3n en este tema. Trabajar fuera de las paredes \u00abseguras\u00bb de la oficina expone a los usuarios a un mayor n\u00famero de riesgos cibern\u00e9ticos.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/15-social-collaboration.webp\u00bb title_text=\u00bbsocial-collaboration\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>El \u00absmart-working\u00bb ha hecho que, entre todas las herramientas de videoconferencia, haya aumentado r\u00e1pidamente el uso de herramientas para compartir informaci\u00f3n y colaborar, un uso que ha traspasado el \u00e1mbito profesional para llegar definitivamente tambi\u00e9n al personal con los numerosos riesgos que esto conlleva.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/19-Smishing-Vishing-new.webp\u00bb title_text=\u00bb19-smishing-&#038;-vishing-new\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Es otra t\u00e9cnica particular de \u00abphishing\u00bb que ataca a trav\u00e9s de sistemas de mensajer\u00eda como WhatsApp, Messenger, Telegram y SMS o de telefon\u00eda. Hay que entender c\u00f3mo los sistemas de mensajer\u00eda que en cierto modo se consideran \u00abseguros\u00bb tambi\u00e9n pueden esconder trampas peligrosas.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/18-spear-phishing.webp\u00bb title_text=\u00bb18-spear-phishing\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Volvemos a hablar del \u00abphishing\u00bb con el \u00abspear phishing\u00bb, <span>una t\u00e9cnica sofisticada que afecta a una persona concreta o a un grupo espec\u00edfico de personas. En este tipo de ataque, se hace \u00e9nfasis en las t\u00e9cnicas preparatorias y necesarias para recopilar informaci\u00f3n sensible mediante el enga\u00f1o.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/18-ransomware.webp\u00bb title_text=\u00bbransomware\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Es el m\u00e1s retorcido de los programas de \u00abmalware\u00bb y el que m\u00e1s da\u00f1os causa, y somete a las personas y a las empresas a un chantaje del que es dif\u00edcil escapar. <span>Esta t\u00e9cnica cada vez est\u00e1 m\u00e1s extendida y es m\u00e1s agresiva, y en los \u00faltimos a\u00f1os se han ido produciendo cada vez m\u00e1s ataques graves relacionados con esta t\u00e9cnica.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/19-multi-factor-authentication.webp\u00bb title_text=\u00bb19-multi-factor-authentication\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Impulsar el uso<\/span><span> de los sistemas de autenticaci\u00f3n m\u00e1s avanzados es \u00fatil tanto para reforzar el nivel de seguridad general de las personas y de las organizaciones como para informar al usuario de cualquier nueva t\u00e9cnica con la que los piratas inform\u00e1ticos traten de superar estos sistemas aprovech\u00e1ndose del factor humano. <\/span> <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/fake-news.webp\u00bb title_text=\u00bbfake-news\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]Las NOTICIAS FALSAS son un fen\u00f3meno peligroso que puede tener repercusiones negativas tanto para las personas como para las empresas. Para defenderse es fundamental reconocerlas y activar algunos procesos de investigaci\u00f3n que ayudan a desarrollar la actitud correcta ante cualquier informaci\u00f3n adquirida en la red.[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/16-iot-device.webp\u00bb title_text=\u00bbIoT-device\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Los electrodom\u00e9sticos, las c\u00e1maras, los dispositivos que podemos llevar puestos, los coches cada vez m\u00e1s inteligentes e incluso otros objetos est\u00e1n destinados a comunicar cada vez m\u00e1s. Cualquier dispositivo interconectado, si no se adoptan comportamientos adecuados, puede convertirse en un posible punto de vulnerabilidad para la seguridad. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/22-bluetooth-wifi.webp\u00bb title_text=\u00bbbluetooth-wifi\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Son dos componentes tecnol\u00f3gicos que ahora son indispensables para garantizar la conexi\u00f3n en movimiento, la movilidad de las personas y la transformaci\u00f3n digital, pero que pueden esconder alg\u00fan problema si los usuarios que los usan no adoptan una actitud consciente.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/15-information-classification.webp\u00bb title_text=\u00bbinformation-classification\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>La clasificaci\u00f3n de la informaci\u00f3n es uno de los factores clave en la gesti\u00f3n de la seguridad de la informaci\u00f3n, pero tambi\u00e9n uno de los factores que los usuarios menos conocen. Su <span>importancia no solo tiene que ver con el cumplimiento de normas y reglamentos, sino tambi\u00e9n con la protecci\u00f3n de la informaci\u00f3n personal identificable.