{"id":3618,"date":"2023-03-07T12:06:38","date_gmt":"2023-03-07T12:06:38","guid":{"rendered":"https:\/\/seifti.io\/servicios-de-consultoria-de-ciberseguridad\/"},"modified":"2024-03-13T12:47:07","modified_gmt":"2024-03-13T12:47:07","slug":"servicios-de-consultoria-de-ciberseguridad","status":"publish","type":"page","link":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/","title":{"rendered":"Servicios de consultor\u00eda de ciberseguridad"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_column_text]<\/p>\n<h2>\u00bfQu\u00e9 es un servicio de consultor\u00eda de ciberseguridad?<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][vc_column_text]Los servicios de consultor\u00eda de ciberseguridad son servicios profesionales que ayudan a las organizaciones a evaluar y mejorar su postura de ciberseguridad. Aproveche la experiencia de Seifti en ciberseguridad para ayudar a su organizaci\u00f3n a identificar y abordar vulnerabilidades en sus sistemas y procesos.[\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb]<a href=\"https:\/\/seifti.io\/es\/solicitud-de-reunion\/\" target=\"_self\"  class=\"qbutton  white\" style=\"\">Solicite una reuni\u00f3n<\/a>[\/vc_column][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb5\/12&#8243;][vc_single_image image=\u00bb896&#8243; img_size=\u00bbfull\u00bb qode_css_animation=\u00bb\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_right\u00bb css=\u00bb.vc_custom_1680616865381{background-image: url(https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/background-gris-elipsis.svg?id=1450) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcybersecurityRow\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner width=\u00bb1\/4&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">\u00bfCu\u00e1les son los ciberataques<br \/>\nm\u00e1s comunes?<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Hay muchos tipos diferentes de ataques cibern\u00e9ticos, pero algunos de los m\u00e1s comunes incluyen:<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb50px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img decoding=\"async\" width=\"75\" height=\"75\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-521.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"\">ATAQUES DE PHISHING<\/h4><p style=''>Estos son ataques que involucran el env\u00edo de correos electr\u00f3nicos falsos o la creaci\u00f3n de sitios web falsos que parecen leg\u00edtimos para enga\u00f1ar a las personas para que proporcionen informaci\u00f3n confidencial, como credenciales de inicio de sesi\u00f3n. o informaci\u00f3n financiera.<\/p><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img decoding=\"async\" width=\"75\" height=\"75\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-605.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"\">ATAQUES DE MALWARE<\/h4><p style=''>Estos ataques implican la instalaci\u00f3n de software malicioso en la computadora de la v\u00edctima, a menudo a trav\u00e9s de un ataque de phishing o mediante la explotaci\u00f3n de una vulnerabilidad en el sistema. El malware se puede usar para robar informaci\u00f3n, interrumpir el sistema o realizar otras acciones maliciosas.<\/p><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img decoding=\"async\" width=\"77\" height=\"75\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-607.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"\">ATAQUES DE DENEGACI\u00d3N DE SERVICIO (DoS)<\/h4><p style=''>estos ataques implican inundar un sitio web o una red con tr\u00e1fico para que no est\u00e9 disponible para los usuarios.<\/p><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_right\u00bb el_class=\u00bb4cols\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior4cols\u00bb width=\u00bb1\/4&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"75\" height=\"75\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-609.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"color: #efb850\">ATAQUES DE INYECCI\u00d3N SQL<\/h4><p style=''>Estos ataques consisten en inyectar c\u00f3digo malicioso en una base de datos a trav\u00e9s del campo de entrada de un sitio web, lo que permite al atacante acceder o modificar los datos almacenados en la base de datos.<\/p><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior4cols\u00bb width=\u00bb1\/4&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"90\" height=\"75\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-611.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"color: #efb850\">ATAQUES Man-in-the-middle<\/h4><p style=''>Estos ataques implican interceptar comunicaciones entre dos partes para robar informaci\u00f3n o alterar la comunicaci\u00f3n de alguna manera.