{"id":2468,"date":"2024-03-13T18:00:28","date_gmt":"2024-03-13T18:00:28","guid":{"rendered":"https:\/\/redsafeguard.com.mx\/?page_id=2468"},"modified":"2024-03-13T18:12:15","modified_gmt":"2024-03-13T18:12:15","slug":"faq","status":"publish","type":"page","link":"https:\/\/redsafeguard.com.mx\/index.php\/faq\/","title":{"rendered":"FAQ"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2468\" class=\"elementor elementor-2468\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d22ea0c e-flex e-con-boxed e-con e-parent\" data-id=\"d22ea0c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-97d307a e-con-full e-flex e-con e-child\" data-id=\"97d307a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccac79b elementor-widget elementor-widget-image\" data-id=\"ccac79b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"384\" src=\"https:\/\/redsafeguard.com.mx\/wp-content\/uploads\/2023\/12\/03.jpg\" class=\"attachment-large size-large wp-image-1943\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e693214 e-con-full e-flex e-con e-child\" data-id=\"e693214\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0a8bc9 elementor-widget elementor-widget-heading\" data-id=\"a0a8bc9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frecuently Asked Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c007324 elementor-widget elementor-widget-accordion\" data-id=\"c007324\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2011\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2011\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfQu\u00e9 servicios de ciberseguridad ofrecen?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2011\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2011\"><ul><li><span class=\"elementor-icon-list-text\">Pruebas de penetraci\u00f3n en redes externas e internas<\/span><\/li><li><span class=\"elementor-icon-list-text\">An\u00e1lisis de c\u00f3digo est\u00e1tico y din\u00e1mico<\/span><\/li><li><span class=\"elementor-icon-list-text\">Investigaciones OSINT<\/span><\/li><li><span class=\"elementor-icon-list-text\">Campa\u00f1as de ingenier\u00eda social<\/span><\/li><li><span class=\"elementor-icon-list-text\">Pruebas de seguridad aplicaciones m\u00f3viles<\/span><\/li><li><span class=\"elementor-icon-list-text\">Pruebas a aplicaciones web<\/span><\/li><li>Capacitaci\u00f3n a empleados<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2012\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2012\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfQu\u00e9 es una prueba de penetraci\u00f3n?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2012\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2012\"><p>Una prueba de penetraci\u00f3n, tambi\u00e9n conocida como &#8220;pentesting&#8221;, es una evaluaci\u00f3n de seguridad que simula un ataque cibern\u00e9tico a tu sistema inform\u00e1tico, red o aplicaci\u00f3n web. El objetivo es identificar las vulnerabilidades que un atacante podr\u00eda explotar para obtener acceso a tu informaci\u00f3n o sistemas.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2013\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2013\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfEn qu\u00e9 me ayuda contar con este tipo de servicios?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2013\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2013\"><p>Primordialmente te ayudan a cuidar t\u00fa informaci\u00f3n y la de tus clientes evitando ciberataques.<\/p><p>Pero adicionalmente te ayudar\u00e1 a cumplir con marcos regulatorios.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Frecuently Asked Questions \u00bfQu\u00e9 servicios de ciberseguridad ofrecen? Pruebas de penetraci\u00f3n en redes externas e internas An\u00e1lisis de c\u00f3digo est\u00e1tico y din\u00e1mico Investigaciones OSINT Campa\u00f1as de ingenier\u00eda social Pruebas de seguridad aplicaciones m\u00f3viles Pruebas a aplicaciones web Capacitaci\u00f3n a empleados \u00bfQu\u00e9 es una prueba de penetraci\u00f3n? Una prueba de penetraci\u00f3n, tambi\u00e9n conocida como &#8220;pentesting&#8221;, es [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2468","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/pages\/2468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/comments?post=2468"}],"version-history":[{"count":3,"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/pages\/2468\/revisions"}],"predecessor-version":[{"id":2471,"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/pages\/2468\/revisions\/2471"}],"wp:attachment":[{"href":"https:\/\/redsafeguard.com.mx\/index.php\/wp-json\/wp\/v2\/media?parent=2468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}