{"id":14774,"date":"2021-11-15T15:02:30","date_gmt":"2021-11-15T13:02:30","guid":{"rendered":"https:\/\/www.lisot.com\/regla-3-2-1-per-a-backups\/"},"modified":"2021-11-15T17:12:23","modified_gmt":"2021-11-15T15:12:23","slug":"regla-3-2-1-per-a-backups","status":"publish","type":"post","link":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/","title":{"rendered":"Qu\u00e8 ens salva en cas d&#8217;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)"},"content":{"rendered":"<p>Existeix una cita molt famosa que diu:<\/p>\n<blockquote><p><em>El que no es defineix no es pot mesurar. El que no es mesura, no es pot millorar. El que no es millora, es degrada sempre.<\/em><\/p><\/blockquote>\n<p>La Seguretat de la Informaci\u00f3 no \u00e9s una excepci\u00f3, i per aix\u00f2 \u00e9s necess\u00e0ria una aproximaci\u00f3 seriosa i objectiva a la <a href=\"https:\/\/www.lisot.com\/la-ciberseguridad-clave-para-tu-negocio\/\">ciberseguretat<\/a>, que ens permeti determinar de manera fiable els riscos als quals estem exposats, en quina mesura ho estem i quines s\u00f3n les conseq\u00fc\u00e8ncies. En l&#8217;\u00e8poca actual no podem seguir ja amb el tradicional\u201a \u201crecordar-se de Santa B\u00e0rbara quan trona\u201d.<\/p>\n<p>L&#8217;eina principal per a remuntar l&#8217;empresa en cas de <a href=\"https:\/\/www.lisot.com\/amenazas-de-seguridad-en-la-red-informatica\/\">ciberatac<\/a> \u00e9s disposar d&#8217;una <a href=\"https:\/\/www.lisot.com\/copias-de-seguridad-principios-basicos\/\"><strong>c\u00f2pia de seguretat<\/strong><\/a> fiable i actual.<\/p>\n<p>Realitzar una c\u00f2pia de seguretat completa, diferencial i incremental \u00e9s la millor manera de garantir la continu\u00eftat del negoci, i aplicant un m\u00e8tode com la regla 3-2-1 es disposar\u00e0 sempre d&#8217;una c\u00f2pia llista per a ser recuperada, independentment de la mena d&#8217;incident (extern o intern) que s&#8217;hagi produ\u00eft.<\/p>\n<h2 class=\"titulos\">Qu\u00e8 \u00e9s la regla 3-2-1 per a c\u00f2pies de seguretat?<\/h2>\n<p>La regla 3-2-1 \u00e9s un m\u00e8tode per a realitzar c\u00f2pies de seguretat que persegueix aconseguir l&#8217;acc\u00e9s a una c\u00f2pia de seguretat per a poder ser recolzada sempre que sigui necessari. \u00c9s igual que l&#8217;incident que requereixi del suport de la c\u00f2pia de seguretat s&#8217;hagi produ\u00eft de manera interna (error hum\u00e0, corrupci\u00f3 de dades, incendi, robatori de dades, o similar) o de manera externa (atac per malware, denegaci\u00f3 de servei o qualsevol altre atac extern), amb aquesta regla sempre es disposar\u00e0 d&#8217;una c\u00f2pia llista per a utilitzar i tornar a la normalitat en el menor temps possible.<\/p>\n<p>La regla del 3-2-1 diu el seg\u00fcent:<\/p>\n<ul>\n<li>Sempre s&#8217;han de realitzar i mantenir tres c\u00f2pies de seguretat de les dades a recolzar.<\/li>\n<li>S&#8217;utilitzaran almenys dos suports diferents per a realitzar aquestes c\u00f2pies<\/li>\n<li>i un d&#8217;ells ha d&#8217;estar sempre fora de l&#8217;empresa (en l&#8217;entorn actual de treball, en el n\u00favol).<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Exemple de la regla 3-2-1<\/h3>\n<p>La millor manera de comprendre com funciona i s&#8217;aplica aquesta regla de c\u00f2pies de seguretat \u00e9s veient un exemple.<\/p>\n<p>Imaginem una empresa que maneja dades del seu programari de facturaci\u00f3 i comptabilitat, correus electr\u00f2nics i documents PDF amb pressupostos, contractes, n\u00f2mines, i una altra informaci\u00f3 rellevant per al negoci. Aquesta informaci\u00f3 \u00e9s vital i necess\u00e0ria per al funcionament de l&#8217;empresa pel que realitza de manera peri\u00f2dica (di\u00e0riament) una c\u00f2pia de seguretat amb totes aquestes dades.<\/p>\n<p>Per a aplicar la regla 3-2-1 de c\u00f2pies de seguretat en aquesta empresa es podria instal\u00b7lar un NAS al qual bolcar di\u00e0riament dos de les c\u00f2pies de seguretat. Aquestes c\u00f2pies es realitzen en directoris diferents dins del NAS.<\/p>\n<p>Tamb\u00e9 es contractaria un espai d&#8217;emmagatzematge en el n\u00favol en un prove\u00efdor cloud segur, i es pujaria una c\u00f2pia de seguretat a aquest.<\/p>\n<p>D&#8217;aquesta manera es farien tres c\u00f2pies, en dos suports diferents i una d&#8217;elles es troba fora de l&#8217;empresa (dues en el NAS i una en el n\u00favol), garantint que l&#8217;empresa sempre podr\u00e0 accedir a una d&#8217;aquestes c\u00f2pies quan ho necessiti.