{"id":12668,"date":"2018-03-08T12:04:42","date_gmt":"2018-03-08T10:04:42","guid":{"rendered":"https:\/\/www.lisot.com\/amenazas-de-seguridad-en-la-red-informatica\/"},"modified":"2018-03-08T12:49:41","modified_gmt":"2018-03-08T10:49:41","slug":"amenazas-de-seguridad-en-la-red-informatica","status":"publish","type":"post","link":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/","title":{"rendered":"Amenaces de seguretat a la xarxa Inform\u00e0tica (I)"},"content":{"rendered":"<p>Anem a comen\u00e7ar una s\u00e8rie d&#8217;articles referents a les possibles <strong>amenaces de<a href=\"https:\/\/www.lisot.com\/ca\/solucions-de-seguretat-informatica-per-a-empreses\/\"> seguretat d&#8217;una xarxa inform\u00e0tica.<\/a><\/strong><\/p>\n<p>Per comen\u00e7ar, unes dades de l&#8217;any 2017 que ens situen el marc d&#8217;internet:<\/p>\n<ul>\n<li>Habitants del m\u00f3n: 7.000 milions de persones<\/li>\n<li>Usuaris de dispositius m\u00f2bils: 4.917 milions de persones<\/li>\n<li>Total d&#8217;usuaris d&#8217;Internet: 3.500 milions de persones (el 50% del total d&#8217;habitants del planeta)<\/li>\n<li>Usuaris de xarxes socials: 2.879 milions d&#8217;usuaris<\/li>\n<\/ul>\n<p><em><strong>Dades 2018: La utilitzaci\u00f3 i penetraci\u00f3 d&#8217;internet va en augment.<\/strong><\/em><\/p>\n<p>Font: <a href=\"http:\/\/www.wearesocial.sg\" target=\"_blank\" rel=\"noopener\">www.wearesocial.sg<\/a><\/p>\n<p>Davant aquesta situaci\u00f3, hem de ser conscients de les possibles<strong> amenaces que podem trobar en utilitzar Internet.<\/strong><\/p>\n<p>Encara que s&#8217;implementin tot tipus de contramesures, sempre va a haver-hi un vector d&#8217;atac pel qual accedir als <strong>sistemes inform\u00e0tics.<\/strong><\/p>\n<p>Probablement h\u00e0gim escoltat el terme <strong>hacker<\/strong> en multitud de not\u00edcies i pel\u00b7l\u00edcules, referint-se a persones que entren en els <strong>sistemes inform\u00e0tics<\/strong> per robar informaci\u00f3 o infectar-los.<\/p>\n<p>Inicialment els <strong>hackers<\/strong> no eren persones que obstaculitzen en sistemes aliens, sin\u00f3 que eren experts programadors que compartien informaci\u00f3 entre si. Per aix\u00f2 ara hem de diferenciar entre:<\/p>\n<ul>\n<li><strong>White Hats o hacker de barret blanc o hacker \u00e8tic<\/strong>\u00a0s\u00f3n <strong><a href=\"https:\/\/www.lisot.com\/ca\/solucions-de-seguretat-informatica-per-a-empreses\/\">experts en seguretat inform\u00e0tica<\/a><\/strong>, especialitzats a realitzar test d&#8217;intrusi\u00f3 i avaluacions de seguretat.<\/li>\n<li><strong>Black Hats o Crackers<\/strong> s\u00f3n <a href=\"https:\/\/www.lisot.com\/ca\/solucions-de-seguretat-informatica-per-a-empreses\/\"><strong>experts en seguretat inform\u00e0tica<\/strong> <\/a>que entren en els sistemes amb finalitats malicioses.<\/li>\n<li><strong>Grey Hats o hackers de barret gris,<\/strong> s\u00f3n <a href=\"https:\/\/www.lisot.com\/ca\/solucions-de-seguretat-informatica-per-a-empreses\/\"><strong>experts en seguretat inform\u00e0tica<\/strong><\/a> que en ocasions vulneren la llei. Normalment no ataquen malintencionadament o amb interessos personals. Les seves motivacions poden protestes o desafiaments personals.<\/li>\n<li><strong>Insiders:<\/strong> s\u00f3n persones amb un gran coneixement del sistema de <a href=\"https:\/\/www.lisot.com\/ca\/solucions-de-seguretat-informatica-per-a-empreses\/\"><strong>seguretat inform\u00e0tica de l&#8217;empresa<\/strong><\/a> que quan s\u00f3n acomiadats o es consideren ofesos realitzen algun tipus d&#8217;atac amb \u00e0nim de venjan\u00e7a.<\/li>\n<\/ul>\n<p>Les regles de joc han canviat, les aplicacions que existien en Internet fa uns anys eren per passar l&#8217;estona, compartir fotos i entretenir-se. Actualment l&#8217;\u00fas d&#8217;internet\u00a0 t\u00e9 un car\u00e0cter professional i empresarial pel que els atacs a aquest mitj\u00e0 poden tenir compensacions econ\u00f2miques i apareixen m\u00e0fies dedicades a extorquir i lucrarsse d&#8217;activitats il\u00b7l\u00edcites.<\/p>\n<p>Aquests atacs els podem agrupar en:<\/p>\n<ul>\n<li>Advanced Persistent Threats \u2013 Amenaces persistents avan\u00e7ades.<\/li>\n<li>Botnets o xarxes zombies<\/li>\n<li>DUES \u2013 Distributed Denial of Service\u00a0 &#8211;\u00a0 Denegaci\u00f3 de servei distribuit<\/li>\n<li>Malware o programari malici\u00f3s<\/li>\n<li>Atacs WEB<\/li>\n<li>Session Hijacking o Robatoris de sessi\u00f3<\/li>\n<li>DNS Poisoning o Enverinament DNS.<\/li>\n<\/ul>\n<p>En articles posteriors anirem explicant cadascun d&#8217;aquests vectors d&#8217;atac.