{"id":29649,"date":"2022-08-30T12:22:44","date_gmt":"2022-08-30T10:22:44","guid":{"rendered":"https:\/\/www.tecsens.com\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/"},"modified":"2022-08-30T12:22:46","modified_gmt":"2022-08-30T10:22:46","slug":"7-capacitats-per-a-una-recuperacio-segura-i-rapida","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/","title":{"rendered":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida"},"content":{"rendered":"\n<p>Seguint en la l\u00ednia de <strong>construir entorns segurs en les organitzacions davant una de les tend\u00e8ncies de ciberatac m\u00e9s destructives de les \u00faltimes d\u00e8cades el ramsonware, \u00e9s imperatiu<\/strong> que les empreses coneguin totes les possibilitats existents per disposar de capacitats s\u00f2lides de recuperaci\u00f3. N&#8217; hi ha moltes, per\u00f2 sigui quina sigui la metodologia escollida ha de ser un marc que permeti definir resultats quantificables i la protecci\u00f3 i recuperaci\u00f3 r\u00e0pida davant un atac. En aquest post<strong> analitzem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.<\/strong><\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida enfront de ramsonware<\/strong><\/h2>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Abans de res, \u00e9s fonamental com hem vist en anteriors posts la <strong>creaci\u00f3 d&#8217; un marc que defineixi com s&#8217; ha d&#8217; aplicar la protecci\u00f3 i les seves metodologies<\/strong>. Com l&#8217;est\u00e0ndard esmentat en l&#8217;anterior post el NiST CFS (National Institute of Standards and Technology) amb les <a href=\"https:\/\/www.tecsens.com\/ca\/5-millors-practiques-contra-ramsonware\/\" target=\"_blank\" rel=\"noreferrer noopener\">5 millors pr\u00e0ctiques contra el ramsonware.<\/a><\/p>\n\n<p>Un cop definit aquest marc cal tenir en compte les <strong>capacitats necess\u00e0ries<\/strong> per aconseguir una recuperaci\u00f3 r\u00e0pida i segura.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>1.Plataforma de protecci\u00f3 \u00e0mplia i extensible<\/strong><\/h3>\n\n<p>S&#8217; ha de comptar amb una<strong>  plataforma capa\u00e7 de protegir totes les c\u00e0rregues de treball cr\u00edtiques tant f\u00edsiques, virtuals<\/strong>  com a basades en contenidors independentment de la seva ubicaci\u00f3 (a les instal\u00b7lacions o al n\u00favol IaaS o SaaS) com comptar amb la capacitat d&#8217;escalat en funci\u00f3 dels requisits i les c\u00e0rregues de treball.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">2.C\u00f2pies de seguretat amb verificaci\u00f3 automatitzada<\/h3>\n\n<p>Comptar amb <strong>c\u00f2pies de seguretat verificades i provades<\/strong> \u00e9s el primer pas feia una recuperaci\u00f3 amb \u00e8xit. Els equips de TI necessiten verificar de manera autom\u00e0tica la integritat de les dades de les c\u00f2pies de seguretat un cop es realitzen, ja que si es detecta algun problema es pugui realitzar una altra c\u00f2pia en producci\u00f3, no un cop realitzada i que no sigui possible disposar-ne per estar compromesa o es consideri poc fiable i amb mancances d&#8217; integritat.<\/p>\n\n<p>Per aix\u00f2 es recomana<strong> seguir la regla del backup 3-2-1-1-0.<\/strong><\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/ca\/politica-3-2-1-1-0-baas\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pol\u00edtica 3-2-1-1-0<\/a><\/div>\n<\/div>\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">3.C\u00f2pies de seguretat resistents: amb espai aeri i immutables<\/h3>\n\n<p>\u00c9s important que les c\u00f2pies de seguretat no puguin ser destru\u00efdes fins i tot tot malgrat comptar amb credencials administratives.