{"id":14,"date":"2024-05-01T19:40:40","date_gmt":"2024-05-01T19:40:40","guid":{"rendered":"http:\/\/ciberbrok.com\/?page_id=14"},"modified":"2025-01-17T11:46:36","modified_gmt":"2025-01-17T11:46:36","slug":"inicio","status":"publish","type":"page","link":"https:\/\/ciberbrok.com\/en\/","title":{"rendered":"Inicio"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbgcid-primary-color\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22background_color%22%93}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb-30px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb||30px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|700|||||||\u00bb header_font_size=\u00bb42px\u00bb custom_margin=\u00bb80px||||false|false\u00bb custom_margin_tablet=\u00bb80px||||false|false\u00bb custom_margin_phone=\u00bb80px||||false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb hover_enabled=\u00bb0&#8243; header_font_size_tablet=\u00bb42px\u00bb header_font_size_phone=\u00bb37px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h1>Seguro de Ciberriesgos<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_text_color=\u00bb#FFFFFF\u00bb text_font_size=\u00bb20px\u00bb custom_margin=\u00bb-20px||||false|false\u00bb custom_margin_tablet=\u00bb-20px||||false|false\u00bb custom_margin_phone=\u00bb-20px||||false|false\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb hover_enabled=\u00bb0&#8243; text_font_size_tablet=\u00bb20px\u00bb text_font_size_phone=\u00bb20px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243; header_2_font=\u00bb|300|||||||\u00bb]<\/p>\n<h2>Contrata ahora el seguro de Ciberriesgos m\u00e1s completo y comienza a proteger tu empresa desde hoy mismo<\/h2>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bbhttps:\/\/ciberbrok.com\/contacto\u00bb button_text=\u00bbBlindar ahora\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_icon=\u00bb&#xe0f6;||divi||400&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/Especialistas_ciberriesgos_2.png\u00bb title_text=\u00bbEspecialistas_ciberriesgos_2&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb transform_scale=\u00bb162%|162%\u00bb transform_scale_tablet=\u00bb162%|162%\u00bb transform_scale_phone=\u00bb210%|210%\u00bb transform_scale_last_edited=\u00bbon|phone\u00bb transform_translate=\u00bb7px|62px\u00bb transform_translate_tablet=\u00bb7px|62px\u00bb transform_translate_phone=\u00bb8px|47px\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_rotate_tablet=\u00bb\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|phone\u00bb max_height=\u00bb1000px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; disabled_on=\u00bbon|off|off\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#e7efed\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb30px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEl 53% de las empresas espa\u00f1olas recibieron un ciberataque en 2023&#8243; use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb||20px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEl coste medio de un ciberataque en Espa\u00f1a es de 50.000\u20ac\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEn 2023 aumentaron los ciberataques %22bajos%22 un 380% respecto al 2022.\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEl 60% de las empresas cierran en 6 meses tras el ciberataque\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bbhttps:\/\/ciberbrok.com\/contacto\u00bb button_text=\u00bbNo quiero correr este riesgo\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; disabled_on=\u00bboff|on|on\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#e7efed\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb30px||||false|false\u00bb custom_margin_tablet=\u00bb30px||||false|false\u00bb custom_margin_phone=\u00bb100px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEl 53% de las empresas espa\u00f1olas recibieron un ciberataque en 2023&#8243; use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb||20px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEl coste medio de un ciberataque en Espa\u00f1a es de 50.000\u20ac\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEn 2023 aumentaron los ciberataques %22bajos%22 un 380% respecto al 2022.