{"id":25844469,"date":"2024-02-02T11:59:28","date_gmt":"2024-02-02T10:59:28","guid":{"rendered":"https:\/\/ack3.eu\/servicios\/ciberseguridad\/"},"modified":"2025-05-13T12:12:44","modified_gmt":"2025-05-13T10:12:44","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/ack3.eu\/es\/servicios\/ciberseguridad\/","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#000000&#8243; background_pattern_repeat_origin=\u00bbcenter\u00bb custom_padding=\u00bb13px||13px||true|false\u00bb saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bb32edda46-f9f8-4bcc-acb6-81abff8182ae\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb4px||4px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.20.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][dipi_breadcrumbs bc_home_text=\u00bbHome\u00bb bc_home_url=\u00bb\/\u00bb bc_items_alignment=\u00bbdipi-bc-left\u00bb bc_item_padding=\u00bb|10px||10px|false|true\u00bb bc_active_item_padding=\u00bb|20px||10px|true|false\u00bb _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb active_text_color=\u00bb#BADFF7&#8243; global_colors_info=\u00bb{}\u00bb][\/dipi_breadcrumbs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb module_alignment=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/ack3.eu\/wp-content\/uploads\/2024\/01\/ICONOS-SERVICIOS-2.jpg\u00bb title_text=\u00bbICONOS-SERVICIOS-2&#8243; align=\u00bbcenter\u00bb _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb10&#8243; max_width=\u00bb8%\u00bb max_width_tablet=\u00bb17%\u00bb max_width_phone=\u00bb25%\u00bb max_width_last_edited=\u00bbon|phone\u00bb custom_margin_tablet=\u00bb-158px||||false|false\u00bb custom_margin_phone=\u00bb-140px||||false|false\u00bb custom_margin_last_edited=\u00bboff|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.27.2&#8243; _module_preset=\u00bb13ddcc34-f131-47ca-8026-edc37a2f8af8&#8243; max_width=\u00bb70%\u00bb max_width_tablet=\u00bb70%\u00bb max_width_phone=\u00bb70%\u00bb max_width_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb||||false|false\u00bb header_font_size_tablet=\u00bb\u00bb header_font_size_phone=\u00bb24px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1 style=\"text-align: center;\">Ciberseguridad<\/h1>\n<p style=\"text-align: center;\">El servicio de Ciberseguridad de ACK3 se destaca por ofrecer un enfoque integral impulsado por la inteligencia. Va m\u00e1s all\u00e1 de las medidas de protecci\u00f3n est\u00e1ndar, integrando inteligencia avanzada sobre amenazas y evaluaci\u00f3n proactiva de riesgos. Esta <strong>estrategia progresista permite a las empresas anticipar y neutralizar eficazmente las amenazas cibern\u00e9ticas emergentes<\/strong>.<\/p>\n<p style=\"text-align: center;\">Los programas de formaci\u00f3n personalizados refuerzan a\u00fan m\u00e1s esto, cultivando una mentalidad de seguridad robusta entre los empleados. El compromiso de ACK3 con la evoluci\u00f3n junto con el panorama de amenazas cibern\u00e9ticas proporciona una protecci\u00f3n distinta y duradera para los clientes.<\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<h2>\u00bfQu\u00e9 es la ciberseguridad?<\/h2>\n<p><strong>La ciberseguridad es la pr\u00e1ctica de proteger sistemas, redes y datos de ataques digitales, accesos no autorizados y da\u00f1os. En un mundo cada vez m\u00e1s interconectado, salvaguardar informaci\u00f3n sensible y mantener la integridad de los activos digitales es fundamental para organizaciones de todos los tama\u00f1os. Esto implica implementar una estrategia integral que incluya evaluaci\u00f3n de riesgos, detecci\u00f3n de amenazas, respuesta a incidentes y medidas de seguridad continuas. Al priorizar la ciberseguridad, las empresas pueden mitigar riesgos, garantizar el cumplimiento de regulaciones y generar confianza con clientes y partes interesadas, todo mientras fomentan un entorno digital seguro que apoya la innovaci\u00f3n y el crecimiento.<\/strong><\/p>\n<\/blockquote>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/ack3.eu\/wp-content\/uploads\/2024\/02\/Cybersecurity-2.webp\u00bb title_text=\u00bbCiberseguridad\u00bb _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb90%\u00bb max_width_tablet=\u00bb100%\u00bb max_width_phone=\u00bb100%\u00bb max_width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_divider divider_weight=\u00bb12px\u00bb _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0px||0px||true|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#BADFF7&#8243; text_orientation=\u00bbcenter\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb-13px||||false|true\u00bb custom_padding=\u00bb8px|25px|0px|25px|false|true\u00bb custom_css_main_element=\u00bbwidth: fit-content;||margin-left:auto;||margin-right:auto;\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h5>Servicios espec\u00edficos<\/h5>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbPruebas de Penetraci\u00f3n (PenTesting)\u00bb image=\u00bbhttps:\/\/ack3.eu\/wp-content\/uploads\/2024\/02\/Pentesting-2.webp\u00bb _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||20px||false|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Los servicios de PenTesting profundizan en su red para descubrir vulnerabilidades, utilizando t\u00e9cnicas de hacking \u00e9tico para evaluar los riesgos de seguridad, ofreciendo informes detallados y estrategias de remediaci\u00f3n para fortalecer su infraestructura digital contra amenazas cibern\u00e9ticas.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1ODQxNTc0In19@\u00bb button_text=\u00bbLeer m\u00e1s\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.24.0&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEquipo Rojo (Red Team)\u00bb image=\u00bbhttps:\/\/ack3.eu\/wp-content\/uploads\/2024\/02\/Red-Team-2.webp\u00bb _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb custom_margin=\u00bb||20px||false|false\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span>Los servicios del Equipo Rojo (Red Team) ofrecen un enfoque proactivo de la seguridad, empleando simulaciones de ataques avanzados para probar la efectividad de las defensas organizacionales, destacando vulnerabilidades y proporcionando conocimientos accionables para robustecer la seguridad.