{"id":1624,"date":"2025-04-02T18:18:17","date_gmt":"2025-04-02T18:18:17","guid":{"rendered":"https:\/\/esta.digital-planning.com\/?page_id=1624"},"modified":"2025-05-02T22:42:38","modified_gmt":"2025-05-02T22:42:38","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/digital-planning.com\/index.php\/ciberseguridad\/","title":{"rendered":"CIBERSEGURIDAD"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1624\" class=\"elementor elementor-1624\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab540be e-flex e-con-boxed e-con e-parent\" data-id=\"ab540be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1bb5ee elementor-widget elementor-widget-heading\" data-id=\"b1bb5ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><H2>Ciberseguridad<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-967d717 elementor-widget elementor-widget-text-editor\" data-id=\"967d717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La ciberseguridad es la pr\u00e1ctica de proteger sistemas, redes, dispositivos y datos contra ataques digitales, accesos no autorizados y da\u00f1os. Su objetivo principal es garantizar la confidencialidad, integridad y disponibilidad de la informaci\u00f3n, permitiendo un uso seguro de la tecnolog\u00eda en un entorno digital cada vez m\u00e1s conectado.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c86dad elementor-widget elementor-widget-heading\" data-id=\"1c86dad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3>SERVICIOS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26089f5 e-grid e-con-full e-con e-child\" data-id=\"26089f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6fc4196 e-grid e-con-full e-con e-child\" data-id=\"6fc4196\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb57a41 elementor-widget elementor-widget-image\" data-id=\"eb57a41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"740\" height=\"417\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/cybersecurity.jpeg\" class=\"attachment-large size-large wp-image-1626\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/cybersecurity.jpeg 755w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/cybersecurity-300x169.jpeg 300w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7bcd83 elementor-widget elementor-widget-text-editor\" data-id=\"e7bcd83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align:center;\">MITIGACI\u00d3N DE AMENAZAS<\/h4>\n<br>\n<p style=\"text-align:justify;\">Ofrecemos detecci\u00f3n y respuesta a amenazas impulsadas por inteligencia artificial para mitigar ataques antes de que ocurran.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e01e93 e-grid e-con-full e-con e-child\" data-id=\"4e01e93\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d25ef elementor-widget elementor-widget-image\" data-id=\"26d25ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"740\" height=\"387\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/IoT_Security_Amidst_Rising_Cyber_Threats_GlobalSign-1024x535.jpg\" class=\"attachment-large size-large wp-image-1630\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/IoT_Security_Amidst_Rising_Cyber_Threats_GlobalSign-1024x535.jpg 1024w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/IoT_Security_Amidst_Rising_Cyber_Threats_GlobalSign-300x157.jpg 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/IoT_Security_Amidst_Rising_Cyber_Threats_GlobalSign-768x401.jpg 768w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/IoT_Security_Amidst_Rising_Cyber_Threats_GlobalSign.jpg 1200w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46e3a25 elementor-widget elementor-widget-text-editor\" data-id=\"46e3a25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">SEGURIDAD IOT<\/h4>\n&nbsp;\n<p style=\"text-align: justify;\">Protegemos entornos de primera l\u00ednea contra cibercrimen, mitigando vulnerabilidades para asegurar operaciones cr\u00edticas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45f83c4 e-grid e-con-full e-con e-child\" data-id=\"45f83c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4632c5 elementor-widget elementor-widget-image\" data-id=\"b4632c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"670\" height=\"377\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iot_practices_1.jpg\" class=\"attachment-large size-large wp-image-1632\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iot_practices_1.jpg 670w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iot_practices_1-300x169.jpg 300w\" sizes=\"(max-width: 670px) 100vw, 670px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbee825 elementor-widget elementor-widget-text-editor\" data-id=\"dbee825\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Gesti\u00f3n de Identidad y Acceso<\/h4><p>\u00a0<\/p><p style=\"text-align: justify;\">Gestionamos identidades y accesos de usuarios para fortalecer la seguridad operativa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-004ab47 e-grid e-con-full e-con e-child\" data-id=\"004ab47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82a705f elementor-widget elementor-widget-image\" data-id=\"82a705f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"416\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/dvsi-technical-support-dvsis-and-information-drawing-art-gallery-1-1024x576.jpg\" class=\"attachment-large