{"id":24207,"date":"2022-06-28T18:50:04","date_gmt":"2022-06-28T23:50:04","guid":{"rendered":"https:\/\/iteraprocess.com\/2022\/06\/28\/how-to-assess-your-companys-information-security\/"},"modified":"2025-03-05T19:12:07","modified_gmt":"2025-03-06T00:12:07","slug":"how-to-assess-your-companys-information-security","status":"publish","type":"post","link":"https:\/\/iteraprocess.com\/en\/2022\/06\/28\/how-to-assess-your-companys-information-security\/","title":{"rendered":"How to assess your company&#8217;s information security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24207\" class=\"elementor elementor-24207 elementor-18967\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-139ef2f e-con-full e-flex e-con e-parent\" data-id=\"139ef2f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-61c3724 e-con-full custom-breadcrumbs-content e-flex e-con e-child\" data-id=\"61c3724\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a9d0ca elementor-widget__width-auto custom-breadcrumbs elementor-widget elementor-widget-text-editor\" data-id=\"0a9d0ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><a href=\"\/\">Home<\/a><\/li>\n<li><a href=\"https:\/\/iteraprocess.com\/en\/blog\/\">Blog<\/a><\/li>\n<li>Cybersecurity<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a2bc44 elementor-widget elementor-widget-text-editor\" data-id=\"6a2bc44\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"header_title title_small\"><span class=\"title_a\">How to assess<\/span><span class=\"title_b\"> your company&#8217;s information<\/span> security<\/h1>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9701f50 e-flex e-con-boxed e-con e-parent\" data-id=\"9701f50\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e12b942 elementor-widget elementor-widget-html\" data-id=\"e12b942\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sidebar_mobile_trigger\"><\/div>\n\n<script>\n    jQuery(document).ready(function() {\n        jQuery('.sidebar_mobile_trigger').on('click',function(){\n            jQuery('.sidebar_mobile').toggleClass('active');\n        })        \n    })\n<\/script>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7699d0 e-con-full e-flex e-con e-child\" data-id=\"a7699d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7f6822 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"c7f6822\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to assess your company's information security?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be576bd elementor-widget elementor-widget-image\" data-id=\"be576bd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"630\" height=\"273\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/12\/28_2.png\" class=\"attachment-full size-full wp-image-18959\" alt=\"\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/12\/28_2.png 630w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/12\/28_2-300x130.png 300w\" sizes=\"(max-width: 630px) 100vw, 630px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0dee0a elementor-widget elementor-widget-text-editor\" data-id=\"a0dee0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Cyber threat and vulnerability management has never faced so many challenges. While there are many digital vulnerability scanning tools to prevent different attacks and detect different types of cyber threats, the effectiveness of these digital tools lies in applying good cybersecurity practices in your company. <\/span><\/p>\n<p><b>Prevent the hijacking of your information<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One of the most recognized viruses or malware is ransomware. It is a type of malware or malicious code that   <\/span><i><span style=\"font-weight: 400;\">infects<\/span><\/i><span style=\"font-weight: 400;\"> in order to prevent the use of your computers or systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How does ransomware work? The cybercriminal takes control of your computers or systems that they have infected and   <\/span><i><span style=\"font-weight: 400;\">Kidnaps<\/span><\/i><span style=\"font-weight: 400;\">  by encrypting the information, blocking the screen, preventing you from accessing it completely because you no longer have authorization. In those cases, to regain control of your information, you will have to pay the ransom in order to have access to your systems again. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware is just one example of what can happen in your organization as a result of not having cybersecurity measures in place that can provide you with advanced digital protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The absence or lack of updating of cybersecurity tools puts your company at risk from:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) Theft and\/or leakage of information<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) Data penetration<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) Virus infection<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) SQL Injection<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) DDoS<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) Zero-Day Attacks<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713) Hash Exploitation<\/span><\/p>\n<p><b>Protect your business from cyberattacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Implement international frameworks or standards. These are frameworks that aim to facilitate the solution of cybersecurity problems. For example, when you apply ethical hacking (EH) scanning and application vulnerability analysis to your systems, you are carrying out digital security processes in accordance with best practices such as OWASP methodologies, NIST standards, and cybersecurity tools.  <\/span><\/p>\n<p><b>Follow these best practices to strengthen your company&#8217;s cybersecurity and prevent malware<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update your systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Patches<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Block open ports<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Classifies the most sensitive and confidential information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor systematically<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement and automate your processes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Raise awareness among your employees<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">To consolidate the above, we recommend that you carry out a cybersecurity diagnosis in your company, based on the following actions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perform vulnerability scans or tests<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Run Pentesting Tests<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conducts audits of ISO\/IEC 27001:2013, NIST, 27018<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify the processes of each of your systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identify the criticality of your organization&#8217;s assets<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set the frequency of scans (running vulnerability scanning tools).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It has a ReadTeam service<\/span><\/li>\n<\/ul>\n<p><b>Learn about some advantages that your company acquires by having adequate cybersecurity measures in place:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u2713 Prevents a ransomware event that can result in a $20 million ransom payment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713 Build trust with your customers<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713 Get corporate security<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713 Help developers have fewer bugs thanks to pentesting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2713 Avoid millions of dollars in losses in sensitive data and\/or unrecognized purchases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And when elaborating on the benefits offered by the implementation of digital security measures in your company, these capabilities that you can obtain stand out:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifies technical vulnerabilities that cannot be detected by an organizational vulnerability analysis.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifies and classifies findings according to international risk management standards such as CVSSv3.1<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop a solution and continuous improvement plan based on the findings detected<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It classifies vulnerabilities according to their level of risk: critical, high, low, informative.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It provides evidence of exploitation and the impact it generates in your organization.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When you carry out this type of good practice, you reinforce the security in the code of your applications, avoiding large cybersecurity gaps, gaps that digital criminals take advantage of.<\/span><\/p>\n<h3><b>Do you have questions or would you like to learn more?  <\/b><\/h3>\n<p><span style=\"font-weight: 400;\">At Itera we can provide you with consulting services and solutions, pentesting, vulnerability testing, social engineering, ReadTeam service and audits, among others.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact a <\/span>Contact an account executive: irma.monroy@iteraprocess.comspecialist: seguridad@iteraprocess.com<\/p>\n<p><span style=\"font-weight: 400;\">Adopting new technologies as a fundamental part of the evolutionary process of digital transformation involves knowing, identifying and understanding new risks, incidents, events, vulnerabilities and threats that companies may be facing.<\/span><\/p>\n<h3><b>What is Information Security Assessment?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is a process that helps organizations identify, analyze, and enforce security controls at the site or workstation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this sense, and to avoid any cyber threat or risk, we must carry out an <\/span><i><span style=\"font-weight: 400;\">assessment <\/span><\/i><span style=\"font-weight: 400;\">or <\/span><i><span style=\"font-weight: 400;\">checklist<\/span><\/i><span style=\"font-weight: 400;\">, with which it is possible to take corrective measures immediately to avoid a great cost in the future.<\/span><\/p>\n<h3><b>What is information security?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is the set of preventive and reactive measures, both of organizations and of technological systems, that allow safeguarding and protecting information, as well as maintaining the confidentiality, integrity and availability of data.<\/span><\/p>\n<h3><b>What controls should we evaluate for information security?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">We must use the ISO\/IEC 27001:2013 standard, considered one of the most important International Standards on the subject and which allows the assurance, confidentiality, integrity and availability of data or information, as well as the systems that process it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this sense, ISO\/IEC 27001:2013 contains &#8220;Annex A&#8221; which, in turn, has 14 domains, 35 control objectives and 114 controls to, depending on the risk analysis and the statement of applicability that is made, allow us to select those that apply, while justifying those that are excluded.