{"id":33282,"date":"2024-04-09T10:00:11","date_gmt":"2024-04-09T08:00:11","guid":{"rendered":"https:\/\/www.i3s.es\/blog\/data-protection-issues-in-a-company\/"},"modified":"2024-04-29T09:11:36","modified_gmt":"2024-04-29T07:11:36","slug":"data-protection-issues-in-a-company","status":"publish","type":"post","link":"https:\/\/www.i3s.es\/en\/blog\/data-protection-issues-in-a-company\/","title":{"rendered":"Data protection issues in a company"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"33282\" class=\"elementor elementor-33282 elementor-33137\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8c8ceb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c8ceb7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a1b813\" data-id=\"5a1b813\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7568bf elementor-widget elementor-widget-text-editor\" data-id=\"c7568bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The <\/span><b>data protection in companies<\/b><span style=\"font-weight: 400;\"> has become a real headache for many organizations. <\/span> <\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><i><span style=\"font-weight: 400;\">cybercrime <\/span><\/i> <span style=\"font-weight: 400;\">has increased its threat to the integrity of corporate information and security systems. And not all companies are prepared either to prevent their onslaught or to deal with a cyber attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, those of us who implement cybersecurity solutions in organizations have redoubled our efforts in recent months in order to guarantee data protection in companies. <\/span><b>data protection in companies<\/b><span style=\"font-weight: 400;\">. This 2023 has been <\/span><a href=\"https:\/\/www.i3s.es\/en\/blog\/2023-the-year-of-cybersecurity-in-sap-environments\/\"><b>the year of cybersecurity in SAP environments<\/b><\/a><span style=\"font-weight: 400;\">. <\/span> <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88ef12a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88ef12a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f13a3f\" data-id=\"9f13a3f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4686fc7 elementor-widget elementor-widget-heading\" data-id=\"4686fc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is data protection in a company?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30fde21 elementor-widget elementor-widget-text-editor\" data-id=\"30fde21\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span style=\"font-weight: 400;\">We understand by<\/span><b> corporate data protection<\/b><span style=\"font-weight: 400;\"> the set of policies, actions, protocols and standards used to ensure data security in an organization. <\/span><b>ensure the security of data in an organization<\/b><span style=\"font-weight: 400;\">. That is, that they are not compromised, either by illicit misappropriation practices, or by public exposure (when confidential) or loss due to technical or human error.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This requires<b> secure and efficient data management<\/b> <b>systems<\/b><b> and storage solutions<\/b>. As well as <b>a strategy for its protection<\/b> against possible external threats and its recovery in case of loss. responsibility. Both have motivated <\/span><b>a change in the corporate culture of most organizations.<\/b><span style=\"font-weight: 400;\"> of most organizations. <\/span> <\/p>\n<p><span style=\"font-weight: 400;\">This culture now embraces environmental, safety and health <\/span><b>environmental, safety and health objectives<\/b><span style=\"font-weight: 400;\">i.e. a <\/span><b>code of ethics<\/b><span style=\"font-weight: 400;\"> that goes beyond regulations and has a lot to do with the values that a large number of <\/span><b>values that many of today&#8217;s professionals wish to uphold.<\/b><span style=\"font-weight: 400;\"> today&#8217;s professionals.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-761cfe4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"761cfe4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8701fc4\" data-id=\"8701fc4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f577f6 elementor-widget elementor-widget-image\" data-id=\"1f577f6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.i3s.es\/wp-content\/uploads\/2024\/03\/importancia-de-la-proteccion-de-datos-en-las-empresas.jpg\" class=\"attachment-full size-full wp-image-33160\" alt=\"Los ciberataques provocan enormes p\u00e9rdidas econ\u00f3micas a las empresas\" srcset=\"https:\/\/www.i3s.es\/wp-content\/uploads\/2024\/03\/importancia-de-la-proteccion-de-datos-en-las-empresas.jpg 1024w, https:\/\/www.i3s.es\/wp-content\/uploads\/2024\/03\/importancia-de-la-proteccion-de-datos-en-las-empresas-300x176.jpg 300w, https:\/\/www.i3s.es\/wp-content\/uploads\/2024\/03\/importancia-de-la-proteccion-de-datos-en-las-empresas-768x450.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-959f8f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"959f8f7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ff6150\" data-id=\"6ff6150\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f0c2ef elementor-widget elementor-widget-heading\" data-id=\"1f0c2ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data protection obligations of the company<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b78390 elementor-widget elementor-widget-text-editor\" data-id=\"2b78390\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span style=\"font-weight: 400;\">The obligations of companies in terms of data protection <\/span><b>data protection <\/b> <span style=\"font-weight: 400;\">have grown as their implications have grown. The <\/span><a href=\"https:\/\/www.i3s.es\/blog\/digitalizacion-pyme\/\"><b>digitalization process of the business activity, especially that of the SMEs<\/b><\/a><span style=\"font-weight: 400;\">has required a regulatory<\/span><b> regulatory framework that guarantees the rights of consumers as users, but also the continuity of organizations.<\/b><span style=\"font-weight: 400;\"> of consumers as users, but also the continuity of organizations. <\/span> <\/p>\n<p><span style=\"font-weight: 400;\">Thus, companies are obliged to comply with the European regulations set out in the <\/span><a href=\"https:\/\/eur-lex.europa.eu\/ES\/legal-content\/summary\/general-data-protection-regulation-gdpr.html\" rel=\"nofollow noopener\" target=\"_blank\"><b>General Data Protection Regulation (<\/b><\/a><span style=\"font-weight: 400;\">RGPD) and its adaptation to the national legislation through the <\/span><a href=\"https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-2018-16673\" rel=\"nofollow noopener\" target=\"_blank\"><b>LOPDGDD<\/b><\/a><span style=\"font-weight: 400;\"> (Organic Law on Personal Data Protection and guarantee of digital rights).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even so, the problems in the protection of <\/span><b>data protection in a company are still common, especially in SMEs. <\/b><span style=\"font-weight: 400;\">are still common, especially in small and medium-sized companies.