<\/p><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior4cols\u00bb width=\u00bb1\/4&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"88\" height=\"76\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-625.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"color: #efb850\">ATAQUES DE RANSOMWARE<\/h4><p style=''>Estos ataques implican cifrar los datos de la v\u00edctima y exigir el pago a cambio de la clave de descifrado.<\/p><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior4cols\u00bb width=\u00bb1\/4&#8243;]<div class='q_icon_with_title   center with_custom_icon'><div class=\"icon_holder \" style=\" \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"76\" height=\"81\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-620.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><h4 class=\"icon_title\" style=\"color: #efb850\">ATAQUES DE CONTRASE\u00d1A<\/h4><p style=''>Estos ataques implican tratar de adivinar o descifrar una contrase\u00f1a para obtener acceso no autorizado a un sistema.<\/p><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb css=\u00bb.vc_custom_1677841826494{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">\u00bfC\u00f3mo ayudamos a las empresas con su estrategia de seguridad?<\/h2>\n<p>[\/vc_column_text][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner][vc_empty_space height=\u00bb50px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Nuestro equipo de expertos revisar\u00e1 lo siguiente con su empresa para ayudarlo a implementar su estrategia de seguridad:<\/p>\n<p>[\/vc_column_text][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb50px\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb10\/12&#8243;][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior2cols\u00bb width=\u00bb1\/2&#8243;]<div class='q_icon_with_title   left_from_title with_custom_icon'><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><div class=\"icon_title_holder\"><div class=\"icon_holder \" style=\"margin: 4%; \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"75\" height=\"74\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-622.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><h4 class=\"icon_title\" style=\"\">Las evaluaciones de riesgos ayudan a las organizaciones a identificar y evaluar posibles riesgos y vulnerabilidades de ciberseguridad.<\/h4><\/div><p style=''><\/p><\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior2cols\u00bb width=\u00bb1\/2&#8243;]<div class='q_icon_with_title   left_from_title with_custom_icon'><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><div class=\"icon_title_holder\"><div class=\"icon_holder \" style=\"margin: 4%; \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"75\" height=\"80\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-623.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><h4 class=\"icon_title\" style=\"\">Las auditor\u00edas de seguridad implican un examen exhaustivo de los sistemas y procesos de una organizaci\u00f3n para identificar cualquier debilidad o vulnerabilidad.<\/h4><\/div><p style=''><\/p><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb1\/12&#8243;][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb10\/12&#8243; el_class=\u00bbcolumnaInterior3cols\u00bb][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb1\/12&#8243; el_class=\u00bbcolumnaInterior3cols\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb10\/12&#8243;][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior1cols\u00bb]<div class='q_icon_with_title   left_from_title with_custom_icon'><div class=\"icon_text_holder\" style=\"\"><div class=\"icon_text_inner\" style=\"\"><div class=\"icon_title_holder\"><div class=\"icon_holder \" style=\"margin: 4%; \"><div class=\"icon_holder_inner\"><img loading=\"lazy\" decoding=\"async\" width=\"75\" height=\"73\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/Grupo-633.svg\" class=\"attachment-full size-full\" alt=\"\" \/><\/div><\/div><h4 class=\"icon_title\" style=\"\">En general, el objetivo de los servicios de consultor\u00eda de seguridad cibern\u00e9tica es ayudar a las organizaciones a proteger sus activos y datos de las amenazas cibern\u00e9ticas y mejorar su postura general de seguridad cibern\u00e9tica.