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the following image you can see annexes 5 to 18:<\/span><\/p>\n<h3><b>Benefits of Information Security Assessment:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provides structure of the management system.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduce the risk of having a security incident.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It offers greater security to companies.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It increases the prestige of the organization.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Improves customer confidence.<\/span><\/li>\n<\/ul>\n<h3><b>How can we help strengthen security in your organization?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">From the <\/span><a href=\"https:\/\/iteraprocess.com\/en\/cloud-governance-and-finops\/\"><b>Delivery Force area, <\/b><\/a><span style=\"font-weight: 400;\">at <\/span><b>Itera<\/b> <span style=\"font-weight: 400;\">we suggest implementing different types of policies and controls to maintain and preserve the integrity and confidentiality of information, all based on compliance with international standards such as ISO\/IEC 27001:2013 and <\/span><a href=\"https:\/\/iteraprocess.com\/2022\/02\/21\/actualizacion-iso-iec-270022022\/\"><b>ISO\/IEC 27002:2022.<\/b><\/a><\/p>\n<h3><b>Do you have questions or would you like more details?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">At Itera we can provide you with consulting services and solutions on audits, Information Security Management Systems (ISMS), cybersecurity, cloud and compliance with ISO\/IEC 27001:2013 standards, as well as <\/span><a href=\"https:\/\/iteraprocess.com\/2022\/02\/21\/actualizacion-iso-iec-270022022\/\"><b>ISO\/IEC 27002:2022.<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">To receive a free consultation, contact our team of specialists: <\/span><a href=\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/seguridad@iteraprocess.com\"><b>seguridad@iteraprocess.com<\/b><\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c30d6db e-con-full e-flex e-con e-child\" data-id=\"c30d6db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1a6c76 elementor-widget elementor-widget-template\" data-id=\"f1a6c76\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"27669\" class=\"elementor elementor-27669 elementor-21565\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee58c95 e-con-full e-flex e-con e-child\" data-id=\"4ee58c95\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61f2e0b1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"61f2e0b1\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f686172 elementor-share-buttons--view-icon elementor-share-buttons--skin-minimal elementor-share-buttons--shape-circle elementor-share-buttons--align-right elementor-share-buttons--color-custom elementor-widget__width-inherit elementor-share-buttons-mobile--align-center shared_buttons_content elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"4f686172\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_x-twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on x-twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-x-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6ce4d9 e-con-full sidebar_mobile e-flex e-con e-child\" data-id=\"b6ce4d9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f19faf e-con-full e-flex e-con e-child\" data-id=\"2f19faf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d3d99f underline_gradient_azul elementor-widget elementor-widget-text-editor\" data-id=\"0d3d99f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 24px; color: #00607b;\">Related posts<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e877df9 blogs_tipo_listado_pequeno listing-pagination-border-style-gradient listing-pagination-background-style-solid elementor-widget elementor-widget-neuros_blog_listing\" data-id=\"e877df9\" data-element_type=\"widget\" data-widget_type=\"neuros_blog_listing.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"archive-listing\" data-ajax='{&quot;post_type&quot;:&quot;post&quot;,&quot;posts_per_page&quot;:3,&quot;orderby&quot;:&quot;date&quot;,&quot;order&quot;:&quot;desc&quot;,&quot;paged&quot;:1,&quot;category_name&quot;:&quot;&quot;,&quot;tag&quot;:&quot;ai,aws,ia-generativa&quot;,&quot;post__in&quot;:&quot;&quot;,&quot;ignore_sticky_posts&quot;:false,&quot;link_base&quot;:&quot;https:\\\/\\\/iteraprocess.com\\\/en\\\/wp-json\\\/wp\\\/v2\\\/posts\\\/24207\\\/&quot;}' data-widget='{&quot;listing_type&quot;:&quot;classic&quot;,&quot;excerpt_length&quot;:100,&quot;show_cat&quot;:&quot;&quot;,&quot;show_media&quot;:&quot;yes&quot;,&quot;show_author&quot;:&quot;&quot;,&quot;show_date&quot;:&quot;yes&quot;,&quot;show_title&quot;:&quot;yes&quot;,&quot;show_tags&quot;:&quot;no&quot;,&quot;show_excerpt&quot;:&quot;yes&quot;,&quot;show_read_more&quot;:&quot;&quot;,&quot;read_more_text&quot;:&quot;Read More&quot;,&quot;columns_number&quot;:1,&quot;show_pagination&quot;:&quot;yes&quot;,&quot;item_class&quot;:&quot;post standard-blog-item-wrapper&quot;}'>\n            <div class=\"archive-listing-wrapper classic-listing\">\n                \n<div class=\"standard-blog-item-wrapper post post-29763 type-post status-publish format-standard has-post-thumbnail hentry category-aws-en-2 category-aws-en category-cloud-en category-cloud-computing-en category-data-analysis-and-business-intelligence category-news tag-ai-en tag-automatizacion-inteligente tag-aws-en tag-cloud-en tag-cybersecurity tag-safety\">\n    <div class=\"blog-item\">\n        <div class=\"post-media-wrapper\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/12\/02\/impulsa-tu-operacion-empresarial-con-amazon-ai-agentops\/\"><picture><source media=\"(max-width: 575px)\" sizes=\"(max-width: 575px) 575px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/12\/02.png 575w\"><source media=\"(max-width: 991px)\" sizes=\"(max-width: 991px) 991px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/12\/02.png 991w\"><img decoding=\"async\" alt=\"02\" title=\"02\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/12\/02.