{"id":56541,"date":"2021-10-29T12:16:01","date_gmt":"2021-10-29T10:16:01","guid":{"rendered":"https:\/\/blog.euncet.com\/entrevista-genis-margarit-ciberseguridad\/"},"modified":"2023-02-15T16:51:40","modified_gmt":"2023-02-15T15:51:40","slug":"entrevista-genis-margarit-ciberseguretat","status":"publish","type":"post","link":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/","title":{"rendered":"Gen\u00eds Margarit: \u201cL&#8217;error m\u00e9s com\u00fa i greu \u00e9s no avaluar l&#8217;impacte que t\u00e9 un ciberincident sobre l&#8217;empresa\u201d"},"content":{"rendered":"<p>Parlem amb <a href=\"https:\/\/www.linkedin.com\/in\/gen%C3%ADs-margarit-9736645\/?originalSubdomain=es\" target=\"_blank\" rel=\"noopener noreferrer\">Gen\u00eds Margarit<\/a>, CEO i fundador d\u2019<a href=\"http:\/\/www.centralip.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ipnet<\/a> i especialista en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.\u00a0\u00a0<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u00cdNDEX DE CONTINGUTS<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #222222;color:#222222\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #222222;color:#222222\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Com_es_pot_combatre_una_ciberextorsio\" >Com es pot combatre una ciberextorsi\u00f3?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Que_es_lautodefensa_digital_en_ciberseguretat\" >Qu\u00e8 \u00e9s l&#8217;autodefensa digital en ciberseguretat?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Per_que_es_important_aplicar_tecniques_de_hacker_etic_o_tenir_una_politica_de_desconfianca\" >Per qu\u00e8 \u00e9s important aplicar t\u00e8cniques de hacker \u00e8tic o tenir una pol\u00edtica de desconfian\u00e7a?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#El_passat_4_doctubre_va_caure_Instagram_Facebook_i_WhatsApp_Ni_les_grans_corporacions_escapen_daquests_riscos\" >El passat 4 d&#8217;octubre va caure Instagram, Facebook i WhatsApp. Ni les grans corporacions escapen d&#8217;aquests riscos?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Es_creu_que_la_informacio_privada_de_mes_de_1500_milions_dusuaris_de_Facebook_es_va_posar_a_la_venda_en_un_forum_de_hackers_Els_usuaris_son_conscients_de_la_vulnerabilitat_a_la_qual_poden_exposar-se_quan_crein_comptes_en_les_xarxes_socials\" >Es creu que la informaci\u00f3 privada de m\u00e9s de 1.500 milions d&#8217;usuaris de Facebook es va posar a la venda en un f\u00f2rum de hackers. Els usuaris s\u00f3n conscients de la vulnerabilitat a la qual poden exposar-se quan cre\u00efn comptes en les xarxes socials?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Els_empleats_son_conscients_de_la_vulnerabilitat_dels_seus_telefons_mobils\" >Els empleats s\u00f3n conscients de la vulnerabilitat dels seus tel\u00e8fons m\u00f2bils?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Quins_consells_donaria_per_a_protegir_els_dispositius_electronics_daquests_riscos_cibernetics_en_les_empreses\" >Quins consells donaria per a protegir els dispositius electr\u00f2nics d&#8217;aquests riscos cibern\u00e8tics en les empreses?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#Centralip_Ipnet_Centralized_Solutions\" >Centralip (Ipnet Centralized Solutions)\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"Com_es_pot_combatre_una_ciberextorsio\"><\/span>Com es pot combatre una ciberextorsi\u00f3?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A nivell reactiu no es pot combatre perqu\u00e8 el punt de partit acostuma a ser que ja han aconseguit el seu objectiu com, per exemple, el segrest d&#8217;informaci\u00f3. Per aquest motiu, el flotador salvavides sempre \u00e9s el pla de recuperaci\u00f3 de desastres que comen\u00e7a per unes mesures de restauraci\u00f3 de la informaci\u00f3 que sigui resistent als ciberatacs.\u00a0<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Que_es_lautodefensa_digital_en_ciberseguretat\"><\/span>Qu\u00e8 \u00e9s l&#8217;autodefensa digital en ciberseguretat?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>S\u00f3n el conjunt de mesures individuals que cada persona que t\u00e9 activitat digital realitza per protegir-se. L&#8217;autodefensa comen\u00e7a per recon\u00e8ixer l&#8217;exist\u00e8ncia de les ciberamenaces i tenir una actitud proactiva per a eliminar les accions imprudents en l&#8217;\u00fas de les tecnologies de la informaci\u00f3. Comen\u00e7ant per reflexionar sobre el rastre digital que deixem a internet.\u00a0<\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"242\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/autodefensa-digital.jpeg\" alt=\"Qu\u00e8 \u00e9s l&#039;autodefensa digital en ciberseguretat?\" loading=\"lazy\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/autodefensa-digital.jpeg 602w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/autodefensa-digital-300x121.jpeg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/autodefensa-digital-80x32.jpeg 80w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Per_que_es_important_aplicar_tecniques_de_hacker_etic_o_tenir_una_politica_de_desconfianca\"><\/span>Per qu\u00e8 \u00e9s important aplicar t\u00e8cniques de <em>hacker<\/em> \u00e8tic o tenir una pol\u00edtica de desconfian\u00e7a?