{"id":2787,"date":"2019-02-11T14:01:48","date_gmt":"2019-02-11T19:01:48","guid":{"rendered":"https:\/\/orendasecurity.com\/blog\/how-to-spot-an-insider-threat-copy\/"},"modified":"2025-10-24T12:14:58","modified_gmt":"2025-10-24T16:14:58","slug":"detectar-amenaza-interna","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/","title":{"rendered":"C\u00d3MO DETECTAR UNA AMENAZA INTERNA"},"content":{"rendered":"<p class=\"c-text-block_title\">La mayor\u00eda de las empresas son conscientes de las amenazas que suponen para su negocio los hackers externos o los actores maliciosos. Estas empresas gastan miles, si no millones, de d\u00f3lares al a\u00f1o para proteger su red contra el acceso externo no autorizado. Sin embargo, la mayor\u00eda de las empresas no invierten tanto esfuerzo ni recursos en protegerse contra las amenazas internas a su negocio. Las amenazas internas suponen un peligro tan grande y causan tanto da\u00f1o a las empresas como las amenazas de los piratas inform\u00e1ticos externos. Las siguientes estad\u00edsticas ponen de relieve el peligro que suponen las amenazas internas para las empresas:<\/p>\n<div class=\"c-text-block_wrap s-wysiwyg\">\n<ul>\n<li>El <strong>68 % de todos los ataques<\/strong> a redes que tuvieron como objetivo a organizaciones sanitarias en 2016 se debieron a amenazas internas.<\/li>\n<li>En 2018, el <strong>53 % de todas las empresas<\/strong> informaron de que hab\u00edan sido v\u00edctimas de amenazas internas en los 12 meses anteriores.<\/li>\n<li>El coste medio total para las empresas afectadas por amenazas internas es de <strong>8,76 millones de d\u00f3lares<\/strong>.<\/li>\n<li>El tiempo medio que se tarda en contener una amenaza interna es de <strong>73 d\u00edas<\/strong>.<\/li>\n<\/ul>\n<h2>TIPOS DE AMENAZAS INTERNAS<\/h2>\n<p>Hay dos tipos de amenazas internas que las empresas deben tener en cuenta a la hora de proteger sus redes. Descuidar uno u otro tipo de amenaza interna puede dejar a una empresa vulnerable a un ataque interno. Los tipos de amenazas internas incluyen:<\/p>\n<ul>\n<li><strong>Empleados maliciosos\/deliberados.<\/strong> Se trata de personas que buscan deliberadamente formas de sabotear una empresa comprometiendo sus datos.<\/li>\n<li><strong>Empleados accidentales\/no intencionados.<\/strong> Estas personas ponen en riesgo a la empresa sin saberlo, debido a negligencia y otras pr\u00e1cticas laborales inadecuadas.<\/li>\n<\/ul>\n<h2>EJEMPLOS DE AMENAZAS INTERNAS<\/h2>\n<p>Algunos ejemplos de empresas que se convirtieron en v\u00edctimas de amenazas internas por diversas razones incluyen:<\/p>\n<ul>\n<li><strong>Anthem: <\/strong>En 2017, la aseguradora m\u00e9dica BlueCross BlueShield envi\u00f3 avisos a unos 18 000 de sus clientes de Medicare inform\u00e1ndoles de que sus datos hab\u00edan sido comprometidos. LaunchPoint Ventures, el proveedor de servicios de coordinaci\u00f3n de seguros de Medicare de Anthem, inform\u00f3 de que se hab\u00eda descubierto que uno de sus empleados hab\u00eda estado robando informaci\u00f3n personal de los clientes, como identificaciones de Medicare, n\u00fameros de la Seguridad Social e identificaciones de planes de salud.<\/li>\n<li><strong>Target:<\/strong> Target Supermarket fue v\u00edctima de una filtraci\u00f3n masiva de datos en 2013. Inform\u00f3 de que la informaci\u00f3n personal de unos 110 millones de sus clientes se hab\u00eda visto comprometida; los datos comprometidos inclu\u00edan tanto informaci\u00f3n personal como informaci\u00f3n de tarjetas de cr\u00e9dito\/d\u00e9bito. Un empleado de uno de los proveedores externos de Target facilit\u00f3 involuntariamente esta filtraci\u00f3n de datos al ser v\u00edctima de un correo electr\u00f3nico de phishing; los hackers pudieron entonces instalar el malware para acceder a los datos protegidos.<\/li>\n<li><strong>Sage:<\/strong> En 2016, la empresa de software Sage inform\u00f3 de que una filtraci\u00f3n de datos hab\u00eda comprometido los datos de unos 280 de sus clientes empresariales del Reino Unido. Uno de sus empleados utiliz\u00f3 un inicio de sesi\u00f3n interno para acceder a datos no autorizados y, por lo tanto, pudo comprometer la red.<\/li>\n<\/ul>\n<h2>FACTORES DE RIESGO DE AMENAZAS INTERNAS<\/h2>\n<p>Dado el da\u00f1o que pueden causar las amenazas internas, es esencial reconocer y mitigar r\u00e1pidamente las posibles vulnerabilidades. Algunos factores que pueden aumentar el riesgo de amenazas internas para las empresas son:<\/p>\n<ul>\n<li><strong>Acceso sin restricciones:<\/strong> los empleados cuyo acceso no est\u00e1 regulado o est\u00e1 mal controlado suelen suponer una grave amenaza para la organizaci\u00f3n. Las violaciones de datos intencionadas o involuntarias causadas por estas personas pueden ser devastadoras. Lo ideal es aplicar el principio del m\u00ednimo privilegio a la hora de conceder acceso; un empleado solo debe tener el acceso m\u00ednimo necesario para cumplir con sus funciones laborales.