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" \/><\/picture><\/a><\/div><div class=\"post-meta-header\"><div class=\"post-meta-items-wrapper\"><div class=\"post-meta-items\"><div class=\"post-meta-item post-meta-item-date\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/12\/02\/\">2 December, 2025<\/a><\/div><\/div><\/div><\/div><h3 class=\"post-title\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/12\/02\/impulsa-tu-operacion-empresarial-con-amazon-ai-agentops\/\">Impulsa tu operaci\u00f3n empresarial con Amazon AI AgentOps<\/a><\/h3><div class=\"post-content\">Descubre c\u00f3mo nuestro servicio Amazon AI AgentOps habilita agentes de IA capaces de ejecutar accion<\/div>    <\/div>\n<\/div>\n<div class=\"standard-blog-item-wrapper post post-27904 type-post status-publish format-standard has-post-thumbnail hentry category-aws-en-2 category-aws-en category-cloud-en category-cloud-computing-en category-cybersecurity category-data-analysis-and-business-intelligence category-logistics category-news tag-aws-en tag-aws-mexico-en tag-aws-mexico-beneficios-en tag-aws-mexico-incentivos-en\">\n    <div class=\"blog-item\">\n        <div class=\"post-media-wrapper\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/07\/30\/how-does-the-aws-well-architected-framework-benefit-your-organization-and-its-business-goals\/\"><picture><source media=\"(max-width: 575px)\" sizes=\"(max-width: 575px) 575px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/630x274-WAPP.png 575w\"><source media=\"(max-width: 991px)\" sizes=\"(max-width: 991px) 991px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/630x274-WAPP.png 991w\"><img decoding=\"async\" alt=\"630x274-WAPP\" title=\"630x274-WAPP\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/630x274-WAPP.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" \/><\/picture><\/a><\/div><div class=\"post-meta-header\"><div class=\"post-meta-items-wrapper\"><div class=\"post-meta-items\"><div class=\"post-meta-item post-meta-item-date\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/07\/30\/\">30 July, 2025<\/a><\/div><\/div><\/div><\/div><h3 class=\"post-title\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/07\/30\/how-does-the-aws-well-architected-framework-benefit-your-organization-and-its-business-goals\/\">How does the AWS Well-Architected Framework benefit your organization and its business goals?<\/a><\/h3><div class=\"post-content\">Learn how the AWS Well-Architected Framework helps your business improve security, cost, sustainabil<\/div>    <\/div>\n<\/div>\n<div class=\"standard-blog-item-wrapper post post-27576 type-post status-publish format-standard has-post-thumbnail hentry category-aws-en category-aws-en-2 category-cloud-en category-cloud-computing-en category-cybersecurity category-data-analysis-and-business-intelligence category-logistics category-news tag-aws-en tag-aws-mexico-en tag-aws-mexico-beneficios-en tag-aws-mexico-incentivos-en\">\n    <div class=\"blog-item\">\n        <div class=\"post-media-wrapper\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/07\/14\/migrating-vmware-to-aws-4-strategic-benefits-for-your-infrastructure\/\"><picture><source media=\"(max-width: 575px)\" sizes=\"(max-width: 575px) 575px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/1312x402-VMware.jpg 575w\"><source media=\"(max-width: 991px)\" sizes=\"(max-width: 991px) 991px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/1312x402-VMware.jpg 991w\"><img decoding=\"async\" alt=\"1312x402-VMware\" title=\"1312x402-VMware\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/1312x402-VMware.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" \/><\/picture><\/a><\/div><div class=\"post-meta-header\"><div class=\"post-meta-items-wrapper\"><div class=\"post-meta-items\"><div class=\"post-meta-item post-meta-item-date\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/07\/14\/\">14 July, 2025<\/a><\/div><\/div><\/div><\/div><h3 class=\"post-title\"><a href=\"https:\/\/iteraprocess.com\/en\/2025\/07\/14\/migrating-vmware-to-aws-4-strategic-benefits-for-your-infrastructure\/\">Migrating VMware to AWS: 4 Strategic Benefits for Your Infrastructure<\/a><\/h3><div class=\"post-content\">Migrating VMware to AWS is easier than you think. Discover the key benefits for your operation and m<\/div>    <\/div>\n<\/div>            <\/div>\n\n            <div class=\"content-pagination\"><nav class=\"navigation pagination\" role=\"navigation\"><h2 class=\"screen-reader-text\">Pagination<\/h2><div class=\"nav-links\"><span aria-current=\"page\" class=\"page-numbers current\"><span class=\"button-inner\"><\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207\/?e877df9-paged=2\"><span class=\"button-inner\"><\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207\/?e877df9-paged=3\"><span class=\"button-inner\"><\/span>3<\/a>\n<span class=\"page-numbers dots\">&hellip;<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207\/?e877df9-paged=12\"><span class=\"button-inner\"><\/span>12<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207\/?e877df9-paged=13\"><span