{"id":58929,"date":"2021-06-30T13:46:03","date_gmt":"2021-06-30T11:46:03","guid":{"rendered":"https:\/\/blog.euncet.com\/?p=58929"},"modified":"2023-03-10T11:58:59","modified_gmt":"2023-03-10T10:58:59","slug":"sistema-informatico-segur","status":"publish","type":"post","link":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/","title":{"rendered":"Caracter\u00edstiques d&#8217;un sistema inform\u00e0tic segur"},"content":{"rendered":"<p><span data-contrast=\"auto\">La vulnerabilitat en el sistema inform\u00e0tic \u00e9s una de les preocupacions en auge a les empreses. Cada vegada la Xarxa cont\u00e9 un major nombre d\u2019informaci\u00f3 sensible, fet que fa que les empreses siguin blancs perfectes per als <\/span><b><span data-contrast=\"none\">atacs inform\u00e0tics<\/span><\/b><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u00cdNDEX DE CONTINGUTS<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #222222;color:#222222\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #222222;color:#222222\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Que_es_un_sistema_informatic\" >Qu\u00e8 \u00e9s un sistema inform\u00e0tic?\u00a0<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Quina_es_lestructura_dun_sistema_informatic_segur\" >Quina \u00e9s l&#8217;estructura d&#8217;un sistema inform\u00e0tic segur?\u00a0<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Tipus_de_seguretat_informatica\" >Tipus de seguretat inform\u00e0tica\u00a0<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Seguretat_de_xarxa_o_online\" >Seguretat de xarxa o online\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Seguretat_de_maquinari\" >Seguretat de maquinari\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Seguretat_de_programari\" >Seguretat de programari\u00a0<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Beneficis_dun_sistema_informatic_segur_a_la_teva_empresa\" >Beneficis d&#8217;un sistema inform\u00e0tic segur a la teva empresa<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Per_que_la_teva_empresa_ha_de_comptar_amb_un_sistema_informatic_segur\" >Per qu\u00e8 la teva empresa ha de comptar amb un sistema inform\u00e0tic segur?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#Elements_sensibles_del_sistema_informatic_de_la_teva_empresa_a_protegir\" >Elements sensibles del sistema inform\u00e0tic de la teva empresa a protegir<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<p><span data-contrast=\"auto\">Ahores d&#8217;ara, com podem fer segur el nostre sistema inform\u00e0tic?\u00bfQuins elements s\u00f3n sensibles a aquests ciberatacs? En el seg\u00fcent article, et donem les claus perqu\u00e8 s\u00e0pigues detectar-lo en el teu negoci i puguis protegir-los el m\u00e0xim possible.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Et pot interessar:<\/span><\/b><a href=\"https:\/\/blog.euncet.es\/glosario-ciberseguridad\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\"> 50 <\/span><span data-contrast=\"none\">te<\/span><span data-contrast=\"none\">r<\/span><span data-contrast=\"none\">mes<\/span><span data-contrast=\"none\"> que <\/span><span data-contrast=\"none\">has de<\/span><span data-contrast=\"none\"> saber sobre <\/span><span data-contrast=\"none\">ciberseguretat<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/a><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-50340 size-full\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/06\/Que-es-un-sistema-informatico.png\" alt=\"\u00bfQu\u00e9 es un sistema inform\u00e1tico?\" width=\"750\" height=\"300\" srcset=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Que-es-un-sistema-informatico.png 750w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Que-es-un-sistema-informatico-300x120.png 300w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Que-es-un-sistema-informatico-80x32.png 80w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Que_es_un_sistema_informatic\"><\/span><span style=\"font-weight: 400;\"><span class=\"TextRun SCXW101210226 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW101210226 BCX0\" data-ccp-parastyle=\"heading 2\">Qu\u00e8 \u00e9s un sistema inform\u00e0tic?<\/span><\/span><span class=\"EOP SCXW101210226 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><br \/>\n<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">El sistema inform\u00e0tic (SI) \u00e9s un sistema encarregat d&#8217;emmagatzemar, processar i transmetre dades o informaci\u00f3.