{"id":94,"date":"2025-08-24T22:27:07","date_gmt":"2025-08-24T20:27:07","guid":{"rendered":"https:\/\/ciber-seguridad.org\/?page_id=94"},"modified":"2026-04-22T20:09:21","modified_gmt":"2026-04-22T18:09:21","slug":"inicio","status":"publish","type":"page","link":"https:\/\/ciber-seguridad.org\/","title":{"rendered":"INICIO"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns alignfull are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:13.89%\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/IMAGEN-TOMEU-SEGURA.jpg\" alt=\"\" class=\"wp-image-69\" style=\"width:120px;height:auto\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/IMAGEN-TOMEU-SEGURA.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/IMAGEN-TOMEU-SEGURA-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Mas de 40 a\u00f1os trabajando en el sector de la consultor\u00eda inform\u00e1tica y en ciberseguridad<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:13.89%\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-thumbnail is-resized\"><a href=\"https:\\\\www.antpji.org\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/ICONO-ANTPJI-TRANSPARENTE-150x150.png\" alt=\"\" class=\"wp-image-231\" style=\"width:148px;height:auto\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/ICONO-ANTPJI-TRANSPARENTE-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/ICONO-ANTPJI-TRANSPARENTE.png 231w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Asociaci\u00f3n Nacional de Tasadores y Peritos Judiciales Inform\u00e1ticos Asociado_n\u00ba 603<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:18.52%\">\n<figure class=\"wp-block-image aligncenter size-thumbnail is-resized\"><a href=\"https:\\\\www.investic.org\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Logo-Investic-150x150.jpg\" alt=\"\" class=\"wp-image-245\" style=\"width:169px;height:auto\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Logo-Investic-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/09\/Logo-Investic.jpg 231w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><figcaption class=\"wp-element-caption\">Asociaci\u00f3n Nacional para la promoci\u00f3n de la Investigaci\u00f3n<br>Asociado_n\u00ba 101<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:18.52%\">\n<figure class=\"wp-block-image aligncenter size-thumbnail is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/12\/LOGO-MICROSOFT-PARTNER-150x150.jpg\" alt=\"\" class=\"wp-image-370\" style=\"width:160px;height:auto\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/12\/LOGO-MICROSOFT-PARTNER-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/12\/LOGO-MICROSOFT-PARTNER.jpg 260w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Partner T\u00e9cnol\u00f3gico Microsoft especializado en Inteligencia Artificial aplicada a la nube Partner_n\u00ba 7036769<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:18.52%\">\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.coiticv.org\/\"><img loading=\"lazy\" decoding=\"async\" width=\"618\" height=\"240\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/coiticv_sello_colegiado_20260011.png\" alt=\"\" class=\"wp-image-417\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/coiticv_sello_colegiado_20260011.png 618w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/coiticv_sello_colegiado_20260011-300x117.png 300w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Colegio Oficial de Ingenieros T\u00e9cnico en Inform\u00e1tica de la Comunidad Valenciana. Colegiado_n\u00ba 20260011<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:16.67%\">\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-1024x1024.jpg\" alt=\"\" class=\"wp-image-488\" style=\"width:182px;height:auto\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-1024x1024.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-768x768.jpg 768w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-1536x1536.jpg 1536w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2026\/04\/Logotipo-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Perito Inform\u00e1tico Judicial Colegiado COITICV n\u00ba_20260011<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull are-vertically-aligned-center iconos-fila1 is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ciber-seguridad.org\/?page_id=380\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios.png\" alt=\"\" class=\"wp-image-167\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Software-Gestion-Gimnasios-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ciber-seguridad.org\/?page_id=42\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-free.jpg\" alt=\"\" class=\"wp-image-199\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-free.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-free-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-free-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-free-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia.png\" alt=\"\" class=\"wp-image-166\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistemas-de-Video-Vigilancia-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatCIB-Elite.jpg\" alt=\"\" class=\"wp-image-200\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatCIB-Elite.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatCIB-Elite-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatCIB-Elite-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatCIB-Elite-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistema-de-Lectura-de-Matriculas.png\" alt=\"\" class=\"wp-image-165\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistema-de-Lectura-de-Matriculas.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistema-de-Lectura-de-Matriculas-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistema-de-Lectura-de-Matriculas-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Sistema-de-Lectura-de-Matriculas-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/mail.sd-a.com\/owa\/auth\/logon.aspx?replaceCurrent=1&amp;url=https%3a%2f%2fmail.sd-a.com%2fowa%2f\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-free.jpg\" alt=\"\" class=\"wp-image-195\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-free.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-free-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-free-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-free-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos.png\" alt=\"\" class=\"wp-image-160\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-de-accesos-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/mail.ciber-seguridad.org:4430\/owa\/auth\/logon.aspx?replaceCurrent=1&amp;url=https%3a%2f%2fmail.ciber-seguridad.org%2fowa\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-elite.jpg\" alt=\"\" class=\"wp-image-196\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-elite.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-elite-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-elite-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/eMail-elite-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral.png\" alt=\"\" class=\"wp-image-161\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Control-Presencia-Laboral-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-31-ago-2025-17_49_17.png\" alt=\"\" class=\"wp-image-202\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-31-ago-2025-17_49_17.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-31-ago-2025-17_49_17-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-31-ago-2025-17_49_17-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-31-ago-2025-17_49_17-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Formacion.png\" alt=\"\" class=\"wp-image-157\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Formacion.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Formacion-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Formacion-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Formacion-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"http:\/\/proyectos.progesystel.com:13000\/SitePages\/Inicio.aspx\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite.jpg\" alt=\"\" class=\"wp-image-203\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/harePoint-Elite-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas.png\" alt=\"\" class=\"wp-image-162\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Peritaciones-Informaticas-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-basic.jpg\" alt=\"\" class=\"wp-image-205\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-basic.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-basic-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-basic-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-basic-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad.png\" alt=\"\" class=\"wp-image-159\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad.png 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad-300x300.png 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad-150x150.png 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/CiberSeguridad-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-elite.jpg\" alt=\"\" class=\"wp-image-206\" srcset=\"https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-elite.jpg 1024w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-elite-300x300.jpg 300w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-elite-150x150.jpg 150w, https:\/\/ciber-seguridad.org\/wp-content\/uploads\/2025\/08\/Team-Viewer-elite-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mas de 40 a\u00f1os trabajando en el sector de la consultor\u00eda inform\u00e1tica y en ciberseguridad Asociaci\u00f3n Nacional de Tasadores y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-94","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/94","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=94"}],"version-history":[{"count":207,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/94\/revisions"}],"predecessor-version":[{"id":499,"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=\/wp\/v2\/pages\/94\/revisions\/499"}],"wp:attachment":[{"href":"https:\/\/ciber-seguridad.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}