{"id":667,"date":"2024-08-06T17:21:04","date_gmt":"2024-08-06T20:21:04","guid":{"rendered":"https:\/\/conversys.global\/?post_type=blue-huddle&#038;p=667"},"modified":"2024-09-04T12:16:14","modified_gmt":"2024-09-04T15:16:14","slug":"huddlephishing","status":"publish","type":"blue-huddle","link":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/","title":{"rendered":"huddlePHISHING"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><section id=\"huddlephi1\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4 class=\"blue\">Visi\u00f3n general<\/h4>\n<h2>Reforzar la resistencia digital con inteligencia<\/h2>\n<p>El phishing es una forma de ciberataque en la que individuos o grupos malintencionados intentan enga\u00f1ar a la gente para obtener informaci\u00f3n confidencial. Estos ataques suelen consistir en el env\u00edo de correos electr\u00f3nicos o mensajes de texto fraudulentos haci\u00e9ndose pasar por fuentes fiables, como empresas o entidades financieras.<\/p>\n<p>huddlePHISHING es una potente herramienta que permite a las empresas poner a prueba la concienciaci\u00f3n de sus empleados en materia de seguridad frente a los ataques de phishing. Dise\u00f1ada para parecer real, con correos electr\u00f3nicos enviados desde direcciones aparentemente leg\u00edtimas, esta soluci\u00f3n no solo eval\u00faa la preparaci\u00f3n de los empleados, sino que tambi\u00e9n ofrece formaci\u00f3n personalizada para reforzar las defensas de la empresa.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\" id=\"beneficios\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2>Beneficios del huddlePHISHING<\/h2>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi1.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi1\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Reducci\u00f3n del riesgo de ataques de phishing:<\/h3>\n<p>Minimiza la probabilidad de \u00e9xito de los ataques de phishing.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi2.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi2\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Mayor concienciaci\u00f3n sobre la seguridad:<\/h3>\n<p>Aumenta la capacidad de los empleados para reconocer los intentos de phishing y reaccionar ante ellos.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi3.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi3\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Identificaci\u00f3n de las \u00e1reas de formaci\u00f3n:<\/h3>\n<p>Destaca las \u00e1reas que necesitan m\u00e1s atenci\u00f3n en t\u00e9rminos de seguridad.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi4.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi4\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Mejorar el cumplimiento:<\/h3>\n<p>Garantiza que la empresa cumple las mejores pr\u00e1cticas de seguridad.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi5.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi5\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Proteger el valor de la marca:<\/h3>\n<p>Preserva la integridad y la reputaci\u00f3n de la empresa.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi6.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi6\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Prevenci\u00f3n de p\u00e9rdidas financieras:<\/h3>\n<p>Evita importantes perjuicios econ\u00f3micos derivados del \u00e9xito de los ataques.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section id=\"huddlephi2\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Caracter\u00edsticas principales<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi9.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi9\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Formaci\u00f3n de usuarios:<\/h4>\n<p>Permite a los empleados reconocer las amenazas de phishing y defenderse de ellas.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi10.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi10\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Generaci\u00f3n de correos electr\u00f3nicos y mensajes de texto de phishing:<\/h4>\n<p>Crea correos electr\u00f3nicos y mensajes personalizados que imitan comunicaciones leg\u00edtimas.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi11.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi11\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Personalizaci\u00f3n de la simulaci\u00f3n:<\/h4>\n<p>Personaliza las simulaciones para satisfacer las necesidades espec\u00edficas de la organizaci\u00f3n.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi8.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi8\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Informes detallados:<\/h4>\n<p>Ofrece informes detallados que proporcionan informaci\u00f3n valiosa sobre la eficacia de las campa\u00f1as de phishing.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left wpb_content_element  icone\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi7.svg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi7\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Identificaci\u00f3n de usuarios vulnerables:<\/h4>\n<p>Detecta e identifica a los usuarios que muestran signos de vulnerabilidad, como abrir, hacer clic y compartir enlaces falsos.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3>Documentaci\u00f3n e informes<\/h3>\n<p>La documentaci\u00f3n de huddlePHISHING ofrece un an\u00e1lisis completo del rendimiento de las campa\u00f1as de phishing, destacando posibles \u00e1reas de mejora y permitiendo aplicar medidas correctivas de forma proactiva. Esto garantiza la solidez continua de la soluci\u00f3n y un enfoque proactivo de la ciberseguridad.