{"id":43,"date":"2025-08-22T13:04:05","date_gmt":"2025-08-22T11:04:05","guid":{"rendered":"https:\/\/ciber-seguridad.org\/?page_id=43"},"modified":"2025-09-20T17:18:20","modified_gmt":"2025-09-20T15:18:20","slug":"soluciones","status":"publish","type":"page","link":"https:\/\/ciber-seguridad.org\/?page_id=43","title":{"rendered":"SOLUCIONES"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas.png\" alt=\"\" class=\"wp-image-162\" style=\"width:345px;height:auto\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>LABORATORIO PERICIAL INFORM\u00c1TICO FORENSE<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Periciales Inform\u00e1ticas Judiciales.<\/strong> Informes periciales, ratificaciones en sala, preservaci\u00f3n de evidencias digitales con cadena de custodia.<\/li>\n\n\n\n<li><strong>Formaci\u00f3n en la Prevenci\u00f3n del Ciberdelito.<\/strong> Cursos pr\u00e1cticos para cuerpos de seguridad, personal t\u00e9cnico, directivos, administrativos, funcionarios.<\/li>\n\n\n\n<li><strong>Prevenci\u00f3n del ciberacoso. <\/strong>Protocolos, formaci\u00f3n y herramientas para colegios, institutos y empresas.<\/li>\n\n\n\n<li><strong>Laboratorio Inform\u00e1tico Forense.<\/strong> An\u00e1lisis de dispositivos, recuperaci\u00f3n de datos, malware y trazabilidad de incidencias.<\/li>\n\n\n\n<li><strong>Hacking \u00c9tico. <\/strong>Pentesting de aplicaciones web, m\u00f3viles y redes con informes ejecutivos y t\u00e9cnicos.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Asitencia-Tecnica.jpg\" alt=\"\" class=\"wp-image-232\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Asitencia-Tecnica.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Asitencia-Tecnica-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Asitencia-Tecnica-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Asitencia-Tecnica-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>ASISTENCIA T\u00c9CNICA INFORM\u00c1TICA<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Soporte Remoto y Presencial.<\/strong> Resoluci\u00f3n de incidencias en software y hardware. Asistencia por control remoto o desplazamiento a la empresa.<\/li>\n\n\n\n<li><strong>Mantenimiento Preventivo y Correctivo.<\/strong> Monitorizaci\u00f3n proactiva de servidores, PC&#8217;s y redes. Limpieza, optimizaci\u00f3n y actualizaci\u00f3n de sistemas para prevenir fallos.<\/li>\n\n\n\n<li><strong>Gesti\u00f3n de Redes y Comunicaciones. <\/strong>Configuraci\u00f3n de routers, switchs y firewalls. Creaci\u00f3n de redes seguras (LAN, Wifi empresarial, VPN para teletrabajo).<\/li>\n\n\n\n<li><strong>Administraci\u00f3n de Servidores y Sistemas.<\/strong> Instalaci\u00f3n y configuraci\u00f3n de servidores Windows y Linux. Gesti\u00f3n de copias de seguridad, actualizaciones y seguridad.<\/li>\n\n\n\n<li><strong>Asesoramiento y Consultor\u00eda Tecnol\u00f3gica. <\/strong>Recomendaciones de hardware y software adaptadas y personalizadas. Migraci\u00f3n a la nube.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios.png\" alt=\"\" class=\"wp-image-167\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>SPORTMAN. SOFTWARE DE GESTI\u00d3N DE INSTALACIONES DEPORTIVAS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Gesti\u00f3n de Clientes y Socios. <\/strong>Facturaci\u00f3n peri\u00f3dica, bonos, emisi\u00f3n de recibos bancarios, control de caja, unificaci\u00f3n familiar, historial.<\/li>\n\n\n\n<li><strong>Control de Accesos. <\/strong>Franjas horarias, identificaci\u00f3n por tarjeta, c\u00f3digo QR, facial, biometr\u00eda, pulseras, llaveros.<\/li>\n\n\n\n<li><strong>Reservas.<\/strong> Pistas, salas, actividades, ocupaci\u00f3n, cupos, servicios.<\/li>\n\n\n\n<li><strong>P\u00e1rquing.<\/strong> Gesti\u00f3n del control de accesos, ocupaci\u00f3n y bonos de p\u00e1rquing de veh\u00edculos en la instalaci\u00f3n deportiva.<\/li>\n\n\n\n<li><strong>Taquillas. <\/strong>Gesti\u00f3n de taquillas, zonas de las taquillas, organizaci\u00f3n por g\u00e9nero.<\/li>\n\n\n\n<li>Tornos, portillo, pasillos motorizados, barreras. Suministro, transporte, instalaci\u00f3n, configuraci\u00f3n y puesta en marcha.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia.png\" alt=\"\" class=\"wp-image-166\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>SOLUCIONES DE VIDEO VIGILANCIA POLICIAL<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Control de Tr\u00e1fico Inteligente<\/strong>: c\u00e1maras con lectura autom\u00e1tica de matr\u00edculas, identificaci\u00f3n y b\u00fasqueda de veh\u00edculos mediante Inteligencia Artificial.