{"id":81482,"date":"2020-09-23T13:00:20","date_gmt":"2020-09-23T11:00:20","guid":{"rendered":"https:\/\/blog.wildix.com\/?p=81482"},"modified":"2020-09-23T13:00:20","modified_gmt":"2020-09-23T11:00:20","slug":"hacer-frente-los-ataques-dos-en-voip","status":"publish","type":"post","link":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/","title":{"rendered":"Hacer frente a los ataques DoS en VoIP"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=\u00bb37256&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_column_text]<span style=\"font-weight: 400;\">Todos los sectores tienen alguna debilidad: un problema que le afecta especialmente y parece no tener soluci\u00f3n.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En materia de ciberseguridad, la mayor amenaza seguramente son los ataques de denegaci\u00f3n de servicio.<\/span><!--more--><\/p>\n<h2><b>\u00bfQu\u00e9 es la Denegaci\u00f3n de Servicio?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Abreviado como DoS (Denial of Service) o DDoS (Distributed Denial of Service), esta pesadilla digital <\/span><a href=\"https:\/\/www.technologyreview.com\/s\/613331\/the-first-ddos-attack-was-20-years-ago-this-is-what-weve-learned-since\/\"><span style=\"font-weight: 400;\">golpe\u00f3 por primera vez en 1999<\/span><\/a><span style=\"font-weight: 400;\"> y no ha abandonado el mundo de la inform\u00e1tica desde entonces.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Los ataques DoS se producen cuando un ordenador \u201cdominante\u201d fuerza a otros ordenadores a enviar un exceso de informaci\u00f3n a un servidor web, generando demasiada actividad e impidiendo que el sistema pueda dar servicio a los verdaderos usuarios.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Es como si un aficionado al cine, haciendo cola para comprar las entradas de una peli, fuera arrollado de repente por una multitud cort\u00e1ndole el paso. El aumento en el tr\u00e1fico evita que los clientes que ya estaban haciendo cola puedan llegar hasta la taquilla.<\/span><\/p>\n<h2><b>Riesgos para VoIP<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Conceptualmente, DoS es algo muy abstracto. Sin embargo, sus consecuencias son muy reales. <\/span><a href=\"https:\/\/techhq.com\/2019\/03\/ddos-attacks-cost-us-businesses-10bn-per-year\/\"><span style=\"font-weight: 400;\">Seg\u00fan un estudio<\/span><\/a><span style=\"font-weight: 400;\">, los ataques DoS han afectado al 92% de las empresas de Norte Am\u00e9rica, evitando que los leg\u00edtimos usuarios accedieran a sus p\u00e1ginas webs durante periodos que van desde los 30 minutos hasta horas enteras. Anualmente, estos ataques causan una p\u00e9rdida econ\u00f3mica media de unos 200.000 $ <\/span><i><span style=\"font-weight: 400;\">por negocio<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aunque la telefon\u00eda VoIP no es t\u00e9cnicamente una p\u00e1gina web, <\/span><b>sigue siendo vulnerable a los ataques DoS<\/b><span style=\"font-weight: 400;\">. Igual que un ordenador pirateado puede sobrecargar un servidor con datos superfluos, <\/span><b>es posible tumbar f\u00e1cilmente un sistema VoIP bombarde\u00e1ndolo con llamadas, mensajes y otras solicitudes de acceso<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Esto no es solo teor\u00eda: <\/span><a href=\"https:\/\/securityintelligence.com\/hello-youve-been-compromised-upward-attack-trend-targeting-voip-protocol-sip\/\"><span style=\"font-weight: 400;\">DDoS suele mencionarse como una vulnerabilidad de la VoIP<\/span><\/a><span style=\"font-weight: 400;\"> y, en la pr\u00e1ctica, ha sido utilizado para tumbar la comunicaci\u00f3n telef\u00f3nica durante algunos ciberataques. <\/span><a href=\"https:\/\/www.techrepublic.com\/article\/major-ddos-attacks-increased-967-this-year\/\"><span style=\"font-weight: 400;\">Teniendo en cuenta que los ataques DoS que afectaron a gran cantidad de datos se multiplicaron hasta en un 967% solo en el primer trimestre de 2019<\/span><\/a><span style=\"font-weight: 400;\">, es f\u00e1cil comprender por qu\u00e9 debes tomarte muy en serio este riesgo para tu seguridad.<\/span><\/p>\n<h2><b>La Soluci\u00f3n<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">La mejor medida preventiva contra los ataques DoS es impedir que ocurran: te interesa que tu PBX sea accesible, pero tambi\u00e9n necesitas que tu sistema ignore un exceso de intentos de acceso.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En teor\u00eda, puedes conseguir esto con un firewall. La clave, aun as\u00ed, es que la protecci\u00f3n no se limite \u00fanicamente a solicitar un registro. Despu\u00e9s de todo, si tu sistema est\u00e1 intentando verificar el estado de una solicitud, sigue dedicando sus recursos a gestionar ese tr\u00e1fico, d\u00e1ndole al autor del ataque DoS lo que quiere.