{"id":1996,"date":"2023-09-17T12:17:19","date_gmt":"2023-09-17T15:17:19","guid":{"rendered":"https:\/\/ciberingenieria.com.ar\/?page_id=1996"},"modified":"2023-11-23T11:26:12","modified_gmt":"2023-11-23T14:26:12","slug":"configuracion-de-vpn-y-comunicaciones-seguras-asegurando-la-conexion-y-privacidad-de-tu-empresa","status":"publish","type":"page","link":"https:\/\/ciberingenieria.com.ar\/index.php\/configuracion-de-vpn-y-comunicaciones-seguras-asegurando-la-conexion-y-privacidad-de-tu-empresa\/","title":{"rendered":"Comunicaciones Seguras"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uag-hide-tab uag-hide-mob uagb-block-b37efe12 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-0c2bf6ee\"><h2 class=\"uagb-heading-text\">Comunicaciones Seguras<\/h2><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Fortalece la Privacidad y la Integridad de tus Datos<\/strong><\/p>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-53e08e65\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-1cb2d29c alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-7f366278\"><h2 class=\"uagb-heading-text\"><strong>En un mundo digital interconectado, la seguridad de tus comunicaciones es esencial. En Ciberingenier\u00eda, nos dedicamos a asegurar que tus datos viajen de forma segura y confiable en el ciberespacio.<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-d72d5dfb\"><h2 class=\"uagb-heading-text\"><strong>Nuestro servicio de Comunicaciones Seguras se centra en establecer conexiones protegidas y cifradas para fortalecer la privacidad y la integridad de tus comunicaciones.<\/strong><\/h2><\/div>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--20);padding-bottom:0;padding-left:var(--wp--preset--spacing--20);font-size:35px;line-height:1.3\"><strong>Lo que Ofrecemos<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-995286dc animated zoomIn\"><h2 class=\"uagb-heading-text\">Redes Privadas Virtuales (VPN) Seguras<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Implementamos VPN seguras para crear t\u00faneles cifrados que protegen tus comunicaciones y datos mientras viajan a trav\u00e9s de redes p\u00fablicas. Esto asegura que tus conexiones sean privadas y seguras, incluso en entornos no confiables.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-74744f69 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/mathew-schwartz-sb7RUrRMaC4-unsplash-edited-scaled.jpg , https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/mathew-schwartz-sb7RUrRMaC4-unsplash-edited-1024x1024.jpg 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/mathew-schwartz-sb7RUrRMaC4-unsplash-edited-scaled.jpg\" alt=\"\" class=\"uag-image-3519\" width=\"680\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop is-layout-flex wp-container-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-1d9c7998 animated zoomIn\"><h2 class=\"uagb-heading-text\">Configuraci\u00f3n de HTTPS y Certificados SSL\/TLS<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Aseguramos que tu sitio web utilice HTTPS, implementando certificados SSL\/TLS confiables. Esto hace que la informaci\u00f3n transmitida entre tu sitio web y los usuarios est\u00e9 encriptada y sea segura contra posibles intentos de interceptaci\u00f3n.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-44d35d45 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Sin-titulo-copia-edited.png \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Sin-titulo-copia-edited.png\" alt=\"\" class=\"uag-image-3508\" width=\"734\" height=\"734\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-tab uag-hide-mob is-layout-flex wp-container-20 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-18 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-cd7b0ea7 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Sin-titulo-copia-edited.png \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Sin-titulo-copia-edited.png\" alt=\"\" class=\"uag-image-3508\" width=\"683\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Aseguramos que tu sitio web utilice HTTPS, implementando certificados SSL\/TLS confiables. Esto hace que la informaci\u00f3n transmitida entre tu sitio web y los usuarios est\u00e9 encriptada y sea segura contra posibles intentos de interceptaci\u00f3n.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-7c98796d animated zoomIn\"><h2 class=\"uagb-heading-text\">Configuraci\u00f3n de HTTPS y Certificados SSL\/TLS<\/h2><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-26 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-310a02a6 animated zoomIn\"><h2 class=\"uagb-heading-text\">Protocolos seguros de Comunicaci\u00f3n<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Configuramos y optimizamos protocolos de comunicaci\u00f3n seguros, como TLS\/SSL, SSH y otros, para que tus datos est\u00e9n protegidos durante la transmisi\u00f3n y las interacciones en l\u00ednea.