\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbEl 60% de las empresas cierran en 6 meses tras el ciberataque\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#xe000;||divi||400&#8243; image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bbgcid-primary-color\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22header_text_color%22,%22header_text_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbgcid-primary-color\u00bb custom_padding=\u00bb||107px|||\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22background_color%22%93}\u00bb][et_pb_row _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bb|700|||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb text_font_size=\u00bb40px\u00bb text_line_height=\u00bb1em\u00bb text_orientation=\u00bbcenter\u00bb text_font_size_tablet=\u00bb40px\u00bb text_font_size_phone=\u00bb40px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Nuestra <span style=\"color: #38dece;\">especializaci\u00f3n<\/span> es tu principal beneficio<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_4,1_4,1_4,1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb60px|auto||auto||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbTranquilidad de trabajar con especialistas en Ciberriesgos\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#x7e;||divi||400&#8243; icon_color=\u00bbgcid-secondary-color\u00bb image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbTu empresa protegida por las aseguradoras m\u00e1s TOP\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#x7e;||divi||400&#8243; icon_color=\u00bbgcid-secondary-color\u00bb image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbPrevenci\u00f3n contra ataques gracias a nuestra ACADEMY\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#x7e;||divi||400&#8243; icon_color=\u00bbgcid-secondary-color\u00bb image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbTrabajamos para ti,  no para las aseguradoras\u00bb use_icon=\u00bbon\u00bb font_icon=\u00bb&#x7e;||divi||400&#8243; icon_color=\u00bbgcid-secondary-color\u00bb image_icon_width=\u00bb65px\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|600|||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb22px\u00bb body_text_color=\u00bb#FFFFFF\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb54px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bbhttps:\/\/ciberbrok.com\/contacto\u00bb button_text=\u00bbQuiero hablar con vosotros\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; disabled_on=\u00bbon|off|off\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|700|||||||\u00bb header_text_color=\u00bbgcid-body-color\u00bb header_font_size=\u00bb34px\u00bb custom_margin=\u00bb50px||24px|0px|false|false\u00bb custom_margin_tablet=\u00bb50px||24px|0px|false|false\u00bb custom_margin_phone=\u00bb0px||15px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_font_size_tablet=\u00bb34px\u00bb header_font_size_phone=\u00bb30px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-body-color%22:%91%22header_text_color%22%93}\u00bb]<\/p>\n<h1>\u00bfTienes una pyme en Espa\u00f1a? <span style=\"color: #38dece;\">Estas son las principales amenazas a<\/span> las que se enfrenta tu empresa<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb text_font_size=\u00bb16px\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb16px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Son 6 las principales amenazas que<strong><a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener\"> INCIBE<\/a><\/strong> destaca como las principales que sufren a d\u00eda de hoy las pymes espa\u00f1olas. Conocerlas es la primera herramienta para comenzar a poner la barrera que necesitas frente a ciberdelincuentes. \u00bfConoces estas amenazas?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bbhttps:\/\/ciberbrok.com\/contacto\u00bb button_text=\u00bbReserva tu evaluaci\u00f3n gratuita\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_toggle title=\u00bbPhishing\/suplantaci\u00f3n de identidad\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>El\u00a0<\/span><em>phishing<\/em><span> es una t\u00e9cnica mediante la cual los atacantes se hacen pasar por entidades leg\u00edtimas para enga\u00f1ar a las v\u00edctimas y obtener informaci\u00f3n confidencial, como nombres de usuario, contrase\u00f1as y datos bancarios. Generalmente, esto se hace a trav\u00e9s de correos electr\u00f3nicos, mensajes de texto o sitios web falsificados que parecen leg\u00edtimos. <a href=\"https:\/\/www.incibe.es\/empresas\/tematicas\/phishing\">Visita el siguiente enlace<\/a>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbRansomware\/secuestro virtual de informaci\u00f3n\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>El\u00a0<\/span><em>ransomware<\/em><span>\u00a0es un tipo de software malicioso que cifra los archivos de un dispositivo, impidiendo al usuario acceder a ellos. En este tipo de ataque los ciberdelincuentes demandan a posteriori un rescate a cambio de la clave de descifrado.