{"id":8429,"date":"2024-09-18T08:00:07","date_gmt":"2024-09-18T11:00:07","guid":{"rendered":"https:\/\/rcgherco.com\/?page_id=8429"},"modified":"2025-01-21T12:44:14","modified_gmt":"2025-01-21T15:44:14","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/rcg-global.com\/es\/servicios\/ciberseguridad\/","title":{"rendered":"CIBERSEGURIDAD"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lgunergf-0b635cdb1f66431385526096a8b3ceb0\">\n.avia-section.av-lgunergf-0b635cdb1f66431385526096a8b3ceb0{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/rcg-global.com\/wp-content\/uploads\/2024\/09\/image-19-300x83-1.png);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\n}\n.avia-section.av-lgunergf-0b635cdb1f66431385526096a8b3ceb0 .av-section-color-overlay{\nopacity:0.6;\nbackground-color:#0a0909;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-lgunergf-0b635cdb1f66431385526096a8b3ceb0 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_textblock  avia-builder-el-first  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap sidebar_right'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8429'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-qrpkrp-c9d19b27c4a35ed7098d83d2a3d80f03\">\n#top .hr.hr-invisible.av-qrpkrp-c9d19b27c4a35ed7098d83d2a3d80f03{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-qrpkrp-c9d19b27c4a35ed7098d83d2a3d80f03 hr-invisible  avia-builder-el-1  el_before_av_hr  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-q1tfo5-fcdfaf91fdb11952730dceb527659118\">\n#top .hr.hr-invisible.av-q1tfo5-fcdfaf91fdb11952730dceb527659118{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-q1tfo5-fcdfaf91fdb11952730dceb527659118 hr-invisible  avia-builder-el-2  el_after_av_hr  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfz5c164-270ee351baae44051095caf886316647\">\n#top .av-special-heading.av-lfz5c164-270ee351baae44051095caf886316647{\npadding-bottom:10px;\ncolor:#ffffff;\n}\nbody .av-special-heading.av-lfz5c164-270ee351baae44051095caf886316647 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lfz5c164-270ee351baae44051095caf886316647 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-lfz5c164-270ee351baae44051095caf886316647 .av-subheading{\nfont-size:18px;\n}\nbody .av-special-heading.av-lfz5c164-270ee351baae44051095caf886316647 .av-special-heading-tag .heading-wrap:before{\nborder-color:#ffffff;\n}\nbody .av-special-heading.av-lfz5c164-270ee351baae44051095caf886316647 .av-special-heading-tag .heading-wrap:after{\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='av-special-heading av-lfz5c164-270ee351baae44051095caf886316647 av-special-heading-h1 custom-color-heading blockquote elegant-quote elegant-centered  avia-builder-el-3  el_after_av_hr  el_before_av_hr '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><span class=\"heading-wrap\">CIBERSEGURIDAD<\/span><\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-if5j5x-cda982f9723400a2a71013183981c051\">\n#top .hr.hr-invisible.av-if5j5x-cda982f9723400a2a71013183981c051{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-if5j5x-cda982f9723400a2a71013183981c051 hr-invisible  avia-builder-el-4  el_after_av_heading  el_before_av_hr '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-i30put-694f342e7af06a1bae08f5d49e60cf65\">\n#top .hr.hr-invisible.av-i30put-694f342e7af06a1bae08f5d49e60cf65{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-i30put-694f342e7af06a1bae08f5d49e60cf65 hr-invisible  avia-builder-el-5  el_after_av_hr  el_before_av_hr '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-fe4ul1-8765fbb095c6ff08a6be1077b640bccd\">\n#top .hr.hr-invisible.av-fe4ul1-8765fbb095c6ff08a6be1077b640bccd{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-fe4ul1-8765fbb095c6ff08a6be1077b640bccd hr-invisible  avia-builder-el-6  el_after_av_hr  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8429'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17pv1ug-383febf90c2a7a4dbd995a8776a78b08\">\n#top .av_textblock_section.av-m17pv1ug-383febf90c2a7a4dbd995a8776a78b08 .avia_textblock{\nfont-size:14px;\ntext-align:justify;\n}\n<\/style>\n<section  class='av_textblock_section av-m17pv1ug-383febf90c2a7a4dbd995a8776a78b08 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: left;\"><strong>La importancia de la ciberseguridad<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4300 size-full\" src=\"https:\/\/rcgherco.com\/wp-content\/uploads\/2023\/05\/Rectangle-24@2x-e1683869946287.png\" alt=\"\" width=\"44\" height=\"8\" srcset=\"https:\/\/rcg-global.com\/wp-content\/uploads\/2023\/05\/Rectangle-24@2x-e1683869946287.png 44w, https:\/\/rcg-global.com\/wp-content\/uploads\/2023\/05\/Rectangle-24@2x-e1683869946287-36x8.png 36w\" sizes=\"auto, (max-width: 44px) 100vw, 44px\" \/><\/p>\n<p>En la era digital actual, en la que las ciberamenazas est\u00e1n siempre al acecho, la seguridad en l\u00ednea es una prioridad absoluta. La consultor\u00eda de riesgos de ciberseguridad ha surgido como un recurso esencial, que ayuda a las empresas a mantener su informaci\u00f3n a salvo. Algunos puntos importantes sobre el papel de esta consultor\u00eda:<\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17pxt07-dcfc6ff9581d12d29cc272d03cb41d0e\">\n.avia-section.av-m17pxt07-dcfc6ff9581d12d29cc272d03cb41d0e{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-m17pxt07-dcfc6ff9581d12d29cc272d03cb41d0e main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-8  el_after_av_textblock  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8429'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17q15vy-af8f02a3dd65412f06610f593a753ae1\">\n.flex_column.av-m17q15vy-af8f02a3dd65412f06610f593a753ae1{\npadding:10px 0 0 0;\n}\n<\/style>\n<div  class='flex_column av-m17q15vy-af8f02a3dd65412f06610f593a753ae1 av_two_third  avia-builder-el-9  el_before_av_one_third  avia-builder-el-first  first flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17q29lh-7cea6bb55e793fa01eb5a0815605f118\">\n#top .av_textblock_section.av-m17q29lh-7cea6bb55e793fa01eb5a0815605f118 .avia_textblock{\nfont-size:14px;\ntext-align:justify;\n}\n<\/style>\n<section  class='av_textblock_section av-m17q29lh-7cea6bb55e793fa01eb5a0815605f118 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>Identificaci\u00f3n de riesgos: Los consultores de ciberseguridad eval\u00faan los puntos d\u00e9biles de una empresa. Examinan los sistemas, redes, pol\u00edticas de seguridad y procesos existentes para ver por d\u00f3nde pueden colarse los piratas inform\u00e1ticos y qu\u00e9 riesgos pueden entra\u00f1ar estas intrusiones para la empresa. <\/li>\n<li>Estrategias personalizadas: A partir de estas evaluaciones, los consultores desarrollan planes de seguridad adaptados al objetivo de la empresa. Esto significa adoptar medidas espec\u00edficas para las necesidades de cada cliente. <\/li>\n<li>Aplicaci\u00f3n de medidas avanzadas: Adem\u00e1s de crear planes, los consultores ayudan a ponerlos en pr\u00e1ctica. Ayudan a implantar mejoras como SIEM, SOC, campa\u00f1as de concienciaci\u00f3n y otras soluciones. <\/li>\n<li>Respuesta a incidentes: Cuando se produce un ataque, los asesores est\u00e1n ah\u00ed para ayudar a hacer frente a la situaci\u00f3n. Trabajan para ayudar a contener el problema y minimizar los da\u00f1os. <\/li>\n<li>Cumplimiento normativo: Con tantas normas sobre seguridad de los datos, las empresas necesitan mantenerse al d\u00eda. Los consultores de ciberseguridad ayudan a garantizar que se marcan todas las casillas reglamentarias. <\/li>\n<\/ul>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17q4osl-0a137e3639754e829959f781567bc557\">\n.flex_column.av-m17q4osl-0a137e3639754e829959f781567bc557{\npadding:10px 0 0 0;\n}\n<\/style>\n<div  class='flex_column av-m17q4osl-0a137e3639754e829959f781567bc557 av_one_third  avia-builder-el-11  el_after_av_two_third  el_before_av_textblock  flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17q8eng-5bf68ac9ebf467cc53bd471ec382cdf5\">\n.avia-image-container.av-m17q8eng-5bf68ac9ebf467cc53bd471ec382cdf5 