
{"id":1312,"date":"2011-04-14T08:26:48","date_gmt":"2011-04-14T11:26:48","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1312"},"modified":"2011-04-14T08:26:49","modified_gmt":"2011-04-14T11:26:49","slug":"guia-sobre-almacenamiento-y-borrado-seguro-de-informacion","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/","title":{"rendered":"Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n"},"content":{"rendered":"<p>En la actual sociedad del  conocimiento, los avances tecnol\u00f3gicos en redes y sistemas posibilitan  que la informaci\u00f3n se pueda generar, copiar, enviar y recibir desde  cualquier lugar y en cualquier momento. Estos aspectos son vitales para  el funcionamiento de las empresas y convierten a la informaci\u00f3n en un  activo de gran valor en la toma de decisiones.<\/p>\n<p><!-- contentStar --><\/p>\n<div>\n<p>El conocimiento de la gesti\u00f3n del ciclo de vida de la informaci\u00f3n  y el establecimiento de planes, normas y pol\u00edticas de almacenamiento de  la informaci\u00f3n y de seguridad de los datos, asegura un control y  gesti\u00f3n de la informaci\u00f3n eficiente.<\/p>\n<p>Por ello, la Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n  aborda diferentes cuestiones: por qu\u00e9 se debe controlar la informaci\u00f3n  en la empresa, c\u00f3mo se almacena dicha informaci\u00f3n en los dispositivos de  almacenamiento m\u00e1s comunes, en qu\u00e9 consiste la recuperaci\u00f3n en caso de  p\u00e9rdida y qu\u00e9 debe hacerse si se quiere eliminar de modo permanente la  informaci\u00f3n.<\/p>\n<p>Disponible la gu\u00eda completa en castellano e ingl\u00e9s y la rese\u00f1a de la misma en catal\u00e1n, euskera, gallego y valenciano.<\/p>\n<p><a><\/a> <script src=\"http:\/\/w.sharethis.com\/button\/buttons.js\" type=\"text\/javascript\"><\/script> <script type=\"text\/javascript\">\/\/ < ![CDATA[\n stLight.options({ publisher:'12345', });\n\/\/ ]]><\/script><\/div>\n<h4>Documentos asociados<\/h4>\n<div id=\"listFiles\">\n<ul>\n<li>\n<div><a title=\"Descargar Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n [pdf - 1.31 MB] \" href=\"http:\/\/www.inteco.es\/file\/Nxk8l4GNfrjAyyRDEuknZg\">Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n<\/a> (1.31 MB)<\/div>\n<\/li>\n<li>\n<div><a title=\"Descargar (English Version) Guide to store and erase information securely [pdf - 946 KB] \" href=\"http:\/\/www.inteco.es\/file\/bV3wPaHJ7K9tRjmJl-mD6A\">(English Version) Guide to store and erase information securely<\/a> (946 KB)<\/div>\n<\/li>\n<\/ul>\n<p>Fuente: <a href=\"http:\/\/www.inteco.es\">Inteco<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>En la actual sociedad del conocimiento, los avances tecnol\u00f3gicos en redes y sistemas posibilitan que la informaci\u00f3n se pueda generar, copiar, enviar y recibir desde cualquier lugar y en cualquier momento. Estos aspectos son vitales para el funcionamiento de las empresas y convierten a la informaci\u00f3n en un activo de gran valor en la toma [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1312","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n\",\"datePublished\":\"2011-04-14T11:26:48+00:00\",\"dateModified\":\"2011-04-14T11:26:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/\"},\"wordCount\":232,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2011-04-14T11:26:48+00:00\",\"dateModified\":\"2011-04-14T11:26:49+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n","datePublished":"2011-04-14T11:26:48+00:00","dateModified":"2011-04-14T11:26:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/"},"wordCount":232,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/","url":"https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda sobre almacenamiento y borrado seguro de informaci\u00f3n","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2011-04-14T11:26:48+00:00","dateModified":"2011-04-14T11:26:49+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/guia-sobre-almacenamiento-y-borrado-seguro-de-informacion\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1312"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1312\/revisions"}],"predecessor-version":[{"id":1313,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1312\/revisions\/1313"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}