class=\"button-inner\"><\/span>13<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207\/?e877df9-paged=2\">Next<span class=\"button-inner\"><\/span><span class=\"icon-button-arrow left\"><\/span><span class=\"icon-button-arrow right\"><\/span><\/a><\/div><\/nav><\/div>        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8438bcb e-con-full contenedor_etiquetas e-flex e-con e-child\" data-id=\"8438bcb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3a67de underline_gradient_azul elementor-widget elementor-widget-text-editor\" data-id=\"b3a67de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 24px; color: #00607b;\">Topics<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eb0235 elementor-widget elementor-widget-shortcode\" data-id=\"9eb0235\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"tagcloud\"><a href=\"https:\/\/iteraprocess.com\/tag\/aws-en\" class=\"tag-cloud-link tag-link-105\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS\"> AWS <\/a><a href=\"https:\/\/iteraprocess.com\/tag\/aws-mexico-en\" class=\"tag-cloud-link tag-link-494\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS MEXICO\"> AWS MEXICO <\/a><a href=\"https:\/\/iteraprocess.com\/tag\/aws-mexico-incentivos-en\" class=\"tag-cloud-link tag-link-495\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS M\u00e9xico incentivos\"> AWS M\u00e9xico incentivos <\/a><a href=\"https:\/\/iteraprocess.com\/tag\/aws-mexico-beneficios-en\" class=\"tag-cloud-link tag-link-496\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS M\u00e9xico beneficios\"> AWS M\u00e9xico beneficios <\/a><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13f67f4 e-con-full e-flex e-con e-parent\" data-id=\"13f67f4\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3407006 e-flex e-con-boxed e-con e-child\" data-id=\"3407006\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/youtu.be\\\/RlKo-Nj2r0s&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-video-embed\"><\/div>\n\t\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-6c74049 elementor-widget elementor-widget-text-editor\" data-id=\"6c74049\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"font-size: 32px; color: #00334e; text-shadow: 0px 4px 4px rgba(255,255,255,0.4);\"><strong>Ready to take full control <span style=\"color: #00607b; font-size: 36px;\"><strong>of your cloud investment?<\/strong><\/span><\/strong><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df34f70 neuros-button-border-style-gradient neuros-button-bakground-style-solid elementor-widget elementor-widget-neuros_button\" data-id=\"df34f70\" data-element_type=\"widget\" data-widget_type=\"neuros_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"button-widget\">\n            <div class=\"button-container\">\n                                <a class=\"neuros-button\" href=\"#modal_contactanos\" href=\"#modal_contactanos\">Contact us                        <span class=\"icon-button-arrow left\"><\/span><span class=\"icon-button-arrow right\"><\/span>                    \n                    <span class=\"button-inner\"><\/span>\n                <\/a>\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0cce9db e-con-full e-flex e-con e-child\" data-id=\"0cce9db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-236f5a4 elementor-widget elementor-widget-template\" data-id=\"236f5a4\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"27663\" class=\"elementor elementor-27663 elementor-21454\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7abf18c9 e-flex e-con-boxed e-con e-parent\" data-id=\"7abf18c9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-129170f elementor-widget elementor-widget-shortcode\" data-id=\"129170f\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><style>\n    .items_50_25_25 {\n    display: flex;\n}\n\n.items_50_25_25 .content_elem {\n    width: 50%;\n    padding: 20px;\n}\n\n.items_50_25_25 .content_elem.two .elementor-element .neuros-button:hover {\n    padding: 0px 40px 0px 20px !important;\n    color: #00334E !important;\n    background-color: #FFFFFF !important;\n}\n\n.items_50_25_25 .content_elem.two {\n    display: flex;\n    justify-content: space-between;\n    gap: 10px;\n    flex-wrap: wrap;\n    align-items: flex-end;\n}\n\n.items_50_25_25 .content_elem.two .post {\n    width: calc(50% - 10px);\n}\n\n.items_50_25_25 .blog-item .post-media-wrapper picture img {\n    width: 100%;\n    height: auto;\n}\n\n.items_50_25_25 .content_elem.one .blog-item .post-media-wrapper picture img {\n    height: 300px;\n}\n\n.items_50_25_25 .blog-item .post-meta-items-wrapper:after {\n    box-shadow: 0 20px 0 0 #f0f0f0;\n}\n\n.items_50_25_25 .content_elem .post-content {\n    color: #00334e;\n    margin: 0 20px;\n    line-height: normal;\n    max-height: 80px;\n    margin: 0 20px !important;\n    overflow: hidden;\n}\n\n.items_50_25_25 .content_elem.two .post-content {\n    font-size: 80%;\n    height: 60px;\n}\n\n.items_50_25_25 .post-meta-items-wrapper:after {\n    right: 4px;\n}\n\n.items_50_25_25 .content_elem.one .post-meta-items-wrapper {\n    width: 50%;\n}\n\n.items_50_25_25 .content_elem.two .post-meta-items-wrapper {\n    width: 70%;\n}\n\n.items_50_25_25 .content_elem.two .post-meta-header {\n    margin-bottom: 5px !important;\n}\n.items_50_25_25 .show_mob{\n    display: none;\n}\n.items_50_25_25 .show_web{\n    display: block;\n}\n@media (max-width: 767px) {\n    .items_50_25_25 {\n        display: flex;\n        flex-direction: column;\n    }\n    .items_50_25_25 .content_elem{\n        width: 100%;\n        padding: 0px;\n    }\n    .items_50_25_25 .show_web{\n        display: none;\n    }\n    .items_50_25_25 .show_mob{\n        display: block;\n    }\n    .items_50_25_25 .content_elem.one .blog-item .post-media-wrapper