{"id":13261,"date":"2019-04-15T13:16:08","date_gmt":"2019-04-15T11:16:08","guid":{"rendered":"https:\/\/www.lisot.com\/ciberseguretat\/"},"modified":"2019-04-15T13:16:11","modified_gmt":"2019-04-15T11:16:11","slug":"ciberseguretat","status":"publish","type":"post","link":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/","title":{"rendered":"Ciberseguretat"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l&#8217;inici la necessitat d&#8217;aspectes de ciberseguretat.<br \/>\nAix\u00f2 implica que existeixin errors de disseny que originen forats de seguretat que desafortunadament poden ser explotats pels\u00a0ciberdelinq\u00fcents.<br \/>\nAquesta situaci\u00f3 juntament amb la imparable digitalitzaci\u00f3 dels sistemes d&#8217;informaci\u00f3, originen un nou escenari amb un\u00a0ciber-risc\u00a0que \u00e9s un repte molt important per a la nostra societat actual.<\/p>\n<\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1343\" height=\"771\" alt=\"Ciberseguridad - atacs inform\u00e0tics\" title=\"ciberseguretat &#8211; seguretat inform\u00e0tica 3\" src=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1.png\" class=\"img-responsive wp-image-13251\" srcset=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1-200x115.png 200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1-400x230.png 400w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1-600x344.png 600w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1-800x459.png 800w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1-1200x689.png 1200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-3-1.png 1343w\" sizes=\"(max-width: 800px) 100vw, 1343px\" \/><\/span><\/div><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1352\" height=\"418\" alt=\"Ciberseguretat - segurietat inform\u00e0tica\" title=\"ciberseguretat &#8211; seguretat inform\u00e0tica 2\" src=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1.png\" class=\"img-responsive wp-image-13253\" srcset=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1-200x62.png 200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1-400x124.png 400w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1-600x186.png 600w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1-800x247.png 800w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1-1200x371.png 1200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-2-1.png 1352w\" sizes=\"(max-width: 800px) 100vw, 1352px\" \/><\/span><\/div><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"1280\" height=\"522\" alt=\"Ciberseguretat - ciberatacs\" title=\"ciberseguretat &#8211; seguretat inform\u00e0tica\" src=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1.png\" class=\"img-responsive wp-image-13255\" srcset=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1-200x82.png 200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1-400x163.png 400w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1-600x245.png 600w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1-800x326.png 800w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1-1200x489.png 1200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-1.png 1280w\" sizes=\"(max-width: 800px) 100vw, 1280px\" \/><\/span><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>Enfront d&#8217;aquest nou escenari, qu\u00e8 hem de fer:<\/p>\n<p>&nbsp;<\/p>\n<p>1.- Personalitzar la seguretat a cada tipus d&#8217;empresa:<\/p>\n<p>Cada empresa en funci\u00f3 de la seva grand\u00e0ria, tipus de dades que maneja i estructura corporativa ha de tenir un sistema de seguretat dissenyat a la seva mesura.<\/p>\n<p>2.- La seguretat inform\u00e0tica s&#8217;ha de prendre de forma pro-activa:<\/p>\n<p>Ja no \u00e9s suficient reaccionar davant un atac, sin\u00f3 que hem d&#8217;implementar mecanismes preventius abans que ocorrin.<\/p>\n<p>3.- No hem d&#8217;assumir que el \u201cn\u00favol \u00e9s segur per disseny\u201d:<\/p>\n<p>La migraci\u00f3 al n\u00favol \u00e9s un proc\u00e9s imparable que ofereix molts avantatges per\u00f2 hem de refor\u00e7ar-la amb mesures de seguretat locals; combinar implementacions mixtes (n\u00favol-local) \u00e9s la millor opci\u00f3.<\/p>\n<p>4.- L&#8217;usuari \u00e9s la part mes sensible de tot el sistema de seguretat:<\/p>\n<p>Els cibercriminals saben com accedir a la informaci\u00f3 personal dels usuaris per a despr\u00e9s utilitzar-la en els atacs; s&#8217;ha de dedicar temps a formar i conscienciar als usuaris dels possibles riscos.<\/p>\n<p>5.- La ciberseguretat ha de ser implantada per empreses professionals i especialistes en el sector.<\/p>\n<p>Les solucions a implementar s\u00f3n cada vegada mes complexes i requereix de major formaci\u00f3 i experi\u00e8ncia t\u00e8cnica.<\/p>\n<p>&nbsp;<\/p>\n<p>Capacitats i compet\u00e8ncies requerides per a implementar el marc NIST (National Institute of Standards and Technology).<\/p>\n<\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1297\" height=\"792\" alt=\"Ciberseguridad - atacs inform\u00e0tics\" title=\"ciberseguretat &#8211; seguretat inform\u00e0tica 4\" src=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png\" class=\"img-responsive wp-image-13249\" srcset=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1-200x122.png 200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1-400x244.png 400w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1-600x366.png 600w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1-800x489.png 800w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1-1200x733.png 1200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png 1297w\" sizes=\"(max-width: 800px) 100vw, 1297px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":13249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[70],"tags":[189,72,187,74],"class_list":["post-13261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad-ca","tag-amenaces-de-seguretat","tag-ciberseguridad-ca","tag-pla-director-de-seguretat","tag-seguridad-informatica-ca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguretat - Seguretat dels sistemes inform\u00e0tics<\/title>\n<meta name=\"description\" content=\"La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l\u2019inici la necessitat d\u2019aspectes de ciberseguretat pel que poden ser atacats pels ciberdelinq\u00fcents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguretat - Seguretat dels sistemes inform\u00e0tics\" \/>\n<meta property=\"og:description\" content=\"La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l\u2019inici la necessitat d\u2019aspectes de ciberseguretat pel que poden ser atacats pels ciberdelinq\u00fcents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\" \/>\n<meta