{"id":5104,"date":"2024-01-17T10:28:58","date_gmt":"2024-01-17T09:28:58","guid":{"rendered":"https:\/\/glofera.com\/2024\/01\/17\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/"},"modified":"2026-05-07T08:59:06","modified_gmt":"2026-05-07T06:59:06","slug":"coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat","status":"publish","type":"post","link":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/","title":{"rendered":"Descobreix vulnerabilitats amb una auditoria de ciberseguretat"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:justify;\"><p>Les pimes s\u00f3n l&#8217;objectiu predilecte dels ciberdelinq\u00fcents, que operen sota la suposici\u00f3 que compten amb sistemes de seguretat menys sofisticats que les grans corporacions. En aquest escenari, una auditoria de ciberseguretat no \u00e9s nom\u00e9s una mesura preventiva, sin\u00f3 una eina essencial per blindar la teva empresa davant d&#8217;aquestes amenaces invisibles, per\u00f2 sempre presents.<\/p>\n<p>Des de l&#8217;intrigant art del <strong>hacking \u00e8tic<\/strong> fins al rol vital del <strong>pentester<\/strong> , explorarem cada fase d&#8217;una auditoria i com aquesta es converteix en una eina educativa i preventiva. A m\u00e9s, et mostrarem els beneficis tangibles de realitzar aquestes auditories, ressaltant-ne l&#8217;impacte en la prevenci\u00f3 de p\u00e8rdues financeres, l&#8217;enfortiment de la consci\u00e8ncia de seguretat i la import\u00e0ncia d&#8217;una planificaci\u00f3 estrat\u00e8gica informada.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:22px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h2><strong>Qu\u00e8 \u00e9s una auditoria de ciberseguretat per a empreses?<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:justify;\"><p>Una auditoria de ciberseguretat \u00e9s molt m\u00e9s que una simple revisi\u00f3 de rutina. \u00c9s un examen detallat de la teva infraestructura de TI, on experts examinen meticulosament cada aspecte de la teva xarxa i sistemes. Des de l&#8217;avaluaci\u00f3 de pol\u00edtiques de seguretat fins a l&#8217;an\u00e0lisi de com s&#8217;emmagatzema i es transmet la informaci\u00f3, aquesta auditoria destapa vulnerabilitats ocultes i ofereix solucions concretes. Per a una pime, aix\u00f2 vol dir entendre on s\u00f3n les teves fortaleses i debilitats digitals i com enfortir-les contra atacs potencials.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:22px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h2><strong>Hacking \u00c8tic: la ci\u00e8ncia de prevenir atacs mitjan\u00e7ant la simulaci\u00f3<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:justify;\"><p>El hacking \u00e8tic \u00e9s un element crucial a la ciberseguretat moderna. Mitjan\u00e7ant la simulaci\u00f3 d&#8217;atacs cibern\u00e8tics, els hackers \u00e8tics (professionals de la seguretat inform\u00e0tica que utilitzen les seves habilitats per millorar la seguretat) identifiquen vulnerabilitats que un ciberdelinq\u00fcent podria explotar. Per a la teva pime, aix\u00f2 significa una oportunitat d&#8217;avan\u00e7ar-te als atacs, corregint les falles abans que siguin explotades.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:22px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h2><strong>El Pentester: un estrateg a la l\u00ednia de foc digital<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:justify;\"><p>El pentester, o provador de penetraci\u00f3, \u00e9s l&#8217;especialista encarregat de fer les auditories. El seu paper va m\u00e9s enll\u00e0 de la mera detecci\u00f3 de falles; tamb\u00e9 assessora sobre com millorar larquitectura de seguretat, implementar millors pr\u00e0ctiques i assegurar que les defenses de la teva empresa estiguin sempre un pas endavant de les amenaces emergents.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:22px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h2><strong>Com es fa una auditoria o pentesting de ciberseguretat per a empreses?