<\/h4><\/div><p style=''><\/p><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb1\/12&#8243;][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_right\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb el_class=\u00bbschedule-demo\u00bb css=\u00bb.vc_custom_1680613799396{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 80px !important;padding-right: 80px !important;padding-bottom: 80px !important;padding-left: 80px !important;border-left-color: #3a3c4c !important;border-left-style: solid !important;border-right-color: #3a3c4c !important;border-right-style: solid !important;border-top-color: #3a3c4c !important;border-top-style: solid !important;border-bottom-color: #3a3c4c !important;border-bottom-style: solid !important;border-radius: 10px !important;}\u00bb][vc_column_inner width=\u00bb6\/12&#8243;][vc_column_text]<\/p>\n<h3>Programa una reuni\u00f3n con nuestro asesor jur\u00eddico<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/12&#8243;][\/vc_column_inner][vc_column_inner el_class=\u00bbbtn-schedule\u00bb width=\u00bb5\/12&#8243;]<a href=\"https:\/\/seifti.io\/es\/solicitud-de-reunion\/\" target=\"_self\"  class=\"qbutton  big_large_full_width\" style=\"\">Programar una reuni\u00f3n<\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb5\/12&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-895\" src=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg\" alt=\"\" width=\"451\" height=\"337\" srcset=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg 300w, https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-550x412.jpg 550w, https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer.jpg 553w\" sizes=\"(max-width: 451px) 100vw, 451px\" \/>[\/vc_column_text][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb50px\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=\u00bb5\/12&#8243;][vc_column_text]<\/p>\n<h2>\u00bfQu\u00e9 <span style=\"color: #efb850;\">servicios de consultor\u00eda en ciberseguridad<\/span> ofrecemos?<\/h2>\n<p>[\/vc_column_text][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner][vc_empty_space height=\u00bb50px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_accordion active_tab=\u00bbfalse\u00bb collapsible=\u00bbyes\u00bb style=\u00bbaccordion\u00bb][vc_accordion_tab title=\u00bbSimulaci\u00f3n de phishing\u00bb][vc_column_text]<span style=\"font-weight: 400;\">Ejecutaremos un ataque cibern\u00e9tico simulado que prueba la capacidad de su organizaci\u00f3n para identificar y responder a correos electr\u00f3nicos de phishing.<\/span>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=\u00bbPentesting\u00bb][vc_column_text]<span style=\"font-weight: 400;\">Nuestro equipo probar\u00e1 sus sistemas, redes o aplicaciones web para identificar vulnerabilidades que un atacante podr\u00eda explotar.<\/span>[\/vc_column_text][\/vc_accordion_tab][vc_accordion_tab title=\u00bbISO 27001&#8243;][vc_column_text]<span style=\"font-weight: 400;\">Nuestros expertos lo ayudar\u00e1n con los requisitos necesarios para que el sistema de administraci\u00f3n de seguridad de la informaci\u00f3n (SGSI) de su organizaci\u00f3n cumpla con el marco ISO 27001 para administrar y proteger datos confidenciales de clientes y empresas.<\/span>[\/vc_column_text][\/vc_accordion_tab][\/vc_accordion][\/vc_column][vc_column width=\u00bb1\/12&#8243;][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_right\u00bb css=\u00bb.vc_custom_1680616913790{background-image: url(https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/background-amarillo-left.svg?id=1448) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner width=\u00bb1\/4&#8243;][\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243;][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\">\u00bfQu\u00e9 hacer si sufres un<br \/>\nataque de ciberseguridad?<\/h1>\n<p>[\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][vc_column_text]<\/p>\n<p style=\"text-align: center;\">Si sospecha que ha sufrido un ataque cibern\u00e9tico, es importante tomar medidas inmediatas para minimizar el da\u00f1o y prevenir nuevos ataques. Estos son algunos pasos que puedes seguir:<\/p>\n<p>[\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwc3R5bGUlM0QlMjJtaW4taGVpZ2h0JTNBJTIwMzAwcHglM0IlMjIlM0UlMEElM0NiciUzRSUwQSUzQ2ltZyUyMGNsYXNzJTNEJTIyYWxpZ25ub25lJTIwd3AtaW1hZ2UtMTAlMjIlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRnNlaWZ0aS5pbyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMyUyRjAzJTJGR3J1cG8tMTIyMS5zdmclMjIlMjBhbHQlM0QlMjJMZWFybiUyMiUyMHdpZHRoJTNEJTIyNjAlMjIlMjBoZWlnaHQlM0QlMjIxMDAlMjIlM0UlMEElM0NiciUzRSUwQSUzQ2JyJTNFJTBBJTNDaDQlM0VERVNDT04lQzMlODlDVEVTRSUyMERFJTIwSU5URVJORVQlM0MlMkZoNCUzRSUwQSUzQ2JyJTNFJTBBJTNDYnIlM0UlMEElM0NwJTNFU2klMjBlc3QlQzMlQTElMjB1dGlsaXphbmRvJTIwdW4lMjBkaXNwb3NpdGl2byUyMHF1ZSUyMHNlJTIwaGElMjB2aXN0byUyMGNvbXByb21ldGlkbyUyQyUyMGRlc2NvbmVjdGFybG8lMjBkZSUyMEludGVybmV0JTIwcHVlZGUlMjBheXVkYXIlMjBhJTIwZXZpdGFyJTIwcXVlJTIwZWwlMjBhdGFjYW50ZSUyMGFjY2VkYSUyMGElMjBzdXMlMjBkYXRvcyUyMG8lMjBsb3MlMjBkYSVDMyVCMWUlMjBhJUMzJUJBbiUyMG0lQzMlQTFzLiUwQSUwQSUzQyUyRnAlM0UlMEElMEElM0MlMkZkaXYlM0UlMEE=[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwc3R5bGUlM0QlMjJtaW4taGVpZ2h0JTNBJTIwMzAwcHglM0IlMjIlM0UlMEElM0NiciUzRSUwQSUzQ2ltZyUyMGNsYXNzJTNEJTIyYWxpZ25ub25lJTIwd3AtaW1hZ2UtMTAlMjIlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRnNlaWZ0aS5pbyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMyUyRjAzJTJGR3J1cG8tMTIyNi5zdmclMjIlMjBhbHQlM0QlMjJMZWFybiUyMiUyMHdpZHRoJTNEJTIyNjAlMjIlMjBoZWlnaHQlM0QlMjIxMDAlMjIlM0UlMEElM0NiciUzRSUwQSUzQ2JyJTNFJTBBJTNDaDQlM0VOT1RJRklRVUUlMjBBJTIwU1UlMjBERVBBUlRBTUVOVE8lMjBERSUyMFRJJTIwTyUyMFBST1ZFRURPUiUyMERFJTIwU0VSVklDSU9TJTIwREUlMjBUSSUzQyUyRmg0JTNFJTBBJTNDYnIlM0UlMEElM0NiciUzRSUwQSUzQ3AlM0VQdWVkZW4lMjBheXVkYXJsbyUyMGElMjBldmFsdWFyJTIwZWwlMjBhbGNhbmNlJTIwZGVsJTIwZGElQzMlQjFvJTIweSUyMHRvbWFyJTIwbWVkaWRhcyUyMHBhcmElMjBwcm90ZWdlciUyMHN1JTIwcmVkLiUwQSUwQSUwQSUwQSUzQyUyRnAlM0UlMEElMEElM0MlMkZkaXYlM0UlMEE=[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=\u00bbcolumnaInterior\u00bb width=\u00bb1\/3&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_right\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb use_row_as_full_screen_section_slide=\u00bbno\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb el_class=\u00bbschedule-demo\u00bb css=\u00bb.vc_custom_1682509950979{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 70px !important;border-left-color: #3a3c4c !important;border-left-style: solid !important;border-right-color: #3a3c4c !important;border-right-style: solid !important;border-top-color: #3a3c4c !important;border-top-style: solid !important;border-bottom-color: #3a3c4c !important;border-bottom-style: solid !important;border-radius: 10px !important;}\u00bb][vc_column_inner width=\u00bb1\/2&#8243;][vc_column_text]<\/p>\n<h3>Contacta con nuestro equipo legal<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00bb1\/2&#8243;]<div class=\"\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3906-o1\" lang=\"es-ES\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/es\/wp-json\/wp\/v2\/pages\/3618#wpcf7-f3906-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"3906\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.9.5\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3906-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<div>\n\t<div class=\"emailnews\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-348\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-email wpcf7-text wpcf7-validates-as-email\" aria-invalid=\"false\" placeholder=\"Introduce tu e-mail*\" value=\"\" type=\"email\" name=\"email-348\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"emailnews2\">\n\t\t<p><label><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-956\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"acceptance-956\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span> <span style=\"font-size:13px\">He le\u00eddo y acepto la<\/span> <a href=\"https:\/\/seifti.io\/privacy-policy\/\"><span style=\"font-size:16px;text-decoration:underline\">Pol\u00edtica de privacidad<\/span><\/a><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"access\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Enviar\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb200px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-lg vc_hidden-md vc_hidden-sm\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_column_text] \u00bfQu\u00e9 es un servicio de consultor\u00eda de ciberseguridad? [\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][vc_column_text]Los servicios de consultor\u00eda de ciberseguridad son servicios profesionales que ayudan a las organizaciones a evaluar y mejorar su postura&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-3618","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Servicios de consultor\u00eda de ciberseguridad - Seifti<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Servicios de consultor\u00eda de ciberseguridad - Seifti\" \/>\n<meta property=\"og:description\" content=\"[vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_column_text] \u00bfQu\u00e9 es un servicio de consultor\u00eda de ciberseguridad? [\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][vc_column_text]Los servicios de consultor\u00eda de ciberseguridad son servicios profesionales que ayudan a las organizaciones a evaluar y mejorar su postura...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Seifti\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-13T12:47:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@seifti_io\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/\",\"url\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/\",\"name\":\"Servicios de consultor\u00eda de ciberseguridad - Seifti\",\"isPartOf\":{\"@id\":\"https:\/\/seifti.io\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg\",\"datePublished\":\"2023-03-07T12:06:38+00:00\",\"dateModified\":\"2024-03-13T12:47:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#primaryimage\",\"url\":\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg\",\"contentUrl\":\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Seifti\",\"item\":\"https:\/\/seifti.io\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Servicios de consultor\u00eda de ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/seifti.io\/es\/#website\",\"url\":\"https:\/\/seifti.io\/es\/\",\"name\":\"Seifti\",\"description\":\" Maximize the value of your data while ensuring compliance &amp; trust.