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4770bd1 elementor-widget elementor-widget-heading\" data-id=\"4770bd1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Most common errors in data protection in companies\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a30371 elementor-widget elementor-widget-text-editor\" data-id=\"8a30371\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span style=\"font-weight: 400;\">Some of the common mistakes in data<\/span><b> data protection in companies<\/b><span style=\"font-weight: 400;\"> have to do with the <\/span><b>configuration of the company&#8217;s website<\/b><span style=\"font-weight: 400;\">lack of a cookie policy, impossibility of exercising the right of access to data <\/span> <span style=\"font-weight: 400;\">Access, Rectification, Cancellation and Opposition, or the absence of communication systems of a digital breach. These are errors that usually violate the rights of consumers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, there are also those that can disrupt a company&#8217;s day-to-day business. Normally, it is due to the <\/span><b>absence of protocols in systems for internal use<\/b><span style=\"font-weight: 400;\"> systems that operate, however, through cloud services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, the so-called <\/span><b>Industry 4.0<\/b><span style=\"font-weight: 400;\">which is increasingly employing IoT or AI, has been the target of numerous cyber-attacks in the last two years. This situation has meant <\/span><b>huge financial losses<\/b><span style=\"font-weight: 400;\"> and has brought with it dire consequences, such as the difficulty of consolidating its old customers or attracting new ones.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a237af7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a237af7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.i3s.es\/en\/services\/cybersecurity-at-sap\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">CYBERSECURITY IN SAP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4691cf3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"4691cf3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2408a86\" data-id=\"2408a86\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb7d70a elementor-widget elementor-widget-image\" data-id=\"fb7d70a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.i3s.es\/en\/sap-solutions\/sap-ehsm\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.i3s.es\/wp-content\/uploads\/elementor\/thumbs\/que-es-la-proteccion-de-datos-en-una-empresa-qlu2230beygfnefcil2n95jkgl92xwb5uh024owm4g.jpg\" title=\"que-es-la-proteccion-de-datos-en-una-empresa\" alt=\"C\u00f3mo garantizar la protecci\u00f3n de datos en una organizaci\u00f3n\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9a5e59c\" data-id=\"9a5e59c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-080a962 elementor-widget elementor-widget-image\" data-id=\"080a962\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.i3s.es\/en\/sap-solutions\/sap-ehsm\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.i3s.es\/wp-content\/uploads\/elementor\/thumbs\/problemas-de-proteccion-de-datos-en-una-empresa-qlu2490x67f8f1a0v0soi3utrkkjorwvt75cynoxs0.jpg\" title=\"problemas-de-proteccion-de-datos-en-una-empresa\" alt=\"La ciberdelincuencia ha aumentado en los \u00faltimos a\u00f1os.\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74d985a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74d985a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3986d7\" data-id=\"e3986d7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5eedfeb elementor-widget elementor-widget-heading\" data-id=\"5eedfeb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Importance of data protection in companies\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c370a38 elementor-widget elementor-widget-text-editor\" data-id=\"c370a38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<\/p>\n<p><span style=\"font-weight: 400;\">Every company must put in place physical and digital measures to ensure the protection of the data they handle. And not only for <\/span><b>to guarantee the rights of its users, but also its own activity, which could be vulnerable to an attack that could jeopardize all of its users&#8217; rights.<\/b><span style=\"font-weight: 400;\">but also its own activity, which could be vulnerable to an attack that could jeopardize all its production and management systems. <\/span><b>production and management systems.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Thus, companies have to protect all types of data <\/span><b>all types of data, from basic<\/b><span style=\"font-weight: 400;\">from basic to particularly sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Investing time and effort, as well as money, in the<\/span><b> data protection<\/b><span style=\"font-weight: 400;\"> is also necessary for <\/span><b>not to incur in an illegality<\/b><span style=\"font-weight: 400;\">and to avoid a <\/span><b>reputation crisis<\/b><span style=\"font-weight: 400;\"> The company has been affected by a security breach that threatens the identity of individuals, as has already occurred, for example, in large multinationals in the telecommunications sector.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-190534c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"190534c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e7494f\" data-id=\"1e7494f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17edeed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17edeed\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac1af78\" data-id=\"ac1af78\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-014e3bd elementor-align-center elementor-widget elementor-widget-button\" data-id=\"014e3bd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.i3s.es\/en\/services\/cybersecurity-at-sap\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">REQUEST A PROPOSAL<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybercrime has increased its threat to the integrity of corporate information and security systems. And not all companies are prepared to deal with it.<\/p>\n","protected":false},"author":3,"featured_media":33142,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[287],"tags":[397,395,396,398,326],"class_list":["post-33282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-i3s-blog-en","tag-cyberattacks","tag-cybersecurity","tag-data-security","tag-information-security","tag-sap-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/posts\/33282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/comments?post=33282"}],"version-history":[{"count":28,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/posts\/33282\/revisions"}],"predecessor-version":[{"id":33341,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/posts\/33282\/revisions\/33341"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/media\/33142"}],"wp:attachment":[{"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/media?parent=33282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/categories?post=33282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i3s.es\/en\/wp-json\/wp\/v2\/tags?post=33282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}