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anem a comen\u00e7ar una s\u00e8rie d&#8217;articles referents a les possibles amenaces de seguretat d&#8217;una xarxa inform\u00e0tica. Per comen\u00e7ar, unes dades de l&#8217;any 2017 que ens situen el marc d&#8217;internet: Habitants del m\u00f3n: 7.000 milions de persones Usuaris de dispositius m\u00f2bils: 4.917 milions de persones Total d&#8217;usuaris d&#8217;Internet: 3.500 milions de persones (el 50% del total d&#8217;habitants  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":12819,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[70],"tags":[71,72,69,73,74],"class_list":["post-12668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad-ca","tag-ciberataque-ca","tag-ciberseguridad-ca","tag-hackers","tag-hackers-ca","tag-seguridad-informatica-ca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Amenaces de seguretat en la xarxa inform\u00e0tica I. Inform\u00e0tica per a empreses<\/title>\n<meta name=\"description\" content=\"Cada cop hi ha m\u00e9s usuaris a Internet. hay m\u00e1s usuarios de Internet. Davant aquesta situaci\u00f3, hem de ser conscients de les possibles amenaces que podem trobar en utilitzar Internet. En articles posteriors anirem explicant cadascun d&#039;aquests vectors d&#039;atac. LISOT, empresa de manteniment inform\u00e0tic i seguretat Inform\u00e0tica per a empreses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amenaces de seguretat en la xarxa inform\u00e0tica I. Inform\u00e0tica per a empreses\" \/>\n<meta property=\"og:description\" content=\"Cada cop hi ha m\u00e9s usuaris a Internet. hay m\u00e1s usuarios de Internet. Davant aquesta situaci\u00f3, hem de ser conscients de les possibles amenaces que podem trobar en utilitzar Internet. En articles posteriors anirem explicant cadascun d&#039;aquests vectors d&#039;atac. LISOT, empresa de manteniment inform\u00e0tic i seguretat Inform\u00e0tica per a empreses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"LISOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lisot.bcn\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-08T10:04:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-08T10:49:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png\" \/>\n\t<meta property=\"og:image:width\" content=\"601\" \/>\n\t<meta property=\"og:image:height\" content=\"349\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\"},\"author\":{\"name\":\"Lisot Inform\u00e1tica empresarial\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\"},\"headline\":\"Amenaces de seguretat a la xarxa Inform\u00e0tica (I)\",\"datePublished\":\"2018-03-08T10:04:42+00:00\",\"dateModified\":\"2018-03-08T10:49:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\"},\"wordCount\":431,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png\",\"keywords\":[\"ciberatac\",\"ciberseguretat\",\"hackers\",\"hackers\",\"seguretat inform\u00e0tica\"],\"articleSection\":[\"Ciberseguretat\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\",\"url\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\",\"name\":\"Amenaces de seguretat en la xarxa inform\u00e0tica I. Inform\u00e0tica per a empreses\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png\",\"datePublished\":\"2018-03-08T10:04:42+00:00\",\"dateModified\":\"2018-03-08T10:49:41+00:00\",\"description\":\"Cada cop hi ha m\u00e9s usuaris a Internet. hay m\u00e1s usuarios de Internet. Davant aquesta situaci\u00f3, hem de ser conscients de les possibles amenaces que podem trobar en utilitzar Internet. En articles posteriors anirem explicant cadascun d'aquests vectors d'atac. LISOT, empresa de manteniment inform\u00e0tic i seguretat Inform\u00e0tica per a empreses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png\",\"width\":601,\"height\":349,\"caption\":\"Amenaces de seguretat a la xarxa Inform\u00e0tica\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.lisot.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amenaces de seguretat a la xarxa Inform\u00e0tica (I)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"name\":\"LISOT\",\"description\":\"Empresa de mantenimient inform\u00e0tic a Barcelona\",\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lisot.com\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\",\"name\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"width\":112,\"height\":38,\"caption\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lisot.bcn\/\",\"https:\/\/es.linkedin.com\/company\/lisot\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\",\"name\":\"Lisot Inform\u00e1tica empresarial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"caption\":\"Lisot Inform\u00e1tica empresarial\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amenaces de seguretat en la xarxa inform\u00e0tica I. Inform\u00e0tica per a empreses","description":"Cada cop hi ha m\u00e9s usuaris a Internet. hay m\u00e1s usuarios