<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:justify;\"><p>A Glofera utilitzem metodologies de ciberseguretat comprovades i recolzades per l&#8217;\u00e0mplia experi\u00e8ncia dels nostres professionals. Desenvolupades per pentesters experts, aquestes t\u00e8cniques s&#8217;apliquen amb \u00e8tica i precisi\u00f3, assegurant avaluacions detallades de sistemes i xarxes. A continuaci\u00f3, presentem les fases clau de les nostres auditories, reflectint l&#8217;efectivitat i la cura a cada pas del proc\u00e9s.<\/p>\n<\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-3 fusion-content-boxes-1 content-boxes-icon-with-title content-left\" style=\"--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading icon-left\"><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Pas 1: planificaci\u00f3<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p><strong>Definici\u00f3 d\u201fabast:<\/strong> el pentester il\u201forganitzaci\u00f3 acorden l\u201fabast de l\u201fauditoria. Aix\u00f2 inclou determinar quins sistemes, xarxes i aplicacions seran examinats.<\/p>\n<p><strong>Reconeixement:<\/strong> el pentester recull informaci\u00f3 sobre l&#8217;objectiu. Aix\u00f2 pot incloure recol\u00b7lecci\u00f3 de dades p\u00fabliques, mapeig de la xarxa, identificaci\u00f3 de sistemes operatius exposats a internet, relaci\u00f3 amb altres empreses (cadena de subministrament, prove\u00efdors, etc..) i serveis en execuci\u00f3.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading icon-left\"><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Pas 2: escaneig<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p><strong>Escaneig de ports i xarxa:<\/strong> utilitzant diferents eines i serveis, els nostres professionals identifiquen ports oberts i serveis en execuci\u00f3.<\/p>\n<p><strong>Avaluaci\u00f3 de vulnerabilitats<\/strong> : s&#8217;utilitzen t\u00e8cniques i procediments avan\u00e7ats per detectar debilitats conegudes en els sistemes identificats.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading icon-left\"><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Pas 3: guanyant acc\u00e9s<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p><strong>Explotaci\u00f3:<\/strong> en aquesta fase, el pentester intenta explotar les vulnerabilitats trobades per accedir al sistema o xarxa. Aix\u00f2 pot incloure atacs d&#8217;injecci\u00f3 SQL, fer atacs de for\u00e7a bruta al sistema amb dades obtingudes en passos anteriors, entre d&#8217;altres.<\/p>\n<p><strong>Elevaci\u00f3 de privilegis:<\/strong> un cop a dins, l&#8217;objectiu \u00e9s trobar els punts cr\u00edtics escalant privilegis i fent un moviment lateral per accedir a m\u00e9s sistemes o dades.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-3 fusion-content-boxes-2 content-boxes-icon-with-title content-left\" style=\"--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading icon-left\"><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\"> Pas 4: manteniment de l'acc\u00e9s<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p><strong>Acc\u00e9s persistent:<\/strong> el pentester intenta mantenir l&#8217;acc\u00e9s obtingut. Aix\u00f2 es fa per demostrar com un atacant podria mantenir una pres\u00e8ncia perllongada a la xarxa, cosa que \u00e9s vital per entendre la gravetat d&#8217;una vulnerabilitat. Cal tenir en compte que normalment, els analistes triguen com a mitjana entre 6 i 9 mesos per trobar un atac sofisticat.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading icon-left\"><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Pas 5: an\u00e0lisi i creaci\u00f3 d'informes<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p><strong>Recol\u00b7lecci\u00f3 d&#8217;evid\u00e8ncia:<\/strong> es recol\u00b7lecta evid\u00e8ncia de les vulnerabilitats explotades i les dades a qu\u00e8 es va tenir acc\u00e9s.<\/p>\n<p><strong>Informe d&#8217;auditoria:<\/strong> el pentester prepara un informe detallat que inclou les vulnerabilitats descobertes, la manera com van ser explotades, la informaci\u00f3 a qu\u00e8 es va accedir, i recomanacions per mitigar aquestes vulnerabilitats.