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1ODQxNTgwIn19@\u00bb button_text=\u00bbLeer m\u00e1s\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.24.0&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Otros Servicios<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEvaluaciones de seguridad de redes\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xf058;||fa||900&#8243; image_icon_width=\u00bb100px\u00bb image_icon_width_tablet=\u00bb90px\u00bb image_icon_width_phone=\u00bb80px\u00bb image_icon_width_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Evaluaci\u00f3n de la seguridad de la red para identificar vulnerabilidades y mejorar la protecci\u00f3n.<\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1ODQxNTc0In19@\u00bb button_text=\u00bbLeer m\u00e1s\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.24.0&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbRespuesta y recuperaci\u00f3n de incidentes\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xf058;||fa||900&#8243; image_icon_width=\u00bb100px\u00bb image_icon_width_tablet=\u00bb90px\u00bb image_icon_width_phone=\u00bb80px\u00bb image_icon_width_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Acciones r\u00e1pidas y planes para abordar y recuperarse de incidentes de seguridad.<\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1ODU0MDQ4In19@\u00bb button_text=\u00bbLeer m\u00e1s\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbServicios de inteligencia de amenazas\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xf058;||fa||900&#8243; image_icon_width=\u00bb100px\u00bb image_icon_width_tablet=\u00bb90px\u00bb image_icon_width_phone=\u00bb80px\u00bb image_icon_width_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Recolecci\u00f3n y an\u00e1lisis de datos de amenazas para mitigar proactivamente los riesgos de seguridad.<\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1ODU0MDU4In19@\u00bb button_text=\u00bbLeer m\u00e1s\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbConcienciaci\u00f3n y entrenamiento en seguridad\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xf058;||fa||900&#8243; image_icon_width=\u00bb100px\u00bb image_icon_width_tablet=\u00bb90px\u00bb image_icon_width_phone=\u00bb80px\u00bb image_icon_width_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Programas educativos para mejorar la conciencia y habilidades de seguridad de los empleados.<\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1ODU0MDY3In19@\u00bb button_text=\u00bbLeer m\u00e1s\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.27.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider _builder_version=\u00bb4.27.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_module=\u00bb25840410&#8243; saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbe9776427-b859-4288-b0a2-c7103567bb8c\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: center;\">Cont\u00e1ctanos<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.24.0&#8243; _dynamic_attributes=\u00bbcontent\u00bb _module_preset=\u00bb13ddcc34-f131-47ca-8026-edc37a2f8af8&#8243; header_2_text_align=\u00bbcenter\u00bb custom_margin=\u00bb||5px||false|false\u00bb global_colors_info=\u00bb{}\u00bb]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90aXRsZSIsInNldHRpbmdzIjp7ImJlZm9yZSI6IjxoMj4gXHUwMGJmRXN0XHUwMGUxcyBpbnRlcmVzYWRvIGVuIGxvcyBzZXJ2aWNpb3MgZGUgIiwiYWZ0ZXIiOiIgZGUgQUNLMz88L2gyPiJ9fQ==@[\/et_pb_text][et_pb_text _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bb13ddcc34-f131-47ca-8026-edc37a2f8af8&#8243; global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: center;\">Ponte en contacto con nosotros completando el siguiente formulario:<\/p>\n<p>[\/et_pb_text][dipi_gravity_forms_styler gf_form_id=\u00bb1&#8243; form_title=\u00bbhide\u00bb _builder_version=\u00bb4.24.0&#8243; _module_preset=\u00bbdefault\u00bb form_title_font_size=\u00bb0px\u00bb field_label_font=\u00bbTrade Gothic LT Bold Extended||||||||\u00bb field_label_font_size=\u00bb15px\u00bb required_field_indicator_font_size=\u00bb15px\u00bb field_description_font_size=\u00bb16px\u00bb checkbox_radio_label_font_size=\u00bb17px\u00bb custom_all=\u00bbon\u00bb all_text_size=\u00bb17px\u00bb all_bg_color=\u00bb#000000&#8243; all_font=\u00bb|600|||||||\u00bb all_use_icon=\u00bboff\u00bb max_width=\u00bb78%\u00bb max_width_tablet=\u00bb100%\u00bb max_width_phone=\u00bb100%\u00bb max_width_last_edited=\u00bbon|desktop\u00bb module_alignment=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb all_bg_color__hover_enabled=\u00bbon|hover\u00bb all_bg_color__hover=\u00bb#535353&#8243; all_bg_enable_color__hover=\u00bbon\u00bb][\/dipi_gravity_forms_styler][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protege tu organizaci\u00f3n con una ciberseguridad robusta: salvaguarda datos, mitiga riesgos y asegura el cumplimiento en un mundo digital.<\/p>\n","protected":false},"author":1,"featured_media":25843024,"parent":25843523,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"dipi_cpt_category":[],"class_list":["post-25844469","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/pages\/25844469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/comments?post=25844469"}],"version-history":[{"count":0,"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/pages\/25844469\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/pages\/25843523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/media\/25843024"}],"wp:attachment":[{"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/media?parent=25844469"}],"wp:term":[{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/ack3.eu\/es\/wp-json\/wp\/v2\/dipi_cpt_category?post=25844469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}