\u00a0Est\u00e0 integrat per tres parts: el <\/span><b><i><span data-contrast=\"none\">maquinari<\/span><\/i><\/b><span data-contrast=\"auto\">, el qual inclou els <\/span><b><span data-contrast=\"none\">components f\u00edsics<\/span><\/b><span data-contrast=\"auto\"> i materials, el <\/span><b><i><span data-contrast=\"none\">programari<\/span><\/i><\/b><span data-contrast=\"auto\">, que inclou el <\/span><b><span data-contrast=\"none\">sistema operatiu<\/span><\/b><span data-contrast=\"auto\">, firmware i aplicacions, i el <\/span><b><i><span data-contrast=\"auto\">humanware<\/span><\/i><\/b><span data-contrast=\"auto\">, el qual fa\u00a0 refer\u00e8ncia al personal inform\u00e0tic que programa o als propis usuaris que utilitzen l&#8217; ordinador.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A m\u00e9s d&#8217;aquestes tres parts, els <\/span><b><span data-contrast=\"none\">sistemes inform\u00e0tics<\/span><\/b><span data-contrast=\"auto\"> suporten elements que no s\u00f3n propis de\u00a0\u00a0l&#8217;ordinador, per\u00f2 s\u00ed\u00a0que formen part del seu sistema com s\u00f3n els coneguts<\/span><b><span data-contrast=\"auto\"> perif\u00e8rics<\/span><\/b><span data-contrast=\"auto\">. Aquests elements externs permeten posar informaci\u00f3 a l&#8217;ordinador, com \u00e9s en el cas del teclat, o treure la informaci\u00f3 impresa en paper, com succeeix amb les impressores.\u00a0Existeixen quatre tipus de perif\u00e8rics:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Perif\u00e8rics d&#8217;entrada<\/span><\/b><b><span data-contrast=\"auto\">: <\/span><\/b><span data-contrast=\"auto\">teclat, micr\u00f2fon, esc\u00e0ner&#8230;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Perif\u00e8rics de sortida: <\/span><\/b><span data-contrast=\"auto\">monitors, altaveus, impressores&#8230;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Perif\u00e8rics d&#8217;entrada i sortida: <\/span><\/b><span data-contrast=\"auto\">m\u00f2dem, router, fax&#8230;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Perif\u00e8rics d &#8216;emmagatzematge: <\/span><\/b><span data-contrast=\"auto\">disc dur extern, pen drive&#8230;<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">L&#8217;objectiu dels SI \u00e9s gestionar de manera eficient l a informaci\u00f3 permetent guardar-la, recuperar-la, canviar-la i\/o compartir-la.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Et pot interessar: <\/span><\/b><a href=\"https:\/\/blog.euncet.es\/medidas-ciberseguridad-informatica\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\">Ciberseguretat<\/span><span data-contrast=\"none\">, <\/span><span data-contrast=\"none\">com<\/span><span data-contrast=\"none\"> protegir<\/span><span data-contrast=\"none\"> la <\/span><span data-contrast=\"none\">inform<\/span><span data-contrast=\"none\">a<\/span><span data-contrast=\"none\">ci\u00f3<\/span><span data-contrast=\"none\"> a la xarxa<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/a><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-50343 aligncenter\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/06\/Cual-es-la-estructura-de-un-sistema-informatico-seguro.png\" alt=\"\" width=\"750\" height=\"300\" srcset=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Cual-es-la-estructura-de-un-sistema-informatico-seguro.png 750w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Cual-es-la-estructura-de-un-sistema-informatico-seguro-300x120.png 300w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Cual-es-la-estructura-de-un-sistema-informatico-seguro-80x32.png 80w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Quina_es_lestructura_dun_sistema_informatic_segur\"><\/span><span class=\"TextRun SCXW13525268 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW13525268 BCX0\" data-ccp-parastyle=\"heading 3\">Quina \u00e9s l&#8217;estructura d&#8217;un sistema inform\u00e0tic segur?<\/span><\/span><span class=\"EOP SCXW13525268 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Tal com hem comentat anteriorment, un sistema inform\u00e0tic es compon per un maquinari, un programari, l&#8217;humanware i els perif\u00e8rics.\u00a0Ara b\u00e9, qu\u00e8 els fa segurs? Els sistemes inform\u00e0tics segurs han de complir amb aquestes quatre caracter\u00edstiques:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">1. <\/span><span style=\"font-weight: 400;\">Integritat <\/span><\/h4>\n<p><span data-contrast=\"auto\">La informaci\u00f3 no podr\u00e0 ser modificada o alterada per aquelles persones i\/o processos inform\u00e0tics\u00a0 que no estiguin autoritzades per fer-ho. Per assegurar-se que aquesta informaci\u00f3 no ha estat manipulada sense autoritzaci\u00f3 \u00e9s convenient crear un conjunt de dades (metadades) de comprovaci\u00f3 amb les quals comparar-los.