{"id":69,"date":"2023-02-24T16:09:00","date_gmt":"2023-02-24T15:09:00","guid":{"rendered":"https:\/\/blog.cyberguardian.tech\/?p=69"},"modified":"2023-02-24T16:09:00","modified_gmt":"2023-02-24T15:09:00","slug":"cuidemos-nuestras-pymes","status":"publish","type":"post","link":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/","title":{"rendered":"\u00a1Cuidemos nuestras pymes!"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">El crimen ha mutado a un mundo m\u00e1s digital, al igual que el tejido empresarial, exponiendo la informaci\u00f3n y los activos de las compa\u00f1\u00edas. En el caso de las PYMES, uno de los mayores tejidos empresariales de este pa\u00eds, aproximadamente <strong>el 60% de los casos, en los que cierran, la causa es un Ciberataque<\/strong>. Este tejido empresarial soporta m\u00e1s de 8 millones de personas, y no siempre tienen los recursos para ocuparse de la seguridad, aunque est\u00e9n preocupados por ello.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">En algunos casos, a su alcance est\u00e1n los Antivirus, una medida necesaria, pero ante la evoluci\u00f3n de los ataques, recomendado es reforzarla. Y en otros casos, hay un pensamiento de \u00bb a m\u00ed no \u00bb o \u00bb yo nunca he \u00ab, esas frases que siendo ni\u00f1os nos ayudaba a desviar el foco de atenci\u00f3n, pero que hoy en d\u00eda, en ciberseguridad ya no nos ayuda.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Estudiando el atacante, cada vez son m\u00e1s los ataques, por la alta rentabilidad y velocidad (hablamos de un negocio de Poca Tasa \/ Mucha masa), hacia nuestras PYMES.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">Pongamos soluci\u00f3n y protejamos el mayor tejido empresarial, <strong><a href=\"https:\/\/www.cyberguardian.tech\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Guardian<\/a>, protege de los vectores de ataque m\u00e1s comunes, correo, dispositivos, navegaci\u00f3n y la formaci\u00f3n a sus empleados son los pilares para que no tenga que lamentar un ataque Cyber, plataforma \u201cen idioma tradicional\u201d y de f\u00e1cil despliegue, sin necesidad de conocimiento experto<\/strong>.<\/p>\n\n\n\n<p><strong>Alexis Alonso Ar\u00e9valo<\/strong><\/p>\n\n\n\n<p><strong>Director de Desarrollo de Negocio Cyber Guardian<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El crimen ha mutado a un mundo m\u00e1s digital, al igual que el tejido empresarial, exponiendo la informaci\u00f3n y los activos de las compa\u00f1\u00edas. En el caso de las PYMES, uno de los mayores tejidos empresariales de este pa\u00eds, aproximadamente el 60% de los casos, en los que cierran, la causa es un Ciberataque. Este &hellip; <a href=\"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/\" class=\"more-link\">Continuar leyendo<span class=\"screen-reader-text\"> \u00ab\u00a1Cuidemos nuestras pymes!\u00bb<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-69","post","type-post","status-publish","format-standard","hentry","category-articulos-cyber-guardian"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00a1Cuidemos nuestras pymes! - Cyber Guardian - Blog<\/title>\n<meta name=\"description\" content=\"El 60% de las pymes v\u00edctimas de ciberataques severos, desaparecen en los 6 meses posteriores al incidente. Protejamos nuestro mayor tejido empresarial.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00a1Cuidemos nuestras pymes! - Cyber Guardian - Blog\" \/>\n<meta property=\"og:description\" content=\"El 60% de las pymes v\u00edctimas de ciberataques severos, desaparecen en los 6 meses posteriores al incidente. Protejamos nuestro mayor tejido empresarial.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guardian - Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T15:09:00+00:00\" \/>\n<meta name=\"author\" content=\"Cyber Guardian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber Guardian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/\"},\"author\":{\"name\":\"Cyber Guardian\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#\\\/schema\\\/person\\\/a3ed9f985851939bf7cef30f1017d93c\"},\"headline\":\"\u00a1Cuidemos nuestras pymes!\",\"datePublished\":\"2023-02-24T15:09:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/\"},\"wordCount\":249,\"articleSection\":[\"Art\u00edculos Cyber Guardian\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/\",\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/\",\"name\":\"\u00a1Cuidemos nuestras pymes! - Cyber Guardian - Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#website\"},\"datePublished\":\"2023-02-24T15:09:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#\\\/schema\\\/person\\\/a3ed9f985851939bf7cef30f1017d93c\"},\"description\":\"El 60% de las pymes v\u00edctimas de ciberataques severos, desaparecen en los 6 meses posteriores al incidente. Protejamos nuestro mayor tejido empresarial.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/cuidemos-nuestras-pymes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00a1Cuidemos nuestras pymes!