{"id":13210,"date":"2019-02-18T11:50:45","date_gmt":"2019-02-18T09:50:45","guid":{"rendered":"https:\/\/www.lisot.com\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/"},"modified":"2019-02-18T11:50:45","modified_gmt":"2019-02-18T09:50:45","slug":"classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio","status":"publish","type":"post","link":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/","title":{"rendered":"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#8217;informaci\u00f3"},"content":{"rendered":"<p>\u00c9s evident que<strong> el <a href=\"https:\/\/www.lisot.com\/ca\/manteniment-informatic-barcelona\/\">manteniment inform\u00e0tic<\/a> i la gesti\u00f3 de la infraestructura tecnol\u00f2gica s\u00f3n necessaris per a qualsevol empresa que tingui depend\u00e8ncia dels actius tecnol\u00f2gics i de la informaci\u00f3 en format digital.<\/strong><\/p>\n<p>Existeix el mateix risc de p\u00e8rdua de dades, extraviament, robatori, etc. per a un llibre \u00abcl\u00e0ssic\u00bb en paper que no custodiem degudament, com el que es troba en un fitxer de dades dins del nostre ordinador port\u00e0til.<\/p>\n<p>Davant aquesta situaci\u00f3, podem distingir entre <strong>amenaces de ciberseguretat externes i internes,<\/strong> i en tots dos casos, poden ser<strong> intencionades o accidentals.<\/strong><\/p>\n<ul>\n<li><strong>Amenaces de ciberseguretat externes intencionades.<\/strong> Espionatge, sabotatge, vandalisme, robatori d&#8217;informaci\u00f3 confidencial s\u00f3n algunes de les amenaces externes a les quals ens enfrontem. En algunes ocasions els atacs seran mitjan\u00e7ant t\u00e8cniques d&#8217;enginyeria social o <a href=\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\">atacs de denegaci\u00f3 de servei<\/a>.<\/li>\n<li><strong>Amenaces de ciberseguretat externes accidentals.<\/strong> En moltes ocasions les amenaces s\u00f3n involunt\u00e0ries o resultants de desastres naturals, que poden derivar en molts casos en inundacions o incendis.<\/li>\n<li><strong>Amenaces de ciberseguretat internes intencionades.<\/strong> Una de les amenaces que han de resoldre els nostres departaments d&#8217;inform\u00e0tica \u00e9s el propi personal de l&#8217;organitzaci\u00f3, com podria ser un empleat amb acc\u00e9s als recursos de l&#8217;organitzaci\u00f3 que sap que ser\u00e0 acomiadat.<\/li>\n<li><strong>Amenaces de ciberseguretat internes accidentals.<\/strong> Comprenen les males pr\u00e0ctiques per part d&#8217;un empleat, sense tenir una mala intenci\u00f3, per exemple inserir un USB infectat en un ordinador corporatiu<\/li>\n<\/ul>\n<p>Hem de tenir present les <a href=\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\">amenaces de ciberseguretat<\/a> a les quals est\u00e0 exposada l&#8217;organitzaci\u00f3 i la forma en la qual podem fer-los front.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c9s evident que el manteniment inform\u00e0tic i la gesti\u00f3 de la infraestructura tecnol\u00f2gica s\u00f3n necessaris per a qualsevol empresa que tingui depend\u00e8ncia dels actius tecnol\u00f2gics i de la informaci\u00f3 en format digital. Existeix el mateix risc de p\u00e8rdua de dades, extraviament, robatori, etc. per a un llibre \u00abcl\u00e0ssic\u00bb en paper que no custodiem degudament, com el  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":13204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[70,93],"tags":[189,94,71,72,187,74],"class_list":["post-13210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad-ca","category-mantenimiento-informatico-ca","tag-amenaces-de-seguretat","tag-ataques-web-ca","tag-ciberataque-ca","tag-ciberseguridad-ca","tag-pla-director-de-seguretat","tag-seguridad-informatica-ca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#039;informaci\u00f3 | Seguretat inform\u00e0tica<\/title>\n<meta name=\"description\" content=\"Hem de tenir present les amenaces de ciberseguretat a les quals est\u00e0 exposada l\u2019organitzaci\u00f3 i la forma en la qual podem fer-los front.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#039;informaci\u00f3 | Seguretat inform\u00e0tica\" \/>\n<meta property=\"og:description\" content=\"Hem de tenir present les amenaces de ciberseguretat a les quals est\u00e0 exposada l\u2019organitzaci\u00f3 i la forma en la qual podem fer-los front.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\" \/>\n<meta property=\"og:site_name\" content=\"LISOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lisot.bcn\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-18T09:50:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"778\" \/>\n\t<meta property=\"og:image:height\" content=\"399\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\"},\"author\":{\"name\":\"Lisot Inform\u00e1tica empresarial\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\"},\"headline\":\"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#8217;informaci\u00f3\",\"datePublished\":\"2019-02-18T09:50:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\"},\"wordCount\":280,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg\",\"keywords\":[\"amenaces de seguretat\",\"atacs web\",\"ciberatac\",\"ciberseguretat\",\"pla director de seguretat\",\"seguretat inform\u00e0tica\"],\"articleSection\":[\"Ciberseguretat\",\"Manteniment inform\u00e0tic\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\",\"url\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\",\"name\":\"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d'informaci\u00f3 | Seguretat inform\u00e0tica\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg\",\"datePublished\":\"2019-02-18T09:50:45+00:00\",\"description\":\"Hem de tenir present les amenaces de ciberseguretat a les quals est\u00e0 exposada l\u2019organitzaci\u00f3 i la forma en la qual podem fer-los front.