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">2. Confidencialitat<\/span><\/h4>\n<p><span style=\"font-weight: 400;\"><span class=\"TextRun SCXW3061506 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3061506 BCX0\">Nom\u00e9s les <\/span><\/span><strong><span class=\"TextRun SCXW3061506 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW3061506 BCX0\">persones autoritzades<\/span><\/span><\/strong><span class=\"TextRun SCXW3061506 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3061506 BCX0\"> podran llegir la informaci\u00f3 i aquests no l&#8217;hauran de divulgar a persones, entitats o processos no autoritzats.\u00a0<\/span><\/span><\/span><\/p>\n<h4><span style=\"font-weight: 400;\">3. Disponibilitat<\/span><\/h4>\n<p><span class=\"TextRun SCXW86101447 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW86101447 BCX0\">La informaci\u00f3 ha d&#8217;estar disponible per al moment en qu\u00e8 ho requereixin les persones, processos o aplicacions autoritzades per\u00a0a aix\u00f2.<\/span><\/span><span class=\"EOP SCXW86101447 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">4. Autentificaci\u00f3<\/span><\/h4>\n<p><span class=\"TextRun SCXW89706507 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW89706507 BCX0\">Per preservar la identificaci\u00f3 dels accessos\u00a0s&#8217;ha de crear un sistema que permeti con\u00e8ixer quin usuari est\u00e0 accedint en tot moment. Per a aix\u00f2, \u00e9s necessari implementar una combinaci\u00f3 de comptes i contrasenyes amb diferents tipus d&#8217;acc\u00e9s a la informaci\u00f3 segons el rang de privilegis que es defineixi a cada persona.\u00a0<\/span><\/span><span class=\"EOP SCXW89706507 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">5. <span class=\"TextRun SCXW75943281 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW75943281 BCX0\" data-ccp-parastyle=\"heading 4\">Irrefutabilitat (no-rebuig o no-repudi)<\/span><\/span><span class=\"EOP SCXW75943281 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:280,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/span><\/h4>\n<p><span class=\"TextRun SCXW132894928 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW132894928 BCX0\">Evita que un usuari, programa o proc\u00e9s inform\u00e0tic pugui negar o rebutjar l&#8217;autoria d&#8217;una acci\u00f3.<\/span><\/span><span class=\"EOP SCXW132894928 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-50346 aligncenter\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/06\/Beneficios-de-un-sistema-informatico-seguro-en-tu-empresa.png\" alt=\"Tipos de seguridad inform\u00e1tica\" width=\"750\" height=\"300\" srcset=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Beneficios-de-un-sistema-informatico-seguro-en-tu-empresa.png 750w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Beneficios-de-un-sistema-informatico-seguro-en-tu-empresa-300x120.png 300w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Beneficios-de-un-sistema-informatico-seguro-en-tu-empresa-80x32.png 80w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tipus_de_seguretat_informatica\"><\/span><span class=\"TextRun SCXW87448245 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW87448245 BCX0\" data-ccp-parastyle=\"heading 2\">Tipus de seguretat inform\u00e0tica<\/span><\/span><span class=\"EOP SCXW87448245 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:360,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-contrast=\"auto\">Existeixen tres tipus de seguretat inform\u00e0tica segons els components que la formen:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Seguretat_de_xarxa_o_online\"><\/span><span class=\"TextRun SCXW87171711 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW87171711 BCX0\" data-ccp-parastyle=\"heading 3\">Seguretat de xarxa o online<\/span><\/span><span class=\"EOP SCXW87171711 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Serveix per protegir tota la informaci\u00f3 i dades accessibles a trav\u00e9s d&#8217;Internet. Aquest tipus de seguretat \u00e9s l&#8217;encarregada de lluitar contra les amenaces que hi ha a\u00a0la xarxa com poden ser ciberatacs de virus, troians, cucs, intrusions d&#8217;espies, robatoris de dades i\u00a0informaci\u00f3&#8230;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Per combatre&#8217;ls s&#8217;utilitzen\u00a0 antivirus i antispyware, tallafocs, sistema de prevenci\u00f3 d&#8217;intrusions (IPS) i xarxes privades amb les quals poder garantir l&#8217;acc\u00e9s\u00a0segur a la xarxa.