<\/p>\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading icon-left\"><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Pas 6: neteja<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p><strong>Restauraci\u00f3 de sistemes:<\/strong> s&#8217;assegura que tots els canvis realitzats a la xarxa o sistemes durant la prova siguin revertits, deixant els sistemes al seu estat original.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:22px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;font-size:1em;\"><h2><strong>Beneficis tangibles d&#8217;una auditoria de ciberseguretat per a empreses<\/strong><\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:justify;\"><p>Realitzar una auditoria de ciberseguretat porta beneficis tangibles per a la teva pime. A continuaci\u00f3, explorarem els principals avantatges d&#8217;aquesta estrat\u00e8gia i destaquem com cadascuna contribueix a forjar un negoci m\u00e9s segur i competitiu.<\/p>\n<\/div><ul style=\"--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;--awb-circlecolor:var(--awb-color4);--awb-circle-yes-font-size:14.08px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Identificaci\u00f3 de vulnerabilitats i refor\u00e7ament de la seguretat<\/strong> : sovint, les bretxes de seguretat no s\u00f3n evidents per al personal intern, i poden ser el punt d&#8217;entrada per a ciberatacs. En identificar i abordar aquestes debilitats, la teva pime pot enfortir significativament les defenses digitals, protegint-se contra una varietat d&#8217;amenaces cibern\u00e8tiques.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Prevenci\u00f3 de p\u00e8rdues financeres<\/strong> : els ciberatacs poden resultar en p\u00e8rdues financeres devastadores, des del robatori de fons fins a la interrupci\u00f3 del negoci. Una auditoria de ciberseguretat prepara les pimes per enfrontar aquests desafiaments i minimitza el risc d&#8217;atacs que puguin resultar en p\u00e8rdues econ\u00f2miques directes o costos associats amb la recuperaci\u00f3 de dades i sistemes.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Millora de la consci\u00e8ncia de seguretat a l&#8217;empresa<\/strong> : una auditoria de ciberseguretat tamb\u00e9 serveix com una eina educativa per als empleats. En comprendre les vulnerabilitats i les mesures de mitigaci\u00f3, el personal esdev\u00e9 m\u00e9s conscient de la import\u00e0ncia de la seguretat en les activitats di\u00e0ries.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><strong>Presa de decisions informada i planificaci\u00f3 estrat\u00e8gica<\/strong> : amb els insights obtinguts d&#8217;una auditoria, la teva empresa pot prendre decisions informades sobre inversions en seguretat de TI. Aquest coneixement permet una planificaci\u00f3 estrat\u00e8gica i l&#8217;assignaci\u00f3 de recursos de manera m\u00e9s efectiva, garantint que es prioritzin les \u00e0rees de m\u00e9s risc o debilitat.<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#ffffff;border-color:#ffffff;border-top-width:10px;border-bottom-width:10px;\"><\/div><\/div><div class=\"fusion-text fusion-text-7\"><p>A Glofera estem compromesos amb l&#8217;excel\u00b7l\u00e8ncia en ciberseguretat, oferint serveis que no nom\u00e9s identifiquen riscos, sin\u00f3 que tamb\u00e9 enforteixen la teva empresa. Els nostres plans <span style=\"color: #a9ca4a;\"><strong>Advance<\/strong><\/span> i <span style=\"color: #a9ca4a;\"><strong>Elite<\/strong><\/span> de <a href=\"https:\/\/prociber.glofera.com\/?utm_source=web&amp;utm_medium=blog&amp;utm_term=enlace&amp;utm_content=landing&amp;utm_campaign=auditoria\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #a9ca4a;\"><strong>ProCiber<\/strong><\/span><\/a> , la nostra soluci\u00f3 multicapa en ciberseguretat per a empreses, estan dissenyats per proporcionar la m\u00e0xima protecci\u00f3 i inclouen la realitzaci\u00f3 d&#8217;auditoria de ciberseguretat, coneix m\u00e9s els detalls sobre els nostres plans i preus <a href=\"https:\/\/prociber.glofera.com\/?utm_source=web&amp;utm_medium=blog&amp;utm_term=enlace&amp;utm_content=landing&amp;utm_campaign=auditoria\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #a9ca4a;\">AQU\u00cd<\/span><\/strong><\/a> .