<\/p>\n<p>La regla del 3-2-1 \u00e9s un m\u00e8tode que permet a l&#8217;empresa disposar sempre d&#8217;una c\u00f2pia de seguretat llesta per al seu suport.<\/p>\n<p>Des de LISOT, com a <a href=\"https:\/\/www.lisot.com\/soluciones-de-seguridad-informatica-para-empresas\/\">proveidor de solucions de seguretat inform\u00e0tica<\/a> i <a href=\"https:\/\/www.lisot.com\/cloud-computing-empresas-barcelona\/\">Partner CLOUD<\/a>, podem oferir-vos la implementaci\u00f3 d&#8217;aquestes solucions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Existeix una cita molt famosa que diu: El que no es defineix no es pot mesurar. El que no es mesura, no es pot millorar. El que no es millora, es degrada sempre. La Seguretat de la Informaci\u00f3 no \u00e9s una excepci\u00f3, i per aix\u00f2 \u00e9s necess\u00e0ria una aproximaci\u00f3 seriosa i objectiva a la ciberseguretat, que  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":14779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[70,107],"tags":[189,178,71,196,72,176,73,150,187,74,152],"class_list":["post-14774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad-ca","category-cloud-computing-ca","tag-amenaces-de-seguretat","tag-backup-ca","tag-ciberataque-ca","tag-ciberdelinquents","tag-ciberseguridad-ca","tag-copies-de-seguretat","tag-hackers-ca","tag-nube-empresarial-ca","tag-pla-director-de-seguretat","tag-seguridad-informatica-ca","tag-serveis-al-nuvol"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Qu\u00e8 ens salva en cas d&#039;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)<\/title>\n<meta name=\"description\" content=\"L&#039;eina principal per a remuntar l&#039;empresa en cas de ciberatac \u00e9s disposar d&#039;una c\u00f2pia de seguretat fiable i actual.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu\u00e8 ens salva en cas d&#039;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)\" \/>\n<meta property=\"og:description\" content=\"L&#039;eina principal per a remuntar l&#039;empresa en cas de ciberatac \u00e9s disposar d&#039;una c\u00f2pia de seguretat fiable i actual.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\" \/>\n<meta property=\"og:site_name\" content=\"LISOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lisot.bcn\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-15T13:02:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-15T15:12:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"812\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\"},\"author\":{\"name\":\"Lisot Inform\u00e1tica empresarial\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\"},\"headline\":\"Qu\u00e8 ens salva en cas d&#8217;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)\",\"datePublished\":\"2021-11-15T13:02:30+00:00\",\"dateModified\":\"2021-11-15T15:12:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\"},\"wordCount\":636,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg\",\"keywords\":[\"amenaces de seguretat\",\"backup\",\"ciberatac\",\"ciberdelinq\u00fcents\",\"ciberseguretat\",\"C\u00f2pies de seguretat\",\"hackers\",\"nube empresarial\",\"pla director de seguretat\",\"seguretat inform\u00e0tica\",\"serveis al n\u00favol\"],\"articleSection\":[\"Ciberseguretat\",\"Cloud Computing\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\",\"url\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\",\"name\":\"Qu\u00e8 ens salva en cas d'un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg\",\"datePublished\":\"2021-11-15T13:02:30+00:00\",\"dateModified\":\"2021-11-15T15:12:23+00:00\",\"description\":\"L'eina principal per a remuntar l'empresa en cas de ciberatac \u00e9s disposar d'una c\u00f2pia de seguretat fiable i actual.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg\",\"width\":1200,\"height\":812,\"caption\":\"Regla 3-2-1 per a backups\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.lisot.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu\u00e8 ens salva en cas d&#8217;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"name\":\"LISOT\",\"description\":\"Empresa de mantenimient inform\u00e0tic a Barcelona\",\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lisot.com\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\",\"name\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"width\":112,\"height\":38,\"caption\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lisot.bcn\/\",\"https:\/\/es.linkedin.com\/company\/lisot\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\",\"name\":\"Lisot Inform\u00e1tica empresarial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"caption\":\"Lisot Inform\u00e1tica empresarial\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu\u00e8 ens salva en cas d'un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)","description":"L'eina principal per a remuntar l'empresa en cas de ciberatac \u00e9s disposar d'una c\u00f2pia de seguretat fiable i actual.