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Seguretat_de_maquinari\"><\/span><span class=\"TextRun SCXW217770212 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW217770212 BCX0\" data-ccp-parastyle=\"heading 3\">Seguretat de maquinari<\/span><\/span><span class=\"EOP SCXW217770212 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Aquesta seguretat \u00e9s l&#8217;encarregada de protegir els equips f\u00edsics, \u00e9s a dir, ordinadors o dispositius, de possibles intromissions, manipulacions o amenaces.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Un dels m\u00e8todes m\u00e9s utilitzats s\u00f3n els tallafocs o firewalls de maquinari i els servidors proxy.\u00a0Tamb\u00e9 s&#8217; han de\u00a0mantenir la seguretat f\u00edsica de les m\u00e0quines i dispositius resguardant-los en espais amb accessos restringits, aix\u00ed com incloent contrasenyes i c\u00f2pies de seguretat amb les quals evitar perdre informaci\u00f3 o dades.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Seguretat_de_programari\"><\/span><span class=\"TextRun SCXW258972915 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW258972915 BCX0\" data-ccp-parastyle=\"heading 3\">Seguretat de programari<\/span><\/span><span class=\"EOP SCXW258972915 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"TextRun SCXW177525723 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW177525723 BCX0\">La seguretat de programari vetlla per protegir la informaci\u00f3 emmagatzemada en els SI.\u00a0 <\/span><span class=\"NormalTextRun SCXW177525723 BCX0\">b<\/span><span class=\"NormalTextRun SCXW177525723 BCX0\">loqueja i impedeix atacs maliciosos de hackers tant en els programes com en les dades i informacions de les empreses.\u00a0T\u00e9 com\u00a0a objectiu fer que qualsevol programari continu\u00ef funcionant eficientment.\u00a0<\/span><\/span><span class=\"EOP SCXW177525723 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><strong><span class=\"TextRun SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW39266203 BCX0\">Et pot interessar: <\/span><\/span><\/strong><a href=\"https:\/\/blog.euncet.es\/beneficios-plan-estrategico-ciberseguridad\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"TextRun Underlined SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW39266203 BCX0\">Estrat\u00e8gia<\/span><\/span><span class=\"TextRun Underlined SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW39266203 BCX0\"> de <\/span><\/span><span class=\"TextRun Underlined SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW39266203 BCX0\">ciberseguretat<\/span><\/span> <span class=\"TextRun Underlined SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW39266203 BCX0\">panorama actual i <\/span><\/span><span class=\"TextRun Underlined SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW39266203 BCX0\">implementaci\u00f3<\/span><\/span><span class=\"TextRun Underlined SCXW39266203 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW39266203 BCX0\"> a l&#8217;empresa<\/span><\/span><span class=\"EOP SCXW39266203 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-50349 aligncenter\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/06\/Los-elementos-sensibles-del-sistema-informatico-de-tu-empresa-a-proteger.png\" alt=\"Beneficios de un sistema inform\u00e1tico seguro en tu empresa\" width=\"750\" height=\"300\" srcset=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Los-elementos-sensibles-del-sistema-informatico-de-tu-empresa-a-proteger.png 750w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Los-elementos-sensibles-del-sistema-informatico-de-tu-empresa-a-proteger-300x120.png 300w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Los-elementos-sensibles-del-sistema-informatico-de-tu-empresa-a-proteger-80x32.png 80w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Beneficis_dun_sistema_informatic_segur_a_la_teva_empresa\"><\/span><span class=\"TextRun SCXW111117358 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW111117358 BCX0\" data-ccp-parastyle=\"heading 2\">Beneficis d&#8217;un sistema inform\u00e0tic segur a la teva empresa<\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span class=\"TextRun SCXW179458029 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW179458029 BCX0\">Apostar per un sistema inform\u00e0tic segur \u00e9s un dels compromisos que ha de\u00a0tenir qualsevol empresa en l&#8217;actualitat. La transformaci\u00f3 digital ha fet que empreses tradicionals s&#8217;hagin d&#8217;adaptar a nous ecosistemes digitals, i no sempre disposen dels coneixements necessaris per implementar-lo sense posar en risc les seves dades i informacions sensibles.