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>El <em>hacking<\/em> \u00e8tic permet con\u00e8ixer les vulnerabilitats que afecten un entorn. Tamb\u00e9 hi ha t\u00e8cniques conegudes com <em>pentesting <\/em>amb les quals es busquen les possibilitats d&#8217;introduir-se il\u00b7leg\u00edtimament en el sistema d&#8217;informaci\u00f3. B\u00e0sicament ser pro-actiu i identificar les amenaces ofereix l&#8217;oportunitat de corregir errors abans que siguin aprofitats pels ciberdelinq\u00fcents. Per aquest motiu, sempre t\u00e9 significat auditar la ciberseguretat d&#8217;un sistema abans que es publiqui i entri en funcionament. Mai ha de donar-se la seguretat per suposada, sin\u00f3 implementar una desconfian\u00e7a predeterminada i buscar una opini\u00f3 externa, imparcial i sense conflicte d&#8217;interessos.\u00a0<\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"El_passat_4_doctubre_va_caure_Instagram_Facebook_i_WhatsApp_Ni_les_grans_corporacions_escapen_daquests_riscos\"><\/span>El passat 4 d&#8217;octubre va caure Instagram, Facebook i WhatsApp. Ni les grans corporacions escapen d&#8217;aquests riscos?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>La disponibilitat \u00e9s el primer domini en el qual treballa un pla de seguretat de la informaci\u00f3. Els marcs de treball creen controls per a reduir les probabilitats de talls del servei per\u00f2 el risc es residual, sempre \u00e9s present. L&#8217;important \u00e9s que una incid\u00e8ncia no sols es resolgui sin\u00f3 que s&#8217;investigui. En aquest cas, Facebook ha publicat el resultat de les recerques i ha afirmat que el tall de servei va ser produ\u00eft per un error en les tasques de manteniment en la manipulaci\u00f3 de la seva xarxa troncal.\u00a0<\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"242\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/tecniques-de-hacker-etic.jpeg\" alt=\"Per qu\u00e8 \u00e9s important aplicar t\u00e8cniques de hacker \u00e8tic ?\" loading=\"lazy\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/tecniques-de-hacker-etic.jpeg 602w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/tecniques-de-hacker-etic-300x121.jpeg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/tecniques-de-hacker-etic-80x32.jpeg 80w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Es_creu_que_la_informacio_privada_de_mes_de_1500_milions_dusuaris_de_Facebook_es_va_posar_a_la_venda_en_un_forum_de_hackers_Els_usuaris_son_conscients_de_la_vulnerabilitat_a_la_qual_poden_exposar-se_quan_crein_comptes_en_les_xarxes_socials\"><\/span>Es creu que la informaci\u00f3 privada de m\u00e9s de 1.500 milions d&#8217;usuaris de Facebook es va posar a la venda en un f\u00f2rum de <em>hackers<\/em>. Els usuaris s\u00f3n conscients de la vulnerabilitat a la qual poden exposar-se quan cre\u00efn comptes en les xarxes socials?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Les dades d&#8217;usuaris de Facebook s&#8217;han obtingut de manera il\u00b7leg\u00edtima durant els \u00faltims anys mitjan\u00e7ant l&#8217;\u00fas indegut del seu API (interf\u00edcie de programaci\u00f3) per part de terceres empreses que han incomplert les condicions d&#8217;\u00fas. El cas m\u00e9s significatiu va ser el de la consultoria Cambridge Analytics. Les persones que utilitzen les xarxes socials han de protegir la seva navegaci\u00f3 i no accedir a eines o plataformes de tercers mentre que els demanin autoritzaci\u00f3 d&#8217;acc\u00e9s a les dades dels seus perfils personals. I alhora comprendre que la comercialitzaci\u00f3 de les dades per part de la majoria de les xarxes socials \u00e9s intr\u00ednseca al seu model de negoci.\u00a0<\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"242\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/venda-informacio-privada.jpeg\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/venda-informacio-privada.jpeg 602w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/venda-informacio-privada-300x121.jpeg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/venda-informacio-privada-80x32.jpeg 80w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Els_empleats_son_conscients_de_la_vulnerabilitat_dels_seus_telefons_mobils\"><\/span>Els empleats s\u00f3n conscients de la vulnerabilitat dels seus tel\u00e8fons m\u00f2bils?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>La majoria de les persones usu\u00e0ries dels tel\u00e8fons intel\u00b7ligents saben que hi ha programes maliciosos que roben informaci\u00f3. A m\u00e9s, \u00e9s una circumst\u00e0ncia que han sofert molts personatges famosos i aix\u00f2 ha ajudat a qu\u00e8 tothom prengui consci\u00e8ncia d&#8217;aquesta amena\u00e7a. El major problema \u00e9s que el temps d&#8217;exposici\u00f3 amb els m\u00f2bils \u00e9s molt elevat (sovint m\u00e9s de 5 hores di\u00e0ries) i es barregen tasques professionals amb privades i d&#8217;oci. Aquesta situaci\u00f3 \u00e9s una combinaci\u00f3 prop\u00edcia perqu\u00e8 les noves estafes digitals s&#8217;enfoquin cap a les aplicacions de missatgeria i el falseig d&#8217;aplicacions per a m\u00f2bils.