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-m17q8eng-5bf68ac9ebf467cc53bd471ec382cdf5 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-m17q8eng-5bf68ac9ebf467cc53bd471ec382cdf5 av-styling- avia-align-center  avia-builder-el-12  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-8439 avia-img-lazy-loading-not-8439 avia_image ' src=\"https:\/\/rcg-global.com\/wp-content\/uploads\/2024\/09\/escudo-1.png\" alt='' title='escudo-1'  height=\"411\" width=\"344\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/rcg-global.com\/wp-content\/uploads\/2024\/09\/escudo-1.png 344w, https:\/\/rcg-global.com\/wp-content\/uploads\/2024\/09\/escudo-1-251x300.png 251w\" sizes=\"(max-width: 344px) 100vw, 344px\" \/><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qa2bc-e050e47e8bf16dfd38e2c8e7107cd0bb\">\n#top .av_textblock_section.av-m17qa2bc-e050e47e8bf16dfd38e2c8e7107cd0bb .avia_textblock{\nfont-size:14px;\ntext-align:justify;\n}\n<\/style>\n<section  class='av_textblock_section av-m17qa2bc-e050e47e8bf16dfd38e2c8e7107cd0bb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Aqu\u00ed es donde entra en juego la consultor\u00eda de ciberseguridad. Estos expertos proporcionan orientaci\u00f3n y apoyo especializados para ayudar a las empresas a identificar vulnerabilidades, desarrollar estrategias de seguridad personalizadas y aplicar medidas preventivas. Con su ayuda, las organizaciones pueden reforzar sus defensas digitales, mitigar los riesgos y mantener la confianza de sus clientes y socios. En resumen, la consultor\u00eda de ciberseguridad desempe\u00f1a un papel vital en la defensa de las fronteras digitales de las empresas en un mundo cada vez m\u00e1s conectado y amenazador.<\/p>\n<\/div><\/section>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qbyhz-67b7e44622d39b1c48d692ad0cbba51d\">\n.avia-section.av-m17qbyhz-67b7e44622d39b1c48d692ad0cbba51d{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-m17qbyhz-67b7e44622d39b1c48d692ad0cbba51d main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-14  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8429'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qd71c-27ea86682d49f2b89c8ea76f153d194f\">\n.flex_column.av-m17qd71c-27ea86682d49f2b89c8ea76f153d194f{\npadding:10px 0 0 0;\n}\n<\/style>\n<div  class='flex_column av-m17qd71c-27ea86682d49f2b89c8ea76f153d194f av_one_full  avia-builder-el-15  avia-builder-el-no-sibling  first flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qdnwp-b1e619bda128cb615e8c5744c010942e\">\n#top .av_textblock_section.av-m17qdnwp-b1e619bda128cb615e8c5744c010942e .avia_textblock{\nfont-size:14px;\ntext-align:justify;\n}\n<\/style>\n<section  class='av_textblock_section av-m17qdnwp-b1e619bda128cb615e8c5744c010942e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: left;\"><strong>\u00bfCU\u00c1LES SON LAS VENTAJAS DE INVERTIR EN CIBERSEGURIDAD?<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4300 size-full alignleft\" src=\"https:\/\/rcgherco.com\/wp-content\/uploads\/2023\/05\/Rectangle-24@2x-e1683869946287.png\" alt=\"\" width=\"44\" height=\"8\" srcset=\"https:\/\/rcg-global.com\/wp-content\/uploads\/2023\/05\/Rectangle-24@2x-e1683869946287.png 44w, https:\/\/rcg-global.com\/wp-content\/uploads\/2023\/05\/Rectangle-24@2x-e1683869946287-36x8.png 36w\" sizes=\"auto, (max-width: 44px) 100vw, 44px\" \/><\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qewh4-e08756c93ad36a2e6eae14d7d89fb659\">\n.avia-section.av-m17qewh4-e08756c93ad36a2e6eae14d7d89fb659{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-m17qewh4-e08756c93ad36a2e6eae14d7d89fb659 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-17  el_after_av_section  el_before_av_hr  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8429'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-m17qfvn1-61b8a444e5dc1c115d4abaaf59afad93 av_one_half  avia-builder-el-18  el_before_av_one_half  avia-builder-el-first  first flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qiiig-4d0bfac5dd617be6db82bd60182c382f\">\n.avia-image-container.av-m17qiiig-4d0bfac5dd617be6db82bd60182c382f img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-m17qiiig-4d0bfac5dd617be6db82bd60182c382f .