
{"id":5442,"date":"2019-12-04T16:39:30","date_gmt":"2019-12-04T19:39:30","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?page_id=5442"},"modified":"2020-08-18T15:53:36","modified_gmt":"2020-08-18T18:53:36","slug":"newsletter-cyberseguridad","status":"publish","type":"page","link":"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/","title":{"rendered":"Newsletter Cyberseguridad"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.5.6&#8243; hover_enabled=&#8221;0&#8243; title_text=&#8221;bg_talsoft_1354x619&#8243; background_image=&#8221;https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]\n<h2 class=\"has-text-align-center wp-block-heading\">Suscr\u00edbase a nuestro Newsletter para estar actualizado sobre las amenazas cybern\u00e9ticas que ponen en peligro a su Negocio<\/h2>\n\n\n\n<div style=\"overflow: hidden;\">\n    <div>\n        <div style=\"width: 500px; margin: 0px auto;\"> \n            <div class=\"cuerpo\">\n            <!--FORMULARIO--> \n            <div class=\"marco\">\n            <form method=\"GET\" action=\"https:\/\/app.embluemail.com\/TriggerUrlExterna.aspx\" onsubmit=\"return validateForm();\" novalidate=\"\">\n            <input type=\"hidden\" name=\"key\" value=\"cd431a21-b59d-4504-934f-d564cfa10168\"\/>\n            <table class=\"formulario campos\">\n                <tbody>\n                    <tr class=\"campo\">\n                        <td><p>Email *<\/p><\/td>\n                        <td><input id=\"email\" type=\"email\" placeholder=\"&#109;&#x69;&#x65;m&#97;&#x69;&#x6c;&#64;&#109;&#x69;e&#109;&#x61;&#x69;l&#46;&#x63;o&#109;\" name=\"email\" required=\"\" data-error=\"Campo requerido|Formato inv\u00e1lido\"\/><\/td>\n                    <\/tr>\n                    <tr class=\"error-email\">\n                        <td colspan=\"2\" style=\"text-align: right;\"><\/td>\n                    <\/tr>\n                <tr id=\"campo-624945\" class=\"campo\">\n    <td>\n        <p class=\"txt-cap\">Nombre&nbsp;<span class=\"req\">&nbsp;<\/span><\/p>\n    <\/td>\n    <td><input id=\"624945\" type=\"text\" name=\"624945\" data-error=\"Campo requerido|Formato inv\u00e1lido\"\/><\/td>\n<\/tr>\n<tr class=\"error-624945\">\n    <td colspan=\"2\" style=\"text-align: right;\"><\/td>\n<\/tr><tr id=\"campo-624946\" class=\"campo\">\n    <td>\n        <p class=\"txt-cap\">Apellido&nbsp;<span class=\"req\">&nbsp;<\/span><\/p>\n    <\/td>\n    <td><input id=\"624946\" type=\"text\" name=\"624946\" data-error=\"Campo requerido|Formato inv\u00e1lido\"\/><\/td>\n<\/tr>\n<tr class=\"error-624946\">\n    <td colspan=\"2\" style=\"text-align: right;\"><\/td>\n<\/tr><\/tbody>\n            <\/table>\n            <table class=\"formulario\">\n                <tbody><tr>\n                    <td colspan=\"2\" align=\"center\">\n                        <input type=\"submit\" value=\"Confirmar datos\"\/>\n                    <\/td>\n                <\/tr>\n<tr><td colspan=\"2\" align=\"center\">\n<a href=\"https:\/\/www.talsoft-security.com\/site\/es\/contacto\/politica-de-privacidad\/\">Pol\u00edtica de Privacidad y Protecci\u00f3n de datos personales<\/a><\/td>\n\n              <\/tr>\n            <\/tbody><\/table>\n            <\/form>\n            <\/div>\n            <!--FIN FORMULARIO--> \n        <\/div>\n        <!--FIN CUERPO--> \n       \n        <!--FIN LEYENDA--> \n    <\/div>\n<\/div>\n\n<\/div><script type=\"text\/javascript\" src=\"https:\/\/app.embluemail.com\/emblue\/form_validation.js\"><\/script>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>Suscr\u00edbase a nuestro Newsletter para estar actualizado sobre las amenazas cybern\u00e9ticas que ponen en peligro a su Negocio Email * Nombre&nbsp;&nbsp; Apellido&nbsp;&nbsp; Pol\u00edtica de Privacidad y Protecci\u00f3n de datos personales<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:heading {\"align\":\"center\"} -->\n<h2 class=\"has-text-align-center\">Suscr\u00edbase a nuestro Newsletter para estar actualizado sobre las amenazas cybern\u00e9ticas que ponen en peligro a su Negocio<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:html -->\n<div style=\"overflow: hidden;\">\n    <div>\n        <div style=\"width: 500px; margin: 0px auto;\"> \n            <div class=\"cuerpo\">\n            <!