\u00a0<\/p>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Quins_consells_donaria_per_a_protegir_els_dispositius_electronics_daquests_riscos_cibernetics_en_les_empreses\"><\/span>Quins consells donaria per a protegir els dispositius electr\u00f2nics d&#8217;aquests riscos cibern\u00e8tics en les empreses?\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Les empreses poden realitzar m\u00faltiples accions per millorar la seguretat dels m\u00f2bils dels\u00a0\u00a0seus usuaris. Les tres principals serien: implementar un sistema de gesti\u00f3 centralitzat de tel\u00e8fons intel\u00b7ligents que permeti el seu monitoratge i administraci\u00f3 remota; instal\u00b7lar una aplicaci\u00f3 de <i>antimalware <\/i>que supervisi totes les accions realitzades per l&#8217;usuari, i, finalment, crear perfils diferents per a les aplicacions de treball i personals per delimitar l&#8217;abast d&#8217;una infecci\u00f3 o intrusi\u00f3.\u00a0<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Centralip_Ipnet_Centralized_Solutions\"><\/span>Centralip (Ipnet Centralized Solutions)\u00a0<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"391\" height=\"260\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/centralip-empresa.jpeg\" alt=\"Coneix l&#039;empresa Centralip\" loading=\"lazy\" srcset=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/centralip-empresa.jpeg 391w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/centralip-empresa-300x199.jpeg 300w, https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/10\/centralip-empresa-80x53.jpeg 80w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<p style=\"margin-bottom: 0px; padding: 0px; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; overflow-wrap: break-word; white-space: pre-wrap; vertical-align: baseline; font-kerning: none; background-color: transparent; color: windowtext;\">Des de la seva creaci\u00f3, el 2010, <a href=\"https:\/\/www.centralip.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Centralip<\/a> pret\u00e9n millorar la protecci\u00f3 de les dades i els sistemes d&#8217;informaci\u00f3, millorant la seguretat dels sistemes d&#8217;informaci\u00f3 i els processos associats per a protegir les persones. L&#8217;empresa est\u00e0 formada per un equip d&#8217;enginyers i advocats que sumen m\u00e9s de quinze anys d&#8217;experi\u00e8ncia.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Parlem amb Gen\u00eds Margarit, CEO i fundador d\u2019Ipnet i especialista en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.\u00a0\u00a0 Com es pot combatre una ciberextorsi\u00f3?\u00a0 A nivell reactiu no es pot combatre perqu\u00e8 el punt de partit acostuma a ser que ja han aconseguit el seu objectiu com, per exemple, el [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":63743,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[449],"tags":[],"class_list":["post-56541","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-entrevistes-posts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gen\u00eds Margarit, entrevista sobre ciberseguretat empresarial | Blog Euncet<\/title>\n<meta name=\"description\" content=\"Analitzem amb Gen\u00eds Margarit, expert en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gen\u00eds Margarit, entrevista sobre ciberseguretat empresarial | Blog Euncet\" \/>\n<meta property=\"og:description\" content=\"Analitzem amb Gen\u00eds Margarit, expert en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/\" \/>\n<meta property=\"og:site_name\" content=\"Euncet Business School\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/euncet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-29T10:16:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-15T15:51:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/10\/Web_Euncet-17.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1900\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"euncet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@euncet\" \/>\n<meta name=\"twitter:site\" content=\"@euncet\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"euncet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/\"},\"author\":{\"name\":\"euncet\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\"},\"headline\":\"Gen\u00eds Margarit: \u201cL&#8217;error m\u00e9s com\u00fa i greu \u00e9s no avaluar l&#8217;impacte que t\u00e9 un ciberincident sobre l&#8217;empresa\u201d\",\"datePublished\":\"2021-10-29T10:16:01+00:00\",\"dateModified\":\"2023-02-15T15:51:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/\"},\"wordCount\":861,\"image\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Web_Euncet-17.jpg\",\"articleSection\":[\"Entrevistes\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/\",\"name\":\"Gen\u00eds Margarit, entrevista sobre ciberseguretat empresarial | Blog Euncet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Web_Euncet-17.jpg\",\"datePublished\":\"2021-10-29T10:16:01+00:00\",\"dateModified\":\"2023-02-15T15:51:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\"},\"description\":\"Analitzem