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-m17qiiig-4d0bfac5dd617be6db82bd60182c382f av-styling- avia-align-center  avia-builder-el-19  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-8442 avia-img-lazy-loading-not-8442 avia_image ' src=\"https:\/\/rcg-global.com\/wp-content\/uploads\/2024\/09\/Rectangle-131-180x135-1.png\" alt='' title='Rectangle-131-180x135'  height=\"135\" width=\"180\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17ql9e3-914cd8268d8377e493d64d6b058a2577\">\n#top .hr.av-m17ql9e3-914cd8268d8377e493d64d6b058a2577{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n.hr.av-m17ql9e3-914cd8268d8377e493d64d6b058a2577 .hr-inner{\nwidth:30;\nborder-color:#ffffff;\nmax-width:45%;\n}\n.hr.av-m17ql9e3-914cd8268d8377e493d64d6b058a2577 .av-seperator-icon{\ncolor:#ffffff;\n}\n.hr.av-m17ql9e3-914cd8268d8377e493d64d6b058a2577 .av-seperator-icon.avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<div  class='hr av-m17ql9e3-914cd8268d8377e493d64d6b058a2577 hr-custom  avia-builder-el-20  el_after_av_image  el_before_av_textblock  hr-center hr-icon-yes'><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><span class='av-seperator-icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' ><\/span><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qmcmv-db1a96254021485cdbe425cad7192ad1\">\n#top .av_textblock_section.av-m17qmcmv-db1a96254021485cdbe425cad7192ad1 .avia_textblock{\nfont-size:14px;\ntext-align:justify;\n}\n<\/style>\n<section  class='av_textblock_section av-m17qmcmv-db1a96254021485cdbe425cad7192ad1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><\/h3>\n<h3 style=\"text-align: center;\">RESPUESTA R\u00c1PIDA A INCIDENTES<\/h3>\n<p>Con la estructura del SOC y el plan de respuesta a incidentes, la empresa podr\u00e1 responder r\u00e1pidamente a posibles amenazas, minimizando el tiempo de exposici\u00f3n y los da\u00f1os derivados de los ataques.<\/p>\n<\/div><\/section><\/p><\/div><div  class='flex_column av-20nhqj-8603b5b41c49ac2016885ccd7505e37b av_one_half  avia-builder-el-22  el_after_av_one_half  avia-builder-el-last  flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qjhsr-29a2929b8836ce99de37b0e89252d5b3\">\n.avia-image-container.av-m17qjhsr-29a2929b8836ce99de37b0e89252d5b3 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-m17qjhsr-29a2929b8836ce99de37b0e89252d5b3 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-m17qjhsr-29a2929b8836ce99de37b0e89252d5b3 av-styling- avia-align-center  avia-builder-el-23  el_before_av_hr  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-8445 avia-img-lazy-loading-not-8445 avia_image ' src=\"https:\/\/rcg-global.com\/wp-content\/uploads\/2024\/09\/Rectangle-132-180x135-1.png\" alt='' title='Rectangle-132-180x135'  height=\"135\" width=\"180\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qlwcq-365276686ac628a23d5adaa002463678\">\n#top .hr.av-m17qlwcq-365276686ac628a23d5adaa002463678{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n.hr.av-m17qlwcq-365276686ac628a23d5adaa002463678 .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\nmax-width:45%;\n}\n.hr.av-m17qlwcq-365276686ac628a23d5adaa002463678 .av-seperator-icon{\ncolor:#ffffff;\n}\n.hr.av-m17qlwcq-365276686ac628a23d5adaa002463678 .av-seperator-icon.avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<div  class='hr av-m17qlwcq-365276686ac628a23d5adaa002463678 hr-custom  avia-builder-el-24  el_after_av_image  el_before_av_textblock  hr-center hr-icon-yes'><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><span class='av-seperator-icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' ><\/span><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qmokw-982cd706a8e9f25182b4ea2670ea066b\">\n#top .av_textblock_section.av-m17qmokw-982cd706a8e9f25182b4ea2670ea066b .avia_textblock{\nfont-size:14px;\ntext-align:justify;\n}\n<\/style>\n<section  class='av_textblock_section av-m17qmokw-982cd706a8e9f25182b4ea2670ea066b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><\/h3>\n<h3 style=\"text-align: center;\">REDUCIR RIESGOS Y COSTES<\/h3>\n<p>Al mitigar los riesgos de seguridad, la empresa reducir\u00e1 la probabilidad de que se produzcan incidentes de seguridad, minimizando las posibles p\u00e9rdidas econ\u00f3micas y los impactos negativos sobre la reputaci\u00f3n.