picture img {\n        height: 220px;\n    }\n    .items_50_25_25 .content_elem.two .post {\n        width: calc(50% - 5px);\n    }\n    .items_50_25_25 .content_elem .post-content {\n        margin: 0 10px !important;\n    }\n}\n<\/style>\n\n\n<div class=\"items_50_25_25\">\n    <div class=\"show_mob\" style=\"width: 100%; margin-bottom: 20px;\">\n                        <h4 class=\"elementor-heading-title elementor-size-default\" style=\"color: #00334E;margin-bottom: 10px;\">Success <span style=\"color: #00607B;\"><b>stories<\/b><\/span><\/h4>\n                        <div class=\"elementor-element neuros-button-border-style-gradient neuros-button-bakground-style-solid elementor-widget elementor-widget-neuros_button\" data-element_type=\"widget\" data-widget_type=\"neuros_button.default\">\n                            <div class=\"elementor-widget-container\">    \n                                <div class=\"button-widget\">\n                                    <div class=\"button-container\">\n                                        <a class=\"neuros-button\" href=\"https:\/\/iteraprocess.com\/en\/success-stories\/\" target=\"_blank\" style=\"font-family: &quot;Poppins&quot;, Sans-serif; font-size: 20px; --button-border-width: 3px; color: #FFFFFF; background-color: #00334E; padding: 0px 20px 0px 40px;\">\n                                            Success stories \n                                            <span class=\"icon-button-arrow left\"><\/span>\n                                            <span class=\"icon-button-arrow right\"><\/span>\n                                            <span class=\"button-inner\"><\/span>\n                                        <\/a>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                    <\/div><div class=\"content_elem one\"><div class=\"standard-blog-item-wrapper post post-23189 type-page status-publish format-standard has-post-thumbnail hentry category-atlassian-en category-financial category-success-stories tag-atlassian-en tag-cloud-en tag-migration tag-picnic\">\n                        <div class=\"blog-item\" style=\"padding: 25px 0 15px; background-color: #f0f0f0;\">\n                            <div class=\"post-media-wrapper\" style=\"margin: -30px 0 0;\">\n                                <a href=\"https:\/\/iteraprocess.com\/en\/banca-march\/\">\n                                    <picture> <img decoding=\"async\" width=\"409\" height=\"279\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2024\/07\/BancaMarch-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"automatizaci\u00f3n de oficinas de proyectos en entidades financieras espa\u00f1olas\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2024\/07\/BancaMarch-1.png 409w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2024\/07\/BancaMarch-1-300x205.png 300w\" sizes=\"(max-width: 409px) 100vw, 409px\" \/> <\/picture>\n                                <\/a>\n                            <\/div>\n                            <div class=\"post-meta-header\" style=\"margin-bottom: 10px; margin-top: -25px;\">\n                                <div class=\"post-meta-items-wrapper\">\n                                    <div class=\"post-meta-items\" style=\"background-color: #F0f0f0;\">\n                                        <div class=\"post-categories\" style=\"height: 20px\"> <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                            <div class=\"post-content\"> We designed a solution based on their needs, which allowed them to increase their competitive advantages. <\/div>\n                        <\/div>\n                    <\/div><\/div><div class=\"content_elem two\"><div class=\"show_web\" style=\"width: 100%; text-align: center;\">\n                        <h4 class=\"elementor-heading-title elementor-size-default\" style=\"color: #00334E;margin-bottom: 10px;\">Success <span style=\"color: #00607B;\"><b>stories<\/b><\/span><\/h4>\n                        <div class=\"elementor-element neuros-button-border-style-gradient neuros-button-bakground-style-solid elementor-widget elementor-widget-neuros_button\" data-element_type=\"widget\" data-widget_type=\"neuros_button.default\">\n                            <div class=\"elementor-widget-container\">    \n                                <div class=\"button-widget\">\n                                    <div class=\"button-container\">\n                                        <a class=\"neuros-button\" href=\"https:\/\/iteraprocess.com\/en\/success-stories\/\" target=\"_blank\" style=\"font-family: &quot;Poppins&quot;, Sans-serif; font-size: 20px; --button-border-width: 3px; color: #FFFFFF; background-color: #00334E; padding: 0px 20px 0px 40px;\">\n                                            Success stories \n                                            <span class=\"icon-button-arrow left\"><\/span>\n                                            <span class=\"icon-button-arrow right\"><\/span>\n                                            <span class=\"button-inner\"><\/span>\n                                        <\/a>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                    <\/div><div class=\"show_mob\" style=\" height: 30px;width: 100%;\"><\/div><div class=\"standard-blog-item-wrapper post post-23723 type-page status-publish format-standard has-post-thumbnail hentry category-bless-you category-ibm-en category-success-stories tag-cloud-en tag-ibm-en\">\n                        <div class=\"blog-item\" style=\"padding: 25px 0 15px; background-color: #f0f0f0;\">\n                            <div class=\"post-media-wrapper\" style=\"margin: -30px 0 0;\">\n                                <a href=\"https:\/\/iteraprocess.com\/en\/grifols\/\">\n                                    <picture> <img decoding=\"async\" width=\"410\" height=\"279\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2024\/01\/GRIFOLS2.