<\/li>\n\n\n\n<li><strong>Seguridad en Espacios P\u00fablicos<\/strong>: sistemas de videovigilancia aut\u00f3nomos, con alimentaci\u00f3n solar y comunicaci\u00f3n 4G, dise\u00f1ados para entornos urbanos y rurales.<\/li>\n\n\n\n<li><strong>Protecci\u00f3n Residencial y Comunitaria<\/strong>: soluciones adaptadas para comunidades de propietarios, urbanizaciones y viviendas particulares.<\/li>\n<\/ul>\n\n\n\n<p><em>Nuestros sistemas integran tecnolog\u00eda avanzada de an\u00e1lisis inteligente, garantizando una respuesta r\u00e1pida y eficaz ante cualquier incidencia.<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral.png\" alt=\"\" class=\"wp-image-161\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>CONTROL DE PRESENCIA LABORAL<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Registro de jornada automatizado<\/strong>: sistemas de fichaje mediante huella dactilar, reconocimiento facial, tarjetas de proximidad o aplicaciones m\u00f3viles.<\/li>\n\n\n\n<li><strong>Cumplimiento legal<\/strong>: soluciones adaptadas a la normativa vigente de control horario y conservaci\u00f3n de registros.<\/li>\n\n\n\n<li><strong>Gesti\u00f3n avanzada de turnos y ausencias<\/strong>: planificaci\u00f3n de horarios, control de vacaciones, bajas m\u00e9dicas y horas extras.<\/li>\n\n\n\n<li><strong>Informes y an\u00e1lisis en tiempo real<\/strong>: acceso a estad\u00edsticas y reportes que optimizan la productividad y la gesti\u00f3n del personal.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos.png\" alt=\"\" class=\"wp-image-160\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>SISTEMAS DE CONTROL DE ACCESOS DE PERSONAS Y VEH\u00cdCULOS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identificaci\u00f3n avanzada<\/strong>: control mediante tarjetas, biometr\u00eda (huella, rostro) o credenciales m\u00f3viles.<\/li>\n\n\n\n<li><strong>Gesti\u00f3n de accesos vehiculares<\/strong>: lectura autom\u00e1tica de matr\u00edculas y control de barreras, esclusas y portillos.<\/li>\n\n\n\n<li><strong>Seguridad y trazabilidad<\/strong>: registro en tiempo real de entradas y salidas de personas y veh\u00edculos. Verificaci\u00f3n mediante sistema inteligencia artificial de lectura de matr\u00edculas.<\/li>\n\n\n\n<li><strong>Integraci\u00f3n con otros sistemas<\/strong>: conexi\u00f3n con videovigilancia, alarmas y software de gesti\u00f3n corporativa.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite.jpg\" alt=\"\" class=\"wp-image-203\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>PLATAFORMAS DE TRABAJO CORPORATIVO<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Gesti\u00f3n documental centralizada<\/strong>: almacenamiento seguro y organizado de documentos con control de versiones.<\/li>\n\n\n\n<li><strong>Colaboraci\u00f3n en equipo<\/strong>: trabajo simult\u00e1neo en archivos, comunicaci\u00f3n interna y flujos de trabajo compartidos.<\/li>\n\n\n\n<li><strong>Automatizaci\u00f3n de procesos<\/strong>: creaci\u00f3n de formularios, flujos de aprobaci\u00f3n y seguimiento de tareas.<\/li>\n\n\n\n<li><strong>Acceso seguro y remoto<\/strong>: disponibilidad desde cualquier dispositivo, con autenticaci\u00f3n y permisos personalizados.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad.png\" alt=\"\" class=\"wp-image-159\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>\u00daLTIMOS AVANCES TECNOL\u00d3GICOS EN CIBERSEGURIDAD<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protecci\u00f3n frente a ciberataques<\/strong>: implantaci\u00f3n de firewalls, antivirus y sistemas de detecci\u00f3n de intrusos.<\/li>\n\n\n\n<li><strong>Cumplimiento normativo<\/strong>: adaptaci\u00f3n a est\u00e1ndares como el Esquema Nacional de Seguridad (ENS) e ISO 27001.<\/li>\n\n\n\n<li><strong>Auditor\u00edas y an\u00e1lisis de riesgos<\/strong>: identificaci\u00f3n de vulnerabilidades y recomendaciones de mejora.<\/li>\n\n\n\n<li><strong>Formaci\u00f3n y concienciaci\u00f3n<\/strong>: capacitaci\u00f3n a usuarios para prevenir phishing, malware y fraudes digitales.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LABORATORIO PERICIAL INFORM\u00c1TICO FORENSE ASISTENCIA T\u00c9CNICA INFORM\u00c1TICA SPORTMAN. SOFTWARE DE GESTI\u00d3N DE INSTALACIONES DEPORTIVAS SOLUCIONES DE VIDEO VIGILANCIA POLICIAL Nuestros [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-43","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=43"}],"version-history":[{"count":23,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/43\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/43\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}