<\/p>\n<\/div><\/section><\/p><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_4'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8429'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qnig0-330f5f3691b6459f09011b7eea51ea91\">\n#top .hr.av-m17qnig0-330f5f3691b6459f09011b7eea51ea91{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n.hr.av-m17qnig0-330f5f3691b6459f09011b7eea51ea91 .hr-inner{\nwidth:30;\nborder-color:#ffffff;\nmax-width:45%;\n}\n.hr.av-m17qnig0-330f5f3691b6459f09011b7eea51ea91 .av-seperator-icon{\ncolor:#ffffff;\n}\n.hr.av-m17qnig0-330f5f3691b6459f09011b7eea51ea91 .av-seperator-icon.avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<div  class='hr av-m17qnig0-330f5f3691b6459f09011b7eea51ea91 hr-custom  avia-builder-el-26  el_after_av_section  el_before_av_one_full  avia-builder-el-first  hr-center hr-icon-yes'><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><span class='av-seperator-icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' ><\/span><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qpvma-adeb5198710e7cc43a72b31f5fad3983\">\n#top .flex_column.av-m17qpvma-adeb5198710e7cc43a72b31f5fad3983{\nmargin-top:10px;\nmargin-bottom:10px;\n}\n.flex_column.av-m17qpvma-adeb5198710e7cc43a72b31f5fad3983{\nborder-radius:1px 1px 1px 1px;\npadding:5px 5px 5px 5px;\n}\n.responsive #top #wrap_all .flex_column.av-m17qpvma-adeb5198710e7cc43a72b31f5fad3983{\nmargin-top:10px;\nmargin-bottom:10px;\n}\n<\/style>\n<div  class='flex_column av-m17qpvma-adeb5198710e7cc43a72b31f5fad3983 av_one_full  avia-builder-el-27  el_after_av_hr  avia-builder-el-last  first flex_column_div av-animated-generic fade-in  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17qsgls-91f29a59249e3aeacbce427699e555b8\">\n#top .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8{\nmargin:10px 10px 10px 10px;\npadding-bottom:10px;\ncolor:#d51317;\nfont-size:28px;\n}\nbody .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-special-heading-tag{\nfont-size:28px;\npadding:10px 10px 10px 10px;\n}\n.av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-subheading{\nfont-size:18px;\ncolor:#d51317;\n}\nbody .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-special-heading-tag .heading-wrap:before{\nborder-color:#ffffff;\n}\nbody .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-special-heading-tag .heading-wrap:after{\nborder-color:#ffffff;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-m17qsgls-91f29a59249e3aeacbce427699e555b8 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-m17qsgls-91f29a59249e3aeacbce427699e555b8 av-special-heading-h3 custom-color-heading blockquote elegant-quote elegant-centered  avia-builder-el-28  el_before_av_toggle_container  avia-builder-el-first  av-inherit-size'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  ><span class=\"heading-wrap\">M\u00e1s informaci\u00f3n sobre nuestros servicios<\/span><\/h3><div class='av_custom_color av-subheading av-subheading_below'><p>Consulta los principales servicios de ciberseguridad<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4\">\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler{\ncolor:#000000;\nbackground-color:#ffffff;\nborder-color:#b02b2c;\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler.activeTitle{\ncolor:#ffffff;\nborder-color:#ffffff;\nbackground-color:#d51317;\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler:not(.activeTitle):hover{\ncolor:#ffffff;\nbackground-color:rgba(213,19,23,0.8);\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler:not(.activeTitle):hover .toggle_icon, #top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler:not(.activeTitle):hover .toggle_icon *{\nborder-color:#b02b2c !important;\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler .toggle_icon{\ncolor:#000000;\nborder-color:#000000;\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler .toggle_icon > span{\ncolor:#000000;\nborder-color:#000000;\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler.activeTitle .toggle_icon, #top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 p.toggler.activeTitle .toggle_icon > span{\ncolor:#ffffff;\nborder-color:#ffffff;\n}\n#top .togglecontainer.av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 .toggle_wrap .toggle_content{\ncolor:#000000;\nbackground-color:#ffffff;\nborder-color:#b02b2c;\n}\n<\/style>\n<div  class='togglecontainer av-m17r0ghy-e5559c8df1208dc9bfc55e79de3e42a4 av-elegant-toggle  avia-builder-el-29  el_after_av_heading  el_before_av_button  toggle_close_all' >\n<section class='av_toggle_section av-m17qv49r-fbdc7e9a381a05e31e790739ff13fcd2'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{Todo} \"  ><p id='toggle-toggle-id-1' data-fake-id='#toggle-id-1' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"headline\"  role='tab' tabindex='0' aria-controls='toggle-id-1' data-slide-speed=\"200\" data-title=\"Evaluaci\u00f3n de la ciberseguridad  \" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Evaluaci\u00f3n de la ciberseguridad  \" data-aria_expanded=\"Click to collapse: Evaluaci\u00f3n de la ciberseguridad  \">Evaluaci\u00f3n de la ciberseguridad  <span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-1' aria-labelledby='toggle-toggle-id-1' role='region' class='toggle_wrap  av-title-above'  ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Nuestro servicio pretende analizar el proceso de recopilaci\u00f3n de informaci\u00f3n, empezando por una reuni\u00f3n preliminar en la que realizamos un estudio detallado de la informaci\u00f3n esencial. Este proceso est\u00e1 guiado por nuestro principio de inmersi\u00f3n, que garantiza que tengamos una comprensi\u00f3n completa de las necesidades y requisitos. Durante esta reuni\u00f3n, nos centramos en crear las herramientas necesarias, como cuestionarios y guiones de entrevistas, que se utilizar\u00e1n durante todo el proceso de recogida.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-m17qvf82-88ec43def0f55ade63b520dfc045c39f'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{Todo} \"  ><p id='toggle-toggle-id-2' data-fake-id='#toggle-id-2' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"headline\"  role='tab' tabindex='0' aria-controls='toggle-id-2' data-slide-speed=\"200\" data-title=\"WAF - Cortafuegos de Aplicaciones Web\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: WAF - Cortafuegos de Aplicaciones Web\" data-aria_expanded=\"Click to collapse: WAF - Cortafuegos de Aplicaciones Web\">WAF - Cortafuegos de Aplicaciones Web<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-2' aria-labelledby='toggle-toggle-id-2' role='region' class='toggle_wrap  av-title-above'  ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Ofrecemos un escudo virtual integral que protege todos los entornos expuestos en Internet, proporcionando una zona de seguridad avanzada para aplicaciones web de cualquier complejidad. Mediante el uso de inteligencia artificial, nuestra soluci\u00f3n no s\u00f3lo detecta nuevos ataques, sino que define autom\u00e1ticamente las acciones necesarias para proteger tu sistema, sin requerir la interferencia del cliente ni de nuestro equipo t\u00e9cnico. Integrada con el Cortafuegos de Aplicaciones Web (WAF), nuestra soluci\u00f3n incluye una exclusiva CDN (Content Delivery Network), una red de distribuci\u00f3n de contenidos que acelera la entrega de informaci\u00f3n web a un gran n\u00famero de usuarios, aumentando el rendimiento del entorno y ofreciendo otras ventajas diversas. Nuestra tecnolog\u00eda WAF bloquea una amplia gama de ataques, garantizando as\u00ed un entorno estable y libre de cualquier inestabilidad.