amb Gen\u00eds Margarit, expert en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Web_Euncet-17.jpg\",\"contentUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Web_Euncet-17.jpg\",\"width\":1900,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/entrevista-genis-margarit-ciberseguretat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gen\u00eds Margarit: \u201cL&#8217;error m\u00e9s com\u00fa i greu \u00e9s no avaluar l&#8217;impacte que t\u00e9 un ciberincident sobre l&#8217;empresa\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/\",\"name\":\"Euncet Business School\",\"description\":\"Escuela de negocios\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\",\"name\":\"euncet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"caption\":\"euncet\"},\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/author\\\/euncet\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gen\u00eds Margarit, entrevista sobre ciberseguretat empresarial | Blog Euncet","description":"Analitzem amb Gen\u00eds Margarit, expert en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/","og_locale":"ca_ES","og_type":"article","og_title":"Gen\u00eds Margarit, entrevista sobre ciberseguretat empresarial | Blog Euncet","og_description":"Analitzem amb Gen\u00eds Margarit, expert en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.","og_url":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/","og_site_name":"Euncet Business School","article_publisher":"https:\/\/www.facebook.com\/euncet","article_published_time":"2021-10-29T10:16:01+00:00","article_modified_time":"2023-02-15T15:51:40+00:00","og_image":[{"width":1900,"height":700,"url":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/10\/Web_Euncet-17.jpg","type":"image\/jpeg"}],"author":"euncet","twitter_card":"summary_large_image","twitter_creator":"@euncet","twitter_site":"@euncet","twitter_misc":{"Escrit per":"euncet","Temps estimat de lectura":"4 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#article","isPartOf":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/"},"author":{"name":"euncet","@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268"},"headline":"Gen\u00eds Margarit: \u201cL&#8217;error m\u00e9s com\u00fa i greu \u00e9s no avaluar l&#8217;impacte que t\u00e9 un ciberincident sobre l&#8217;empresa\u201d","datePublished":"2021-10-29T10:16:01+00:00","dateModified":"2023-02-15T15:51:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/"},"wordCount":861,"image":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/10\/Web_Euncet-17.jpg","articleSection":["Entrevistes"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/","url":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/","name":"Gen\u00eds Margarit, entrevista sobre ciberseguretat empresarial | Blog Euncet","isPartOf":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#primaryimage"},"image":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/10\/Web_Euncet-17.jpg","datePublished":"2021-10-29T10:16:01+00:00","dateModified":"2023-02-15T15:51:40+00:00","author":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268"},"description":"Analitzem amb Gen\u00eds Margarit, expert en ciberseguretat, perqu\u00e8 ens expliqui la import\u00e0ncia de la ciberseguretat a les empreses.","breadcrumb":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#primaryimage","url":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/10\/Web_Euncet-17.jpg","contentUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/10\/Web_Euncet-17.jpg","width":1900,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.euncet.com\/blog\/ca\/entrevista-genis-margarit-ciberseguretat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.euncet.com\/blog\/ca\/"},{"@type":"ListItem","position":2,"name":"Gen\u00eds Margarit: \u201cL&#8217;error m\u00e9s com\u00fa i greu \u00e9s no avaluar l&#8217;impacte que t\u00e9 un ciberincident sobre l&#8217;empresa\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.euncet.com\/blog\/ca\/#website","url":"https:\/\/www.euncet.com\/blog\/ca\/","name":"Euncet Business School","description":"Escuela de negocios","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.euncet.com\/blog\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Person","@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268","name":"euncet","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","caption":"euncet"},"url":"https:\/\/www.euncet.com\/blog\/ca\/author\/euncet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts\/56541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/comments?post=56541"}],"version-history":[{"count":0,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts\/56541\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/media\/63743"}],"wp:attachment":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/media?parent=56541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/categories?post=56541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/tags?post=56541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}