de Internet. Davant aquesta situaci\u00f3, hem de ser conscients de les possibles amenaces que podem trobar en utilitzar Internet. En articles posteriors anirem explicant cadascun d'aquests vectors d'atac. LISOT, empresa de manteniment inform\u00e0tic i seguretat Inform\u00e0tica per a empreses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/","og_locale":"ca_ES","og_type":"article","og_title":"Amenaces de seguretat en la xarxa inform\u00e0tica I. Inform\u00e0tica per a empreses","og_description":"Cada cop hi ha m\u00e9s usuaris a Internet. hay m\u00e1s usuarios de Internet. Davant aquesta situaci\u00f3, hem de ser conscients de les possibles amenaces que podem trobar en utilitzar Internet. En articles posteriors anirem explicant cadascun d'aquests vectors d'atac. LISOT, empresa de manteniment inform\u00e0tic i seguretat Inform\u00e0tica per a empreses.","og_url":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/","og_site_name":"LISOT","article_publisher":"https:\/\/www.facebook.com\/lisot.bcn\/","article_published_time":"2018-03-08T10:04:42+00:00","article_modified_time":"2018-03-08T10:49:41+00:00","og_image":[{"width":601,"height":349,"url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png","type":"image\/png"}],"author":"Lisot Inform\u00e1tica empresarial","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"Lisot Inform\u00e1tica empresarial","Temps estimat de lectura":"2 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#article","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/"},"author":{"name":"Lisot Inform\u00e1tica empresarial","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4"},"headline":"Amenaces de seguretat a la xarxa Inform\u00e0tica (I)","datePublished":"2018-03-08T10:04:42+00:00","dateModified":"2018-03-08T10:49:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/"},"wordCount":431,"commentCount":0,"publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png","keywords":["ciberatac","ciberseguretat","hackers","hackers","seguretat inform\u00e0tica"],"articleSection":["Ciberseguretat"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/","url":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/","name":"Amenaces de seguretat en la xarxa inform\u00e0tica I. Inform\u00e0tica per a empreses","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png","datePublished":"2018-03-08T10:04:42+00:00","dateModified":"2018-03-08T10:49:41+00:00","description":"Cada cop hi ha m\u00e9s usuaris a Internet. hay m\u00e1s usuarios de Internet. Davant aquesta situaci\u00f3, hem de ser conscients de les possibles amenaces que podem trobar en utilitzar Internet. En articles posteriors anirem explicant cadascun d'aquests vectors d'atac. LISOT, empresa de manteniment inform\u00e0tic i seguretat Inform\u00e0tica per a empreses.","breadcrumb":{"@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#primaryimage","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/03\/amenazas-seguridad-en-la-red-informatica.png","width":601,"height":349,"caption":"Amenaces de seguretat a la xarxa Inform\u00e0tica"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.lisot.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Amenaces de seguretat a la xarxa Inform\u00e0tica (I)"}]},{"@type":"WebSite","@id":"https:\/\/www.lisot.com\/ca\/#website","url":"https:\/\/www.lisot.com\/ca\/","name":"LISOT","description":"Empresa de mantenimient inform\u00e0tic a Barcelona","publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lisot.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.lisot.com\/ca\/#organization","name":"Lisot - Inform\u00e1tica empresarial en Barcelona","url":"https:\/\/www.lisot.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","width":112,"height":38,"caption":"Lisot - Inform\u00e1tica empresarial en Barcelona"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lisot.bcn\/","https:\/\/es.linkedin.com\/company\/lisot"]},{"@type":"Person","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4","name":"Lisot Inform\u00e1tica empresarial","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","caption":"Lisot Inform\u00e1tica empresarial"}}]}},"_links":{"self":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/12668"}],"collection":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/comments?post=12668"}],"version-history":[{"count":0,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/12668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media\/12819"}],"wp:attachment":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media?parent=12668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/categories?post=12668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/tags?post=12668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}