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/\",\"name\":\"Cyber Guardian - Blog\",\"description\":\"Blog sobre ciberseguridad para peque\u00f1as y medianas empresas f\u00e1cil de entender tambi\u00e9n para usuarios no t\u00e9cnicos.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/#\\\/schema\\\/person\\\/a3ed9f985851939bf7cef30f1017d93c\",\"name\":\"Cyber Guardian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g\",\"caption\":\"Cyber Guardian\"},\"sameAs\":[\"https:\\\/\\\/cyberguardian.tech\"],\"url\":\"https:\\\/\\\/www.cyberguardian.tech\\\/blog\\\/author\\\/cyberguardian\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00a1Cuidemos nuestras pymes! - Cyber Guardian - Blog","description":"El 60% de las pymes v\u00edctimas de ciberataques severos, desaparecen en los 6 meses posteriores al incidente. Protejamos nuestro mayor tejido empresarial.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/","og_locale":"es_ES","og_type":"article","og_title":"\u00a1Cuidemos nuestras pymes! - Cyber Guardian - Blog","og_description":"El 60% de las pymes v\u00edctimas de ciberataques severos, desaparecen en los 6 meses posteriores al incidente. Protejamos nuestro mayor tejido empresarial.","og_url":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/","og_site_name":"Cyber Guardian - Blog","article_published_time":"2023-02-24T15:09:00+00:00","author":"Cyber Guardian","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Cyber Guardian","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/#article","isPartOf":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/"},"author":{"name":"Cyber Guardian","@id":"https:\/\/www.cyberguardian.tech\/blog\/#\/schema\/person\/a3ed9f985851939bf7cef30f1017d93c"},"headline":"\u00a1Cuidemos nuestras pymes!","datePublished":"2023-02-24T15:09:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/"},"wordCount":249,"articleSection":["Art\u00edculos Cyber Guardian"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/","url":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/","name":"\u00a1Cuidemos nuestras pymes! - Cyber Guardian - Blog","isPartOf":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/#website"},"datePublished":"2023-02-24T15:09:00+00:00","author":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/#\/schema\/person\/a3ed9f985851939bf7cef30f1017d93c"},"description":"El 60% de las pymes v\u00edctimas de ciberataques severos, desaparecen en los 6 meses posteriores al incidente. Protejamos nuestro mayor tejido empresarial.","breadcrumb":{"@id":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguardian.tech\/blog\/cuidemos-nuestras-pymes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.cyberguardian.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"\u00a1Cuidemos nuestras pymes!"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguardian.tech\/blog\/#website","url":"https:\/\/www.cyberguardian.tech\/blog\/","name":"Cyber Guardian - Blog","description":"Blog sobre ciberseguridad para peque\u00f1as y medianas empresas f\u00e1cil de entender tambi\u00e9n para usuarios no t\u00e9cnicos.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguardian.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguardian.tech\/blog\/#\/schema\/person\/a3ed9f985851939bf7cef30f1017d93c","name":"Cyber Guardian","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f120ab25b7fcac0c91b7b5d2970930a6a93112558b277a8b8353f8bbad0b82a?s=96&d=mm&r=g","caption":"Cyber Guardian"},"sameAs":["https:\/\/cyberguardian.tech"],"url":"https:\/\/www.cyberguardian.tech\/blog\/author\/cyberguardian\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":78,"url":"https:\/\/www.cyberguardian.tech\/blog\/encuentro-cyber-guardian-con-empresarios-en-work-cafe-santander-bilbao-y-foro-tendencias-empresariales-de-banco-santander-en-gijon\/","url_meta":{"origin":69,"position":0},"title":"Encuentro Cyber Guardian con empresarios en Work-Caf\u00e9 Santander Bilbao y Foro Tendencias Empresariales de Banco Santander en Gij\u00f3n.","author":"Cyber Guardian","date":"21 de abril de 2023","format":false,"excerpt":"Ayer 20 de Abril asistimos al primero de los eventos de Cyber Guardian en Work Caf\u00e9s Santander, en Bilbao, en la Plaza Moyua. Fue un encuentro con un n\u00famero importante de empresarios de Bilbao y tambi\u00e9n retransmitido por streaming. Nuestro Director de Desarrollo de Negocio, Alexis Alonso, habl\u00f3 de las\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/f6444f676d49ab17.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":56,"url":"https:\/\/www.cyberguardian.tech\/blog\/cada-semana-en-espana-mas-de-1000-empresas-sufren-el-secuestro-de-sus-datos\/","url_meta":{"origin":69,"position":1},"title":"Cada semana, en Espa\u00f1a m\u00e1s de 1000 empresas sufren el secuestro de sus datos","author":"Cyber Guardian","date":"21 de febrero de 2023","format":false,"excerpt":"Espa\u00f1a sigue escalando puestos en el ranking de pa\u00edses donde m\u00e1s incidencia tienen los ataques de ransomware o secuestro de datos inform\u00e1ticos, registr\u00e1ndose m\u00e1s de 1000 ataques a la semana de este tipo a empresas, mayoritariamente a pymes. El ransomware, o secuestro de datos inform\u00e1ticos, es un malware que impide\u2026","rel":"","context":"En \u00abArt\u00edculos Cyber Guardian\u00bb","block_context":{"text":"Art\u00edculos Cyber Guardian","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/articulos-cyber-guardian\/"},"img":{"alt_text":"Secuestro de datos inform\u00e1ticos","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/cc4c09a223661449.