\u00a0<\/span><\/span><span class=\"EOP SCXW179458029 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-50352 aligncenter\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/06\/Seguridad-en-sistemas-informaticos-lo-mas-importante-que-debe-protegerse.png\" alt=\"Seguridad-en-sistemas-inform\u00e1ticos-lo-m\u00e1s-importante-que-debe-protegerse\" width=\"750\" height=\"300\" srcset=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Seguridad-en-sistemas-informaticos-lo-mas-importante-que-debe-protegerse.png 750w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Seguridad-en-sistemas-informaticos-lo-mas-importante-que-debe-protegerse-300x120.png 300w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Seguridad-en-sistemas-informaticos-lo-mas-importante-que-debe-protegerse-80x32.png 80w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Per_que_la_teva_empresa_ha_de_comptar_amb_un_sistema_informatic_segur\"><\/span><span class=\"TextRun SCXW207264473 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW207264473 BCX0\" data-ccp-parastyle=\"heading 3\">Per qu\u00e8 la teva empresa ha de comptar amb un sistema inform\u00e0tic segur?<\/span><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">A continuaci\u00f3, t\u2019ensenyem alguns dels motius pels quals la teva empresa ha de\u00a0 comptar amb un SI segur:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Protegir les dades privades dels empleats i clients ajuda a prevenir atacs de hackers.<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u00c9s important comptar amb plans de conting\u00e8ncia amb els quals minimitzar els possibles errors que puguin donar-se.\u00a0Ha de contemplar mesures de prevenci\u00f3, detecci\u00f3 i correcci\u00f3.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Implementar programes antivirus als nostres ordinadors \u00e9s el recurs perfecte per evitar manipulacions malicioses de dades per part de hackers.\u00a0Aix\u00f2 contribuir\u00e0 a una de les caracter\u00edstiques que fa que un sistema inform\u00e0tic sigui segur: integritat.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilitzar programari i maquinari segurs ajudar\u00e0 a prolongar el bon funcionament dels equips inform\u00e0tics.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Controlar els accessos mitjan\u00e7ant codis de verificaci\u00f3 facilitats als usuaris autoritzats per\u00a0a aix\u00f2.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Un SI segur millora la productivitat, ja que minimitza els\u00a0possibles riscos o desafiaments que puguin retardar el proc\u00e9s laboral.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:280,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><b><span data-contrast=\"auto\">Et pot interessar:<\/span><\/b><a href=\"https:\/\/blog.euncet.es\/ciberseguridad-empresa-riesgos-consejos\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-contrast=\"none\"> Per <\/span><span data-contrast=\"none\">qu\u00e8<\/span><span data-contrast=\"none\"> invertir en <\/span><span data-contrast=\"none\">ciberseguretat<\/span><span data-contrast=\"none\"> de<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">pr\u00e9s de<\/span><span data-contrast=\"none\"> la <\/span><span data-contrast=\"none\">covid<\/span><span data-contrast=\"none\"> -19: <\/span><span data-contrast=\"none\">riscos<\/span><span data-contrast=\"none\"> i <\/span><span data-contrast=\"none\">consells<\/span><span data-contrast=\"none\"> per <\/span><span data-contrast=\"none\">combatre<\/span><span data-contrast=\"none\"> els <\/span><span data-contrast=\"none\">ciberatacs<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/a><\/p>\n<p><span data-contrast=\"auto\">Aquests s\u00f3n alguns dels beneficis que pot reportar la ciberseguretat inform\u00e0tica. \u00c9s crucial tenir-la en compte si es vol ser una empresa competitiva, ja que ajudar\u00e0 a protegir la privacitat, seguretat i integritat de la informaci\u00f3 i de les dades empresarials.