<\/p>\n<p>Amb un equip de professionals altament qualificats i metodologies provades, garantim una auditoria integral que cobreix totes les necessitats de seguretat digital. No esperis a ser el proper objectiu d&#8217;un ciberatac. Contacta&#8217;ns avui mateix per obtenir una auditoria de ciberseguretat personalitzada i comen\u00e7a a protegir el teu negoci amb la confian\u00e7a i experi\u00e8ncia que nom\u00e9s Glofera pot oferir, escriu-nos a <span style=\"color: #a9ca4a;\"><strong><a style=\"color: #a9ca4a;\" href=\"mailto:hola@glofera.com\">hola@glofera.com<\/a><\/strong><\/span> o truca&#8217;ns al <strong><span style=\"color: #a9ca4a;\">(+34) 900 600 300<\/span><\/strong> .<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":5101,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[99,100],"tags":[905,360,361,288,906,907,909,910,912,367,292,364,365,362,363,915,1014,366],"class_list":["post-5104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguretat","category-empresa-ca","tag-amenazas-digitales-ca-2","tag-auditoria-ciberseguretat","tag-auditories-de-ciberseguretat","tag-ciber-resiliencia-ca","tag-ciber-tranquilidad-ca-2","tag-ciberataque-ca-2","tag-ciberseguridad-ca-2","tag-ciberseguridad-empresarial-ca-2","tag-ciberseguridad-para-pymes-ca-2","tag-com-fer-una-auditoria-de-ciberseguretat","tag-glofera-ca","tag-hacker-etic","tag-hacking-etic","tag-pentester-ca","tag-pentesting-ca","tag-pymes-ca-2","tag-seguridad-informatica","tag-tipus-dauditoria-ciberseguretat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerabilitats en Ciberseguretat Empresa | Glofera<\/title>\n<meta name=\"description\" content=\"Descobreix com una auditoria en ciberseguretat identifica vulnerabilitats, protegeix les dades i enforteix la seguretat de la teva empresa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilitats en Ciberseguretat Empresa | Glofera\" \/>\n<meta property=\"og:description\" content=\"Descobreix com una auditoria en ciberseguretat identifica vulnerabilitats, protegeix les dades i enforteix la seguretat de la teva empresa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/\" \/>\n<meta property=\"og:site_name\" content=\"Glofera\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/glofera.telecom\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T09:28:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T06:59:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/glofera.com\/wp-content\/uploads\/2024\/01\/audciberseguridad_17e.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leidy G\u00f3mez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/\"},\"author\":{\"name\":\"Leidy G\u00f3mez\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#\\\/schema\\\/person\\\/3bca10e664a33206693cc552303f513b\"},\"headline\":\"Descobreix vulnerabilitats amb una auditoria de ciberseguretat\",\"datePublished\":\"2024-01-17T09:28:58+00:00\",\"dateModified\":\"2026-05-07T06:59:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/\"},\"wordCount\":5094,\"publisher\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/glofera.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/audciberseguridad_17e.jpg\",\"keywords\":[\"amenazas digitales\",\"auditoria ciberseguretat\",\"auditories de ciberseguretat\",\"ciber resili\u00e8ncia\",\"ciber tranquilidad\",\"ciberataque\",\"ciberseguridad\",\"ciberseguridad empresarial\",\"ciberseguridad para pymes\",\"com fer una auditoria de ciberseguretat\",\"glofera\",\"hacker \u00e8tic\",\"hacking \u00e8tic\",\"pentester\",\"pentesting\",\"pymes\",\"seguridad inform\u00e1tica\",\"tipus d'auditoria ciberseguretat\"],\"articleSection\":[\"Ciberseguretat\",\"Empresa\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/\",\"url\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/\",\"name\":\"Vulnerabilitats en Ciberseguretat Empresa | Glofera\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/glofera.