{"id":509,"date":"2026-04-28T09:50:13","date_gmt":"2026-04-28T07:50:13","guid":{"rendered":"https:\/\/ciber-seguridad.org\/?page_id=509"},"modified":"2026-04-28T11:11:25","modified_gmt":"2026-04-28T09:11:25","slug":"ciber-seguridad","status":"publish","type":"page","link":"https:\/\/ciber-seguridad.org\/?page_id=509","title":{"rendered":"CIBER-SEGURIDAD"},"content":{"rendered":"\n<!DOCTYPE html>\n<html lang=\"es\">\n<head>\n  <meta charset=\"UTF-8\" \/>\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\" \/>\n  <title>Soluciones de Ciberseguridad | Empresa Partner de Microsoft<\/title>\n  <meta name=\"description\" content=\"Soluciones profesionales de ciberseguridad para empresas: protecci\u00f3n del puesto de trabajo, correo electr\u00f3nico, identidad, copias de seguridad, nube, auditor\u00eda, formaci\u00f3n y respuesta ante incidentes.\" \/>\n  <style>\n    :root {\n      --bg: #0f172a;\n      --bg-soft: #111827;\n      --card: #ffffff;\n      --card-soft: #f8fafc;\n      --text: #0f172a;\n      --muted: #64748b;\n      --primary: #2563eb;\n      --primary-dark: #1d4ed8;\n      --accent: #38bdf8;\n      --border: #e2e8f0;\n      --success: #16a34a;\n    }\n\n    * { box-sizing: border-box; margin: 0; padding: 0; }\n\n    body {\n      font-family: Arial, Helvetica, sans-serif;\n      line-height: 1.6;\n      background: #f1f5f9;\n      color: var(--text);\n    }\n\n    a { color: inherit; text-decoration: none; }\n\n    .container { width: min(1180px, 92%); margin: 0 auto; }\n\n    header {\n      background: rgba(15, 23, 42, 0.96);\n      color: #fff;\n      position: sticky;\n      top: 0;\n      z-index: 50;\n      border-bottom: 1px solid rgba(255, 255, 255, 0.08);\n    }\n\n    .nav {\n      display: flex;\n      justify-content: space-between;\n      align-items: center;\n      padding: 18px 0;\n      gap: 24px;\n    }\n\n    .logo { font-weight: 700; letter-spacing: 0.2px; font-size: 1.05rem; }\n    .logo span { color: var(--accent); }\n\n    .nav-links { display: flex; gap: 20px; font-size: 0.95rem; color: #cbd5e1; }\n    .nav-links a:hover { color: #fff; }\n\n    .hero {\n      background:\n        radial-gradient(circle at top right, rgba(56, 189, 248, 0.20), transparent 34%),\n        linear-gradient(135deg, #0f172a 0%, #111827 48%, #020617 100%);\n      color: #fff;\n      padding: 96px 0 86px;\n    }\n\n    .hero-grid {\n      display: grid;\n      grid-template-columns: 1.25fr 0.75fr;\n      gap: 48px;\n      align-items: center;\n    }\n\n    .eyebrow {\n      display: inline-flex;\n      align-items: center;\n      gap: 8px;\n      padding: 7px 12px;\n      border: 1px solid rgba(255, 255, 255, 0.18);\n      border-radius: 999px;\n      color: #bfdbfe;\n      background: rgba(255, 255, 255, 0.06);\n      font-size: 0.9rem;\n      margin-bottom: 22px;\n    }\n\n    h1 {\n      font-size: clamp(2.2rem, 5vw, 4.7rem);\n      line-height: 1.05;\n      margin-bottom: 24px;\n      letter-spacing: -1.5px;\n      color: #FFFFFF !important;\n    }\n\n    .hero p { color: #cbd5e1; font-size: 1.16rem; max-width: 720px; margin-bottom: 30px; }\n\n    .hero-actions { display: flex; flex-wrap: wrap; gap: 14px; }\n\n    .btn {\n      display: inline-flex;\n      align-items: center;\n      justify-content: center;\n      padding: 13px 20px;\n      border-radius: 10px;\n      font-weight: 700;\n      border: 1px solid transparent;\n      transition: 0.2s ease;\n    }\n\n    .btn-primary { background: var(--primary); color: #fff; }\n    .btn-primary:hover { background: var(--primary-dark); color: var(--text); }\n    .btn-secondary { border-color: rgba(255,255,255,0.24); color: #fff; background: rgba(255,255,255,0.06); }\n    .btn-secondary:hover { background: rgba(255,255,255,0.12); }\n\n    .hero-card {\n      background: rgba(255,255,255,0.08);\n      border: 1px solid rgba(255,255,255,0.14);\n      border-radius: 22px;\n      padding: 28px;\n      backdrop-filter: blur(10px);\n      box-shadow: 0 28px 70px rgba(0,0,0,0.28);\n    }\n\n    .hero-card h2 { font-size: 1.3rem; margin-bottom: 18px; color: #FFFFFF !important; }\n\n    .check-list { list-style: none; display: grid; gap: 13px; color: #e2e8f0; }\n    .check-list li::before { content: \"\u2713\"; color: var(--accent); font-weight: 700; margin-right: 9px; }\n\n    section { padding: 74px 0; }\n\n    .section-title { max-width: 840px; margin-bottom: 38px; }\n    .section-title h2 {\n      font-size: clamp(1.8rem, 3vw, 2.7rem);\n      line-height: 1.15;\n      margin-bottom: 12px;\n      letter-spacing: -0.7px;\n    }\n    .section-title p { color: var(--muted); font-size: 1.06rem; }\n\n    .grid { display: grid; grid-template-columns: repeat(3, 1fr); gap: 22px; }\n\n    .card {\n      background: var(--card);\n      border: 1px solid var(--border);\n      border-radius: 18px;\n      padding: 26px;\n      box-shadow: 0 14px 35px rgba(15,23,42,0.06);\n    }\n\n    .card .icon {\n      width: 46px; height: 46px;\n      display: grid; place-items: center;\n      background: #eff6ff;\n      color: var(--primary);\n      border-radius: 12px;\n      font-size: 1.35rem;\n      margin-bottom: 16px;\n    }\n\n    .card h3 { font-size: 1.18rem; margin-bottom: 10px; }\n    .card p { color: var(--muted); font-size: 0.98rem; }\n\n    .split { display: grid; grid-template-columns: 1fr 1fr; gap: 42px; align-items: center; }\n\n    .panel {\n      background: #fff;\n      border-radius: 22px;\n      border: 1px solid var(--border);\n      padding: 34px;\n      box-shadow: 0 14px 35px rgba(15,23,42,0.06);\n    }\n\n    .panel h2 { font-size: 2rem; margin-bottom: 14px; }\n    .panel p { color: var(--muted); margin-bottom: 18px; }\n\n    .feature-list { list-style: none; display: grid; gap: 12px; margin-top: 18px; }\n    .feature-list li { padding-left: 28px; position: relative; color: #334155; }\n    .feature-list li::before { content: \"\u2022\"; position: absolute; left: 8px; top: 0; color: var(--primary); font-weight: 900; }\n\n    .dark-section { background: var(--bg); color: #fff; }\n\n    .dark-section .section-title p,\n    .dark-section .card p { color: #cbd5e1; }\n\n    .dark-section .card {\n      background: rgba(255,255,255,0.06);\n      border-color: rgba(255,255,255,0.12);\n      color: #fff;\n    }\n\n    .dark-section .card .icon {\n      background: rgba(56, 189, 248, 0.12);\n      color: var(--accent);\n    }\n\n    .dark-section h2,\n    .dark-section h3 {\n      color: #FFFFFF !important;\n    }\n\n    .process { display: grid; grid-template-columns: repeat(4, 1fr); gap: 18px; }\n\n    .step {\n      background: #fff;\n      border: 1px solid var(--border);\n      border-radius: 18px;\n      padding: 24px;\n    }\n\n    .step-number { font-size: 0.85rem; color: var(--primary); font-weight: 800; margin-bottom: 8px; }\n    .step h3 { font-size: 1.05rem; margin-bottom: 8px; }\n    .step p { color: var(--muted); font-size: 0.95rem; }\n\n    .cta {\n      background: linear-gradient(135deg, #1d4ed8, #0f172a);\n      color: #fff;\n      border-radius: 26px;\n      padding: 46px;\n      display: grid;\n      grid-template-columns: 1fr auto;\n      gap: 24px;\n      align-items: center;\n      box-shadow: 0 25px 55px rgba(37,99,235,0.22);\n    }\n\n    .cta h2 { font-size: 2rem; margin-bottom: 10px; color: #FFFFFF !important; }\n    .cta p { color: #dbeafe; max-width: 760px; }\n\n    .contact-box { display: flex; flex-direction: column; gap: 10px; min-width: 260px; }\n    .contact-box a {\n      background: rgba(255,255,255,0.1);\n      border: 1px solid rgba(255,255,255,0.16);\n      padding: 12px 14px;\n      border-radius: 10px;\n      color: #fff;\n      font-weight: 700;\n      text-align: center;\n    }\n\n    footer { background: #020617; color: #94a3b8; padding: 30px 0; font-size: 0.92rem; }\n    .footer-grid { display: flex; justify-content: space-between; gap: 20px; flex-wrap: wrap; }\n\n    @media (max-width: 920px) {\n      .hero-grid, .split, .cta { grid-template-columns: 1fr; }\n      .grid, .process { grid-template-columns: repeat(2, 1fr); }\n      .nav-links { display: none; }\n    }\n\n    @media (max-width: 620px) {\n      .grid, .process { grid-template-columns: 1fr; }\n      .hero { padding: 72px 0 64px; }\n      .cta { padding: 30px; }\n    }\n  <\/style>\n<\/head>\n<body>\n  <header>\n    <div class=\"container nav\">\n      <a href=\"#inicio\" class=\"logo\">CIBER-SEGURIDAD SLU <span>|<\/span> Ciberseguridad<\/a>\n      <nav class=\"nav-links\" aria-label=\"Navegaci\u00f3n principal\">\n        <a href=\"#soluciones\">Soluciones<\/a>\n        <a href=\"#microsoft\">Microsoft<\/a>\n        <a href=\"#servicios\">Servicios<\/a>\n        <a href=\"#contacto\">Contacto<\/a>\n      <\/nav>\n    <\/div>\n  <\/header>\n\n  <main id=\"inicio\">\n    <section class=\"hero\">\n      <div class=\"container hero-grid\">\n        <div>\n          <div class=\"eyebrow\">Empresa especializada en ciberseguridad \u00b7 Partner de Microsoft<\/div>\n          <h1>Protecci\u00f3n integral para empresas, usuarios, datos y sistemas.<\/h1>\n          <p>\n            Ofrecemos soluciones profesionales de ciberseguridad para proteger la identidad digital,\n            el correo electr\u00f3nico, los equipos, la red, la nube y la informaci\u00f3n cr\u00edtica de su organizaci\u00f3n.\n          <\/p>\n          <div class=\"hero-actions\">\n            <a href=\"mailto:bartomeu.segura@ciber-seguridad.org\" class=\"btn btn-primary\">Solicitar informaci\u00f3n<\/a>\n            <a href=\"#soluciones\" class=\"btn btn-secondary\">Ver soluciones<\/a>\n          <\/div>\n        <\/div>\n        <aside class=\"hero-card\" aria-label=\"Resumen de capacidades\">\n          <h2>\u00c1reas principales de protecci\u00f3n<\/h2>\n          <ul class=\"check-list\">\n            <li>Protecci\u00f3n del puesto de trabajo y servidores<\/li>\n            <li>Seguridad del correo electr\u00f3nico y colaboraci\u00f3n<\/li>\n            <li>Identidad, accesos y autenticaci\u00f3n multifactor<\/li>\n            <li>Copias de seguridad y continuidad de negocio<\/li>\n            <li>Auditor\u00eda, cumplimiento y respuesta ante incidentes<\/li>\n          <\/ul>\n        <\/aside>\n      <\/div>\n    <\/section>\n\n    <section id=\"soluciones\">\n      <div class=\"container\">\n        <div class=\"section-title\">\n          <h2>Soluciones de ciberseguridad para organizaciones<\/h2>\n          <p>\n            Nuestra propuesta cubre las principales capas de defensa necesarias para reducir el riesgo,\n            prevenir incidentes, detectar amenazas y recuperar la actividad en caso de ataque.\n          <\/p>\n        <\/div>\n        <div class=\"grid\">\n          <article class=\"card\">\n            <div class=\"icon\">\ud83d\udee1\ufe0f<\/div>\n            <h3>Protecci\u00f3n de equipos y servidores<\/h3>\n            <p>Soluciones de defensa avanzada para ordenadores, port\u00e1tiles y servidores, con prevenci\u00f3n, detecci\u00f3n y respuesta frente a malware, ransomware y comportamientos an\u00f3malos.<\/p>\n          <\/article>\n          <article class=\"card\">\n            <div class=\"icon\">\u2709\ufe0f<\/div>\n            <h3>Seguridad del correo electr\u00f3nico<\/h3>\n            <p>Protecci\u00f3n frente a phishing, suplantaci\u00f3n de identidad, enlaces maliciosos, adjuntos peligrosos, fraude corporativo y campa\u00f1as de ingenier\u00eda social.