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-m17qyv15-8e5affb31d7bd700bba6b53be0f2826f'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{Todo} \"  ><p id='toggle-toggle-id-3' data-fake-id='#toggle-id-3' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"headline\"  role='tab' tabindex='0' aria-controls='toggle-id-3' data-slide-speed=\"200\" data-title=\"Programa de sensibilizaci\u00f3n sobre seguridad de la informaci\u00f3n\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Programa de sensibilizaci\u00f3n sobre seguridad de la informaci\u00f3n\" data-aria_expanded=\"Click to collapse: Programa de sensibilizaci\u00f3n sobre seguridad de la informaci\u00f3n\">Programa de sensibilizaci\u00f3n sobre seguridad de la informaci\u00f3n<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-3' aria-labelledby='toggle-toggle-id-3' role='region' class='toggle_wrap  av-title-above'  ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Nuestro objetivo es establecer una cultura de seguridad s\u00f3lida y proactiva, garantizando que todos los empleados est\u00e9n bien informados y capacitados para afrontar los retos de seguridad.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-m17qz60z-33e21738cd9e5fb0679c987ec8b0a68f'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{Todo} \"  ><p id='toggle-toggle-id-4' data-fake-id='#toggle-id-4' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"headline\"  role='tab' tabindex='0' aria-controls='toggle-id-4' data-slide-speed=\"200\" data-title=\"Desarrollo y aplicaci\u00f3n del plan de respuesta a incidentes (IRP)\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Desarrollo y aplicaci\u00f3n del plan de respuesta a incidentes (IRP)\" data-aria_expanded=\"Click to collapse: Desarrollo y aplicaci\u00f3n del plan de respuesta a incidentes (IRP)\">Desarrollo y aplicaci\u00f3n del plan de respuesta a incidentes (IRP)<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-4' aria-labelledby='toggle-toggle-id-4' role='region' class='toggle_wrap  av-title-above'  ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Nuestro objetivo es proporcionar un plan eficaz y probado que permita a tu organizaci\u00f3n responder a los incidentes de seguridad de forma \u00e1gil y coordinada.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-m17qzo3v-7b67d45125fa8afc7498e77ffe8e5fc8'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{Todo} \"  ><p id='toggle-toggle-id-5' data-fake-id='#toggle-id-5' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"headline\"  role='tab' tabindex='0' aria-controls='toggle-id-5' data-slide-speed=\"200\" data-title=\"Evaluaci\u00f3n y gesti\u00f3n de riesgos para terceros y usuarios con acceso a informaci\u00f3n sensible  \" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Evaluaci\u00f3n y gesti\u00f3n de riesgos para terceros y usuarios con acceso a informaci\u00f3n sensible  \" data-aria_expanded=\"Click to collapse: Evaluaci\u00f3n y gesti\u00f3n de riesgos para terceros y usuarios con acceso a informaci\u00f3n sensible  \">Evaluaci\u00f3n y gesti\u00f3n de riesgos para terceros y usuarios con acceso a informaci\u00f3n sensible  <span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-5' aria-labelledby='toggle-toggle-id-5' role='region' class='toggle_wrap  av-title-above'  ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Aqu\u00ed nos centramos en aplicar un programa completo de evaluaci\u00f3n y gesti\u00f3n de riesgos para terceros y usuarios con acceso a informaci\u00f3n sensible o datos personales (PII). Nuestro principal objetivo es garantizar la seguridad e integridad de los datos de tu empresa, protegi\u00e9ndolos de amenazas tanto internas como externas.