{"id":196,"date":"2016-04-08T01:57:26","date_gmt":"2016-04-08T06:57:26","guid":{"rendered":"https:\/\/kryptogenesis.com.co\/kportal\/?page_id=196"},"modified":"2019-12-05T00:27:18","modified_gmt":"2019-12-05T05:27:18","slug":"seguridad-de-la-informacion-2","status":"publish","type":"page","link":"https:\/\/kryptogenesis.com.co\/?page_id=196","title":{"rendered":"Seguridad de la Informaci\u00f3n"},"content":{"rendered":"<div id=\"pl-196\"  class=\"panel-layout\" ><div id=\"pg-196-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-196-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-196-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-219 size-full\" src=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/seguridad-informacion-kryptogenesis.png\" alt=\"seguridad-informacion-kryptogenesis\" width=\"960\" height=\"284\" srcset=\"https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/seguridad-informacion-kryptogenesis.png 960w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/seguridad-informacion-kryptogenesis-300x89.png 300w, https:\/\/kryptogenesis.com.co\/kportal\/wp-content\/uploads\/2016\/04\/seguridad-informacion-kryptogenesis-768x227.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<p>\u00a0<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pg-196-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-196-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-196-1-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"1\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\" align=\"center\"><span style=\"font-size: small; color: #888888;\"><strong>Las organizaciones dependen, cada d&iacute;a m&aacute;s, de las IT para lograr sus objetivos y estrategias de negocio. La evoluci&oacute;n obliga a un cambio constante para que las organizaciones mantengan la ventaja competitiva de los avances tecnol&oacute;gicos en el manejo del negocio.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-196-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-196-1-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"color: #888888; font-size: small;\"><strong>Con un enfoque en seguridad, <span style=\"color: #ff6600;\">Kryptog&eacute;nesis IT Security<\/span>, le ofrece servicios de auditor&iacute;a en seguridad inform&aacute;tica para evaluar la confiabilidad, confidencialidad, integridad y disponibilidad de la informaci&oacute;n.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><div id=\"pgc-196-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-196-1-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"3\" >\t\t\t<div class=\"textwidget\"><p style=\"text-align: justify;\"><span style=\"color: #808080; font-size: small;\"><strong>Garantizando la alineaci&oacute;n de las estrategias inform&aacute;ticas a las del negocio, su control y direcci&oacute;n, as&iacute; como la salvaguarda de la informaci&oacute;n y de la tecnolog&iacute;a que la soporta, como principales activos del negocio, y la existencia de una cultura organizacional y de la informaci&oacute;n.<\/strong><\/span><\/p><\/div>\n\t\t<\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0 Las organizaciones dependen, cada d&iacute;a m&aacute;s, de las IT para lograr sus objetivos y estrategias de negocio. La evoluci&oacute;n obliga a un cambio constante para que las organizaciones mantengan la ventaja competitiva de los avances tecnol&oacute;gicos en el manejo del negocio. Con un enfoque en seguridad, Kryptog&eacute;nesis IT Security, le ofrece servicios de auditor&iacute;a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":477,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-196","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=196"}],"version-history":[{"count":0,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/196\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=\/wp\/v2\/pages\/477"}],"wp:attachment":[{"href":"https:\/\/kryptogenesis.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}