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/audciberseguridad_17e.jpg\",\"datePublished\":\"2024-01-17T09:28:58+00:00\",\"dateModified\":\"2026-05-07T06:59:06+00:00\",\"description\":\"Descobreix com una auditoria en ciberseguretat identifica vulnerabilitats, protegeix les dades i enforteix la seguretat de la teva empresa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/glofera.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/audciberseguridad_17e.jpg\",\"contentUrl\":\"https:\\\/\\\/glofera.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/audciberseguridad_17e.jpg\",\"width\":2560,\"height\":960,\"caption\":\"vulnerabilitats ciberseguretat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/glofera.com\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Descobreix vulnerabilitats amb una auditoria de ciberseguretat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/glofera.com\\\/ca\\\/\",\"name\":\"Glofera\",\"description\":\"Ciberseguretat i Telecomunicacions\",\"publisher\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#organization\"},\"alternateName\":\"Telecomunicaciones y Ciberseguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/glofera.com\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#organization\",\"name\":\"Glofera\",\"alternateName\":\"Telecomunicaciones y Ciberseguridad\",\"url\":\"https:\\\/\\\/glofera.com\\\/ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/glofera.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/firma_logo_glofera_2.png\",\"contentUrl\":\"https:\\\/\\\/glofera.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/firma_logo_glofera_2.png\",\"width\":501,\"height\":501,\"caption\":\"Glofera\"},\"image\":{\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/glofera.telecom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/76501365\\\/admin\\\/notifications\\\/all\\\/\",\"https:\\\/\\\/www.instagram.com\\\/glofera.telecom\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/glofera.com\\\/ca\\\/#\\\/schema\\\/person\\\/3bca10e664a33206693cc552303f513b\",\"name\":\"Leidy G\u00f3mez\",\"description\":\"Comunicadora social y periodista, especializada en marketing de contenidos para entornos digitales. Es responsable de marketing en Glofera, donde impulsa la comunicaci\u00f3n y el posicionamiento digital de la marca. Le apasiona acercar las telecomunicaciones, la inteligencia artificial y las ciberseguridad a las empresas de forma clara, \u00fatil y estrat\u00e9gica.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilitats en Ciberseguretat Empresa | Glofera","description":"Descobreix com una auditoria en ciberseguretat identifica vulnerabilitats, protegeix les dades i enforteix la seguretat de la teva empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/","og_locale":"ca_ES","og_type":"article","og_title":"Vulnerabilitats en Ciberseguretat Empresa | Glofera","og_description":"Descobreix com una auditoria en ciberseguretat identifica vulnerabilitats, protegeix les dades i enforteix la seguretat de la teva empresa.","og_url":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/","og_site_name":"Glofera","article_publisher":"https:\/\/www.facebook.com\/glofera.telecom","article_published_time":"2024-01-17T09:28:58+00:00","article_modified_time":"2026-05-07T06:59:06+00:00","og_image":[{"width":2560,"height":960,"url":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/01\/audciberseguridad_17e.jpg","type":"image\/jpeg"}],"author":"Leidy G\u00f3mez","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#article","isPartOf":{"@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/"},"author":{"name":"Leidy G\u00f3mez","@id":"https:\/\/glofera.com\/ca\/#\/schema\/person\/3bca10e664a33206693cc552303f513b"},"headline":"Descobreix vulnerabilitats amb una auditoria de ciberseguretat","datePublished":"2024-01-17T09:28:58+00:00","dateModified":"2026-05-07T06:59:06+00:00","mainEntityOfPage":{"@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/"},"wordCount":5094,"publisher":{"@id":"https:\/\/glofera.com\/ca\/#organization"},"image":{"@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/01\/audciberseguridad_17e.jpg","keywords":["amenazas