size-large wp-image-1633\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/dvsi-technical-support-dvsis-and-information-drawing-art-gallery-1-1024x576.jpg 1024w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/dvsi-technical-support-dvsis-and-information-drawing-art-gallery-1-300x169.jpg 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/dvsi-technical-support-dvsis-and-information-drawing-art-gallery-1-768x432.jpg 768w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/dvsi-technical-support-dvsis-and-information-drawing-art-gallery-1-1536x864.jpg 1536w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/dvsi-technical-support-dvsis-and-information-drawing-art-gallery-1.jpg 1600w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b72f53 elementor-widget elementor-widget-text-editor\" data-id=\"1b72f53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Soporte T\u00e9cnico Remoto<\/h4>\n&nbsp;\n<p style=\"text-align: justify;\">Brindamos acceso seguro y supervisado, adem\u00e1s de soporte t\u00e9cnico para mejorar la calidad del servicio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc3d829 e-grid e-con-full e-con e-child\" data-id=\"fc3d829\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2652e03 elementor-widget elementor-widget-image\" data-id=\"2652e03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"194\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/images.jpg\" class=\"attachment-large size-large wp-image-1634\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940e609 elementor-widget elementor-widget-text-editor\" data-id=\"940e609\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Seguridad en la Red y Centro de Datos<\/h4>\n&nbsp;\n<p style=\"text-align: justify;\">Brindamos acceso seguro y supervisado, adem\u00e1s de soporte t\u00e9cnico para mejorar la calidad del servicio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17aaa98 e-grid e-con-full e-con e-child\" data-id=\"17aaa98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60ba464 elementor-widget elementor-widget-image\" data-id=\"60ba464\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"493\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/seguridad-en-la-nube-1024x682.jpeg\" class=\"attachment-large size-large wp-image-1635\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/seguridad-en-la-nube-1024x682.jpeg 1024w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/seguridad-en-la-nube-300x200.jpeg 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/seguridad-en-la-nube-768x512.jpeg 768w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/seguridad-en-la-nube-1536x1024.jpeg 1536w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/seguridad-en-la-nube.jpeg 2000w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efb4ef3 elementor-widget elementor-widget-text-editor\" data-id=\"efb4ef3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Seguridad en la Nube<\/h4>\n&nbsp;\n<p style=\"text-align: justify;\">Proporcionamos seguridad robusta para datos y cargas de trabajo en entornos AWS, Azure y redes privadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-876a510 e-grid e-con-full e-con e-child\" data-id=\"876a510\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8269fd3 elementor-widget elementor-widget-image\" data-id=\"8269fd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"494\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/EmailAuthHeader-1024x683.jpg\" class=\"attachment-large size-large wp-image-1636\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/EmailAuthHeader-1024x683.jpg 1024w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/EmailAuthHeader-300x200.jpg 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/EmailAuthHeader-768x512.jpg 768w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/EmailAuthHeader.jpg 1200w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b668cf elementor-widget elementor-widget-text-editor\" data-id=\"7b668cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Protecci\u00f3n del Correo Electr\u00f3nico<\/h4><p>\u00a0<\/p><p style=\"text-align: justify;\">Implementamos soluciones de seguridad para contener amenazas en el correo electr\u00f3nico.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a14bf7 e-grid e-con-full e-con e-child\" data-id=\"8a14bf7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e1723e elementor-widget elementor-widget-image\" data-id=\"2e1723e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"416\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/ordenador-contrasena-60b8ed689a552334449684.webp\" class=\"attachment-large size-large wp-image-1637\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/ordenador-contrasena-60b8ed689a552334449684.webp 696w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/ordenador-contrasena-60b8ed689a552334449684-300x179.webp 300w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecbf9a9 elementor-widget elementor-widget-text-editor\" data-id=\"ecbf9a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Protecci\u00f3n de Acceso Privilegiado<\/h4>\n&nbsp;\n<p style=\"text-align: justify;\">Proporcionamos seguridad robusta para datos y