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg\",\"width\":778,\"height\":399,\"caption\":\"amenaces de ciberseguetat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.lisot.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#8217;informaci\u00f3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"name\":\"LISOT\",\"description\":\"Empresa de mantenimient inform\u00e0tic a Barcelona\",\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lisot.com\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\",\"name\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"width\":112,\"height\":38,\"caption\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lisot.bcn\/\",\"https:\/\/es.linkedin.com\/company\/lisot\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\",\"name\":\"Lisot Inform\u00e1tica empresarial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"caption\":\"Lisot Inform\u00e1tica empresarial\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d'informaci\u00f3 | Seguretat inform\u00e0tica","description":"Hem de tenir present les amenaces de ciberseguretat a les quals est\u00e0 exposada l\u2019organitzaci\u00f3 i la forma en la qual podem fer-los front.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/","og_locale":"ca_ES","og_type":"article","og_title":"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d'informaci\u00f3 | Seguretat inform\u00e0tica","og_description":"Hem de tenir present les amenaces de ciberseguretat a les quals est\u00e0 exposada l\u2019organitzaci\u00f3 i la forma en la qual podem fer-los front.","og_url":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/","og_site_name":"LISOT","article_publisher":"https:\/\/www.facebook.com\/lisot.bcn\/","article_published_time":"2019-02-18T09:50:45+00:00","og_image":[{"width":778,"height":399,"url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg","type":"image\/jpeg"}],"author":"Lisot Inform\u00e1tica empresarial","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"Lisot Inform\u00e1tica empresarial","Temps estimat de lectura":"1 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#article","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/"},"author":{"name":"Lisot Inform\u00e1tica empresarial","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4"},"headline":"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#8217;informaci\u00f3","datePublished":"2019-02-18T09:50:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/"},"wordCount":280,"commentCount":0,"publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg","keywords":["amenaces de seguretat","atacs web","ciberatac","ciberseguretat","pla director de seguretat","seguretat inform\u00e0tica"],"articleSection":["Ciberseguretat","Manteniment inform\u00e0tic"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/","url":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/","name":"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d'informaci\u00f3 | Seguretat inform\u00e0tica","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg","datePublished":"2019-02-18T09:50:45+00:00","description":"Hem de tenir present les amenaces de ciberseguretat a les quals est\u00e0 exposada l\u2019organitzaci\u00f3 i la forma en la qual podem fer-los front.","breadcrumb":{"@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#primaryimage","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/02\/amenazas-de-ciberseguridad.jpg","width":778,"height":399,"caption":"amenaces de ciberseguetat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lisot.com\/ca\/classificacio-de-les-amenaces-de-ciberseguretat-del-nostre-sistema-informacio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.lisot.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Classificaci\u00f3 de les amenaces de ciberseguretat del nostre sistema d&#8217;informaci\u00f3"}]},{"@type":"WebSite","@id":"https:\/\/www.lisot.com\/ca\/#website","url":"https:\/\/www.lisot.com\/ca\/","name":"LISOT","description":"Empresa de mantenimient inform\u00e0tic a Barcelona","publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lisot.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.lisot.com\/ca\/#organization","name":"Lisot - Inform\u00e1tica empresarial en Barcelona","url":"https:\/\/www.lisot.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","width":112,"height":38,"caption":"Lisot - Inform\u00e1tica empresarial en Barcelona"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lisot.bcn\/","https:\/\/es.linkedin.com\/company\/lisot"]},{"@type":"Person","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4","name":"Lisot Inform\u00e1tica empresarial","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","caption":"Lisot Inform\u00e1tica empresarial"}}]}},"_links":{"self":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/13210"}],"collection":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/comments?post=13210"}],"version-history":[{"count":0,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/13210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media\/13204"}],"wp:attachment":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media?parent=13210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/categories?post=13210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/tags?post=13210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}