{"id":50196,"date":"2024-12-17T09:41:36","date_gmt":"2024-12-17T08:41:36","guid":{"rendered":"https:\/\/www.tecsens.com\/3-atacs-a-sistemes-voip\/"},"modified":"2024-12-17T09:41:50","modified_gmt":"2024-12-17T08:41:50","slug":"3-atacs-a-sistemes-voip","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/","title":{"rendered":"3 Atacs a Sistemes VoIP"},"content":{"rendered":"\n<p>Els sistemes VoIP s\u00f3n essencials per a la majoria de les empreses avui dia, oferint comunicaci\u00f3 eficient i econ\u00f2mica. Per\u00f2, com qualsevol tecnologia connectada a Internet, tamb\u00e9 s\u00f3n un objectiu atractiu per als hackers. Si el teu sistema VoIP no est\u00e0 ben protegit, els ciberdelinq\u00fcents podrien aprofitar-se i generar-te p\u00e8rdues econ\u00f2miques importants. A continuaci\u00f3, et presentem tres atacs comuns a sistemes VoIP i com podries ser v\u00edctima si no prens mesures.   <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\">3 Atacs a Sistemes VoIP m\u00e9s comuns i com evitar-los<\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>1. Frau de Peatge (Toll Fraud)<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Cas:<\/strong><\/p>\n\n<p>Imagina que es tracta d&#8217;una petita empresa amb un sistema VoIP per trucar a clients internacionals. Una nit, un hacker accedeix al sistema a causa de contrasenyes febles i comen\u00e7a a realitzar trucades a n\u00fameros premium en pa\u00efsos remots (pensa en l\u00ednies de &#8220;tarifa especial&#8221;). Aquestes trucades generen alts costos per minut, i el hacker rep una comissi\u00f3 d&#8217;aquests n\u00fameros. Al mat\u00ed seg\u00fcent aquesta empresa es troba amb una factura telef\u00f2nica molt elevada que el seu prove\u00efdor no cobreix.   <\/p>\n\n<p><strong>Com ho fan:<\/strong><\/p>\n\n<p>Els hackers busquen sistemes mal configurats o amb contrasenyes simples com &#8220;123456&#8221; o &#8220;admin&#8221;.<\/p>\n\n<p>Un cop dins, redirigen trucades a n\u00fameros internacionals o l\u00ednies de tarifa especial.<\/p>\n\n<p><strong>Impacte:<\/strong><\/p>\n\n<p>Factures exorbitants en q\u00fcesti\u00f3 d&#8217; hores o dies.<\/p>\n\n<p>Dificultat per reclamar reemborsaments al prove\u00efdor, ja que els sistemes eren vulnerables.<\/p>\n\n<p><strong>Com protegir-te:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Contrasenyes fortes i \u00faniques per al sistema VoIP.<\/li>\n\n\n\n<li>Configura restriccions per a trucades internacionals o n\u00fameros premium.<\/li>\n\n\n\n<li>Actives alertes per detectar patrons inusuals de trucades.<\/li>\n<\/ul>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>2. Intercepci\u00f3 de Trucades (Eavesdropping)<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Cas:<\/strong><\/p>\n\n<p>Un despatx legal confia en el seu sistema VoIP per comunicar-se amb clients sobre casos sensibles. Un dia, un hacker intercepta les trucades entre el despatx i un client fent servir un atac conegut com a &#8220;man-in-the-middle&#8221;. Ara, el hacker t\u00e9 acc\u00e9s a informaci\u00f3 confidencial que pot fer servir per xantatge al despatx o vendre-la a la compet\u00e8ncia.  <\/p>\n\n<p><strong>Com ho fan:<\/strong><\/p>\n\n<p>Els hackers exploten xarxes Wi-Fi insegures o sistemes VoIP sense xifrat.<\/p>\n\n<p>Insereixen el seu equip entre l&#8217;usuari i el prove\u00efdor de VoIP per capturar el tr\u00e0nsit de veu.<\/p>\n\n<p><strong>Impacte:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>P\u00e8rdua de privacitat.<\/li>\n\n\n\n<li>Possible extorsi\u00f3 o dany a la reputaci\u00f3 del negoci.<\/li>\n\n\n\n<li>P\u00e8rdua de confian\u00e7a dels clients.<\/li>\n<\/ul>\n\n<p><strong>Com protegir-te:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Assegura&#8217;t que el teu sistema VoIP utilitzi xifrat (com SRTP o TLS).<\/li>\n\n\n\n<li>Evita usar xarxes Wi-Fi p\u00fabliques o no segures per realitzar trucades importants.<\/li>\n\n\n\n<li>Configura firewalls per protegir la teva xarxa empresarial.<\/li>\n<\/ul>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>3. Denegaci\u00f3 de Servei (DoS)<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Cas:<\/strong><\/p>\n\n<p>Gerent d&#8217; un call center que utilitza VoIP per atendre cents de clients al dia.<\/p>\n\n<p>Un dia, els tel\u00e8fons deixen de funcionar. Ning\u00fa pot fer ni rebre trucades perqu\u00e8 un hacker est\u00e0 llan\u00e7ant un atac de denegaci\u00f3 de servei (DoS), saturant el servidor VoIP amb tr\u00e0nsit fals. Mentre els t\u00e8cnics intenten resoldre el problema, el gerent una quantitat de diners molt elevada en vendes i el seu equip queda paralitzat.  <\/p>\n\n<p><strong>Com ho fan:<\/strong><\/p>\n\n<p>Els hackers envien una quantitat massiva de sol\u00b7licituds al servidor VoIP, fent-lo inoperant. De vegades, exigeixen un rescat per aturar l&#8217;atac. <\/p>\n\n<p><strong>Impacte:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Interrupci\u00f3 total del servei.<\/li>\n\n\n\n<li>P\u00e8rdua d&#8217; ingressos durant el temps d&#8217; inactivitat.<\/li>\n\n\n\n<li>Dany a la reputaci\u00f3 si els clients no es poden comunicar.<\/li>\n<\/ul>\n\n<p><strong>Com protegir-te:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Implementa eines de detecci\u00f3 i mitigaci\u00f3 de DoS.<\/li>\n\n\n\n<li>Treballa amb un prove\u00efdor VoIP que ofereixi protecci\u00f3 contra aquests atacs.<\/li>\n\n\n\n<li>Assegura&#8217;t que el teu sistema VoIP estigui actualitzat amb els \u00faltims parx\u00eds de seguretat.