{"id":20243,"date":"2024-12-02T13:54:39","date_gmt":"2024-12-02T12:54:39","guid":{"rendered":"https:\/\/www.transparentedge.eu\/en\/blog\/"},"modified":"2024-12-26T10:54:41","modified_gmt":"2024-12-26T09:54:41","slug":"cybersecurity-for-smes-keys-to-protection","status":"publish","type":"post","link":"https:\/\/www.transparentedge.eu\/en\/blog\/cybersecurity-for-smes-keys-to-protection\/","title":{"rendered":"Cybersecurity for SMEs: keys to protection"},"content":{"rendered":"\n<p>Small and medium-sized businesses face the challenge of protecting their digital assets, ensuring the continuity of their operations and maintaining their corporate reputation, in the face of the new generation of cyberattacks: increasingly sophisticated, frequent and damaging.<\/p>\n\n\n\n<p>According to INCIBE&#8217;s <a href=\"https:\/\/www.incibe.es\/incibe\/sala-de-prensa\/los-incidentes-de-ciberseguridad-de-2023-gestionados-por-incibe-aumentan-en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2023 Cybersecurity Report<\/a>, more than 22,000 cybersecurity incidents affected private companies in Spain last year. Cybercriminals are particularly taking advantage of the limited resources of SMEs to attack them. The less mature the protection system, the greater the number of vulnerabilities and the greater the chances of success for attackers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The impact of cyberattacks on SMEs<\/h3>\n\n\n\n<p>A cyber attack affects both operational capacity and customer confidence. And therefore also finances and business continuity.<\/p>\n\n\n\n<p>Reports from the Spanish Civil Guard<sup data-fn=\"e1ed7ec4-794c-4d6f-a63a-c6919868a717\" class=\"fn\"><a id=\"e1ed7ec4-794c-4d6f-a63a-c6919868a717-link\" href=\"#e1ed7ec4-794c-4d6f-a63a-c6919868a717\">1<\/a><\/sup> indicate that 57% of cases in which SMEs are forced to cease operations after an incident. They do so due to the costs derived from ransoms (in cases of ransomware), fines for non-compliance with regulations and, perhaps most importantly, the loss of trust from their customers..<\/p>\n\n\n\n<p>Against this backdrop, it is evident that cybersecurity must be a vital priority for any company, regardless of its size or sector.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity is not a luxury, but a strategic necessity<\/h3>\n\n\n\n<p>Cybersecurity is not limited to technology itself; it requires a strategic approach that combines prevention, detection and response to incidents. This means being trained and prepared in advance, both to prevent and to confront a potential attack.\u00a0<\/p>\n\n\n\n<p>In the specific case of an SME, it is the person responsible for decision-making who must plan the key points, mainly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Risk analysis and management:<\/strong> Identify and mitigate vulnerabilities before they are exploited.<\/li>\n\n\n\n<li><strong>Response protocols:<\/strong> establish a clear plan to react quickly in the event of an attack.<\/li>\n\n\n\n<li><strong>Regulatory compliance:<\/strong> implement specific security measures, verify how data protection is managed and plan for reporting incidents to the competent authorities.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What to do when faced with an attack? Develop own response protocol<\/h3>\n\n\n\n<p>When an attack occurs, speed and organization are essential, so we suggest some fundamental steps so that, in case it happens, you are prepared:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>1-<\/strong> <strong>Create a crisis committee:<\/strong> involve all relevant departments to assess potential situations, define a joint strategy and the responsibilities of each member in the event of an incident.<\/li>\n\n\n\n<li><strong>2-<\/strong> <strong>Notify the competent authorities:<\/strong> depending on the type of incident, INCIBE must be notified and, if personal data is compromised, the Spanish Data Protection Agency must be notified within a maximum period of 72 hours.<\/li>\n\n\n\n<li><strong>3-<\/strong> <strong>Preserve evidence:<\/strong> To collaborate with forensic experts and comply with regulations, it will be necessary to collect logs that can be used as evidence for legal proceedings or insurance claims.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Regulatory framework: mandatory compliance and legal protection<\/h3>\n\n\n\n<p>European regulations, such as <a href=\"https:\/\/www.transparentedge.eu\/en\/blog\/nis2-directive\/\">the recent NIS2 directive<\/a>, require companies to adopt proactive cybersecurity measures. Non-compliance can result in significant fines and irreversible reputational damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Resilience as a corporate priority<\/h3>\n\n\n\n<p>To address an ever-evolving threat landscape, SMBs must take <a href=\"https:\/\/www.transparentedge.eu\/en\/blog\/cybersecurity-beyond-hype\/\">a continuous approach to cyber resilience<\/a>. This includes regular employee training, proactive system monitoring, and implementing advanced security solutions that span the entire digital ecosystem.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Transparent Edge solutions for digital businesses<\/h3>\n\n\n\n<p>Our proposal adapts to the needs of both SMEs and large companies, and focuses on the versatility of <strong>Perimetrical<\/strong>, our cybersecurity suite.<\/p>\n\n\n\n<p>We understand that cybersecurity is an ongoing process, not a one-time effort, and that&#8217;s why we&#8217;ve designed highly efficient technology designed to protect and maximize the performance of websites and APIs.