{"id":22101,"date":"2021-04-13T10:06:11","date_gmt":"2021-04-13T08:06:11","guid":{"rendered":"https:\/\/www.tecsens.com\/cybersecurity-audit-companies\/"},"modified":"2023-09-19T12:34:51","modified_gmt":"2023-09-19T10:34:51","slug":"cybersecurity-audit-companies","status":"publish","type":"page","link":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/","title":{"rendered":"Cybersecurity audit companies"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;01 Curva superior&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; background_image=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazuloscura.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_center&#8221; background_repeat=&#8221;repeat-x&#8221; min_height=&#8221;176px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;z-index:10;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; admin_label=&#8221;01 slider&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-170px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_slider _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; height=&#8221;550px&#8221; height_tablet=&#8221;500px&#8221; height_phone=&#8221;400px&#8221; height_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;|0px||0px|false|false&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221; animation_direction=&#8221;right&#8221; auto=&#8221;on&#8221; auto_speed=&#8221;3000&#8243; auto_ignore_hover=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide heading=&#8221;CYBERSECURITY AUDIT&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h1&#8243; header_font=&#8221;Raleway|700|||||||&#8221; header_text_color=&#8221;#0075b2&#8243; header_font_size=&#8221;34px&#8221; body_font=&#8221;|600|||||||&#8221; body_text_color=&#8221;#5f5e5d&#8221; body_font_size=&#8221;28px&#8221; background_color=&#8221;#FFFFFF&#8221; background_enable_color=&#8221;on&#8221; background_enable_image=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;]<\/p>\n<p style=\"text-align: center;\">We study your systems and highlight their vulnerabilities.<\/p>\n<hr style=\"color: #fff; max-width: 900px; margin-bottom: 30px;\">\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" alt=\"tecsens logo\" class=\"wp-image-18991 alignnone size-full\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg 100w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-24x24.jpg 24w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-36x36.jpg 36w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-48x48.jpg 48w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;06&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;||0px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||37px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>In an increasingly digitised world, all critical business information is exposed and susceptible to cyber-attacks.<\/strong> Information systems are the most valuable part of an organisation and just as we protect our homes we must protect our businesses.<\/p>\n<p style=\"text-align: justify;\">In short, <strong>ensuring compliance with the cybersecurity standards required by the Data Protection Act for customers, employees and suppliers.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;37px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;11&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; background_repeat=&#8221;repeat-x&#8221; custom_padding=&#8221;30px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;775px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/certificacion-iso-27001-3.jpg&#8221; alt=&#8221;certificacion iso 27001&#8243; title_text=&#8221;certificacion iso 27001&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; transform_scale=&#8221;64%|64%&#8221; custom_margin=&#8221;9px|||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">Certified to ISO 27001, the highest level of information security assurance, which guarantees that we comply with international security standards.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;775px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;\/wp-content\/uploads\/2021\/02\/ACTIVO_TI_ISO_27001_-_ACCREDIA.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;SEE CERTIFICATE&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#0076b2&#8243; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;34px&#8221; button_font=&#8221;Maven Pro|500|||||||&#8221; button_use_icon=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||20px||false|false&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;7px&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;RGBA(0,0,0,0)&#8221; button_text_color__hover=&#8221;#5f5e5d&#8221; button_bg_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;37px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;03&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||41px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/consultoria-transformacion-digital-seguridad-14.png&#8221; alt=&#8221;Almacenamiento robusto&#8221; title_text=&#8221;Almacenamiento robusto&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-50px||52px|||&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">What is a cybersecurity audit?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>A cyber security audit tries to represent the process scenario of an organisation through an analysis that defines its input\/output flow and vulnerabilities in the system.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">When should I do it?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">It is recommended that it is carried out on a regular basis at least annually.<\/p>\n<p style=\"text-align: justify;\">Realizar un an\u00e1lisis proactivo de detecci\u00f3n de vulnerabilidades y fallos de los sistemas nos ayuda a evitar problemas mayores en el futuro.<\/p>\n<p style=\"text-align: justify;\">Technology is advancing and with it the methodology of cybercriminals. No business of any size is free from these threats.