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/aprendeciberseguridad\/ransomware\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbAtaque a la cadena de suministro\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Los ataques a la cadena de suministro son t\u00e1cticas maliciosas dirigidas a infiltrarse en una organizaci\u00f3n a trav\u00e9s de sus proveedores o socios comerciales. Estos ataques explotan las relaciones de confianza entre empresas y sus proveedores, lo cual puede derivar en un robo de datos, la interrupci\u00f3n de las operaciones, etc.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/relacion-proveedores.pdf\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbFalta de formaci\u00f3n\/pol\u00edticas de seguridad\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Tal y como se ha desarrollado a lo largo de este art\u00edculo de blog, se trata de uno de los elementos primordiales para mejorar la ciberseguridad de las pymes. La formaci\u00f3n educa a los empleados sobre las mejores pr\u00e1cticas de seguridad, c\u00f3mo reconocer y responder a amenazas cibern\u00e9ticas, y la importancia de seguir protocolos de seguridad. Las pol\u00edticas de seguridad, por su parte, proporcionan un marco claro y directrices sobre c\u00f3mo manejar y proteger la informaci\u00f3n y los activos de la empresa.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/concienciacion-y-formacion.pdf\">Visita el siguiente enlace<span>\u00a0<\/span><\/a><span>para conocer m\u00e1s acerca de estos recursos.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbContrase\u00f1as d\u00e9biles\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Las contrase\u00f1as d\u00e9biles son aquellas que son f\u00e1ciles de adivinar o descifrar debido a su simplicidad o previsibilidad. Estas contrase\u00f1as, que carecen de variedad en caracteres (como may\u00fasculas, min\u00fasculas, n\u00fameros y s\u00edmbolos) y a menudo utilizan palabras comunes, fechas de nacimiento o secuencias simples, como \u201c123456\u201d, representan un riesgo de seguridad significativo, ya que permiten a los atacantes acceder m\u00e1s f\u00e1cilmente a cuentas y sistemas protegidos.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/contrasenas.pdf\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbActualizaciones de seguridad.\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Las actualizaciones de seguridad son un elemento cr\u00edtico, ya que corrigen vulnerabilidades y fallos de\u00a0<\/span><em>software<\/em><span>\u00a0que pueden ser explotados por atacantes para realizar actividades maliciosas. Mantener el\u00a0<\/span><em>software<\/em><span>\u00a0actualizado es una medida de prevenci\u00f3n clave para proteger los sistemas y los datos.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/actualizaciones-software.pdf\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; disabled_on=\u00bboff|on|on\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bb|700|||||||\u00bb header_text_color=\u00bbgcid-body-color\u00bb header_font_size=\u00bb34px\u00bb custom_margin=\u00bb50px||24px|0px|false|false\u00bb custom_margin_tablet=\u00bb50px||24px|0px|false|false\u00bb custom_margin_phone=\u00bb0px||15px||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb header_font_size_tablet=\u00bb34px\u00bb header_font_size_phone=\u00bb30px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-body-color%22:%91%22header_text_color%22%93}\u00bb]<\/p>\n<h1>\u00bfTienes una pyme en Espa\u00f1a? <span style=\"color: #38dece;\">Estas son las principales amenazas a<\/span> las que se enfrenta tu empresa<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb text_font_size=\u00bb16px\u00bb text_font_size_tablet=\u00bb16px\u00bb text_font_size_phone=\u00bb16px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Son 6 las principales amenazas que<strong><a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener\"> INCIBE<\/a><\/strong> destaca como las principales que sufren a d\u00eda de hoy las pymes espa\u00f1olas. Conocerlas es la primera herramienta para comenzar a poner la barrera que necesitas frente a ciberdelincuentes. \u00bfConoces estas amenazas?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_toggle title=\u00bbPhishing\/suplantaci\u00f3n de identidad\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>El\u00a0<\/span><em>phishing<\/em><span> es una t\u00e9cnica mediante la cual los atacantes se hacen pasar por entidades leg\u00edtimas para enga\u00f1ar a las v\u00edctimas y obtener informaci\u00f3n confidencial, como nombres de usuario, contrase\u00f1as y datos bancarios. Generalmente, esto se hace a trav\u00e9s de correos electr\u00f3nicos, mensajes de texto o sitios web falsificados que parecen leg\u00edtimos. <a href=\"https:\/\/www.incibe.es\/empresas\/tematicas\/phishing\">Visita el siguiente enlace<\/a>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbRansomware\/secuestro virtual de informaci\u00f3n\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>El\u00a0<\/span><em>ransomware<\/em><span>\u00a0es un tipo de software malicioso que cifra los archivos de un dispositivo, impidiendo al usuario acceder a ellos. En este tipo de ataque los ciberdelincuentes demandan a posteriori un rescate a cambio de la clave de descifrado.