<\/p>\n\n\n\n<p><strong>Perimetrical<\/strong> is <a href=\"https:\/\/www.transparentedge.eu\/en\/blog\/securing-the-web-through-edge-computing\/\">a comprehensive solution<\/a> that combines different threat detection and response technologies to stop all types of attacks known today. Its main benefits for an SME can be summarized in three points:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prevent and mitigate attacks with advanced proactive detection and response technologies: WAF, Bot Mitigation, Anti-DDoS and Anomaly Detection, among others.<\/li>\n\n\n\n<li>Protect from edge to origin while optimizing performance, reducing cloud costs, and improving customer experience.<\/li>\n\n\n\n<li>Simplify security management by responding to incidents from a single platform, freeing your team from analyzing and managing large amounts of data.<\/li>\n<\/ul>\n\n\n\n<p>With <strong>Perimetrical<\/strong>, companies can significantly reduce the risk of cyberattacks and focus on what really matters: growing their business safely and strategically.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity as a commitment to the future<\/h3>\n\n\n\n<p>SMEs that adopt a proactive mindset in this area not only manage to minimize the impact of cyberattacks, but also strengthen their position in the market, earning the trust of customers and partners.<\/p>\n\n\n\n<p>In an environment where digital transformation is key, prioritizing cyber resilience ensures that companies can adapt, innovate and thrive without compromising their security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br><\/p>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"e1ed7ec4-794c-4d6f-a63a-c6919868a717\">Digital Security Forum: \u00ab<a href=\"https:\/\/www.autonomosyemprendedor.es\/articulo\/actualidad\/57-autonomos-negocios-que-cesan-actividad-espana-es-debido-ciberataque\/20231120000821033225.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">El 57 % de los aut\u00f3nomos y negocios que cesan su actividad en Espa\u00f1a es debido a un ciberataque<\/a>\u00bb <a href=\"#e1ed7ec4-794c-4d6f-a63a-c6919868a717-link\" aria-label=\"Jump to footnote reference 1\">\u21a9\ufe0e<\/a><\/li><\/ol>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small and medium-sized businesses face the challenge of protecting their digital assets to ensure the continuity of their operations and maintain their corporate reputation in these times of cyberattacks.<\/p>\n","protected":false},"author":18,"featured_media":20240,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"[{\"content\":\"Digital Security Forum: \u00ab<a href=\\\"https:\/\/www.autonomosyemprendedor.es\/articulo\/actualidad\/57-autonomos-negocios-que-cesan-actividad-espana-es-debido-ciberataque\/20231120000821033225.html\\\" target=\\\"_blank\\\" rel=\\\"noreferrer noopener nofollow\\\">El 57 % de los aut\u00f3nomos y negocios que cesan su actividad en Espa\u00f1a es debido a un ciberataque<\/a>\u00bb\",\"id\":\"e1ed7ec4-794c-4d6f-a63a-c6919868a717\"}]"},"categories":[7],"tags":[],"class_list":["post-20243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity for SMEs: keys to protection - Transparent Edge<\/title>\n<meta name=\"description\" content=\"Small and medium-sized businesses face the challenge of ensuring the continuity of their operations in these times of cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for SMEs: keys to protection - Transparent Edge\" \/>\n<meta property=\"og:description\" content=\"Small and medium-sized businesses face the challenge of ensuring the continuity of their operations in these times of cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Transparent Edge\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-02T12:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-26T09:54:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/11\/TE-OG-19.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sonia Ar\u00e9valo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tedgeservices\" \/>\n<meta name=\"twitter:site\" content=\"@tedgeservices\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/\"},\"author\":{\"name\":\"Sonia Ar\u00e9valo\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\"},\"headline\":\"Cybersecurity for SMEs: keys to protection\",\"datePublished\":\"2024-12-02T12:54:39+00:00\",\"dateModified\":\"2024-12-26T09:54:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/\"},\"wordCount\":744,\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/TE-OG-19.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/\",\"name\":\"Cybersecurity for SMEs: keys to protection - Transparent Edge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/TE-OG-19.png\",\"datePublished\":\"2024-12-02T12:54:39+00:00\",\"dateModified\":\"2024-12-26T09:54:41+00:00\",\"description\":\"Small and medium-sized businesses face the challenge of ensuring the continuity of their operations in these times of cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/TE-OG-19.png\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/TE-OG-19.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/blog\\\/cybersecurity-for-smes-keys-to-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.transparentedge.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity for SMEs: keys to protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"name\":\"Transparent Edge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\"},\"alternateName\":\"Transparent Edge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.transparentedge.