{"id":915,"date":"2020-06-23T02:35:04","date_gmt":"2020-06-23T05:35:04","guid":{"rendered":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?p=915"},"modified":"2020-10-06T12:54:50","modified_gmt":"2020-10-06T15:54:50","slug":"servicios-de-ciberseguridad","status":"publish","type":"post","link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/","title":{"rendered":""},"content":{"rendered":"\n<div class=\"wp-block-cover has-background-dim\" style=\"min-height:250px\"><video class=\"wp-block-cover__video-background\" autoplay muted loop playsinline src=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/03\/World-1992.mp4\"><\/video><div class=\"wp-block-cover__inner-container\">\n<h1>Servicios de<br><span class=\"has-inline-color has-vivid-red-color\">Ciberseguridad<\/span><\/h1>\n\n\n\n<p>Listos para brindar apoyo a su organizaci\u00f3n<\/p>\n<\/div><\/div>\n\n\n\n<p>Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica. Que van desde cuestiones estrat\u00e9gicas para analizar riesgos junto con la alta direcci\u00f3n de la organizaci\u00f3n, hasta servicios especializados y altamente t\u00e9cnicos de pirater\u00eda y an\u00e1lisis \u00e9tico o forense digital. <\/p>\n\n\n\n<p>Todo nuestro equipo a su disposici\u00f3n, siempre.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica. Que van desde cuestiones estrat\u00e9gicas para analizar riesgos junto con la alta direcci\u00f3n de la organizaci\u00f3n, hasta servicios especializados y altamente t\u00e9cnicos de pirater\u00eda y an\u00e1lisis \u00e9tico o forense digital. Todo nuestro [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":976,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"video","meta":{"spay_email":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>- KINAITECH | Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- KINAITECH | Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica. Que van desde cuestiones estrat\u00e9gicas para analizar riesgos junto con la alta direcci\u00f3n de la organizaci\u00f3n, hasta servicios especializados y altamente t\u00e9cnicos de pirater\u00eda y an\u00e1lisis \u00e9tico o forense digital. Todo nuestro [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"KINAITECH | Ciberseguridad\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-23T05:35:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-06T15:54:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"953\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andr\u00e9s Kasza\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\",\"name\":\"KINAITECH | Ciberseguridad\",\"description\":\"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2560%2C953&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2560%2C953&ssl=1\",\"width\":2560,\"height\":953,\"caption\":\"Technology photo created by wirestock - www.freepik.com\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#webpage\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/\",\"name\":\"- KINAITECH | Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#primaryimage\"},\"datePublished\":\"2020-06-23T05:35:04+00:00\",\"dateModified\":\"2020-10-06T15:54:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#\/schema\/person\/5756c1a9ccff9901d3807650530d65a1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#\/schema\/person\/5756c1a9ccff9901d3807650530d65a1\",\"name\":\"Andr\\u00e9s Kasza\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/author\/wp34gs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- KINAITECH | Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"- KINAITECH | Ciberseguridad","og_description":"Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica. Que van desde cuestiones estrat\u00e9gicas para analizar riesgos junto con la alta direcci\u00f3n de la organizaci\u00f3n, hasta servicios especializados y altamente t\u00e9cnicos de pirater\u00eda y an\u00e1lisis \u00e9tico o forense digital. Todo nuestro [&hellip;]","og_url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/","og_site_name":"KINAITECH | Ciberseguridad","article_published_time":"2020-06-23T05:35:04+00:00","article_modified_time":"2020-10-06T15:54:50+00:00","og_image":[{"width":2560,"height":953,"url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Andr\u00e9s Kasza"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/","name":"KINAITECH | Ciberseguridad","description":"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#primaryimage","inLanguage":"es","url":"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2560%2C953&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2560%2C953&ssl=1","width":2560,"height":953,"caption":"Technology photo created by wirestock - www.freepik.com"},{"@type":"WebPage","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#webpage","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/","name":"- KINAITECH | Ciberseguridad","isPartOf":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#primaryimage"},"datePublished":"2020-06-23T05:35:04+00:00","dateModified":"2020-10-06T15:54:50+00:00","author":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#\/schema\/person\/5756c1a9ccff9901d3807650530d65a1"},"breadcrumb":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/servicios-de-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/"},{"@type":"ListItem","position":2,"name":""}]},{"@type":"Person","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#\/schema\/person\/5756c1a9ccff9901d3807650530d65a1","name":"Andr\u00e9s Kasza","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/author\/wp34gs\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2560%2C953&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2560%2C953&ssl=1",2560,953,false],"thumbnail":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=300%2C112&ssl=1",300,112,true],"medium_large":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=768%2C286&ssl=1",768,286,true],"large":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=900%2C335&ssl=1",900,335,true],"1536x1536":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=1536%2C572&ssl=1",1536,572,true],"2048x2048":["https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/06\/CiberSecurity12311-scaled-e1601942092265.jpg?fit=2048%2C762&ssl=1",2048,762,true]},"uagb_author_info":{"display_name":"Andr\u00e9s Kasza","author_link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/author\/wp34gs\/"},"uagb_comment_info":0,"uagb_excerpt":"Siempre que necesite asesoramiento o fuerza de trabajo, puede contar con nuestros consultores certificados en una amplia gama de temas de seguridad cibern\u00e9tica. Que van desde cuestiones estrat\u00e9gicas para analizar riesgos junto con la alta direcci\u00f3n de la organizaci\u00f3n, hasta servicios especializados y altamente t\u00e9cnicos de pirater\u00eda y an\u00e1lisis \u00e9tico o forense digital. Todo nuestro&hellip;","_links":{"self":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/posts\/915"}],"collection":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/comments?post=915"}],"version-history":[{"count":11,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/posts\/915\/revisions"}],"predecessor-version":[{"id":992,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/posts\/915\/revisions\/992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/media\/976"}],"wp:attachment":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/media?parent=915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/categories?post=915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/tags?post=915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}