
{"id":2066,"date":"2013-03-07T12:54:06","date_gmt":"2013-03-07T15:54:06","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=2066"},"modified":"2013-03-07T12:54:06","modified_gmt":"2013-03-07T15:54:06","slug":"guia-de-seguridad-en-proteccion-infantil","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/","title":{"rendered":"Gu\u00eda de Seguridad en Protecci\u00f3n Infantil"},"content":{"rendered":"<div style=\"text-align: justify;\">Los ni\u00f1os son el activo m\u00e1s grande que tenemos, nuestro futuro. Para eso, no obstante, es necesario guiarlos en el desarrollo de la vida. Esa responsabilidad, en el mundo de hoy, representa un verdadero desaf\u00edo para los padres. Con equipos inform\u00e1ticos cada vez m\u00e1s modernos y un lenguaje que evoluciona r\u00e1pidamente, los padres de hoy sufren la presi\u00f3n de tener una doble tarea: educarse para poder educar. Esta gu\u00eda le brinda la posibilidad de conocer cu\u00e1les aspectos deber\u00e1 tomar en cuenta para poder asegurarles a sus hijos una experiencia sana y segura en Internet; y todo lo que el ciberespacio ofrece.<\/div>\n<p>&nbsp;<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg\" width=\"292\" height=\"264\" \/><\/div>\n<div><b><a href=\"http:\/\/www.eset-la.com\/pdf\/documento_guia_para_padres_eset_baja.pdf\" target=\"_blank\">DESCARGA<\/a><\/b><\/div>\n<p>Fuente: www.eset-la.com<\/p>\n<p>Visto: CryptoTex<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los ni\u00f1os son el activo m\u00e1s grande que tenemos, nuestro futuro. Para eso, no obstante, es necesario guiarlos en el desarrollo de la vida. Esa responsabilidad, en el mundo de hoy, representa un verdadero desaf\u00edo para los padres. Con equipos inform\u00e1ticos cada vez m\u00e1s modernos y un lenguaje que evoluciona r\u00e1pidamente, los padres de hoy [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-2066","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda de Seguridad en Protecci\u00f3n Infantil<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Gu\u00eda de Seguridad en Protecci\u00f3n Infantil\",\"datePublished\":\"2013-03-07T15:54:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/\"},\"wordCount\":126,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda de Seguridad en Protecci\u00f3n Infantil\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg\",\"datePublished\":\"2013-03-07T15:54:06+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage\",\"url\":\"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg\",\"contentUrl\":\"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda de Seguridad en Protecci\u00f3n Infantil","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Gu\u00eda de Seguridad en Protecci\u00f3n Infantil","datePublished":"2013-03-07T15:54:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/"},"wordCount":126,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage"},"thumbnailUrl":"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/","url":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Gu\u00eda de Seguridad en Protecci\u00f3n Infantil","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage"},"thumbnailUrl":"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg","datePublished":"2013-03-07T15:54:06+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/guia-de-seguridad-en-proteccion-infantil\/#primaryimage","url":"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg","contentUrl":"http:\/\/www.eset-la.com\/images\/proteccion-infantil-gr.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=2066"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2066\/revisions"}],"predecessor-version":[{"id":2068,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2066\/revisions\/2068"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=2066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=2066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=2066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}