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:280,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-50359 aligncenter\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2021\/06\/Por-que-tu-empresa-debe-contar-con-un-sistema-informatico-seguro.png\" alt=\"\" width=\"750\" height=\"300\" srcset=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Por-que-tu-empresa-debe-contar-con-un-sistema-informatico-seguro.png 750w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Por-que-tu-empresa-debe-contar-con-un-sistema-informatico-seguro-300x120.png 300w, https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Por-que-tu-empresa-debe-contar-con-un-sistema-informatico-seguro-80x32.png 80w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Elements_sensibles_del_sistema_informatic_de_la_teva_empresa_a_protegir\"><\/span><span class=\"NormalTextRun SCXW3245634 BCX0\" data-ccp-parastyle=\"heading 3\">Elements sensibles del sistema <\/span><span class=\"NormalTextRun SCXW3245634 BCX0\" data-ccp-parastyle=\"heading 3\">inform\u00e0tic<\/span><span class=\"NormalTextRun SCXW3245634 BCX0\" data-ccp-parastyle=\"heading 3\"> de la teva empresa a protegir<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Per implementar qualsevol pla de ciberseguretat en el teu negoci has de\u00a0ser conscient dels factors que has de\u00a0protegir \u00edntegrament per preservar la seguretat en el sistema de la teva organitzaci\u00f3:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">La font d&#8217; emmagatzematge.<\/span><\/b><span data-contrast=\"auto\">\u00a0La informaci\u00f3 \u00e9s poder i, per aix\u00f2, \u00e9s crucial que tota empresa protegeixi tot el que integra la base de dades i emmagatzematge.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Canal de comunicaci\u00f3.<\/span><\/b><span data-contrast=\"auto\">\u00a0A m\u00e9s de protegir les dades, tamb\u00e9 \u00e9s important disposar de sistemes de seguretat que evitin danys com poden ser els modems, routers, firewalls&#8230;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Arial\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Proc\u00e9s d&#8217; informaci\u00f3.<\/span><\/b><span data-contrast=\"auto\">\u00a0Cal establir un sistema mitjan\u00e7ant el qual l&#8217;\u00fas d&#8217;ordinadors personals, servidors d&#8217; aplicaci\u00f3 o altres elements siguin manipulats correctament, ja que si no existeix un protocol ni un bon \u00fas\u00a0pot suposar una gran p\u00e8rdua econ\u00f2mica.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.euncet.es\/es\/master-online-ciberseguridad\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-58846 size-full\" src=\"https:\/\/blog.euncet.com\/wp-content\/uploads\/2023\/03\/1-Ciber-H-1.gif\" alt=\"\" width=\"750\" height=\"265\" \/><\/a><\/p>\n<p><span class=\"TextRun SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW257192098 BCX0\">Si t&#8217;ha semblat interessant l&#8217;article i vols aprendre m\u00e9s sobre com protegir els sistemes inform\u00e0tics descobreix\u00a0el <\/span><\/span><a href=\"https:\/\/www.euncet.es\/es\/master-online-ciberseguridad\" target=\"_blank\" rel=\"noopener noreferrer\"><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\">m\u00e0ster<\/span><\/span><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\"> online en <\/span><\/span><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\">Ciberseguretat<\/span><\/span><\/a> <span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\">d<\/span><span class=\"NormalTextRun SCXW257192098 BCX0\">e l<\/span><span class=\"NormalTextRun SCXW257192098 BCX0\">&#8216;Euncet<\/span><\/span><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\"> Business <\/span><\/span><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\">School<\/span><\/span><a class=\"Hyperlink SCXW257192098 BCX0\" href=\"https:\/\/www.euncet.es\/es\/master-online-ciberseguridad\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\"> i <\/span><\/span><\/a><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\">Pw<\/span><\/span><a class=\"Hyperlink SCXW257192098 BCX0\" href=\"https:\/\/www.euncet.es\/es\/master-online-ciberseguridad\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\">C<\/span><\/span><\/a><span class=\"TextRun Underlined SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW257192098 BCX0\"> Espanya<\/span><\/span><span class=\"TextRun SCXW257192098 BCX0\" lang=\"CA\" xml:lang=\"CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW257192098 BCX0\">.