cargas de trabajo en entornos AWS, Azure y redes privadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94bc329 e-flex e-con-boxed e-con e-parent\" data-id=\"94bc329\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8bbad57 elementor-widget elementor-widget-heading\" data-id=\"8bbad57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><H2>normas de cumplimiento<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18c348b elementor-widget elementor-widget-text-editor\" data-id=\"18c348b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nuestro equipo est\u00e1 altamente capacitado en ciberseguridad y cuenta con la experiencia y conocimientos necesarios para garantizar la protecci\u00f3n de datos y sistemas cr\u00edticos. Cumplimos con los m\u00e1s altos est\u00e1ndares del sector, incluyendo PCI DSS, NIST, ISO 27001, OWASP y SOC 2, asegurando la confidencialidad, integridad y disponibilidad de la informaci\u00f3n.<\/p><p>Nos mantenemos en constante actualizaci\u00f3n para adaptarnos a las nuevas amenazas y mejores pr\u00e1cticas en seguridad inform\u00e1tica, brindando soluciones robustas y confiables para proteger a nuestros clientes y sus operaciones.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d0bde9 e-grid e-con-boxed e-con e-parent\" data-id=\"8d0bde9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1399fec elementor-widget elementor-widget-image\" data-id=\"1399fec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"496\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/pci_logo-850x570-1.png\" class=\"attachment-large size-large wp-image-1638\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/pci_logo-850x570-1.png 850w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/pci_logo-850x570-1-300x201.png 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/pci_logo-850x570-1-768x515.png 768w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd1b6ba elementor-widget elementor-widget-image\" data-id=\"bd1b6ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/framework-informational-page_hero-badges-nist-csf.webp\" class=\"attachment-large size-large wp-image-1639\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/framework-informational-page_hero-badges-nist-csf.webp 625w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/framework-informational-page_hero-badges-nist-csf-300x300.webp 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/framework-informational-page_hero-badges-nist-csf-150x150.webp 150w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a54909 elementor-widget elementor-widget-image\" data-id=\"0a54909\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"740\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa-1024x1024.jpeg\" class=\"attachment-large size-large wp-image-1640\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa-1024x1024.jpeg 1024w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa-300x300.jpeg 300w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa-150x150.jpeg 150w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa-768x768.jpeg 768w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa-1536x1536.jpeg 1536w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/iso_27001_surus-inversa.jpeg 1620w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76bb04c elementor-widget elementor-widget-image\" data-id=\"76bb04c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"213\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/owasp-logo-vert.webp\" class=\"attachment-large size-large wp-image-1641\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5e83cf elementor-widget elementor-widget-image\" data-id=\"e5e83cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"534\" src=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/Captura-de-pantalla-2024-04-03-a-las-18.07.25.png\" class=\"attachment-large size-large wp-image-1642\" alt=\"\" srcset=\"https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/Captura-de-pantalla-2024-04-03-a-las-18.07.25.png 722w, https:\/\/digital-planning.com\/wp-content\/uploads\/2025\/04\/Captura-de-pantalla-2024-04-03-a-las-18.07.25-300x222.png 300w\" sizes=\"(max-width: 722px) 100vw, 722px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ciberseguridad La ciberseguridad es la pr\u00e1ctica de proteger sistemas, redes, dispositivos y datos contra ataques digitales, accesos no autorizados y da\u00f1os. Su objetivo principal es garantizar la confidencialidad, integridad y disponibilidad de la informaci\u00f3n, permitiendo un uso seguro de la tecnolog\u00eda en un entorno digital cada vez m\u00e1s conectado. SERVICIOS MITIGACI\u00d3N DE AMENAZAS Ofrecemos detecci\u00f3n<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1624","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/pages\/1624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/comments?post=1624"}],"version-history":[{"count":13,"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/pages\/1624\/revisions"}],"predecessor-version":[{"id":1690,"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/pages\/1624\/revisions\/1690"}],"wp:attachment":[{"href":"https:\/\/digital-planning.com\/index.php\/wp-json\/wp\/v2\/media?parent=1624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}