{"id":589,"date":"2021-06-21T19:56:53","date_gmt":"2021-06-22T00:56:53","guid":{"rendered":"https:\/\/wordpress-608669-1971739.cloudwaysapps.com\/?page_id=589"},"modified":"2022-09-30T16:59:20","modified_gmt":"2022-09-30T21:59:20","slug":"cyber","status":"publish","type":"page","link":"https:\/\/grupokriterion.com\/en\/cyber\/","title":{"rendered":"<p>Cyber<\/p>"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"589\" class=\"elementor elementor-589\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7zqmfjg elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7zqmfjg\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1106e9c\" data-id=\"1106e9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6644c3b elementor-widget elementor-widget-heading\" data-id=\"6644c3b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CIBERSEGURIDAD<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b26247c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b26247c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e0e35fa\" data-id=\"e0e35fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bbbc4fc elementor-widget elementor-widget-image\" data-id=\"bbbc4fc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"441\" src=\"https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c1.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c1.png 999w, https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c1-300x132.png 300w, https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c1-768x339.png 768w, https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c1-18x8.png 18w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3d623be\" data-id=\"3d623be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-301d302 elementor-widget elementor-widget-text-editor\" data-id=\"301d302\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We have the best software and hardware technology to protect your entity of any type of electronic attack, in the same way we offer services for the protection of information, to avoid any kind of cyber attack that may affect the integrity of the entity. Including all forms of attack by rasomware, malware, adware and phishing.<\/p><p>So we have the possibility of providing the best cybersecurity market, covering all fronts in the technology, as what they are:<\/p><ul><li>Hardware security<\/li><li>Software security<\/li><li>Network security<\/li><li>Physical and logical security<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-809ab82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"809ab82\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1084e4d\" data-id=\"1084e4d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f48aff0 elementor-widget elementor-widget-text-editor\" data-id=\"f48aff0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Using a diagnostic applied, we perform the analysis process of the entity to determine the best approach cyber security as required by each of the customers, in the same way, at the time of the execution of this process is in constant evaluation to be able to update and maintain protected the institution of new threats, technologies.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-211dd83\" data-id=\"211dd83\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e25661 elementor-widget elementor-widget-image\" data-id=\"5e25661\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"419\" src=\"https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c2.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c2.png 943w, https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c2-300x133.png 300w, https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c2-768x341.png 768w, https:\/\/grupokriterion.com\/wp-content\/uploads\/2022\/06\/c2-18x8.png 18w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>CIBERSEGURIDAD Contamos con la mejor tecnolog&iacute;a de software y hardware para proteger su entidad de cualquier tipo de ataque electr&oacute;nico, del mismo modo ofrecemos servicios para la protecci&oacute;n de informaci&oacute;n, evitar cualquier tipo de ataque cibern&eacute;tico que afecte la integridad de la entidad. Incluyendo todo tipo de ataque mediante rasomware, malware, adware y phishing. De &hellip;<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/grupokriterion.com\/en\/cyber\/\"> <span class=\"screen-reader-text\">Cyber<\/span> Read More &raquo;<\/a><\/p><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-589","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/pages\/589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/comments?post=589"}],"version-history":[{"count":34,"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/pages\/589\/revisions"}],"predecessor-version":[{"id":1761,"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/pages\/589\/revisions\/1761"}],"wp:attachment":[{"href":"https:\/\/grupokriterion.com\/en\/wp-json\/wp\/v2\/media?parent=589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}