\u00a0<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La vulnerabilitat en el sistema inform\u00e0tic \u00e9s una de les preocupacions en auge a les empreses. Cada vegada la Xarxa cont\u00e9 un major nombre d\u2019informaci\u00f3 sensible, fet que fa que les empreses siguin blancs perfectes per als atacs inform\u00e0tics.\u00a0\u00a0\u00a0 Ahores d&#8217;ara, com podem fer segur el nostre sistema inform\u00e0tic?\u00bfQuins elements s\u00f3n sensibles a aquests ciberatacs? [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":50338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[452],"tags":[],"class_list":["post-58929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovacio-i-tecnologia"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sistema inform\u00e0tic segur: les seves caracter\u00edstiques | Blog Euncet<\/title>\n<meta name=\"description\" content=\"T&#039;expliquem quines s\u00f3n les caracter\u00edstiques d&#039;un sistema inform\u00e0tic segur, els seus elements sensibles i els beneficis per a la teva empresa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sistema inform\u00e0tic segur: les seves caracter\u00edstiques | Blog Euncet\" \/>\n<meta property=\"og:description\" content=\"T&#039;expliquem quines s\u00f3n les caracter\u00edstiques d&#039;un sistema inform\u00e0tic segur, els seus elements sensibles i els beneficis per a la teva empresa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/\" \/>\n<meta property=\"og:site_name\" content=\"Euncet Business School\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/euncet\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T11:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T10:58:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Caracteristicas-de-un-sistema-informatico-seguro.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"euncet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@euncet\" \/>\n<meta name=\"twitter:site\" content=\"@euncet\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"euncet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/\"},\"author\":{\"name\":\"euncet\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\"},\"headline\":\"Caracter\u00edstiques d&#8217;un sistema inform\u00e0tic segur\",\"datePublished\":\"2021-06-30T11:46:03+00:00\",\"dateModified\":\"2023-03-10T10:58:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/\"},\"wordCount\":1260,\"image\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Caracteristicas-de-un-sistema-informatico-seguro.png\",\"articleSection\":[\"Innovaci\u00f3 i Tecnologia\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/\",\"name\":\"Sistema inform\u00e0tic segur: les seves caracter\u00edstiques | Blog Euncet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Caracteristicas-de-un-sistema-informatico-seguro.png\",\"datePublished\":\"2021-06-30T11:46:03+00:00\",\"dateModified\":\"2023-03-10T10:58:59+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\"},\"description\":\"T'expliquem quines s\u00f3n les caracter\u00edstiques d'un sistema inform\u00e0tic segur, els seus elements sensibles i els beneficis per a la teva empresa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Caracteristicas-de-un-sistema-informatico-seguro.png\",\"contentUrl\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Caracteristicas-de-un-sistema-informatico-seguro.png\",\"width\":750,\"height\":482,\"caption\":\"Caracter\u00edsticas-de-un-sistema-inform\u00e1tico-seguro\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/sistema-informatico-segur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Caracter\u00edstiques d&#8217;un sistema inform\u00e0tic segur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/\",\"name\":\"Euncet Business School\",\"description\":\"Escuela de negocios\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/#\\\/schema\\\/person\\\/8253e592273eb1f7a48788902ca03268\",\"name\":\"euncet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g\",\"caption\":\"euncet\"},\"url\":\"https:\\\/\\\/www.euncet.com\\\/blog\\\/ca\\\/author\\\/euncet\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sistema inform\u00e0tic segur: les seves caracter\u00edstiques | Blog Euncet","description":"T'expliquem quines s\u00f3n les caracter\u00edstiques d'un sistema inform\u00e0tic segur, els seus elements sensibles i els beneficis per a la