{"id":19,"date":"2023-11-20T03:59:02","date_gmt":"2023-11-20T10:59:02","guid":{"rendered":"http:\/\/www.securityserviceshosting.com\/?page_id=19"},"modified":"2023-11-22T04:54:35","modified_gmt":"2023-11-22T11:54:35","slug":"security-advisor","status":"publish","type":"page","link":"https:\/\/www.securityserviceshosting.com\/?page_id=19","title":{"rendered":"Security Advisor"},"content":{"rendered":"\n<p>The Exploitation of New Technologies brings with it in many cases a considerable increased productivity in business processes and other benefits such as greater agility in the provision of services. But all this comes with a great risk: the information is shared by users of a multitude of systems and the applications are equally accessible by all of them. Like any software development, these applications can present problems of design, errors in code, configuration errors or even the systems on which deployed may present some failure that makes them vulnerable.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"985\" height=\"985\" src=\"http:\/\/www.securityserviceshosting.com\/wp-content\/uploads\/2023\/11\/Hacker-capucha-y-dispositivos-edited.png\" alt=\"\" class=\"wp-image-43\" srcset=\"https:\/\/www.securityserviceshosting.com\/wp-content\/uploads\/2023\/11\/Hacker-capucha-y-dispositivos-edited.png 985w, https:\/\/www.securityserviceshosting.com\/wp-content\/uploads\/2023\/11\/Hacker-capucha-y-dispositivos-edited-300x300.png 300w, https:\/\/www.securityserviceshosting.com\/wp-content\/uploads\/2023\/11\/Hacker-capucha-y-dispositivos-edited-150x150.png 150w, https:\/\/www.securityserviceshosting.com\/wp-content\/uploads\/2023\/11\/Hacker-capucha-y-dispositivos-edited-768x768.png 768w\" sizes=\"auto, (max-width: 985px) 100vw, 985px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The Exploitation of New Technologies brings with it in many cases a considerable increased productivity in business processes and other benefits such as greater agility in the provision of services. But all this comes with a great risk: the information is shared by users of a multitude of systems and the applications are equally accessible [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":40,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-19","page","type-page","status-publish","has-post-thumbnail","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19"}],"version-history":[{"count":4,"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":44,"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/pages\/19\/revisions\/44"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=\/wp\/v2\/media\/40"}],"wp:attachment":[{"href":"https:\/\/www.securityserviceshosting.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}