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Para que sea realmente efectivo, un firewall debe detener el procesamiento de un exceso de solicitudes sospechosas a un mismo tiempo. De este modo, el sistema no tiene que perder tiempo validando el registro: simplemente filtra y aleja el tr\u00e1fico maligno y reserva sus esfuerzos para los usuarios aut\u00e9nticos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Con Wildix, esta forma de protecci\u00f3n DoS est\u00e1 integrada en todos los elementos del sistema PBX, desde el SIP hasta la web. Su configuraci\u00f3n es autom\u00e1tica y est\u00e1 operativa desde la instalaci\u00f3n, como parte de un sistema dise\u00f1ado para ser seguro por defecto (\u201csecure-by-design\u201d).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En fin, si algo es incuestionable es que los ataques DoS est\u00e1n aqu\u00ed para quedarse, por lo que m\u00e1s vale preparar tu sistema para hacerles frente.<\/span><\/p>\n<p><b><i>Para m\u00e1s consejos sobre c\u00f3mo gestionar la vida en la oficina e implementar software, <\/i><\/b><a href=\"https:\/\/www.wildix.com\/es\/wildix-magazine\/\"><b><i>\u00a1suscr\u00edbete para recibir gratis nuestro Magazine!<\/i><\/b><\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_single_image image=\u00bb37256&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_column_text]Todos los sectores tienen alguna debilidad: un problema que le afecta especialmente y parece no tener soluci\u00f3n. En materia de ciberseguridad, la mayor amenaza seguramente son los ataques de denegaci\u00f3n de servicio.<\/p>\n","protected":false},"author":563,"featured_media":37256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[732],"tags":[],"class_list":["post-81482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacer frente a los ataques DoS en VoIP | Wildix<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacer frente a los ataques DoS en VoIP | Wildix\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_single_image image=\u00bb37256&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_column_text]Todos los sectores tienen alguna debilidad: un problema que le afecta especialmente y parece no tener soluci\u00f3n. En materia de ciberseguridad, la mayor amenaza seguramente son los ataques de denegaci\u00f3n de servicio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/\" \/>\n<meta property=\"og:site_name\" content=\"Wildix Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wildix.pbx\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-23T11:00:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg\" \/>\n<meta name=\"author\" content=\"Austen Read-McFarland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@WildixSrl\" \/>\n<meta name=\"twitter:site\" content=\"@WildixSrl\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Austen Read-McFarland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/\"},\"author\":{\"name\":\"Austen Read-McFarland\",\"@id\":\"https:\/\/blog.wildix.com\/#\/schema\/person\/899417d475c0519b2d90ae4cdcd60f99\"},\"headline\":\"Hacer frente a los ataques DoS en VoIP\",\"datePublished\":\"2020-09-23T11:00:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/\"},\"wordCount\":630,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.wildix.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg\",\"articleSection\":[\"Blog @es\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/\",\"url\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/\",\"name\":\"Hacer frente a los ataques DoS en VoIP | Wildix\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wildix.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg\",\"datePublished\":\"2020-09-23T11:00:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage\",\"url\":\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg\",\"contentUrl\":\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg\",\"width\":1200,\"height\":799},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wildix.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog @es\",\"item\":\"https:\/\/blog.wildix.com\/es\/category\/blog-es\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacer frente a los ataques DoS en VoIP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wildix.com\/#website\",\"url\":\"https:\/\/blog.wildix.com\/\",\"name\":\"Wildix Blog\",\"description\":\"Desde el VoIP hasta las Comunicaciones Unificadas y WebRTC\",\"publisher\":{\"@id\":\"https:\/\/blog.wildix.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wildix.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wildix.com\/#organization\",\"name\":\"Wildix\",\"url\":\"https:\/\/blog.wildix.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blog.wildix.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2015\/05\/LOGO-WILDIX-BLU-small-e1733323375170.jpg\",\"contentUrl\":\"https:\/\/blog.wildix.com\/wp-content\/uploads\/2015\/05\/LOGO-WILDIX-BLU-small-e1733323375170.jpg\",\"width\":473,\"height\":192,\"caption\":\"Wildix\"},\"image\":{\"@id\":\"https:\/\/blog.wildix.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/wildix.pbx\",\"https:\/\/x.com\/WildixSrl\",\"https:\/\/www.linkedin.com\/company\/wildix-srl\",\"https:\/\/www.youtube.com\/user\/WildixPBX\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wildix.com\/#\/schema\/person\/899417d475c0519b2d90ae4cdcd60f99\",\"name\":\"Austen Read-McFarland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blog.wildix.