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/23-data-protection.webp\u00bb title_text=\u00bbdata-protection\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Volvemos a hablar de protecci\u00f3n de datos, con una acepci\u00f3n que tiene que ver con la seguridad y m\u00e1s estrictamente con la privacidad y la relaci\u00f3n con las distintas normativas de calidad y seguridad de la informaci\u00f3n, especialmente el RGPD. Se abordan <span>contenidos originales y m\u00e1s sofisticados que los del primer nivel.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s\u00bb title_text=\u00bbM\u00e1s\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbL\u00ednea\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuieres m\u00e1s informaci\u00f3n al respecto?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONTACTA CON NOSOTROS\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik||||||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MTUzIn19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbDESCARGA LA PRESENTACI\u00d3N\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik||||||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITA UNA DEMO\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.19.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik||||||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bb\u00bfQuieres informaci\u00f3n al respecto?\u00bb title_text=\u00bb\u00bfQuieres informaci\u00f3n al respecto?\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u00f3dulos del segundo nivelSecurity Awareness Training \/ M\u00f3dulos del segundo nivelPrestar especial atenci\u00f3n al puesto de trabajo, evitando dejar informaci\u00f3n cr\u00edtica o incluso sensible a disposici\u00f3n de personas no autorizadas para acceder a ella, es una medida fundamental para garantizar la seguridad de la informaci\u00f3n, la protecci\u00f3n de los datos y el cumplimiento de las [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-24065","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>M\u00f3dulos del segundo nivel - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Descubra la importancia de los m\u00f3dulos de nivel dos para aumentar la conciencia sobre la seguridad en el lugar de trabajo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M\u00f3dulos del segundo nivel\" \/>\n<meta property=\"og:description\" content=\"Descubra la importancia de los m\u00f3dulos de nivel dos para aumentar la conciencia sobre la seguridad en el lugar de trabajo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T09:13:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-segundo-nivel\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-segundo-nivel\\\/\",\"name\":\"M\u00f3dulos del segundo nivel - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2023-01-04T18:07:06+00:00\",\"dateModified\":\"2024-09-09T09:13:52+00:00\",\"description\":\"Descubra la importancia de los m\u00f3dulos de nivel dos para aumentar la conciencia sobre la seguridad en el lugar de trabajo.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-segundo-nivel\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-segundo-nivel\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/cyber-guru-awareness-modulos-del-segundo-nivel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"M\u00f3dulos del segundo nivel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"M\u00f3dulos del segundo nivel - Cyber Guru","description":"Descubra la importancia de los m\u00f3dulos de nivel dos para aumentar la conciencia sobre la seguridad en el lugar de trabajo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/","og_locale":"es_ES","og_type":"article","og_title":"M\u00f3dulos del segundo nivel","og_description":"Descubra la importancia de los m\u00f3dulos de nivel dos para aumentar la conciencia sobre la seguridad en el lugar de trabajo.","og_url":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-09-09T09:13:52+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/","url":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/","name":"M\u00f3dulos del segundo nivel - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2023-01-04T18:07:06+00:00","dateModified":"2024-09-09T09:13:52+00:00","description":"Descubra la importancia de los m\u00f3dulos de nivel dos para aumentar la conciencia sobre la seguridad en el lugar de trabajo.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/cyber-guru-awareness-modulos-del-segundo-nivel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"M\u00f3dulos del segundo nivel"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/24065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=24065"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/24065\/revisions"}],"predecessor-version":[{"id":39609,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/24065\/revisions\/39609"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=24065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}