<\/p>\n          <\/article>\n          <article class=\"card\">\n            <div class=\"icon\">\ud83d\udd10<\/div>\n            <h3>Identidad y control de accesos<\/h3>\n            <p>Implantaci\u00f3n de autenticaci\u00f3n multifactor, pol\u00edticas de acceso condicional, gesti\u00f3n segura de usuarios, privilegios y protecci\u00f3n de cuentas cr\u00edticas.<\/p>\n          <\/article>\n          <article class=\"card\">\n            <div class=\"icon\">\u2601\ufe0f<\/div>\n            <h3>Seguridad en la nube<\/h3>\n            <p>Protecci\u00f3n de entornos cloud, configuraci\u00f3n segura de servicios, revisi\u00f3n de permisos, supervisi\u00f3n de riesgos y gobierno de la informaci\u00f3n corporativa.<\/p>\n          <\/article>\n          <article class=\"card\">\n            <div class=\"icon\">\ud83d\udcbe<\/div>\n            <h3>Copias de seguridad y recuperaci\u00f3n<\/h3>\n            <p>Dise\u00f1o de estrategias de backup, recuperaci\u00f3n ante desastres, protecci\u00f3n frente a ransomware y verificaci\u00f3n peri\u00f3dica de la capacidad real de restauraci\u00f3n.<\/p>\n          <\/article>\n          <article class=\"card\">\n            <div class=\"icon\">\ud83c\udf10<\/div>\n            <h3>Seguridad de red y per\u00edmetro<\/h3>\n            <p>Protecci\u00f3n de comunicaciones, segmentaci\u00f3n de red, acceso remoto seguro, filtrado de tr\u00e1fico y endurecimiento de la infraestructura tecnol\u00f3gica.<\/p>\n          <\/article>\n        <\/div>\n      <\/div>\n    <\/section>\n\n    <section id=\"microsoft\" class=\"dark-section\">\n      <div class=\"container split\">\n        <div class=\"section-title\">\n          <h2>Soluciones Microsoft para proteger la empresa moderna<\/h2>\n          <p>\n            Como partner de Microsoft, ayudamos a implantar, configurar y administrar soluciones de seguridad\n            integradas en el ecosistema Microsoft, orientadas a proteger usuarios, dispositivos, correo,\n            datos, identidades y servicios cloud.\n          <\/p>\n        <\/div>\n        <div class=\"card\">\n          <div class=\"icon\">\u25ce<\/div>\n          <h3>Implantaci\u00f3n y configuraci\u00f3n segura<\/h3>\n          <p>\n            Aplicamos buenas pr\u00e1cticas de seguridad sobre entornos Microsoft, incluyendo protecci\u00f3n de identidad,\n            acceso condicional, seguridad del correo, gesti\u00f3n de dispositivos, protecci\u00f3n de la informaci\u00f3n\n            y supervisi\u00f3n de alertas.\n          <\/p>\n        <\/div>\n      <\/div>\n    <\/section>\n\n    <section id=\"servicios\">\n      <div class=\"container split\">\n        <div class=\"panel\">\n          <h2>Servicios profesionales<\/h2>\n          <p>Adem\u00e1s del suministro e implantaci\u00f3n de soluciones, prestamos servicios t\u00e9cnicos especializados para evaluar, reforzar y mantener la seguridad de la organizaci\u00f3n.<\/p>\n          <ul class=\"feature-list\">\n            <li>Auditor\u00edas de seguridad y revisi\u00f3n de configuraci\u00f3n.<\/li>\n            <li>An\u00e1lisis de riesgos tecnol\u00f3gicos y recomendaciones de mejora.<\/li>\n            <li>Planes de continuidad de negocio y recuperaci\u00f3n ante incidentes.<\/li>\n            <li>Formaci\u00f3n y concienciaci\u00f3n en ciberseguridad para empleados.<\/li>\n            <li>Soporte t\u00e9cnico especializado y acompa\u00f1amiento continuado.<\/li>\n          <\/ul>\n        <\/div>\n        <div class=\"panel\">\n          <h2>Enfoque preventivo y operativo<\/h2>\n          <p>La ciberseguridad no depende \u00fanicamente de instalar herramientas. Requiere configuraci\u00f3n, supervisi\u00f3n, procedimientos, formaci\u00f3n y capacidad de reacci\u00f3n.