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;12&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;#eeeeee 65%|#ffffff 65%&#8221; background_color_gradient_start=&#8221;#eeeeee&#8221; background_color_gradient_start_position=&#8221;65%&#8221; background_color_gradient_end=&#8221;#ffffff&#8221; background_color_gradient_end_position=&#8221;65%&#8221; custom_padding=&#8221;3px||5px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;50px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;lista alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;20px|30px|20px|30px|false|false&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;55px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076b2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_text_color=&#8221;#0076B2&#8243; header_2_font=&#8221;Maven Pro||||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"titulo\" style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/objetivos-1.jpg\" alt=\"Objectives\" class=\"wp-image-18837 alignnone size-full\" width=\"16\" height=\"15\"> Objectives<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Realizar o actualizar el plan de protecci\u00f3n y mejora.<\/li>\n<li style=\"text-align: justify;\">Detection of security breaches and internal and external vulnerabilities.<\/li>\n<li style=\"text-align: justify;\">Planificar y ejecutar una rectificaci\u00f3n de los hallazgos.<\/li>\n<li style=\"text-align: justify;\">Training and awareness of the IT team.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;lista alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;20px|30px|20px|30px|false|false&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_blur=&#8221;55px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076b2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_text_color=&#8221;#0076B2&#8243; header_2_font=&#8221;Maven Pro||||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||12px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"titulo\" style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/beneficios.jpg\" alt=\"proceeds\" class=\"wp-image-18841 alignnone size-full\" width=\"16\" height=\"15\"> Benefits<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Ensure confidentiality, integrity and availability of data.<\/li>\n<li style=\"text-align: justify;\">Mitigation of major risks.<\/li>\n<li style=\"text-align: justify;\">Prevention of targeted and untargeted attacks as well as denials of service.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;09&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||1px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;55px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; module_class=&#8221;reverse&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#0076b2&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Maven Pro||||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;16px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||6px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"titulo\" style=\"text-align: left;\">Servicios de auditor\u00eda en ciberseguridad<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||11px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span style=\"text-decoration: underline;\">Internal audit<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||16px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Systems are analysed from the corporate private network<\/strong>, a subject simulates an attack from inside the organisation.<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||11px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span style=\"text-decoration: underline;\">External audit<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8221;lista&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||11px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><strong>Systems are analysed from the internet, the subject is external<\/strong> and simulates an attack from outside the organisation.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-interna-y-externa-17.jpg&#8221; alt=&#8221;internal and external cybersecurity audit&#8221; title_text=&#8221;internal and external cybersecurity audit&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;13&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;5px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;||34px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Areas<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;775px&#8221; custom_margin=&#8221;0px||30px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Website<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Email<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Remote access<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">File exchange<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;775px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Operating system<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">App (Servers, middlewares, etc.)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Network or security systems<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; module_class=&#8221;alineamiento-vertical&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#0076B2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|10px|10px|10px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Password storage<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;55px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#eeeeee&#8221; divider_weight=&#8221;3px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;on|on|off&#8221; admin_label=&#8221;05a&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; custom_padding=&#8221;||34px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">How do we do cybersecurity audits?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-orden-ideas-1.jpg&#8221; alt=&#8221;cybersecurity audit order ideas&#8221; title_text=&#8221;cybersecurity audit order ideas&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5F5E5D&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">We analyse your infrastructure by constructing a service map.