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#organization\",\"name\":\"Transparent Edge Services\",\"alternateName\":\"Transparent Edge\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"contentUrl\":\"https:\\\/\\\/www.transparentedge.eu\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/logotipo-cuadrado.jpg\",\"width\":1328,\"height\":1180,\"caption\":\"Transparent Edge Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/tedgeservices\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/transparent-edge\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC5zZoyZmiLGBTAdiFpj2xHA\\\/videos\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.transparentedge.eu\\\/#\\\/schema\\\/person\\\/c5e1c51b2f3403c743346f269ffa07ec\",\"name\":\"Sonia Ar\u00e9valo\",\"description\":\"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.\",\"sameAs\":[\"https:\\\/\\\/www.transparentedge.eu\\\/\",\"https:\\\/\\\/www.instagram.com\\\/aldeaglobal.web\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/soniaarevalo\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for SMEs: keys to protection - Transparent Edge","description":"Small and medium-sized businesses face the challenge of ensuring the continuity of their operations in these times of cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for SMEs: keys to protection - Transparent Edge","og_description":"Small and medium-sized businesses face the challenge of ensuring the continuity of their operations in these times of cyberattacks.","og_url":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/","og_site_name":"Transparent Edge","article_published_time":"2024-12-02T12:54:39+00:00","article_modified_time":"2024-12-26T09:54:41+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/11\/TE-OG-19.png","type":"image\/png"}],"author":"Sonia Ar\u00e9valo","twitter_card":"summary_large_image","twitter_creator":"@tedgeservices","twitter_site":"@tedgeservices","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#article","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/"},"author":{"name":"Sonia Ar\u00e9valo","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec"},"headline":"Cybersecurity for SMEs: keys to protection","datePublished":"2024-12-02T12:54:39+00:00","dateModified":"2024-12-26T09:54:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/"},"wordCount":744,"publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/11\/TE-OG-19.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/","url":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/","name":"Cybersecurity for SMEs: keys to protection - Transparent Edge","isPartOf":{"@id":"https:\/\/www.transparentedge.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/11\/TE-OG-19.png","datePublished":"2024-12-02T12:54:39+00:00","dateModified":"2024-12-26T09:54:41+00:00","description":"Small and medium-sized businesses face the challenge of ensuring the continuity of their operations in these times of cyberattacks.","breadcrumb":{"@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#primaryimage","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/11\/TE-OG-19.png","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2024\/11\/TE-OG-19.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.transparentedge.eu\/blog\/cybersecurity-for-smes-keys-to-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.transparentedge.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity for SMEs: keys to protection"}]},{"@type":"WebSite","@id":"https:\/\/www.transparentedge.eu\/#website","url":"https:\/\/www.transparentedge.eu\/","name":"Transparent Edge","description":"","publisher":{"@id":"https:\/\/www.transparentedge.eu\/#organization"},"alternateName":"Transparent Edge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.transparentedge.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.transparentedge.eu\/#organization","name":"Transparent Edge Services","alternateName":"Transparent Edge","url":"https:\/\/www.transparentedge.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","contentUrl":"https:\/\/www.transparentedge.eu\/wp-content\/uploads\/2023\/07\/logotipo-cuadrado.jpg","width":1328,"height":1180,"caption":"Transparent Edge Services"},"image":{"@id":"https:\/\/www.transparentedge.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/tedgeservices","https:\/\/www.linkedin.com\/company\/transparent-edge\/","https:\/\/www.youtube.com\/channel\/UC5zZoyZmiLGBTAdiFpj2xHA\/videos"]},{"@type":"Person","@id":"https:\/\/www.transparentedge.eu\/#\/schema\/person\/c5e1c51b2f3403c743346f269ffa07ec","name":"Sonia Ar\u00e9valo","description":"Nada como la sensaci\u00f3n de maravilla e infinitud que se despierta cuando aprendo algo nuevo, cuando descubro cu\u00e1l era la historia y c\u00f3mo funciona algo. Vivo en Madrid hace poco, desarrollo sitios web hace siempre.","sameAs":["https:\/\/www.transparentedge.eu\/","https:\/\/www.instagram.com\/aldeaglobal.web","https:\/\/www.linkedin.com\/in\/soniaarevalo\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/20243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/comments?post=20243"}],"version-history":[{"count":4,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/20243\/revisions"}],"predecessor-version":[{"id":20247,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/posts\/20243\/revisions\/20247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media\/20240"}],"wp:attachment":[{"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/media?parent=20243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/categories?post=20243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transparentedge.eu\/en\/wp-json\/wp\/v2\/tags?post=20243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}