<\/p>\n<\/div><\/div><\/div><\/section>\n<section class='av_toggle_section av-m17r03b9-94bc2eb41569e8554dd64c6855b1695c'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div role=\"tablist\" class=\"single_toggle\" data-tags=\"{Todo} \"  ><p id='toggle-toggle-id-6' data-fake-id='#toggle-id-6' class='toggler  av-title-above av-inherit-border-color'  itemprop=\"headline\"  role='tab' tabindex='0' aria-controls='toggle-id-6' data-slide-speed=\"200\" data-title=\"Evaluar y actualizar el plan de recuperaci\u00f3n en caso de cat\u00e1strofe (DRP)\" data-title-open=\"\" data-aria_collapsed=\"Click to expand: Evaluar y actualizar el plan de recuperaci\u00f3n en caso de cat\u00e1strofe (DRP)\" data-aria_expanded=\"Click to collapse: Evaluar y actualizar el plan de recuperaci\u00f3n en caso de cat\u00e1strofe (DRP)\">Evaluar y actualizar el plan de recuperaci\u00f3n en caso de cat\u00e1strofe (DRP)<span class=\"toggle_icon\"><span class=\"vert_icon\"><\/span><span class=\"hor_icon\"><\/span><\/span><\/p><div id='toggle-id-6' aria-labelledby='toggle-toggle-id-6' role='region' class='toggle_wrap  av-title-above'  ><div class='toggle_content invers-color av-inherit-border-color'  itemprop=\"text\" ><p>Aqu\u00ed nos centramos en aplicar un programa completo de evaluaci\u00f3n y gesti\u00f3n de riesgos para terceros y usuarios con acceso a informaci\u00f3n sensible o datos personales (PII). Nuestro principal objetivo es garantizar la seguridad e integridad de los datos de tu empresa, protegi\u00e9ndolos de amenazas tanto internas como externas.<\/p>\n<\/div><\/div><\/div><\/section>\n<\/div><br \/>\n<div  class='avia-button-wrap av-m3stjphg-672e14d8ad29fb4acd583cc4bc44b4a3-wrap avia_animated_button av-animated-when-visible-95 fade-in-up avia-button-center  avia-builder-el-30  el_after_av_toggle_container  el_before_av_hr '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m3stjphg-672e14d8ad29fb4acd583cc4bc44b4a3\">\n#top #wrap_all .avia-button.av-m3stjphg-672e14d8ad29fb4acd583cc4bc44b4a3{\nfont-size:20px;\nbox-shadow: 1px 1px 1px 1px #706f6f;\ntransition:all 0.4s ease-in-out;\npadding:5px 5px 5px 5px;\n}\n<\/style>\n<a href='https:\/\/rcgherco.com\/es\/atencion-comercial\/'  class='avia-button av-m3stjphg-672e14d8ad29fb4acd583cc4bc44b4a3 av-link-btn avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color'   aria-label=\"\u00a1Contacta a nuestros consultores!\"><span class='avia_iconbox_title' >\u00a1Contacta a nuestros consultores!<\/span><\/a><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m17r1aiv-8be1cc6c174a4197b1c5ebd77d2a9cca\">\n#top .hr.av-m17r1aiv-8be1cc6c174a4197b1c5ebd77d2a9cca{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n.hr.av-m17r1aiv-8be1cc6c174a4197b1c5ebd77d2a9cca .hr-inner{\nwidth:30;\nborder-color:#ffffff;\nmax-width:45%;\n}\n.hr.av-m17r1aiv-8be1cc6c174a4197b1c5ebd77d2a9cca .av-seperator-icon{\ncolor:#ffffff;\n}\n.hr.av-m17r1aiv-8be1cc6c174a4197b1c5ebd77d2a9cca .av-seperator-icon.avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<div  class='hr av-m17r1aiv-8be1cc6c174a4197b1c5ebd77d2a9cca hr-custom  avia-builder-el-31  el_after_av_button  avia-builder-el-last  hr-center hr-icon-yes'><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><span class='av-seperator-icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' ><\/span><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":0,"parent":5429,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"class_list":["post-8429","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/pages\/8429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/comments?post=8429"}],"version-history":[{"count":10,"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/pages\/8429\/revisions"}],"predecessor-version":[{"id":8526,"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/pages\/8429\/revisions\/8526"}],"up":[{"embeddable":true,"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/pages\/5429"}],"wp:attachment":[{"href":"https:\/\/rcg-global.com\/es\/wp-json\/wp\/v2\/media?parent=8429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}