digitales","auditoria ciberseguretat","auditories de ciberseguretat","ciber resili\u00e8ncia","ciber tranquilidad","ciberataque","ciberseguridad","ciberseguridad empresarial","ciberseguridad para pymes","com fer una auditoria de ciberseguretat","glofera","hacker \u00e8tic","hacking \u00e8tic","pentester","pentesting","pymes","seguridad inform\u00e1tica","tipus d'auditoria ciberseguretat"],"articleSection":["Ciberseguretat","Empresa"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/","url":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/","name":"Vulnerabilitats en Ciberseguretat Empresa | Glofera","isPartOf":{"@id":"https:\/\/glofera.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#primaryimage"},"image":{"@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/01\/audciberseguridad_17e.jpg","datePublished":"2024-01-17T09:28:58+00:00","dateModified":"2026-05-07T06:59:06+00:00","description":"Descobreix com una auditoria en ciberseguretat identifica vulnerabilitats, protegeix les dades i enforteix la seguretat de la teva empresa.","breadcrumb":{"@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#primaryimage","url":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/01\/audciberseguridad_17e.jpg","contentUrl":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/01\/audciberseguridad_17e.jpg","width":2560,"height":960,"caption":"vulnerabilitats ciberseguretat"},{"@type":"BreadcrumbList","@id":"https:\/\/glofera.com\/ca\/coneix-les-vulnerabilitats-de-la-teva-empresa-amb-una-auditoria-a-ciberseguretat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/glofera.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Descobreix vulnerabilitats amb una auditoria de ciberseguretat"}]},{"@type":"WebSite","@id":"https:\/\/glofera.com\/ca\/#website","url":"https:\/\/glofera.com\/ca\/","name":"Glofera","description":"Ciberseguretat i Telecomunicacions","publisher":{"@id":"https:\/\/glofera.com\/ca\/#organization"},"alternateName":"Telecomunicaciones y Ciberseguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glofera.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/glofera.com\/ca\/#organization","name":"Glofera","alternateName":"Telecomunicaciones y Ciberseguridad","url":"https:\/\/glofera.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/glofera.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/04\/firma_logo_glofera_2.png","contentUrl":"https:\/\/glofera.com\/wp-content\/uploads\/2024\/04\/firma_logo_glofera_2.png","width":501,"height":501,"caption":"Glofera"},"image":{"@id":"https:\/\/glofera.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/glofera.telecom","https:\/\/www.linkedin.com\/company\/76501365\/admin\/notifications\/all\/","https:\/\/www.instagram.com\/glofera.telecom\/"]},{"@type":"Person","@id":"https:\/\/glofera.com\/ca\/#\/schema\/person\/3bca10e664a33206693cc552303f513b","name":"Leidy G\u00f3mez","description":"Comunicadora social y periodista, especializada en marketing de contenidos para entornos digitales. Es responsable de marketing en Glofera, donde impulsa la comunicaci\u00f3n y el posicionamiento digital de la marca. Le apasiona acercar las telecomunicaciones, la inteligencia artificial y las ciberseguridad a las empresas de forma clara, \u00fatil y estrat\u00e9gica."}]}},"_links":{"self":[{"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/posts\/5104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/comments?post=5104"}],"version-history":[{"count":11,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/posts\/5104\/revisions"}],"predecessor-version":[{"id":16152,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/posts\/5104\/revisions\/16152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/media\/5101"}],"wp:attachment":[{"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/media?parent=5104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/categories?post=5104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/glofera.com\/ca\/wp-json\/wp\/v2\/tags?post=5104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}