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/aprendeciberseguridad\/ransomware\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbAtaque a la cadena de suministro\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Los ataques a la cadena de suministro son t\u00e1cticas maliciosas dirigidas a infiltrarse en una organizaci\u00f3n a trav\u00e9s de sus proveedores o socios comerciales. Estos ataques explotan las relaciones de confianza entre empresas y sus proveedores, lo cual puede derivar en un robo de datos, la interrupci\u00f3n de las operaciones, etc.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/relacion-proveedores.pdf\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbFalta de formaci\u00f3n\/pol\u00edticas de seguridad\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Tal y como se ha desarrollado a lo largo de este art\u00edculo de blog, se trata de uno de los elementos primordiales para mejorar la ciberseguridad de las pymes. La formaci\u00f3n educa a los empleados sobre las mejores pr\u00e1cticas de seguridad, c\u00f3mo reconocer y responder a amenazas cibern\u00e9ticas, y la importancia de seguir protocolos de seguridad. Las pol\u00edticas de seguridad, por su parte, proporcionan un marco claro y directrices sobre c\u00f3mo manejar y proteger la informaci\u00f3n y los activos de la empresa.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/concienciacion-y-formacion.pdf\">Visita el siguiente enlace<span>\u00a0<\/span><\/a><span>para conocer m\u00e1s acerca de estos recursos.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbContrase\u00f1as d\u00e9biles\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Las contrase\u00f1as d\u00e9biles son aquellas que son f\u00e1ciles de adivinar o descifrar debido a su simplicidad o previsibilidad. Estas contrase\u00f1as, que carecen de variedad en caracteres (como may\u00fasculas, min\u00fasculas, n\u00fameros y s\u00edmbolos) y a menudo utilizan palabras comunes, fechas de nacimiento o secuencias simples, como \u201c123456\u201d, representan un riesgo de seguridad significativo, ya que permiten a los atacantes acceder m\u00e1s f\u00e1cilmente a cuentas y sistemas protegidos.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/contrasenas.pdf\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_toggle title=\u00bbActualizaciones de seguridad.\u00bb open_toggle_text_color=\u00bbgcid-primary-color\u00bb closed_toggle_text_color=\u00bbgcid-primary-color\u00bb icon_color=\u00bbgcid-secondary-color\u00bb _builder_version=\u00bb4.25.0&#8243; _module_preset=\u00bbdefault\u00bb title_text_color=\u00bb#fe7183&#8243; title_font=\u00bb|600|||||||\u00bb custom_margin=\u00bb||17px|||\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_color_all=\u00bb#3546a6&#8243; global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22closed_toggle_text_color%22,%22open_toggle_text_color%22,%22closed_toggle_text_color%22,%22open_toggle_text_color%22%93,%22gcid-secondary-color%22:%91%22icon_color%22%93}\u00bb]<\/p>\n<p><span>Las actualizaciones de seguridad son un elemento cr\u00edtico, ya que corrigen vulnerabilidades y fallos de\u00a0<\/span><em>software<\/em><span>\u00a0que pueden ser explotados por atacantes para realizar actividades maliciosas. Mantener el\u00a0<\/span><em>software<\/em><span>\u00a0actualizado es una medida de prevenci\u00f3n clave para proteger los sistemas y los datos.\u00a0<\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/politicas\/documentos\/actualizaciones-software.pdf\">Visita el siguiente enlace<\/a><span>\u00a0para conocer mejor esta amenaza.