{"id":1137,"date":"2025-12-13T12:38:49","date_gmt":"2025-12-13T12:38:49","guid":{"rendered":"https:\/\/radicaloffice.es\/?page_id=1137"},"modified":"2025-12-13T12:39:35","modified_gmt":"2025-12-13T12:39:35","slug":"elementor-1137","status":"publish","type":"page","link":"https:\/\/radicaloffice.es\/?page_id=1137","title":{"rendered":"Auditor\u00eda de seguridad"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1137\" class=\"elementor elementor-1137\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93b53ac e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"93b53ac\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ceb22ac elementor-widget elementor-widget-text-editor\" data-id=\"ceb22ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"entry-header \" style=\"color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 15px;\"><div class=\"entry-header-inner\"><h1 class=\"entry-title\" style=\"margin-top: 0px; margin-bottom: 0.3125em; font-size: 2.48832em; color: #303133; line-height: 1.5; text-rendering: optimizelegibility; overflow-wrap: break-word;\">Auditor\u00eda de seguridad<\/h1><\/div><\/header><div class=\"post-entry tc-content-inner\" style=\"color: #777777; max-width: 100%; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 15px;\"><section class=\"post-content entry-content \" style=\"counter-reset: footnotes 0; color: #444444; font-size: 1.2em; line-height: 1.55em; margin: 0px 0px 2em;\"><div class=\"czr-wp-the-content\"><h2 class=\"wp-block-heading\" style=\"margin-top: 1.25em; margin-bottom: 0.5rem; font-size: 2.0736em; color: #303133; line-height: 1.25em; text-rendering: optimizelegibility;\">\u00bfPreocupados por vuestra seguridad?<\/h2><p style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\">En Radical Office somos\u00a0<span style=\"font-weight: bold;\">especialistas\u00a0<\/span>en la\u00a0<span style=\"font-weight: bold;\">Seguridad de las empresas<\/span>, siendo esta una pieza clave en el s\u00ed de las organizaciones actuales, dada la alta dependencia de los\u00a0<span style=\"font-weight: bold;\">datos\u00a0<\/span>y\u00a0<span style=\"font-weight: bold;\">sistemas inform\u00e1ticos y digitales<\/span>\u00a0en general que estas precisan. Por ello, desde Radical Office proponemos una\u00a0<span style=\"font-weight: bold;\">Auditor\u00eda de Seguridad<\/span>\u00a0de la\u00a0<span style=\"font-weight: bold;\">infraestructura\u00a0<\/span>IT de las\u00a0<span style=\"font-weight: bold;\">organizaciones<\/span>, para garantizar que estas toman las\u00a0<span style=\"font-weight: bold;\">medidas de seguridad<\/span>\u00a0necesarias, as\u00ed como propuestas de los puntos de mejora.<\/p><h2 class=\"wp-block-heading\" style=\"margin-top: 1.25em; margin-bottom: 0.5rem; font-size: 2.0736em; color: #303133; line-height: 1.25em; text-rendering: optimizelegibility;\">\u00a0Analizamos<\/h2><ul class=\"wp-block-list\" style=\"margin-right: 0px; margin-left: 0px; list-style: outside square; padding: 0.5rem 0px 1rem 3rem;\"><li class=\"\" style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/icon1a.png\" alt=\"\" \/>Vuestra\u00a0<span style=\"font-weight: bold;\">visibilidad\u00a0<\/span>en internet<\/li><li class=\"\" style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/icon2a.png\" alt=\"\" width=\"100\" height=\"100\" \/>Posibles\u00a0<span style=\"font-weight: bold;\">fugas de informaci\u00f3n<\/span><\/li><li class=\"\" style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/icon3a.png\" alt=\"\" width=\"100\" height=\"100\" \/>Pol\u00edtica de\u00a0<span style=\"font-weight: bold;\">recuperaci\u00f3n\u00a0<\/span>ante\u00a0<span style=\"font-weight: bold;\">desastres<\/span><\/li><li class=\"\" style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/icon4a.png\" alt=\"\" width=\"100\" height=\"100\" \/><span style=\"font-weight: bold;\">Pol\u00edtica\u00a0<\/span>de\u00a0<span style=\"font-weight: bold;\">credenciales<\/span><\/li><\/ul><h2 class=\"wp-block-heading\" style=\"margin-top: 1.25em; margin-bottom: 0.5rem; font-size: 2.0736em; color: #303133; line-height: 1.25em; text-rendering: optimizelegibility;\">Fases de la Auditor\u00eda de Seguridad<\/h2><ul class=\"wp-block-list\" style=\"margin-right: 0px; margin-left: 0px; list-style: outside square; padding: 0.5rem 0px 1rem 3rem;\"><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Recopilaci\u00f3n de informaci\u00f3n.