--FORMULARIO--> \n            <div class=\"marco\">\n            <form method=\"GET\" action=\"https:\/\/app.embluemail.com\/TriggerUrlExterna.aspx\" onsubmit=\"return validateForm();\" novalidate=\"\">\n            <input type=\"hidden\" name=\"key\" value=\"cd431a21-b59d-4504-934f-d564cfa10168\"\/>\n            <table class=\"formulario campos\">\n                <tbody>\n                    <tr class=\"campo\">\n                        <td><p>Email *<\/p><\/td>\n                        <td><input id=\"email\" type=\"email\" placeholder=\"miemail@miemail.com\" name=\"email\" required=\"\" data-error=\"Campo requerido|Formato inv\u00e1lido\"\/><\/td>\n                    <\/tr>\n                    <tr class=\"error-email\">\n                        <td colspan=\"2\" style=\"text-align: right;\"><\/td>\n                    <\/tr>\n                <tr id=\"campo-624945\" class=\"campo\">\n    <td>\n        <p class=\"txt-cap\">Nombre&nbsp;<span class=\"req\">&nbsp;<\/span><\/p>\n    <\/td>\n    <td><input id=\"624945\" type=\"text\" name=\"624945\" data-error=\"Campo requerido|Formato inv\u00e1lido\"\/><\/td>\n<\/tr>\n<tr class=\"error-624945\">\n    <td colspan=\"2\" style=\"text-align: right;\"><\/td>\n<\/tr><tr id=\"campo-624946\" class=\"campo\">\n    <td>\n        <p class=\"txt-cap\">Apellido&nbsp;<span class=\"req\">&nbsp;<\/span><\/p>\n    <\/td>\n    <td><input id=\"624946\" type=\"text\" name=\"624946\" data-error=\"Campo requerido|Formato inv\u00e1lido\"\/><\/td>\n<\/tr>\n<tr class=\"error-624946\">\n    <td colspan=\"2\" style=\"text-align: right;\"><\/td>\n<\/tr><\/tbody>\n            <\/table>\n            <table class=\"formulario\">\n                <tbody><tr>\n                    <td colspan=\"2\" align=\"center\">\n                        <input type=\"submit\" value=\"Confirmar datos\"\/>\n                    <\/td>\n                <\/tr>\n<tr><td colspan=\"2\" align=\"center\">\n<a href=\"https:\/\/www.talsoft-security.com\/site\/es\/contacto\/politica-de-privacidad\/\">Pol\u00edtica de Privacidad y Protecci\u00f3n de datos personales<\/a><\/td>\n\n              <\/tr>\n            <\/tbody><\/table>\n            <\/form>\n            <\/div>\n            <!--FIN FORMULARIO--> \n        <\/div>\n        <!--FIN CUERPO--> \n       \n        <!--FIN LEYENDA--> \n    <\/div>\n<\/div>\n\n<\/div><script type=\"text\/javascript\" src=\"https:\/\/app.embluemail.com\/emblue\/form_validation.js\"><\/script>\n<!-- \/wp:html -->","_et_gb_content_width":"","footnotes":""},"class_list":["post-5442","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Newsletter Cyberseguridad<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Newsletter Cyberseguridad\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2019-12-04T19:39:30+00:00\",\"dateModified\":\"2020-08-18T18:53:36+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Newsletter Cyberseguridad","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/","url":"https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Newsletter Cyberseguridad","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2019-12-04T19:39:30+00:00","dateModified":"2020-08-18T18:53:36+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/newsletter-cyberseguridad\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/5442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=5442"}],"version-history":[{"count":5,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/5442\/revisions"}],"predecessor-version":[{"id":6403,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/pages\/5442\/revisions\/6403"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=5442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}