{"id":2316,"date":"2025-10-08T11:09:00","date_gmt":"2025-10-08T09:09:00","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/?p=2316"},"modified":"2025-10-08T11:09:00","modified_gmt":"2025-10-08T09:09:00","slug":"octubre-mes-europeo-de-la-ciberseguridad-2","status":"publish","type":"post","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/octubre-mes-europeo-de-la-ciberseguridad-2\/","title":{"rendered":"Octubre: mes europeo de la ciberseguridad"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2025\/10\/Mes_eurpeo_ciberseg.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2317 aligncenter\" src=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2025\/10\/Mes_eurpeo_ciberseg.jpeg\" alt=\"\" width=\"411\" height=\"514\" srcset=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2025\/10\/Mes_eurpeo_ciberseg.jpeg 640w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2025\/10\/Mes_eurpeo_ciberseg-240x300.jpeg 240w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2025\/10\/Mes_eurpeo_ciberseg-560x700.jpeg 560w\" sizes=\"auto, (max-width: 411px) 100vw, 411px\" \/><\/a><\/p>\n<p>Algunos enlaces de inter\u00e9s donde puedes encontrar informaci\u00f3n y contenidos de concienciaci\u00f3n.<\/p>\n<p><a href=\"https:\/\/www.ccn-cert.cni.es\/es\/comunicacion-eventos\/mes-europeo-de-la-ciberseguridad?format=html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ccn-cert.cni.es\/es\/comunicacion-eventos\/mes-europeo-de-la-ciberseguridad?format=html<\/a><\/p>\n<p><a href=\"https:\/\/www.incibe.es\/incibe\/mes-europeo-seguridad-cibernetica\" target=\"_blank\" rel=\"noopener\">https:\/\/www.incibe.es\/incibe\/mes-europeo-seguridad-cibernetica<\/a><\/p>\n<p><a href=\"https:\/\/digital-strategy.ec.europa.eu\/es\/news\/european-cybersecurity-month-2025-kicks-focus-phishing-threats\" target=\"_blank\" rel=\"noopener\">https:\/\/digital-strategy.ec.europa.eu\/es\/news\/european-cybersecurity-month-2025-kicks-focus-phishing-threats<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Algunos enlaces de inter\u00e9s donde puedes encontrar informaci\u00f3n y contenidos de concienciaci\u00f3n. https:\/\/www.ccn-cert.cni.es\/es\/comunicacion-eventos\/mes-europeo-de-la-ciberseguridad?format=html https:\/\/www.incibe.es\/incibe\/mes-europeo-seguridad-cibernetica https:\/\/digital-strategy.ec.europa.eu\/es\/news\/european-cybersecurity-month-2025-kicks-focus-phishing-threats &nbsp;<\/p>\n","protected":false},"author":27,"featured_media":2317,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[47,16,32,12],"tags":[29,33,14,18],"class_list":{"0":"post-2316","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-alertas","8":"category-buenas-practicas","9":"category-consejos","10":"category-noticias","11":"tag-alertas","12":"tag-consejos","13":"tag-noticias","14":"tag-seguridad","15":"entry"},"_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=2316"}],"version-history":[{"count":2,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2316\/revisions"}],"predecessor-version":[{"id":2319,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2316\/revisions\/2319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media?parent=2316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/categories?post=2316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/tags?post=2316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}