<\/li>\n<li><strong>Pr\u00e1cticas de seguridad deficientes:<\/strong> El uso de pr\u00e1cticas de seguridad deficientes por parte de los empleados, como el uso de contrase\u00f1as d\u00e9biles, la reutilizaci\u00f3n de contrase\u00f1as, hacer clic en enlaces de correos electr\u00f3nicos sospechosos o dejar los ordenadores desbloqueados, puede poner a las empresas en riesgo de sufrir amenazas internas. Se debe impartir formaci\u00f3n peri\u00f3dica para educar a los usuarios sobre la importancia de las buenas pr\u00e1cticas de seguridad.<\/li>\n<li><strong>Traiga su propio dispositivo (BYOD):<\/strong> Los empleados que utilizan sus dispositivos personales para realizar actividades relacionadas con el trabajo pueden poner en riesgo a sus empresas. Es posible que los dispositivos personales no est\u00e9n protegidos adecuadamente y, por lo tanto, est\u00e9n en riesgo.<\/li>\n<\/ul>\n<p>En Orenda Security, sabemos todo sobre los riesgos de las amenazas internas y externas a las redes empresariales. Ofrecemos seguridad en la nube, penetration testing y pruebas din\u00e1micas para proteger su red.<\/p>\n<p><strong>\u00a1P\u00f3ngase en contacto con nosotros hoy mismo y solicite un presupuesto!<\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><!--themify_builder_static--><!--\/themify_builder_static--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La mayor\u00eda de las empresas son conscientes de las amenazas que suponen para su negocio los hackers externos o los actores maliciosos. Estas empresas gastan miles, si no millones, de d\u00f3lares al a\u00f1o para proteger su red contra el acceso externo no autorizado. Sin embargo, la mayor\u00eda de las empresas no invierten tanto esfuerzo ni [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-2787","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-concienciacion-sobre-seguridad","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C\u00d3MO DETECTAR UNA AMENAZA INTERNA - Orenda Security<\/title>\n<meta name=\"description\" content=\"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00d3MO DETECTAR UNA AMENAZA INTERNA - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-11T19:01:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-24T16:14:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"C\u00d3MO DETECTAR UNA AMENAZA INTERNA\",\"datePublished\":\"2019-02-11T19:01:48+00:00\",\"dateModified\":\"2025-10-24T16:14:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/\"},\"wordCount\":805,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"articleSection\":[\"Concienciaci\u00f3n sobre seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/\",\"name\":\"C\u00d3MO DETECTAR UNA AMENAZA INTERNA - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"datePublished\":\"2019-02-11T19:01:48+00:00\",\"dateModified\":\"2025-10-24T16:14:58+00:00\",\"description\":\"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-1923446_1920.png\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/detectar-amenaza-interna\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00d3MO DETECTAR UNA AMENAZA INTERNA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00d3MO DETECTAR UNA AMENAZA INTERNA - Orenda Security","description":"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/","og_locale":"es_ES","og_type":"article","og_title":"C\u00d3MO DETECTAR UNA AMENAZA INTERNA - Orenda Security","og_description":"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/","og_site_name":"Orenda Security","article_published_time":"2019-02-11T19:01:48+00:00","article_modified_time":"2025-10-24T16:14:58+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"C\u00d3MO DETECTAR UNA AMENAZA INTERNA","datePublished":"2019-02-11T19:01:48+00:00","dateModified":"2025-10-24T16:14:58+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/"},"wordCount":805,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","articleSection":["Concienciaci\u00f3n sobre seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/","url":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/","name":"C\u00d3MO DETECTAR UNA AMENAZA INTERNA - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","datePublished":"2019-02-11T19:01:48+00:00","dateModified":"2025-10-24T16:14:58+00:00","description":"Insider threats pose as much of a threat and cause as much damage to businesses as threats from external hackers. There are two types of insider threats that businesses should be aware of.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-1923446_1920.png","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/detectar-amenaza-interna\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/es\/"},{"@type":"ListItem","position":2,"name":"C\u00d3MO DETECTAR UNA AMENAZA INTERNA"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/es\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts\/2787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/comments?post=2787"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts\/2787\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/media\/353"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/media?parent=2787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/categories?post=2787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/tags?post=2787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}