<\/span><\/p>\n<p>[\/et_pb_toggle][et_pb_button button_url=\u00bbhttps:\/\/ciberbrok.com\/contacto\u00bb button_text=\u00bbReserva tu evaluaci\u00f3n gratuita\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb custom_margin=\u00bb45px||||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb button_text_size_tablet=\u00bb\u00bb button_text_size_phone=\u00bb17px\u00bb button_text_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#e7efed\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_4,1_2,1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_contact_form email=\u00bbhola@ciberbrok.com\u00bb title=\u00bbContacta ahora con nosotros para iniciar la protecci\u00f3n de tu empresa\u00bb custom_message=\u00bbNombre: %%Name%%||et_pb_line_break_holder||Email: %%Email%%||et_pb_line_break_holder||Nombre Empresa:%%Nombre_Empresa%%||et_pb_line_break_holder||Tipo de Empresa: %%Tipo%%||et_pb_line_break_holder||||et_pb_line_break_holder||Te env\u00eda este mensaje desde el formulario de contacto de Cibrebrok: %%Message%%\u00bb success_message=\u00bbGracias por ponerte en contacto con nosotros. Te responderemos lo antes posible :)\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb _unique_id=\u00bb4b95a71c-a869-4c7c-93f1-a8775fd02823&#8243; form_field_background_color=\u00bb#e7efed\u00bb form_field_text_color=\u00bbgcid-primary-color\u00bb title_font=\u00bb|700|||||||\u00bb title_text_align=\u00bbcenter\u00bb title_text_color=\u00bbgcid-primary-color\u00bb title_font_size=\u00bb30px\u00bb text_orientation=\u00bbleft\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb border_width_all=\u00bb1px\u00bb global_colors_info=\u00bb{%22gcid-primary-color%22:%91%22form_field_text_color%22,%22title_text_color%22%93}\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb4.16&#8243; global_colors_info=\u00bb{}\u00bb button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbTipo\u00bb field_title=\u00bbTu empresa es\u00bb field_type=\u00bbselect\u00bb select_options=\u00bb%91{%22value%22:%22Aut\u00f3nomo%22,%22checked%22:0,%22dragID%22:-1},{%22value%22:%22Pyme%22,%22checked%22:0,%22dragID%22:0},{%22value%22:%22Gran empresa%22,%22checked%22:0,%22dragID%22:1}%93&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbNombre_Empresa\u00bb field_title=\u00bbNombre de la empresa\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos lo que necesitas\u00bb field_type=\u00bbtext\u00bb required_mark=\u00bboff\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.25.2&#8243; global_colors_info=\u00bb{}\u00bb button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbP\u00f3litica_de_privacidad\u00bb field_title=\u00bbPol\u00edtica de privacidad y tratamiento de datos personales\u00bb field_type=\u00bbcheckbox\u00bb checkbox_options=\u00bb%91{%22value%22:%22He le\u00eddo y acepto la %22,%22checked%22:0,%22dragID%22:-1,%22link_url%22:%22https:\/\/ciberbrok.com\/politica-de-privacidad%22,%22link_text%22:%22Pol\u00edtica de privacidad%22},{%22value%22:%22Autorizo el tratamiento de mis datos para el env\u00edo de comunicaciones comerciales con fines promocionales.%22,%22checked%22:0,%22dragID%22:0,%22link_url%22:%22%22,%22link_text%22:%22%22}%93&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][et_pb_column type=\u00bb1_4&#8243; _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Seguro de CiberriesgosContrata ahora el seguro de Ciberriesgos m\u00e1s completo y comienza a proteger tu empresa desde hoy mismoNuestra especializaci\u00f3n es tu principal beneficio\u00bfTienes una pyme en Espa\u00f1a? Estas son las principales amenazas a las que se enfrenta tu empresaSon 6 las principales amenazas que INCIBE destaca como las principales que sufren a d\u00eda de [&hellip;]<\/p>","protected":false},"author":1,"featured_media":261,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-14","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Inicio - CIBERBROK | Seguros de Ciberriesgos<\/title>\n<meta name=\"description\" content=\"Blinda tu empresa contra ciberdelincuentes. Benef\u00edciate de las mejores soluciones aseguradoras para proteger tu empresa frente a ciberriesgos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ciberbrok.com\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIBERBROK | Especialistas en seguros de ciberriesgos\" \/>\n<meta property=\"og:description\" content=\"Blinda tu empresa contra ciberdelincuentes. Benef\u00edciate de las mejores soluciones aseguradoras para proteger tu empresa frente a ciberriesgos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ciberbrok.com\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"CIBERBROK | Seguros de Ciberriesgos\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T11:46:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2134\" \/>\n\t<meta property=\"og:image:height\" content=\"2134\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ciberbrok.com\/\",\"url\":\"https:\/\/ciberbrok.com\/\",\"name\":\"Inicio - CIBERBROK | Seguros de Ciberriesgos\",\"isPartOf\":{\"@id\":\"https:\/\/ciberbrok.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ciberbrok.com\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ciberbrok.com\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png\",\"datePublished\":\"2024-05-01T19:40:40+00:00\",\"dateModified\":\"2025-01-17T11:46:36+00:00\",\"description\":\"Blinda tu empresa contra ciberdelincuentes. Benef\u00edciate de las mejores soluciones aseguradoras para proteger tu empresa frente a ciberriesgos.