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/","og_locale":"ca_ES","og_type":"article","og_title":"Qu\u00e8 ens salva en cas d'un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)","og_description":"L'eina principal per a remuntar l'empresa en cas de ciberatac \u00e9s disposar d'una c\u00f2pia de seguretat fiable i actual.","og_url":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/","og_site_name":"LISOT","article_publisher":"https:\/\/www.facebook.com\/lisot.bcn\/","article_published_time":"2021-11-15T13:02:30+00:00","article_modified_time":"2021-11-15T15:12:23+00:00","og_image":[{"width":1200,"height":812,"url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg","type":"image\/jpeg"}],"author":"Lisot Inform\u00e1tica empresarial","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"Lisot Inform\u00e1tica empresarial","Temps estimat de lectura":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#article","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/"},"author":{"name":"Lisot Inform\u00e1tica empresarial","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4"},"headline":"Qu\u00e8 ens salva en cas d&#8217;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)","datePublished":"2021-11-15T13:02:30+00:00","dateModified":"2021-11-15T15:12:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/"},"wordCount":636,"commentCount":0,"publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg","keywords":["amenaces de seguretat","backup","ciberatac","ciberdelinq\u00fcents","ciberseguretat","C\u00f2pies de seguretat","hackers","nube empresarial","pla director de seguretat","seguretat inform\u00e0tica","serveis al n\u00favol"],"articleSection":["Ciberseguretat","Cloud Computing"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/","url":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/","name":"Qu\u00e8 ens salva en cas d'un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg","datePublished":"2021-11-15T13:02:30+00:00","dateModified":"2021-11-15T15:12:23+00:00","description":"L'eina principal per a remuntar l'empresa en cas de ciberatac \u00e9s disposar d'una c\u00f2pia de seguretat fiable i actual.","breadcrumb":{"@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#primaryimage","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2021\/11\/regla-3-2-1-backups-1.jpg","width":1200,"height":812,"caption":"Regla 3-2-1 per a backups"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lisot.com\/ca\/regla-3-2-1-per-a-backups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.lisot.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Qu\u00e8 ens salva en cas d&#8217;un atac inform\u00e0tic? (o la regla 3-2-1 per a backups)"}]},{"@type":"WebSite","@id":"https:\/\/www.lisot.com\/ca\/#website","url":"https:\/\/www.lisot.com\/ca\/","name":"LISOT","description":"Empresa de mantenimient inform\u00e0tic a Barcelona","publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lisot.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.lisot.com\/ca\/#organization","name":"Lisot - Inform\u00e1tica empresarial en Barcelona","url":"https:\/\/www.lisot.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","width":112,"height":38,"caption":"Lisot - Inform\u00e1tica empresarial en Barcelona"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lisot.bcn\/","https:\/\/es.linkedin.com\/company\/lisot"]},{"@type":"Person","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4","name":"Lisot Inform\u00e1tica empresarial","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","caption":"Lisot Inform\u00e1tica empresarial"}}]}},"_links":{"self":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/14774"}],"collection":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/comments?post=14774"}],"version-history":[{"count":0,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/14774\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media\/14779"}],"wp:attachment":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media?parent=14774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/categories?post=14774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/tags?post=14774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}