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_center wpb_content_element\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img decoding=\"async\" width=\"891\" height=\"713\" src=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi1.jpg\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"phi1\" srcset=\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi1.jpg 891w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi1-300x240.jpg 300w, https:\/\/conversys.global\/wp-content\/uploads\/2024\/08\/phi1-768x615.jpg 768w\" sizes=\"(max-width: 891px) 100vw, 891px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element vc_custom_1725313820371 faixa-banner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: center;\">Esta informaci\u00f3n no s\u00f3lo le informa sobre el estado actual de la ciberseguridad, sino que tambi\u00e9n le sirve de gu\u00eda para futuras mejoras, garantizando la solidez continua de la soluci\u00f3n.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section id=\"cta\" class=\"vc_section\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Contactar con Conversys<\/h4>\n<h2>Descubra c\u00f3mo huddlePHISHING puede transformar la concienciaci\u00f3n sobre la seguridad en su empresa y reforzar sus defensas contra los ataques de phishing.<\/h2>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"bt justify-content-end\">\n        <a class=\"color-white outline-false  size-normal\" href=\"https:\/\/conversys.global\/es\/contato\/\" target=\"_self\" title=\"P\u00f3ngase en contacto\">P\u00f3ngase en contacto<\/a>\n    <\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div>","protected":false},"featured_media":0,"template":"","tipo":[22],"class_list":["post-667","blue-huddle","type-blue-huddle","status-publish","hentry","tipo-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>huddlePHISHING - Conversys<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"huddlePHISHING - Conversys\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Conversys\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-04T15:16:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/\",\"url\":\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/\",\"name\":\"huddlePHISHING - Conversys\",\"isPartOf\":{\"@id\":\"https:\/\/conversys.global\/es\/#website\"},\"datePublished\":\"2024-08-06T20:21:04+00:00\",\"dateModified\":\"2024-09-04T15:16:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/#breadcrumb\"},\"inLanguage\":\"es-CL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conversys.global\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blue Huddle\",\"item\":\"https:\/\/conversys.global\/blue-huddle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/conversys.global\/?tipo=security\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"huddlePHISHING\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conversys.global\/es\/#website\",\"url\":\"https:\/\/conversys.global\/es\/\",\"name\":\"Conversys\",\"description\":\"IT Solutions\",\"publisher\":{\"@id\":\"https:\/\/conversys.global\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conversys.global\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conversys.global\/es\/#organization\",\"name\":\"Conversys\",\"url\":\"https:\/\/conversys.global\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CL\",\"@id\":\"https:\/\/conversys.global\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg\",\"contentUrl\":\"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg\",\"width\":219,\"height\":40,\"caption\":\"Conversys\"},\"image\":{\"@id\":\"https:\/\/conversys.global\/es\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"huddlePHISHING - Conversys","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/","og_locale":"es_ES","og_type":"article","og_title":"huddlePHISHING - Conversys","og_url":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/","og_site_name":"Conversys","article_modified_time":"2024-09-04T15:16:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo estimado de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/","url":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/","name":"huddlePHISHING - Conversys","isPartOf":{"@id":"https:\/\/conversys.global\/es\/#website"},"datePublished":"2024-08-06T20:21:04+00:00","dateModified":"2024-09-04T15:16:14+00:00","breadcrumb":{"@id":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/#breadcrumb"},"inLanguage":"es-CL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conversys.global\/es\/blue-huddle\/huddlephishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conversys.global\/"},{"@type":"ListItem","position":2,"name":"Blue Huddle","item":"https:\/\/conversys.global\/blue-huddle\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/conversys.global\/?tipo=security"},{"@type":"ListItem","position":4,"name":"huddlePHISHING"}]},{"@type":"WebSite","@id":"https:\/\/conversys.global\/es\/#website","url":"https:\/\/conversys.global\/es\/","name":"Conversys","description":"Soluciones inform\u00e1ticas","publisher":{"@id":"https:\/\/conversys.global\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conversys.global\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CL"},{"@type":"Organization","@id":"https:\/\/conversys.global\/es\/#organization","name":"Conversys","url":"https:\/\/conversys.global\/es\/","logo":{"@type":"ImageObject","inLanguage":"es-CL","@id":"https:\/\/conversys.global\/es\/#\/schema\/logo\/image\/","url":"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg","contentUrl":"https:\/\/conversys.global\/wp-content\/uploads\/2024\/03\/conversys.svg","width":219,"height":40,"caption":"Conversys"},"image":{"@id":"https:\/\/conversys.global\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conversys.global\/es\/wp-json\/wp\/v2\/blue-huddle\/667"}],"collection":[{"href":"https:\/\/conversys.global\/es\/wp-json\/wp\/v2\/blue-huddle"}],"about":[{"href":"https:\/\/conversys.global\/es\/wp-json\/wp\/v2\/types\/blue-huddle"}],"wp:attachment":[{"href":"https:\/\/conversys.global\/es\/wp-json\/wp\/v2\/media?parent=667"}],"wp:term":[{"taxonomy":"tipo","embeddable":true,"href":"https:\/\/conversys.global\/es\/wp-json\/wp\/v2\/tipo?post=667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}