teva empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/","og_locale":"ca_ES","og_type":"article","og_title":"Sistema inform\u00e0tic segur: les seves caracter\u00edstiques | Blog Euncet","og_description":"T'expliquem quines s\u00f3n les caracter\u00edstiques d'un sistema inform\u00e0tic segur, els seus elements sensibles i els beneficis per a la teva empresa.","og_url":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/","og_site_name":"Euncet Business School","article_publisher":"https:\/\/www.facebook.com\/euncet","article_published_time":"2021-06-30T11:46:03+00:00","article_modified_time":"2023-03-10T10:58:59+00:00","og_image":[{"width":750,"height":482,"url":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Caracteristicas-de-un-sistema-informatico-seguro.png","type":"image\/png"}],"author":"euncet","twitter_card":"summary_large_image","twitter_creator":"@euncet","twitter_site":"@euncet","twitter_misc":{"Escrit per":"euncet","Temps estimat de lectura":"6 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#article","isPartOf":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/"},"author":{"name":"euncet","@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268"},"headline":"Caracter\u00edstiques d&#8217;un sistema inform\u00e0tic segur","datePublished":"2021-06-30T11:46:03+00:00","dateModified":"2023-03-10T10:58:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/"},"wordCount":1260,"image":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#primaryimage"},"thumbnailUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Caracteristicas-de-un-sistema-informatico-seguro.png","articleSection":["Innovaci\u00f3 i Tecnologia"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/","url":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/","name":"Sistema inform\u00e0tic segur: les seves caracter\u00edstiques | Blog Euncet","isPartOf":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#primaryimage"},"image":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#primaryimage"},"thumbnailUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Caracteristicas-de-un-sistema-informatico-seguro.png","datePublished":"2021-06-30T11:46:03+00:00","dateModified":"2023-03-10T10:58:59+00:00","author":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268"},"description":"T'expliquem quines s\u00f3n les caracter\u00edstiques d'un sistema inform\u00e0tic segur, els seus elements sensibles i els beneficis per a la teva empresa.","breadcrumb":{"@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#primaryimage","url":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Caracteristicas-de-un-sistema-informatico-seguro.png","contentUrl":"https:\/\/www.euncet.com\/blog\/wp-content\/uploads\/2021\/06\/Caracteristicas-de-un-sistema-informatico-seguro.png","width":750,"height":482,"caption":"Caracter\u00edsticas-de-un-sistema-inform\u00e1tico-seguro"},{"@type":"BreadcrumbList","@id":"https:\/\/www.euncet.com\/blog\/ca\/sistema-informatico-segur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.euncet.com\/blog\/ca\/"},{"@type":"ListItem","position":2,"name":"Caracter\u00edstiques d&#8217;un sistema inform\u00e0tic segur"}]},{"@type":"WebSite","@id":"https:\/\/www.euncet.com\/blog\/ca\/#website","url":"https:\/\/www.euncet.com\/blog\/ca\/","name":"Euncet Business School","description":"Escuela de negocios","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.euncet.com\/blog\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Person","@id":"https:\/\/www.euncet.com\/blog\/ca\/#\/schema\/person\/8253e592273eb1f7a48788902ca03268","name":"euncet","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ee2ce5f049e82b74bcc6b8db4c5e9c717e35544f3cde91d14a3daa9827fe21f0?s=96&d=mm&r=g","caption":"euncet"},"url":"https:\/\/www.euncet.com\/blog\/ca\/author\/euncet\/"}]}},"_links":{"self":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts\/58929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/comments?post=58929"}],"version-history":[{"count":0,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/posts\/58929\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/media\/50338"}],"wp:attachment":[{"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/media?parent=58929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/categories?post=58929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euncet.com\/blog\/ca\/wp-json\/wp\/v2\/tags?post=58929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}