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2024\/01\/GRIFOLS2.png 410w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2024\/01\/GRIFOLS2-300x204.png 300w\" sizes=\"(max-width: 410px) 100vw, 410px\" \/> <\/picture>\n                                <\/a>\n                            <\/div>\n                            <div class=\"post-meta-header\" style=\"margin-bottom: 10px; margin-top: -25px;\">\n                                <div class=\"post-meta-items-wrapper\">\n                                    <div class=\"post-meta-items\" style=\"background-color: #F0f0f0;\">\n                                        <div class=\"post-categories\" style=\"height: 20px\"> <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                            <div class=\"post-content\"> Diagnostic Grifols implemented an Agile solution to manage the entire development process and improve collaboration between teams. <\/div>\n                        <\/div>\n                    <\/div><div class=\"standard-blog-item-wrapper post post-23758 type-page status-publish format-standard has-post-thumbnail hentry category-aws-en-2 category-education category-success-stories \">\n                        <div class=\"blog-item\" style=\"padding: 25px 0 15px; background-color: #f0f0f0;\">\n                            <div class=\"post-media-wrapper\" style=\"margin: -30px 0 0;\">\n                                <a href=\"https:\/\/iteraprocess.com\/en\/fitec-technology\/\">\n                                    <picture> <img loading=\"lazy\" decoding=\"async\" width=\"409\" height=\"279\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/01\/Fitec-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/01\/Fitec-1.png 409w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/01\/Fitec-1-300x205.png 300w\" sizes=\"(max-width: 409px) 100vw, 409px\" \/> <\/picture>\n                                <\/a>\n                            <\/div>\n                            <div class=\"post-meta-header\" style=\"margin-bottom: 10px; margin-top: -25px;\">\n                                <div class=\"post-meta-items-wrapper\">\n                                    <div class=\"post-meta-items\" style=\"background-color: #F0f0f0;\">\n                                        <div class=\"post-categories\" style=\"height: 20px\"> <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                            <div class=\"post-content\"> We improve the performance of your Moodle system and increase the availability of your infrastructure. <\/div>\n                        <\/div>\n                    <\/div><\/div><\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Adopting new technologies as a fundamental part of the evolutionary process of digital transformation involves knowing, identifying and understanding new risks, incidents, events, vulnerabilities and threats that companies may be facing.<\/p>\n","protected":false},"author":1,"featured_media":18978,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"inline_featured_image":false,"_joinchat":[],"footnotes":""},"categories":[352,101],"tags":[307],"class_list":["post-24207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","tag-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to assess your company&#039;s information security - Itera Process<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to assess your company&#039;s information security\" \/>\n<meta property=\"og:description\" content=\"Adopting new technologies as a fundamental part of the evolutionary process of digital transformation involves knowing, identifying and understanding new risks, incidents, events, vulnerabilities and threats that companies may be facing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\" \/>\n<meta property=\"og:site_name\" content=\"Itera Process\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IteraBusinessProcess\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T23:50:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T00:12:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"630\" \/>\n\t<meta property=\"og:image:height\" content=\"273\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5\"},\"headline\":\"How to assess your company&#8217;s information security\",\"datePublished\":\"2022-06-28T23:50:04+00:00\",\"dateModified\":\"2025-03-06T00:12:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\"},\"wordCount\":999,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/iteraprocess.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png\",\"keywords\":[\"Safety\"],\"articleSection\":[\"Cybersecurity\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\",\"url\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\",\"name\":\"How to assess your company's information security - Itera Process\",\"isPartOf\":{\"@id\":\"https:\/\/iteraprocess.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png\",\"datePublished\":\"2022-06-28T23:50:04+00:00\",\"dateModified\":\"2025-03-06T00:12:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage\",\"url\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png\",\"contentUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png\",\"width\":630,\"height\":273},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/iteraprocess.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to assess your company&#8217;s information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/iteraprocess.com\/#website\",\"url\":\"https:\/\/iteraprocess.com\/\",\"name\":\"Itera Process\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/iteraprocess.