\",\"breadcrumb\":{\"@id\":\"https:\/\/ciberbrok.com\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ciberbrok.com\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ciberbrok.com\/#primaryimage\",\"url\":\"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png\",\"contentUrl\":\"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png\",\"width\":2134,\"height\":2134},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ciberbrok.com\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ciberbrok.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inicio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ciberbrok.com\/#website\",\"url\":\"https:\/\/ciberbrok.com\/\",\"name\":\"ciberbrok\",\"description\":\"Expertos en Seguros de Ciberriesgos. Protege tu negocio frente a las perdidas producidas por un ataque inform\u00e1tico.\",\"publisher\":{\"@id\":\"https:\/\/ciberbrok.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ciberbrok.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ciberbrok.com\/#organization\",\"name\":\"ciberbrok\",\"url\":\"https:\/\/ciberbrok.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ciberbrok.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/logo_azul.png\",\"contentUrl\":\"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/logo_azul.png\",\"width\":2021,\"height\":459,\"caption\":\"ciberbrok\"},\"image\":{\"@id\":\"https:\/\/ciberbrok.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inicio - CIBERBROK | Seguros de Ciberriesgos","description":"Blinda tu empresa contra ciberdelincuentes. Benef\u00edciate de las mejores soluciones aseguradoras para proteger tu empresa frente a ciberriesgos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ciberbrok.com\/en\/","og_locale":"en_US","og_type":"article","og_title":"CIBERBROK | Especialistas en seguros de ciberriesgos","og_description":"Blinda tu empresa contra ciberdelincuentes. Benef\u00edciate de las mejores soluciones aseguradoras para proteger tu empresa frente a ciberriesgos.","og_url":"https:\/\/ciberbrok.com\/en\/","og_site_name":"CIBERBROK | Seguros de Ciberriesgos","article_modified_time":"2025-01-17T11:46:36+00:00","og_image":[{"width":2134,"height":2134,"url":"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ciberbrok.com\/","url":"https:\/\/ciberbrok.com\/","name":"Inicio - CIBERBROK | Seguros de Ciberriesgos","isPartOf":{"@id":"https:\/\/ciberbrok.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ciberbrok.com\/#primaryimage"},"image":{"@id":"https:\/\/ciberbrok.com\/#primaryimage"},"thumbnailUrl":"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png","datePublished":"2024-05-01T19:40:40+00:00","dateModified":"2025-01-17T11:46:36+00:00","description":"Blinda tu empresa contra ciberdelincuentes. Benef\u00edciate de las mejores soluciones aseguradoras para proteger tu empresa frente a ciberriesgos.","breadcrumb":{"@id":"https:\/\/ciberbrok.com\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ciberbrok.com\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ciberbrok.com\/#primaryimage","url":"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png","contentUrl":"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/CBK_80.png","width":2134,"height":2134},{"@type":"BreadcrumbList","@id":"https:\/\/ciberbrok.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ciberbrok.com\/"},{"@type":"ListItem","position":2,"name":"Inicio"}]},{"@type":"WebSite","@id":"https:\/\/ciberbrok.com\/#website","url":"https:\/\/ciberbrok.com\/","name":"ciberbrok","description":"Expertos en Seguros de Ciberriesgos. Protege tu negocio frente a las perdidas producidas por un ataque inform\u00e1tico.","publisher":{"@id":"https:\/\/ciberbrok.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ciberbrok.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ciberbrok.com\/#organization","name":"ciberbrok","url":"https:\/\/ciberbrok.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ciberbrok.com\/#\/schema\/logo\/image\/","url":"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/logo_azul.png","contentUrl":"https:\/\/ciberbrok.com\/wp-content\/uploads\/2024\/06\/logo_azul.png","width":2021,"height":459,"caption":"ciberbrok"},"image":{"@id":"https:\/\/ciberbrok.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":76,"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/pages\/14\/revisions\/345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/media\/261"}],"wp:attachment":[{"href":"https:\/\/ciberbrok.com\/en\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}