{"id":2799,"date":"2018-12-07T14:02:23","date_gmt":"2018-12-07T19:02:23","guid":{"rendered":"https:\/\/orendasecurity.com\/blog\/4-cybersecurity-tips-to-help-after-the-marriott-data-breach-copy\/"},"modified":"2025-10-24T12:16:15","modified_gmt":"2025-10-24T16:16:15","slug":"4-consejos-ciberseguridad-violacion-datos-marriott","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/","title":{"rendered":"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT"},"content":{"rendered":"<p>La semana pasada se revel\u00f3 que el sistema de reservas de Starwood hab\u00eda sido pirateado, lo que afect\u00f3 a 500 millones de hu\u00e9spedes. La cadena Starwood es una filial de Marriott International, y est\u00e1n recogiendo los pedazos de la violaci\u00f3n, que se remonta a 2014. La informaci\u00f3n personal de los 500 millones de hu\u00e9spedes se ha visto comprometida, incluyendo nombres, direcciones de correo electr\u00f3nico, n\u00fameros de pasaporte y datos de tarjetas de cr\u00e9dito. La CNN lo ha calificado como \u00abla segunda mayor filtraci\u00f3n de datos corporativos de la historia\u00bb.<\/p>\n<p>Los hoteles Starwood que se han visto afectados son:<\/p>\n<ul>\n<li>W Hotels<\/li>\n<li>St.\u00a0Regis<\/li>\n<li>Sheraton Hotels &amp; Resorts<\/li>\n<li>Westin\u00a0Hotels &amp; Resorts<\/li>\n<li>Element Hotels<\/li>\n<li>Aloft Hotels<\/li>\n<li>The Luxury Collection<\/li>\n<li>Tribute Portfolio<\/li>\n<li>Le\u00a0Meridien\u00a0Hotels &amp; Resorts<\/li>\n<li>Four Points by Sheraton and Design Hotels<\/li>\n<li>Starwood-branded\u00a0timeshare properties<\/li>\n<\/ul>\n<p>Entonces, \u00bfqu\u00e9 se est\u00e1 haciendo para solucionar este problema y qu\u00e9 puede hacer usted al respecto?<\/p>\n<p>Mariott est\u00e1 enviando correos electr\u00f3nicos a todos los hu\u00e9spedes afectados y ha creado un sitio web para responder a sus preguntas sobre la filtraci\u00f3n de datos. Pero nosotros tenemos algunas medidas de seguridad \u00fatiles que deber\u00edas tomar para proteger tus datos. Estas medidas deben ponerse en pr\u00e1ctica a diario.<\/p>\n<h2>Medida de seguridad n.\u00ba 1: Deja de compartir demasiada informaci\u00f3n<\/h2>\n<p>Las redes sociales se est\u00e1n utilizando de forma fr\u00edvola, ya que la gente comparte demasiada informaci\u00f3n, desde sus horarios en el ba\u00f1o hasta la direcci\u00f3n de su casa. La mayor\u00eda de las personas que hacen esto nunca admitir\u00edan estos detalles ante un desconocido, pero como utilizan un dispositivo, no sienten la realidad de la exposici\u00f3n.<\/p>\n<p>Entonces, \u00bfqu\u00e9 debes hacer?<\/p>\n<p>La forma inteligente de compartir es publicar lo m\u00e1s destacado en lugar de cada peque\u00f1o detalle y hacerlo cada pocos d\u00edas en lugar de todos los d\u00edas. Cuando se trata de informaci\u00f3n sensible, como problemas familiares, no la publique. Es probable que las personas involucradas no quieran que los extra\u00f1os conozcan la situaci\u00f3n. Si busca ayuda, hable con las personas adecuadas por tel\u00e9fono o en persona. Obtendr\u00e1 mejores resultados.<\/p>\n<h2>Medida de seguridad n.\u00ba 2: supervisa tus cuentas<\/h2>\n<p>Las empresas animan a los consumidores a dejar de usar papel y a introducir su informaci\u00f3n personal en multitud de sitios web. Ya sea para realizar operaciones bancarias, compras o buscar trabajo, es dif\u00edcil obtener resultados sin introducir tu informaci\u00f3n en un dispositivo. Todo el mundo est\u00e1 conectado y estamos tratando de reducir la cantidad de papel que se utiliza, lo cual es loable, pero significa que debemos actuar con m\u00e1s precauci\u00f3n.<\/p>\n<p>Las cuentas bancarias, y ahora las cuentas Starwood Preferred Guest, se encuentran entre las m\u00e1s importantes que hay que supervisar. Marriott ha hecho varias recomendaciones para proteger sus datos:<\/p>\n<ul>\n<li>Bloquee sus tarjetas de cr\u00e9dito.<\/li>\n<li>Considere la posibilidad de contratar servicios de supervisi\u00f3n de cr\u00e9dito.<\/li>\n<li>Contrate un servicio de protecci\u00f3n contra el robo de identidad.<\/li>\n<li>Dedique una tarjeta de cr\u00e9dito a un tipo concreto de transacci\u00f3n, como las compras por Internet.<\/li>\n<\/ul>\n<p>Tanto si ha sido hu\u00e9sped de un hotel Starwood como si no, debe revisar sus cuentas con regularidad y estar atento a cualquier actividad sospechosa. Una buena forma de reforzar esta pr\u00e1ctica es guardar todos los recibos; si olvida los productos que ha comprado o una tienda en la que ha estado por primera vez, los recibos le ayudar\u00e1n a verificar qu\u00e9 es sospechoso y qu\u00e9 no en su cuenta.<\/p>\n<h2>Medida de seguridad n.\u00ba 3: Piensa antes de hacer clic<\/h2>\n<p>\u00bfAcabas de recibir un correo electr\u00f3nico de una persona o empresa? Tanto si conoces a esa persona como si tienes una cuenta en ese banco, no hagas clic en ning\u00fan enlace. Aunque no tengas la m\u00e1s m\u00ednima duda de que tu amigo o tu banco te han enviado el correo electr\u00f3nico, sal del mundo cibern\u00e9tico y verifica por tel\u00e9fono o en persona que es leg\u00edtimo.<\/p>\n<p>Nuestro propio vicepresidente y cofundador recibi\u00f3 una invitaci\u00f3n de phishing a trav\u00e9s de LinkedIn Messenger. Independientemente de la plataforma o el navegador que utilice, mantenga siempre una buena dosis de escepticismo antes de hacer clic en cualquier enlace o facilitar su informaci\u00f3n personal.