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g\",\"caption\":\"Austen Read-McFarland\"},\"url\":\"https:\/\/blog.wildix.com\/es\/author\/austen-read-mcfarland\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacer frente a los ataques DoS en VoIP | Wildix","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Hacer frente a los ataques DoS en VoIP | Wildix","og_description":"[vc_row][vc_column][vc_single_image image=\u00bb37256&#8243; img_size=\u00bbfull\u00bb alignment=\u00bbcenter\u00bb][vc_column_text]Todos los sectores tienen alguna debilidad: un problema que le afecta especialmente y parece no tener soluci\u00f3n. En materia de ciberseguridad, la mayor amenaza seguramente son los ataques de denegaci\u00f3n de servicio.","og_url":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/","og_site_name":"Wildix Blog","article_publisher":"https:\/\/www.facebook.com\/wildix.pbx","article_published_time":"2020-09-23T11:00:20+00:00","og_image":[{"url":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg","type":"","width":"","height":""}],"author":"Austen Read-McFarland","twitter_card":"summary_large_image","twitter_image":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg","twitter_creator":"@WildixSrl","twitter_site":"@WildixSrl","twitter_misc":{"Escrito por":"Austen Read-McFarland","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#article","isPartOf":{"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/"},"author":{"name":"Austen Read-McFarland","@id":"https:\/\/blog.wildix.com\/#\/schema\/person\/899417d475c0519b2d90ae4cdcd60f99"},"headline":"Hacer frente a los ataques DoS en VoIP","datePublished":"2020-09-23T11:00:20+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/"},"wordCount":630,"commentCount":0,"publisher":{"@id":"https:\/\/blog.wildix.com\/#organization"},"image":{"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg","articleSection":["Blog @es"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/","url":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/","name":"Hacer frente a los ataques DoS en VoIP | Wildix","isPartOf":{"@id":"https:\/\/blog.wildix.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage"},"image":{"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg","datePublished":"2020-09-23T11:00:20+00:00","breadcrumb":{"@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#primaryimage","url":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg","contentUrl":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2019\/12\/Dealing-with-DoS-Attacks-in-VoIP.jpg","width":1200,"height":799},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wildix.com\/es\/hacer-frente-los-ataques-dos-en-voip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wildix.com\/es\/"},{"@type":"ListItem","position":2,"name":"Blog @es","item":"https:\/\/blog.wildix.com\/es\/category\/blog-es\/"},{"@type":"ListItem","position":3,"name":"Hacer frente a los ataques DoS en VoIP"}]},{"@type":"WebSite","@id":"https:\/\/blog.wildix.com\/#website","url":"https:\/\/blog.wildix.com\/","name":"Wildix Blog","description":"Desde el VoIP hasta las Comunicaciones Unificadas y WebRTC","publisher":{"@id":"https:\/\/blog.wildix.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wildix.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/blog.wildix.com\/#organization","name":"Wildix","url":"https:\/\/blog.wildix.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.wildix.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2015\/05\/LOGO-WILDIX-BLU-small-e1733323375170.jpg","contentUrl":"https:\/\/blog.wildix.com\/wp-content\/uploads\/2015\/05\/LOGO-WILDIX-BLU-small-e1733323375170.jpg","width":473,"height":192,"caption":"Wildix"},"image":{"@id":"https:\/\/blog.wildix.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wildix.pbx","https:\/\/x.com\/WildixSrl","https:\/\/www.linkedin.com\/company\/wildix-srl","https:\/\/www.youtube.com\/user\/WildixPBX"]},{"@type":"Person","@id":"https:\/\/blog.wildix.com\/#\/schema\/person\/899417d475c0519b2d90ae4cdcd60f99","name":"Austen Read-McFarland","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.wildix.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab44849117dd26bbdfa9ddbee7ab007c63ceafcb5c9585bbbba0bd325a11226c?s=96&d=retro&r=g","caption":"Austen Read-McFarland"},"url":"https:\/\/blog.wildix.com\/es\/author\/austen-read-mcfarland\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/posts\/81482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/comments?post=81482"}],"version-history":[{"count":0,"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/posts\/81482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/media\/37256"}],"wp:attachment":[{"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/media?parent=81482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/categories?post=81482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wildix.com\/es\/wp-json\/wp\/v2\/tags?post=81482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}