{"id":7469,"date":"2022-11-18T00:41:08","date_gmt":"2022-11-17T23:41:08","guid":{"rendered":"https:\/\/www.mdtel.es\/tech\/?p=7469"},"modified":"2024-02-26T11:16:02","modified_gmt":"2024-02-26T10:16:02","slug":"10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/","title":{"rendered":"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades"},"content":{"rendered":"\n\n\n[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb15px||6px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb|auto|4px|auto||\u00bb custom_padding=\u00bb||11px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|300|||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.4em\u00bb text_orientation=\u00bbjustified\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb15px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<p>Con la <strong>gesti\u00f3n de vulnerabilidades tradicional<\/strong>, el n\u00famero de vulnerabilidades detectadas suele ser tan grande que resulta dif\u00edcil mantenerse al d\u00eda con todas ellas y es complicado saber cu\u00e1les son las que representan el mayor riesgo para la organizaci\u00f3n.<\/p>\n<p>Es a\u00fan m\u00e1s complicado si conf\u00edas exclusivamente en las<strong> puntuaciones CVSS<\/strong> para determinar qu\u00e9 vulnerabilidades reparar primero. Esto se debe a que <strong>las puntuaciones CVSS no tienen en cuenta el riesgo real<\/strong>, y la gesti\u00f3n de vulnerabilidades tradicional no te<br \/>brinda una visi\u00f3n completa de su superficie de ataque moderna. Esto deja puntos ciegos que pueden poner a tu organizaci\u00f3n en riesgo.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||5px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb7px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|300|||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.5em\u00bb text_orientation=\u00bbjustified\u00bb custom_margin=\u00bb||11px|||\u00bb custom_padding=\u00bb10px|||||\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb15px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb17px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<h2 style=\"text-align: left;\"><span style=\"color: #144f9b;\">Programa de gesti\u00f3n de vulnerabilidades basado en el riesgo<\/span><\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb column_structure=\u00bb3_5,2_5&#8243; custom_padding=\u00bb11px|||||\u00bb][et_pb_column _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb type=\u00bb3_5&#8243;][et_pb_text _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|300|||||||\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.5em\u00bb text_orientation=\u00bbjustified\u00bb custom_padding=\u00bb7px|||||\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb15px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb]<p>Hacer <strong>evolucionar tu gesti\u00f3n de vulnerabilidades tradicional hacia un programa de gesti\u00f3n de vulnerabilidades basado en el riesgo<\/strong>, puede ayudarte a priorizar qu\u00e9 vulnerabilidades debes corregir primero y brindarte m\u00e1s informaci\u00f3n sobre todos los activos y los riesgos asociados a lo largo de su superficie de ataque.<\/p>\n<p>En la siguiente infograf\u00eda te recomendamos 10 cosas que hay que hacer y 10 que no hay que hacer a la hora de elaborar un programa de gesti\u00f3n de vulnerabilidades que se basa en el riesgo.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb type=\u00bb2_5&#8243;][et_pb_image src=\u00bbhttps:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/10-consejos-gestion-vulnerabilidades.png\u00bb title_text=\u00bb10-consejos-gestion-vulnerabilidades\u00bb align=\u00bbcenter\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_button button_url=\u00bbhttps:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/10\/10-cosas-que-debes-hacer-y-debes-evitar.pdf\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbDescarga\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb _builder_version=\u00bb4.19.0&#8243; _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#144f9b\u00bb button_border_width=\u00bb0px\u00bb button_border_color=\u00bb#0C71C3&#8243; button_border_radius=\u00bb29px\u00bb button_font=\u00bb|300|||||||\u00bb button_use_icon=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb12px||12px|||\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#d8d8d8&#8243; button_bg_enable_color__hover=\u00bbon\u00bb button_border_color__hover_enabled=\u00bbon|desktop\u00bb button_border_color__hover=\u00bbrgba(165,165,165,0.09)\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#144f9b\u00bb button_text_size=\u00bb16px\u00bb button_bg_enable_color=\u00bbon\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n\n","protected":false},"excerpt":{"rendered":"<p>10 consejos para programa gesti\u00f3n vulnerabilidades<\/p>\n","protected":false},"author":3,"featured_media":7558,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[37],"tags":[],"class_list":["post-7469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mdtel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 consejos para tu programa de gesti\u00f3n de vulnerabilidades | mdtel<\/title>\n<meta name=\"description\" content=\"10 consejos para elaborar tu programade gesti\u00f3n de vulnerabilidades\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades | mdtel\" \/>\n<meta property=\"og:description\" content=\"10 consejos para elaborar tu programade gesti\u00f3n de vulnerabilidades\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\" \/>\n<meta property=\"og:site_name\" content=\"mdtel\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T23:41:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-26T10:16:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Blanca Frances\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\"},\"author\":{\"name\":\"Blanca Frances\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/person\/0d8fac50fcac3ee856a9eda42a5305ce\"},\"headline\":\"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades\",\"datePublished\":\"2022-11-17T23:41:08+00:00\",\"dateModified\":\"2024-02-26T10:16:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\"},\"wordCount\":699,\"publisher\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png\",\"articleSection\":[\"mdtel\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\",\"url\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\",\"name\":\"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades | mdtel\",\"isPartOf\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png\",\"datePublished\":\"2022-11-17T23:41:08+00:00\",\"dateModified\":\"2024-02-26T10:16:02+00:00\",\"description\":\"10 consejos para elaborar tu programade gesti\u00f3n de vulnerabilidades\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage\",\"url\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png\",\"contentUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png\",\"width\":700,\"height\":400,\"caption\":\"mdtel-blog-noticias-tenable\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#website\",\"url\":\"https:\/\/www.mdtel.es\/tech\/\",\"name\":\"mdtel\",\"description\":\"Telecomunicaciones para empresas\",\"publisher\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\"},\"alternateName\":\"Telecomunicaciones para empresas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mdtel.es\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#organization\",\"name\":\"mdtel\",\"alternateName\":\"Telecomunicaciones para empresas\",\"url\":\"https:\/\/www.mdtel.es\/tech\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png\",\"contentUrl\":\"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png\",\"width\":177,\"height\":83,\"caption\":\"mdtel\"},\"image\":{\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/es.linkedin.com\/company\/mdtelsa\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/person\/0d8fac50fcac3ee856a9eda42a5305ce\",\"name\":\"Blanca Frances\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.mdtel.es\/tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/772853cb977512277f230bd4a5069a601586bcc34bf8bd09edb240a509dd3138?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/772853cb977512277f230bd4a5069a601586bcc34bf8bd09edb240a509dd3138?s=96&d=mm&r=g\",\"caption\":\"Blanca Frances\"},\"url\":\"https:\/\/www.mdtel.es\/tech\/author\/blanca-frances\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades | mdtel","description":"10 consejos para elaborar tu programade gesti\u00f3n de vulnerabilidades","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/","og_locale":"es_ES","og_type":"article","og_title":"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades | mdtel","og_description":"10 consejos para elaborar tu programade gesti\u00f3n de vulnerabilidades","og_url":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/","og_site_name":"mdtel","article_published_time":"2022-11-17T23:41:08+00:00","article_modified_time":"2024-02-26T10:16:02+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png","type":"image\/png"}],"author":"Blanca Frances","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":false,"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#article","isPartOf":{"@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/"},"author":{"name":"Blanca Frances","@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/person\/0d8fac50fcac3ee856a9eda42a5305ce"},"headline":"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades","datePublished":"2022-11-17T23:41:08+00:00","dateModified":"2024-02-26T10:16:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/"},"wordCount":699,"publisher":{"@id":"https:\/\/www.mdtel.es\/tech\/#organization"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png","articleSection":["mdtel"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/","url":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/","name":"10 consejos para tu programa de gesti\u00f3n de vulnerabilidades | mdtel","isPartOf":{"@id":"https:\/\/www.mdtel.es\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png","datePublished":"2022-11-17T23:41:08+00:00","dateModified":"2024-02-26T10:16:02+00:00","description":"10 consejos para elaborar tu programade gesti\u00f3n de vulnerabilidades","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/10-consejos-para-elaborar-tu-programa-de-gestion-de-vulnerabilidades\/#primaryimage","url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png","contentUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/portada-10-cosas.png","width":700,"height":400,"caption":"mdtel-blog-noticias-tenable"},{"@type":"WebSite","@id":"https:\/\/www.mdtel.es\/tech\/#website","url":"https:\/\/www.mdtel.es\/tech\/","name":"mdtel","description":"Telecomunicaciones para empresas","publisher":{"@id":"https:\/\/www.mdtel.es\/tech\/#organization"},"alternateName":"Telecomunicaciones para empresas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mdtel.es\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.mdtel.es\/tech\/#organization","name":"mdtel","alternateName":"Telecomunicaciones para empresas","url":"https:\/\/www.mdtel.es\/tech\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/","url":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png","contentUrl":"https:\/\/www.mdtel.es\/tech\/wp-content\/uploads\/2022\/11\/logo-mdtel.png","width":177,"height":83,"caption":"mdtel"},"image":{"@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/es.linkedin.com\/company\/mdtelsa"]},{"@type":"Person","@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/person\/0d8fac50fcac3ee856a9eda42a5305ce","name":"Blanca Frances","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.mdtel.es\/tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/772853cb977512277f230bd4a5069a601586bcc34bf8bd09edb240a509dd3138?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/772853cb977512277f230bd4a5069a601586bcc34bf8bd09edb240a509dd3138?s=96&d=mm&r=g","caption":"Blanca Frances"},"url":"https:\/\/www.mdtel.es\/tech\/author\/blanca-frances\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/posts\/7469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/comments?post=7469"}],"version-history":[{"count":10,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/posts\/7469\/revisions"}],"predecessor-version":[{"id":9110,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/posts\/7469\/revisions\/9110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/media\/7558"}],"wp:attachment":[{"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/media?parent=7469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/categories?post=7469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mdtel.es\/tech\/wp-json\/wp\/v2\/tags?post=7469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}