<\/p>\n<h2>Medida de seguridad n.\u00ba 4: Busque ayuda certificada y profesional<\/h2>\n<p>Mediante penetration testing, nuestros expertos en seguridad de Orenda pueden simular ciberataques reales para encontrar las vulnerabilidades ocultas en su sistema. Con los resultados de nuestras evaluaciones de riesgos de ciberseguridad, le ayudaremos a lograr una postura de seguridad s\u00f3lida.<\/p>\n<p>\u00a1P\u00f3ngase en contacto con nosotros hoy mismo y solicite un presupuesto!<\/p>\n<p><!--themify_builder_static--><!--\/themify_builder_static--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La semana pasada se revel\u00f3 que el sistema de reservas de Starwood hab\u00eda sido pirateado, lo que afect\u00f3 a 500 millones de hu\u00e9spedes. La cadena Starwood es una filial de Marriott International, y est\u00e1n recogiendo los pedazos de la violaci\u00f3n, que se remonta a 2014. La informaci\u00f3n personal de los 500 millones de hu\u00e9spedes se [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-2799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-concienciacion-sobre-seguridad","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT - Orenda Security<\/title>\n<meta name=\"description\" content=\"4 Helpful security measures that you should take to protect your data after being victim of a data breach incident.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"4 Helpful security measures that you should take to protect your data after being victim of a data breach incident.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-07T19:02:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-24T16:16:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT\",\"datePublished\":\"2018-12-07T19:02:23+00:00\",\"dateModified\":\"2025-10-24T16:16:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/\"},\"wordCount\":801,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"articleSection\":[\"Concienciaci\u00f3n sobre seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/\",\"name\":\"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"datePublished\":\"2018-12-07T19:02:23+00:00\",\"dateModified\":\"2025-10-24T16:16:15+00:00\",\"description\":\"4 Helpful security measures that you should take to protect your data after being victim of a data breach incident.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#primaryimage\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/cyber-security-2296269_1920.jpg\",\"width\":1024,\"height\":585},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/4-consejos-ciberseguridad-violacion-datos-marriott\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT - Orenda Security","description":"4 Helpful security measures that you should take to protect your data after being victim of a data breach incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/","og_locale":"es_ES","og_type":"article","og_title":"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT - Orenda Security","og_description":"4 Helpful security measures that you should take to protect your data after being victim of a data breach incident.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/","og_site_name":"Orenda Security","article_published_time":"2018-12-07T19:02:23+00:00","article_modified_time":"2025-10-24T16:16:15+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT","datePublished":"2018-12-07T19:02:23+00:00","dateModified":"2025-10-24T16:16:15+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/"},"wordCount":801,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","articleSection":["Concienciaci\u00f3n sobre seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/","url":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/","name":"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#primaryimage"},"image":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#primaryimage"},"thumbnailUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","datePublished":"2018-12-07T19:02:23+00:00","dateModified":"2025-10-24T16:16:15+00:00","description":"4 Helpful security measures that you should take to protect your data after being victim of a data breach incident.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#primaryimage","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/07\/cyber-security-2296269_1920.jpg","width":1024,"height":585},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/4-consejos-ciberseguridad-violacion-datos-marriott\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/es\/"},{"@type":"ListItem","position":2,"name":"4 CONSEJOS DE CIBERSEGURIDAD \u00daTILES TRAS LA VIOLACI\u00d3N DE DATOS DE MARRIOTT"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/es\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts\/2799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/comments?post=2799"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/posts\/2799\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/media\/354"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/media?parent=2799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/categories?post=2799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/es\/wp-json\/wp\/v2\/tags?post=2799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}