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-e7dd2e33 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/markus-spiske-iar-afB0QQw-unsplash-edited-1-scaled.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/markus-spiske-iar-afB0QQw-unsplash-edited-1-scaled.jpg\" alt=\"\" class=\"uag-image-3550\" width=\"680\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-81844d7e alignfull uagb-is-root-container\"><div class=\"uagb-container__shape uagb-container__shape-top\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 700 10\" preserveAspectRatio=\"none\"><path class=\"uagb-container__shape-fill\" d=\"M350,10L340,0h20L350,10z\"><\/path><\/svg><\/div><div class=\"uagb-container-inner-blocks-wrap\">\n<p class=\"has-text-align-center has-ast-global-color-5-color has-text-color\" style=\"padding-top:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--80);font-size:35px;line-height:1.6\">Beneficios Clave<\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-2269793c\"><div class=\"uagb-icon-list__wrap\">\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-e77990c4\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Privacidad y Confidencialidad<\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-358e57af\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Nuestras soluciones de comunicaciones seguras hacen que tus datos est\u00e9n protegidos y que solo las partes autorizadas tengan acceso a la informaci\u00f3n transmitida. Tu privacidad es nuestra prioridad, y nos aseguramos de que tus comunicaciones est\u00e9n altamente resguardadas.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-fb1c696a\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Integridad de los Datos en Todo Momento<\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-ec2a7965\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Al utilizar tecnolog\u00edas de encriptaci\u00f3n y protocolos seguros, hacemos que tus datos no sean manipulados o alterados durante la transmisi\u00f3n. Cada pieza de informaci\u00f3n que env\u00edas o recibes mantiene su integridad en todo momento, asegurando la confianza en la informaci\u00f3n.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-f558b0a5\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong><strong>Generaci\u00f3n de Confianza y Credibilidad<\/strong><\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-24c08b9a\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">La implementaci\u00f3n de HTTPS y la seguridad en tus comunicaciones reflejan un compromiso con la protecci\u00f3n de la privacidad de tus clientes y usuarios, aumentando la confianza en tu marca. Mostrar esta dedicaci\u00f3n a la seguridad refleja un negocio confiable y preocupado por la seguridad de sus usuarios.<\/span><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-3180d753 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-02f2b1ed\"><h2 class=\"uagb-heading-text\">\u00a1Asegura tus Comunicaciones Digitales con Nosotros!<\/h2><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Comunicaciones Seguras Fortalece la Privacidad y la Integridad de tus Datos En un mundo digital interconectado, la seguridad de tus comunicaciones es esencial. En Ciberingenier\u00eda, nos dedicamos a asegurar que tus datos viajen de forma segura y confiable en el ciberespacio. Nuestro servicio de Comunicaciones Seguras se centra en establecer conexiones protegidas y cifradas para [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"CeciliaManzano","author_link":"https:\/\/ciberingenieria.com.ar\/index.php\/author\/ceciliamanzano\/"},"uagb_comment_info":0,"uagb_excerpt":"Comunicaciones Seguras Fortalece la Privacidad y la Integridad de tus Datos En un mundo digital interconectado, la seguridad de tus comunicaciones es esencial. En Ciberingenier\u00eda, nos dedicamos a asegurar que tus datos viajen de forma segura y confiable en el ciberespacio. Nuestro servicio de Comunicaciones Seguras se centra en establecer conexiones protegidas y cifradas para&hellip;","_links":{"self":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1996"}],"collection":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=1996"}],"version-history":[{"count":39,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1996\/revisions"}],"predecessor-version":[{"id":3780,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1996\/revisions\/3780"}],"wp:attachment":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=1996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}