<\/p>\n\n<p>L <strong>&#8216; emmagatzematge de c\u00f2pies de seguretat resistent<\/strong> significa tenir una o m\u00e9s c\u00f2pies de les dades en qualsevol combinaci\u00f3 de les seg\u00fcents:<\/p>\n\n<p>&#8211; C\u00f2pies de seguretat en cinta (i retirades de la biblioteca o marcades com a WORM)<\/p>\n\n<p>&#8211; C\u00f2pies de seguretat immutables en S3 o emmagatzematge d&#8217; objectes compatible amb S3<\/p>\n\n<p>&#8211; Suports sense connexi\u00f3 i amb aire (\u00e9s a dir, unitats extra\u00efbles, unitats girat\u00f2ries)<\/p>\n\n<p>&#8211; C\u00f2pies de seguretat immutables en un repositori refor\u00e7at<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/ca\/servieis-cloud-empreses\/cloud-backup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Backup Tecsens<\/a><\/div>\n<\/div>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">4. Higiene digital<\/h3>\n\n<p>Un cop implantada la immutabilitat sigui del nivell que sigui necessari el <strong>xifrat extrem per evitar l&#8217; exfiltraci\u00f3 i fuga de dades.<\/strong><\/p>\n\n<p>Per a aix\u00f2 existeixen diverses bones <strong>pr\u00e0ctiques d&#8217;higiene digital<\/strong>, fonamental per a una autenticaci\u00f3 adequat i remeiar la injecci\u00f3 de dades:<\/p>\n\n<p>&#8211; Contrasenyes \u00faniques per a cada acc\u00e9s i gestor de contrasenyes.<\/p>\n\n<p>&#8211; Autenticaci\u00f3 multifactor (MFA).<\/p>\n\n<p>&#8211; Eliminar dispositius, aplicacions i programes no essencials i utilitats no essencials de tots els servidors.<\/p>\n\n<p>&#8211; Gesti\u00f3 de pegats, executant nivells de programari actualitzats que hagin apuntalat qualsevol vulnerabilitat coneguda.<\/p>\n\n<p>-C\u00f2pies offline de les dades, necess\u00e0ries per combatre les amenaces internes, inclosa la destrucci\u00f3 de dades.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">5. Recuperaci\u00f3 instant\u00e0nia de dades<\/h3>\n\n<p>Comptar amb recursos per <strong>garantir la restauraci\u00f3 r\u00e0pida<\/strong> de diversos equips de manera simult\u00e0nia proporcionant la capacitat de recuperar arxius i c\u00e0rregues de treball f\u00edsiques i virtuals en entorns virtualitzats. A m\u00e9s de la capacitat per recuperar instant\u00e0niament aplicacions empresarials clau, com les bases de dades i la capacitat de revertir tot el Network Attached (NAS) i arxius compartits a un estat bo i preinfectat.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">6. Recuperaci\u00f3 segura de dades<\/h3>\n\n<p>Cal <strong>comptar amb una automatitzaci\u00f3 que eviti que en el nou entorn es reestableixin les dades infectades de malware.<\/strong> Aquesta capacitat permet:<\/p>\n\n<p>&#8211; Detectar ransomware &#8220;adormit&#8221; en les dades de les c\u00f2pies de seguretat i invocar la remediaci\u00f3 antivirus per desinfectar les dades abans que tornin a l&#8217;entorn de producci\u00f3.<\/p>\n\n<p>&#8211; Verificar les c\u00f2pies de seguretat des d&#8217;ubicacions amb menys control de TI, com les oficines remotes i sucursals (ROBO), abans de restaurar-les en les dades prim\u00e0ries.<\/p>\n\n<p>&#8211; Analitzar les dades de les c\u00f2pies de seguretat amb solucions antivirus addicionals per detectar millor el malware rar o de dia zero.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">7. Automatitzaci\u00f3 de la recuperaci\u00f3<\/h3>\n\n<p>El conjunt de solucions ha <strong>de permetre la realitzaci\u00f3 de proves i auditories que mostrin la rapidesa de recuperaci\u00f3 <\/strong>davant desastres que incloguin proves d&#8217; automatitzaci\u00f3 d&#8217; accessibilitat, accessibilitat des de l&#8217; aplicaci\u00f3 i usabilitat despr\u00e9s de la restauraci\u00f3.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-3 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/ca\/contacte-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sol\u00b7licitar consultoria<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Seguint en la l\u00ednia de construir entorns segurs en les organitzacions davant una de les tend\u00e8ncies de ciberatac m\u00e9s destructives de les \u00faltimes d\u00e8cades el ramsonware, \u00e9s imperatiu que les empreses coneguin totes les possibilitats existents per disposar de capacitats s\u00f2lides de recuperaci\u00f3. N&#8217; hi ha moltes, per\u00f2 sigui quina sigui la metodologia escollida ha [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":29514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[498,496,497],"tags":[157,390,110,459,133,381,86],"class_list":["post-29649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-ca","category-consulting-ca","category-seguretat-ti","tag-backup-ca","tag-ciberseguretat","tag-cloud-ca","tag-cloudbackup","tag-consultoria-ca","tag-seguretat","tag-software-ca-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida - Tecsens<\/title>\n<meta name=\"description\" content=\"Construir entorns segurs en les organitzacions \u00e9s imperatiu, et comptem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida - Tecsens\" \/>\n<meta property=\"og:description\" content=\"Construir entorns segurs en les organitzacions \u00e9s imperatiu, et comptem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-30T10:22:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-30T10:22:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida\",\"datePublished\":\"2022-08-30T10:22:44+00:00\",\"dateModified\":\"2022-08-30T10:22:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\"},\"wordCount\":824,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg\",\"keywords\":[\"backup\",\"Ciberseguretat\",\"Cloud\",\"CloudBackup\",\"Consultoria\",\"Seguretat\",\"software\"],\"articleSection\":[\"Cloud\",\"Consulting\",\"Seguretat TI\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\",\"url\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\",\"name\":\"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg\",\"datePublished\":\"2022-08-30T10:22:44+00:00\",\"dateModified\":\"2022-08-30T10:22:46+00:00\",\"description\":\"Construir entorns segurs en les organitzacions \u00e9s imperatiu, et comptem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida - Tecsens","description":"Construir entorns segurs en les organitzacions \u00e9s imperatiu, et comptem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/","og_locale":"ca_ES","og_type":"article","og_title":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida - Tecsens","og_description":"Construir entorns segurs en les organitzacions \u00e9s imperatiu, et comptem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.","og_url":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/","og_site_name":"Tecsens","article_published_time":"2022-08-30T10:22:44+00:00","article_modified_time":"2022-08-30T10:22:46+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida","datePublished":"2022-08-30T10:22:44+00:00","dateModified":"2022-08-30T10:22:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/"},"wordCount":824,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg","keywords":["backup","Ciberseguretat","Cloud","CloudBackup","Consultoria","Seguretat","software"],"articleSection":["Cloud","Consulting","Seguretat TI"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/","url":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/","name":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg","datePublished":"2022-08-30T10:22:44+00:00","dateModified":"2022-08-30T10:22:46+00:00","description":"Construir entorns segurs en les organitzacions \u00e9s imperatiu, et comptem les 7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_7-capacidades-necesarias-para-una-recuperacion-segura-y-rapida-scaled.jpg","width":2560,"height":1442,"caption":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/ca\/7-capacitats-per-a-una-recuperacio-segura-i-rapida\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/ca\/"},{"@type":"ListItem","position":2,"name":"7 capacitats per a una recuperaci\u00f3 segura i r\u00e0pida"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/29649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/comments?post=29649"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/29649\/revisions"}],"predecessor-version":[{"id":29650,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/29649\/revisions\/29650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media\/29514"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media?parent=29649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/categories?post=29649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/tags?post=29649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}