\",\"publisher\":{\"@id\":\"https:\/\/seifti.io\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/seifti.io\/es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/seifti.io\/es\/#organization\",\"name\":\"Seifti\",\"url\":\"https:\/\/seifti.io\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/seifti.io\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/05\/seifti-logo.png\",\"contentUrl\":\"https:\/\/seifti.io\/wp-content\/uploads\/2023\/05\/seifti-logo.png\",\"width\":347,\"height\":96,\"caption\":\"Seifti\"},\"image\":{\"@id\":\"https:\/\/seifti.io\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/seifti_io\",\"https:\/\/www.linkedin.com\/company\/seiftionlinkedin\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Servicios de consultor\u00eda de ciberseguridad - Seifti","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Servicios de consultor\u00eda de ciberseguridad - Seifti","og_description":"[vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bb\u00bb][vc_column offset=\u00bbvc_hidden-xs\u00bb][vc_empty_space height=\u00bb100px\u00bb][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbgrid\u00bb text_align=\u00bbleft\u00bb background_animation=\u00bbnone\u00bb css_animation=\u00bbelement_from_left\u00bb][vc_column width=\u00bb1\/2&#8243;][vc_column_text] \u00bfQu\u00e9 es un servicio de consultor\u00eda de ciberseguridad? [\/vc_column_text][vc_empty_space height=\u00bb50px\u00bb][vc_column_text]Los servicios de consultor\u00eda de ciberseguridad son servicios profesionales que ayudan a las organizaciones a evaluar y mejorar su postura...","og_url":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/","og_site_name":"Seifti","article_modified_time":"2024-03-13T12:47:07+00:00","og_image":[{"url":"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@seifti_io","twitter_misc":{"Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/","url":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/","name":"Servicios de consultor\u00eda de ciberseguridad - Seifti","isPartOf":{"@id":"https:\/\/seifti.io\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#primaryimage"},"image":{"@id":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg","datePublished":"2023-03-07T12:06:38+00:00","dateModified":"2024-03-13T12:47:07+00:00","breadcrumb":{"@id":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#primaryimage","url":"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg","contentUrl":"https:\/\/seifti.io\/wp-content\/uploads\/2023\/03\/What-cybersecurity-consulting-services-do-we-offer-300x224.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/seifti.io\/es\/servicios-de-consultoria-de-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Seifti","item":"https:\/\/seifti.io\/es\/"},{"@type":"ListItem","position":2,"name":"Servicios de consultor\u00eda de ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/seifti.io\/es\/#website","url":"https:\/\/seifti.io\/es\/","name":"Seifti","description":" Maximize the value of your data while ensuring compliance &amp; trust.","publisher":{"@id":"https:\/\/seifti.io\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seifti.io\/es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/seifti.io\/es\/#organization","name":"Seifti","url":"https:\/\/seifti.io\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/seifti.io\/es\/#\/schema\/logo\/image\/","url":"https:\/\/seifti.io\/wp-content\/uploads\/2023\/05\/seifti-logo.png","contentUrl":"https:\/\/seifti.io\/wp-content\/uploads\/2023\/05\/seifti-logo.png","width":347,"height":96,"caption":"Seifti"},"image":{"@id":"https:\/\/seifti.io\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/seifti_io","https:\/\/www.linkedin.com\/company\/seiftionlinkedin\/"]}]}},"_links":{"self":[{"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/pages\/3618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/comments?post=3618"}],"version-history":[{"count":15,"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/pages\/3618\/revisions"}],"predecessor-version":[{"id":5065,"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/pages\/3618\/revisions\/5065"}],"wp:attachment":[{"href":"https:\/\/seifti.io\/es\/wp-json\/wp\/v2\/media?parent=3618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}