<\/li>\n<\/ul>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Els atacs a sistemes VoIP no nom\u00e9s poden ser costosos, sin\u00f3 que tamb\u00e9 poden danyar la teva reputaci\u00f3 i la confian\u00e7a dels teus clients. La bona not\u00edcia \u00e9s que aquests riscos s\u00f3n evitables si prens les mesures adequades. Assegura&#8217;t d&#8217;usar contrasenyes fortes, activar xifrat, configurar restriccions i mantenir el teu sistema actualitzat.  <\/p>\n\n<p>A Tecsens, <strong>podem ajudar-te a protegir-te contra aquests riscos amb els nostres sistemes de VoIP recolzats i dissenyats per garantir la m\u00e0xima seguretat i rendiment.<\/strong> Ens encarreguem de configurar el teu sistema de forma \u00f2ptima, implementar les mesures de seguretat necess\u00e0ries i oferir-te suport continu perqu\u00e8 t&#8217;enfocis en el que realment importa: fer cr\u00e9ixer el teu negoci. \u00a1Cont\u00e0ctans i deixa que els nostres experts t&#8217;assessorin! <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/forms.office.com\/e\/ms8wACw2Gp\">Demana la teva consultoria TI per al pressupost 2025<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Els sistemes VoIP s\u00f3n essencials per a la majoria de les empreses avui dia, oferint comunicaci\u00f3 eficient i econ\u00f2mica. Per\u00f2, com qualsevol tecnologia connectada a Internet, tamb\u00e9 s\u00f3n un objectiu atractiu per als hackers. Si el teu sistema VoIP no est\u00e0 ben protegit, els ciberdelinq\u00fcents podrien aprofitar-se i generar-te p\u00e8rdues econ\u00f2miques importants. A continuaci\u00f3, et [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":50039,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[496,494],"tags":[],"class_list":["post-50196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-ca","category-voice"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Atacs a Sistemes VoIP - Tecsens -<\/title>\n<meta name=\"description\" content=\"Descobreix els 3 atacs a sistemes VoIP que podrien costar-te car i com protegir-te. Apr\u00e8n a evitar fraus, interceptacions i bloquejos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Atacs a Sistemes VoIP - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"Descobreix els 3 atacs a sistemes VoIP que podrien costar-te car i com protegir-te. Apr\u00e8n a evitar fraus, interceptacions i bloquejos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-17T08:41:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-17T08:41:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"3 Atacs a Sistemes VoIP\",\"datePublished\":\"2024-12-17T08:41:36+00:00\",\"dateModified\":\"2024-12-17T08:41:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\"},\"wordCount\":720,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg\",\"articleSection\":[\"Consulting\",\"Voice\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\",\"url\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\",\"name\":\"3 Atacs a Sistemes VoIP - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg\",\"datePublished\":\"2024-12-17T08:41:36+00:00\",\"dateModified\":\"2024-12-17T08:41:50+00:00\",\"description\":\"Descobreix els 3 atacs a sistemes VoIP que podrien costar-te car i com protegir-te. Apr\u00e8n a evitar fraus, interceptacions i bloquejos.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"3 Atacs VoIP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Atacs a Sistemes VoIP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Atacs a Sistemes VoIP - Tecsens -","description":"Descobreix els 3 atacs a sistemes VoIP que podrien costar-te car i com protegir-te. Apr\u00e8n a evitar fraus, interceptacions i bloquejos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/","og_locale":"ca_ES","og_type":"article","og_title":"3 Atacs a Sistemes VoIP - Tecsens -","og_description":"Descobreix els 3 atacs a sistemes VoIP que podrien costar-te car i com protegir-te. Apr\u00e8n a evitar fraus, interceptacions i bloquejos.","og_url":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/","og_site_name":"Tecsens","article_published_time":"2024-12-17T08:41:36+00:00","article_modified_time":"2024-12-17T08:41:50+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"3 Atacs a Sistemes VoIP","datePublished":"2024-12-17T08:41:36+00:00","dateModified":"2024-12-17T08:41:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/"},"wordCount":720,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg","articleSection":["Consulting","Voice"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/","url":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/","name":"3 Atacs a Sistemes VoIP - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg","datePublished":"2024-12-17T08:41:36+00:00","dateModified":"2024-12-17T08:41:50+00:00","description":"Descobreix els 3 atacs a sistemes VoIP que podrien costar-te car i com protegir-te. Apr\u00e8n a evitar fraus, interceptacions i bloquejos.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/3-Ataques-VoIP-02-scaled.jpg","width":2560,"height":1442,"caption":"3 Atacs VoIP"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/ca\/3-atacs-a-sistemes-voip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/ca\/"},{"@type":"ListItem","position":2,"name":"3 Atacs a Sistemes VoIP"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/50196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/comments?post=50196"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/50196\/revisions"}],"predecessor-version":[{"id":50197,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/50196\/revisions\/50197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media\/50039"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media?parent=50196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/categories?post=50196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/tags?post=50196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}