<\/p>\n          <ul class=\"feature-list\">\n            <li>Dise\u00f1o de medidas proporcionadas al tama\u00f1o y riesgo de la empresa.<\/li>\n            <li>Priorizaci\u00f3n de acciones cr\u00edticas y reducci\u00f3n de exposici\u00f3n.<\/li>\n            <li>Documentaci\u00f3n t\u00e9cnica de medidas implantadas.<\/li>\n            <li>Revisi\u00f3n peri\u00f3dica del estado de seguridad.<\/li>\n            <li>Alineaci\u00f3n con buenas pr\u00e1cticas y requisitos normativos aplicables.<\/li>\n          <\/ul>\n        <\/div>\n      <\/div>\n    <\/section>\n\n    <section>\n      <div class=\"container\">\n        <div class=\"section-title\">\n          <h2>Metodolog\u00eda de trabajo<\/h2>\n          <p>Trabajamos con un proceso claro: diagn\u00f3stico, propuesta, implantaci\u00f3n y seguimiento.<\/p>\n        <\/div>\n        <div class=\"process\">\n          <article class=\"step\">\n            <div class=\"step-number\">01<\/div>\n            <h3>An\u00e1lisis inicial<\/h3>\n            <p>Revisi\u00f3n del entorno, necesidades, riesgos principales y nivel actual de protecci\u00f3n.<\/p>\n          <\/article>\n          <article class=\"step\">\n            <div class=\"step-number\">02<\/div>\n            <h3>Propuesta t\u00e9cnica<\/h3>\n            <p>Definici\u00f3n de soluciones adecuadas, alcance, prioridades y plan de implantaci\u00f3n.<\/p>\n          <\/article>\n          <article class=\"step\">\n            <div class=\"step-number\">03<\/div>\n            <h3>Implantaci\u00f3n<\/h3>\n            <p>Configuraci\u00f3n t\u00e9cnica, validaci\u00f3n, documentaci\u00f3n y puesta en funcionamiento.<\/p>\n          <\/article>\n          <article class=\"step\">\n            <div class=\"step-number\">04<\/div>\n            <h3>Seguimiento<\/h3>\n            <p>Supervisi\u00f3n, soporte, revisi\u00f3n de alertas y mejora continua de la seguridad.<\/p>\n          <\/article>\n        <\/div>\n      <\/div>\n    <\/section>\n\n    <section id=\"contacto\">\n      <div class=\"container\">\n        <div class=\"cta\">\n          <div>\n            <h2>Solicite una evaluaci\u00f3n de ciberseguridad<\/h2>\n            <p>Podemos revisar el estado actual de su organizaci\u00f3n y proponer medidas concretas para mejorar la protecci\u00f3n de usuarios, datos, correo, dispositivos, red y servicios cloud.<\/p>\n          <\/div>\n          <div class=\"contact-box\" aria-label=\"Datos de contacto\">\n            <a href=\"mailto:bartomeu.segura@ciber-seguridad.org\">bartomeu.segura@ciber-seguridad.org<\/a>\n            <a href=\"tel:+34971774066\">971 774 066<\/a>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/section>\n  <\/main>\n\n  <footer>\n    <div class=\"container footer-grid\">\n      <div>\u00a9 2026 CIBER-SEGURIDAD SLU. Todos los derechos reservados.<\/div>\n      <div>Empresa especializada en ciberseguridad \u00b7 Partner de Microsoft<\/div>\n    <\/div>\n  <\/footer>\n<\/body>\n<\/html>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Soluciones de Ciberseguridad | Empresa Partner de Microsoft CIBER-SEGURIDAD SLU | Ciberseguridad Soluciones Microsoft Servicios Contacto Empresa especializada en ciberseguridad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-509","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=509"}],"version-history":[{"count":22,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/509\/revisions"}],"predecessor-version":[{"id":538,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/509\/revisions\/538"}],"wp:attachment":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}