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/cc4c09a223661449.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/cc4c09a223661449.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/cc4c09a223661449.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/cc4c09a223661449.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/cc4c09a223661449.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":190,"url":"https:\/\/www.cyberguardian.tech\/blog\/cyber-guardian-en-evento-ecosistemas-de-ciberseguridad-en-madrid\/","url_meta":{"origin":69,"position":2},"title":"Cyber Guardian en evento \u00abEcosistemas de Ciberseguridad en Madrid\u00bb","author":"Cyber Guardian","date":"23 de febrero de 2024","format":false,"excerpt":"El pasado viernes 23 de Febrero estuvimos en el evento \u201cEcosistemas de Ciberseguridad en Madrid\u201d una jornada sobre ciberseguridad en CEIM - Confederaci\u00f3n Empresarial de Madrid-CEOE donde las principales empresas del sector de Ciberseguridad compartimos nuestra visi\u00f3n sobre la situaci\u00f3n del sector en\u00a0Madrid, los retos existentes y diferentes propuestas para\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/imagen1-150x150.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":182,"url":"https:\/\/www.cyberguardian.tech\/blog\/cyber-guardian-en-el-cyber-insurance-day\/","url_meta":{"origin":69,"position":3},"title":"Cyber Guardian en el Cyber Insurance Day 2023","author":"Cyber Guardian","date":"24 de noviembre de 2023","format":false,"excerpt":"El pasado 22 de noviembre asistimos al Cyber Insurance Day. Cerca de 200 personas asistieron a este congreso enfocado en ciberseguridad y ciberseguros que subray\u00f3 la actual relevancia de varios aspectos cruciales relacionados con la seguridad empresarial. Nuestro Director General Jos\u00e9 Antonio Castro ofreci\u00f3 una Keynote donde present\u00f3 la plataforma\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"Cyber Insurance Day","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/cyber-insurance-day-3.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/cyber-insurance-day-3.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/cyber-insurance-day-3.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/cyber-insurance-day-3.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":156,"url":"https:\/\/www.cyberguardian.tech\/blog\/cyber-guardian-la-ciberseguridad-profesional-sin-complicaciones-para-pymes\/","url_meta":{"origin":69,"position":4},"title":"Cyber Guardian, la ciberseguridad profesional sin complicaciones para pymes","author":"Cyber Guardian","date":"30 de junio de 2023","format":false,"excerpt":"La gesti\u00f3n de la ciberseguridad en el amplio espectro de las pymes es, en general, precaria o inexistente. Este hecho se ha intentado mitigar desde hace tiempo con formaci\u00f3n, concienciaci\u00f3n e iniciativas de divulgaci\u00f3n, que se han mostrado fallidas o poco eficientes. Para paliar esta circunstancia se construy\u00f3 en su\u2026","rel":"","context":"En \u00abArt\u00edculos Cyber Guardian\u00bb","block_context":{"text":"Art\u00edculos Cyber Guardian","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/articulos-cyber-guardian\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/sic1-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/sic1-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/2024\/02\/sic1-1.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":139,"url":"https:\/\/www.cyberguardian.tech\/blog\/encuentro-con-aseguradoras-y-principales-actores-del-mundo-del-ciberseguro\/","url_meta":{"origin":69,"position":5},"title":"Encuentro con Aseguradoras y actores del mundo del ciberseguro","author":"Cyber Guardian","date":"16 de junio de 2023","format":false,"excerpt":"Esta semana, los d\u00edas 13 y 14 de junio tuvimos la oportunidad de patrocinar y participar en el Espacio tiSec, de la Revista SIC, y compartir experiencias con grandes aseguradoras y los principales actores en el mundo del ciberseguro. Nuestro Director General, Jos\u00e9 Antonio Castro realiz\u00f3 una ponencia en la\u2026","rel":"","context":"En \u00abEventos\u00bb","block_context":{"text":"Eventos","link":"https:\/\/www.cyberguardian.tech\/blog\/category\/eventos\/"},"img":{"alt_text":"ciberseguro","src":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.cyberguardian.tech\/blog\/wp-content\/uploads\/3286c3473996761a.png?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguardian.tech\/blog\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}