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/iteraprocess.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/iteraprocess.com\/#organization\",\"name\":\"Itera Process\",\"alternateName\":\"IT ERA\",\"url\":\"https:\/\/iteraprocess.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png\",\"contentUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png\",\"width\":1200,\"height\":1200,\"caption\":\"Itera Process\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IteraBusinessProcess\",\"https:\/\/www.linkedin.com\/company\/itera-process\"],\"description\":\"Somos especialistas en proyectos complejos de Cloud, Workflow Automation, AI y Data. Aceleramos la transformaci\u00f3n digital de las empresas con un enfoque estrat\u00e9gico, \u00e1gil y centrado en resultados.\",\"email\":\"info.mx.df@iteraprocess.com\",\"telephone\":\"52553300 0650\",\"legalName\":\"IT ERA SA de CV\",\"foundingDate\":\"2001-01-30\",\"vatID\":\"ESB85261071\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"201\",\"maxValue\":\"500\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/iteraprocess.com\"],\"url\":\"https:\/\/iteraprocess.com\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to assess your company's information security - Itera Process","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/","og_locale":"en_US","og_type":"article","og_title":"How to assess your company's information security","og_description":"Adopting new technologies as a fundamental part of the evolutionary process of digital transformation involves knowing, identifying and understanding new risks, incidents, events, vulnerabilities and threats that companies may be facing.","og_url":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/","og_site_name":"Itera Process","article_publisher":"https:\/\/www.facebook.com\/IteraBusinessProcess","article_published_time":"2022-06-28T23:50:04+00:00","article_modified_time":"2025-03-06T00:12:07+00:00","og_image":[{"width":630,"height":273,"url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#article","isPartOf":{"@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/"},"author":{"name":"admin","@id":"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5"},"headline":"How to assess your company&#8217;s information security","datePublished":"2022-06-28T23:50:04+00:00","dateModified":"2025-03-06T00:12:07+00:00","mainEntityOfPage":{"@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/"},"wordCount":999,"commentCount":0,"publisher":{"@id":"https:\/\/iteraprocess.com\/#organization"},"image":{"@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png","keywords":["Safety"],"articleSection":["Cybersecurity","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/","url":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/","name":"How to assess your company's information security - Itera Process","isPartOf":{"@id":"https:\/\/iteraprocess.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage"},"image":{"@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage"},"thumbnailUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png","datePublished":"2022-06-28T23:50:04+00:00","dateModified":"2025-03-06T00:12:07+00:00","breadcrumb":{"@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#primaryimage","url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png","contentUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2022\/06\/29_2.png","width":630,"height":273},{"@type":"BreadcrumbList","@id":"https:\/\/iteraprocess.com\/2022\/06\/28\/como-evaluar-la-seguridad-de-la-informacion-de-tu-empresa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/iteraprocess.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"How to assess your company&#8217;s information security"}]},{"@type":"WebSite","@id":"https:\/\/iteraprocess.com\/#website","url":"https:\/\/iteraprocess.com\/","name":"Itera Process","description":"","publisher":{"@id":"https:\/\/iteraprocess.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iteraprocess.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/iteraprocess.com\/#organization","name":"Itera Process","alternateName":"IT ERA","url":"https:\/\/iteraprocess.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/","url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png","contentUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png","width":1200,"height":1200,"caption":"Itera Process"},"image":{"@id":"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IteraBusinessProcess","https:\/\/www.linkedin.com\/company\/itera-process"],"description":"Somos especialistas en proyectos complejos de Cloud, Workflow Automation, AI y Data. Aceleramos la transformaci\u00f3n digital de las empresas con un enfoque estrat\u00e9gico, \u00e1gil y centrado en resultados.","email":"info.mx.df@iteraprocess.com","telephone":"52553300 0650","legalName":"IT ERA SA de CV","foundingDate":"2001-01-30","vatID":"ESB85261071","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}},{"@type":"Person","@id":"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/iteraprocess.com"],"url":"https:\/\/iteraprocess.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/comments?post=24207"}],"version-history":[{"count":0,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/posts\/24207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/media\/18978"}],"wp:attachment":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/media?parent=24207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/categories?post=24207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/tags?post=24207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}