property=\"og:site_name\" content=\"LISOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lisot.bcn\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-15T11:16:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-15T11:16:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1297\" \/>\n\t<meta property=\"og:image:height\" content=\"792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\"},\"author\":{\"name\":\"Lisot Inform\u00e1tica empresarial\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\"},\"headline\":\"Ciberseguretat\",\"datePublished\":\"2019-04-15T11:16:08+00:00\",\"dateModified\":\"2019-04-15T11:16:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\"},\"wordCount\":803,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png\",\"keywords\":[\"amenaces de seguretat\",\"ciberseguretat\",\"pla director de seguretat\",\"seguretat inform\u00e0tica\"],\"articleSection\":[\"Ciberseguretat\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\",\"url\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\",\"name\":\"Ciberseguretat - Seguretat dels sistemes inform\u00e0tics\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png\",\"datePublished\":\"2019-04-15T11:16:08+00:00\",\"dateModified\":\"2019-04-15T11:16:11+00:00\",\"description\":\"La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l\u2019inici la necessitat d\u2019aspectes de ciberseguretat pel que poden ser atacats pels ciberdelinq\u00fcents.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png\",\"width\":1297,\"height\":792,\"caption\":\"Ciberseguretat - seguretat inform\u00e0tica\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.lisot.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguretat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"name\":\"LISOT\",\"description\":\"Empresa de mantenimient inform\u00e0tic a Barcelona\",\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lisot.com\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\",\"name\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"width\":112,\"height\":38,\"caption\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lisot.bcn\/\",\"https:\/\/es.linkedin.com\/company\/lisot\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\",\"name\":\"Lisot Inform\u00e1tica empresarial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"caption\":\"Lisot Inform\u00e1tica empresarial\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguretat - Seguretat dels sistemes inform\u00e0tics","description":"La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l\u2019inici la necessitat d\u2019aspectes de ciberseguretat pel que poden ser atacats pels ciberdelinq\u00fcents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/","og_locale":"ca_ES","og_type":"article","og_title":"Ciberseguretat - Seguretat dels sistemes inform\u00e0tics","og_description":"La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l\u2019inici la necessitat d\u2019aspectes de ciberseguretat pel que poden ser atacats pels ciberdelinq\u00fcents.","og_url":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/","og_site_name":"LISOT","article_publisher":"https:\/\/www.facebook.com\/lisot.bcn\/","article_published_time":"2019-04-15T11:16:08+00:00","article_modified_time":"2019-04-15T11:16:11+00:00","og_image":[{"width":1297,"height":792,"url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png","type":"image\/png"}],"author":"Lisot Inform\u00e1tica empresarial","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"Lisot Inform\u00e1tica empresarial","Temps estimat de lectura":"4 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#article","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/"},"author":{"name":"Lisot Inform\u00e1tica empresarial","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4"},"headline":"Ciberseguretat","datePublished":"2019-04-15T11:16:08+00:00","dateModified":"2019-04-15T11:16:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/"},"wordCount":803,"commentCount":0,"publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png","keywords":["amenaces de seguretat","ciberseguretat","pla director de seguretat","seguretat inform\u00e0tica"],"articleSection":["Ciberseguretat"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lisot.com\/ca\/ciberseguretat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/","url":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/","name":"Ciberseguretat - Seguretat dels sistemes inform\u00e0tics","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png","datePublished":"2019-04-15T11:16:08+00:00","dateModified":"2019-04-15T11:16:11+00:00","description":"La majoria dels sistemes inform\u00e0tics han estat dissenyats sense tenir present des de l\u2019inici la necessitat d\u2019aspectes de ciberseguretat pel que poden ser atacats pels ciberdelinq\u00fcents.","breadcrumb":{"@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lisot.com\/ca\/ciberseguretat\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#primaryimage","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2019\/04\/ciberseguridad-seguridad-informatica-4-1.png","width":1297,"height":792,"caption":"Ciberseguretat - seguretat inform\u00e0tica"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lisot.com\/ca\/ciberseguretat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.lisot.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Ciberseguretat"}]},{"@type":"WebSite","@id":"https:\/\/www.lisot.com\/ca\/#website","url":"https:\/\/www.lisot.com\/ca\/","name":"LISOT","description":"Empresa de mantenimient inform\u00e0tic a Barcelona","publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lisot.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.lisot.com\/ca\/#organization","name":"Lisot - Inform\u00e1tica empresarial en Barcelona","url":"https:\/\/www.lisot.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","width":112,"height":38,"caption":"Lisot - Inform\u00e1tica empresarial en Barcelona"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lisot.bcn\/","https:\/\/es.linkedin.com\/company\/lisot"]},{"@type":"Person","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4","name":"Lisot Inform\u00e1tica empresarial","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","caption":"Lisot Inform\u00e1tica empresarial"}}]}},"_links":{"self":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/13261"}],"collection":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/comments?post=13261"}],"version-history":[{"count":0,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/13261\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media\/13249"}],"wp:attachment":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media?parent=13261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/categories?post=13261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/tags?post=13261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}