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">An\u00e1lisis de la situaci\u00f3n actual.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Detecci\u00f3n de los riesgos y sus consecuencias.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Informe de la auditor\u00eda detallado.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Propuesta del plan de acci\u00f3n y soluciones.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Planes de mantenimiento y continuidad del proyecto.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Acciones de futuro: Mejoras de infraestructuras y servicios.<\/li><li style=\"line-height: 1.55em; padding: 0.25rem 0.5rem;\">Asesor\u00eda y consultor\u00eda preventiva.<\/li><\/ul><h2 class=\"wp-block-heading\" style=\"margin-top: 1.25em; margin-bottom: 0.5rem; font-size: 2.0736em; color: #303133; line-height: 1.25em; text-rendering: optimizelegibility;\">Chequeo integral de seguridad<\/h2><p class=\"\" style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/ic6.png\" alt=\"\" \/>Auditor\u00eda de seguridad externa<\/p><p class=\"\" style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/ic2-1.png\" alt=\"\" \/>An\u00e1lisis de visualizaci\u00f3n a internet<\/p><p class=\"\" style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/ic4-1.png\" alt=\"\" \/>Fugas de informaci\u00f3n<\/p><p class=\"\" style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/ic5-1.png\" alt=\"\" \/>B\u00fasqueda de informaci\u00f3n ya filtrada<\/p><p class=\"\" style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/ic3-1.png\" alt=\"\" \/>Pol\u00edtica de credenciales y accesos<\/p><p class=\"\" style=\"margin-top: 1.25em; margin-bottom: 1rem; overflow-wrap: break-word;\"><img decoding=\"async\" class=\"tc-smart-loaded\" style=\"vertical-align: middle;\" src=\"https:\/\/www.vunkers.com\/wp-content\/uploads\/2018\/08\/ic1-1.png\" alt=\"\" \/>Pol\u00edtica de configuraci\u00f3n y recuperaci\u00f3n ante desastres<\/p><\/div><\/section><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Auditor\u00eda de seguridad \u00bfPreocupados por vuestra seguridad? En Radical Office somos\u00a0especialistas\u00a0en la\u00a0Seguridad de las empresas, siendo esta una pieza clave en el s\u00ed de las organizaciones actuales, dada la alta dependencia de los\u00a0datos\u00a0y\u00a0sistemas inform\u00e1ticos y digitales\u00a0en general que estas precisan. Por ello, desde Radical Office proponemos una\u00a0Auditor\u00eda de Seguridad\u00a0de la\u00a0infraestructura\u00a0IT de las\u00a0organizaciones, para garantizar que estas toman las\u00a0medidas de seguridad\u00a0necesarias, as\u00ed como propuestas de los puntos de mejora. \u00a0Analizamos Vuestra\u00a0visibilidad\u00a0en internet Posibles\u00a0fugas de informaci\u00f3n Pol\u00edtica de\u00a0recuperaci\u00f3n\u00a0ante\u00a0desastres Pol\u00edtica\u00a0de\u00a0credenciales Fases de la Auditor\u00eda de Seguridad Recopilaci\u00f3n de informaci\u00f3n. An\u00e1lisis de la situaci\u00f3n actual. Detecci\u00f3n de los riesgos y sus consecuencias. Informe de la auditor\u00eda detallado. Propuesta del plan de acci\u00f3n y soluciones. Planes de mantenimiento y continuidad del proyecto. Acciones de futuro: Mejoras de infraestructuras y servicios. Asesor\u00eda y consultor\u00eda preventiva. Chequeo integral de seguridad Auditor\u00eda de seguridad externa An\u00e1lisis de visualizaci\u00f3n a internet Fugas de informaci\u00f3n B\u00fasqueda de informaci\u00f3n ya filtrada Pol\u00edtica de credenciales y accesos Pol\u00edtica de configuraci\u00f3n y recuperaci\u00f3n ante desastres<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1137","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/radicaloffice.es\/index.php?rest_route=\/wp\/v2\/pages\/1137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/radicaloffice.es\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/radicaloffice.es\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/radicaloffice.es\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/radicaloffice.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1137"}],"version-history":[{"count":7,"href":"https:\/\/radicaloffice.es\/index.php?rest_route=\/wp\/v2\/pages\/1137\/revisions"}],"predecessor-version":[{"id":1144,"href":"https:\/\/radicaloffice.es\/index.php?rest_route=\/wp\/v2\/pages\/1137\/revisions\/1144"}],"wp:attachment":[{"href":"https:\/\/radicaloffice.es\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}