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-analizar-2.jpg&#8221; alt=&#8221;cybersecurity audit analyse&#8221; title_text=&#8221;cybersecurity audit analyse&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We detect errors and vulnerabilities<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-diseno-2.jpg&#8221; alt=&#8221;cybersecurity audit design&#8221; title_text=&#8221;cybersecurity audit design&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Exploitation of detected vulnerabilities <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-identificacion-cambios-1.jpg&#8221; alt=&#8221;cybersecurity audit identification changes&#8221; title_text=&#8221;cybersecurity audit identification changes&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Data extraction<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-plan-tecnologia-1.jpg&#8221; alt=&#8221;cybersecurity audit technology plan&#8221; title_text=&#8221;cybersecurity audit technology plan&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Detection of future compromises or new attack vectors<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-estudio-necesidades-1.jpg&#8221; alt=&#8221;cybersecurity audit needs assessment&#8221; title_text=&#8221;cybersecurity audit needs assessment&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Detailed report design and risk assessment<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1100px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;55px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|on&#8221; admin_label=&#8221;05b&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;30px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;dos-columnas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-orden-ideas-1.jpg&#8221; alt=&#8221;cybersecurity audit order ideas&#8221; title_text=&#8221;cybersecurity audit order ideas&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">We analyse your infrastructure by constructing a service map.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;dos-columnas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-analizar-2.jpg&#8221; alt=&#8221;cybersecurity audit analyse&#8221; title_text=&#8221;cybersecurity audit analyse&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">We detect errors and vulnerabilities<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;dos-columnas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-diseno-2.jpg&#8221; alt=&#8221;cybersecurity audit design&#8221; title_text=&#8221;cybersecurity audit design&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">We detect errors and vulnerabilities<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;dos-columnas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-identificacion-cambios-1.jpg&#8221; alt=&#8221;cybersecurity audit identification changes&#8221; title_text=&#8221;cybersecurity audit identification changes&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Data extraction<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;dos-columnas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-plan-tecnologia-1.jpg&#8221; alt=&#8221;cybersecurity audit technology plan&#8221; title_text=&#8221;cybersecurity audit technology plan&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Detection of future compromises or new attack vectors<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;dos-columnas&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-estudio-necesidades-1.jpg&#8221; alt=&#8221;cybersecurity audit needs assessment&#8221; title_text=&#8221;cybersecurity audit needs assessment&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro|600|||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Detailed report design and risk assessment<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;10&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F1F6F8&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; background_repeat=&#8221;repeat-x&#8221; custom_margin=&#8221;24px|||||&#8221; custom_padding=&#8221;30px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1000px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5F5E5D&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;5px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Find out more&#8230;<\/h2>\n<p style=\"text-align: center;\">[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;775px&#8221; custom_padding=&#8221;75px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog posts_number=&#8221;1&#8243; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_pagination=&#8221;off&#8221; module_class=&#8221;adelantoblog&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Maven Pro|500|||||||&#8221; header_text_color=&#8221;#5F5E5D&#8221; header_font_size=&#8221;16px&#8221; body_font=&#8221;Maven Pro||||||||&#8221; body_font_size=&#8221;16px&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; text_orientation=&#8221;justified&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii_fullwidth=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog posts_number=&#8221;1&#8243; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_pagination=&#8221;off&#8221; offset_number=&#8221;1&#8243; module_class=&#8221;adelantoblog&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Maven Pro|500|||||||&#8221; header_text_color=&#8221;#5F5E5D&#8221; header_font_size=&#8221;16px&#8221; body_font=&#8221;Maven Pro||||||||&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;16px&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii_fullwidth=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Ondaazulclara&#8221; _builder_version=&#8221;4.9.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; background_image=&#8221;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazulclara.jpg&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;top_center&#8221; background_repeat=&#8221;repeat-x&#8221; height=&#8221;96px&#8221; custom_margin=&#8221;-35px|||||&#8221; custom_padding=&#8221;2px||100px|||&#8221; global_module=&#8221;20514&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; module_id=&#8221;consulting&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;19px|auto||auto||&#8221; custom_padding=&#8221;0px||55px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_code _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; custom_css_before=&#8221;span.wpcf7-list-item {display:block;}&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; box_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f34141-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"34141\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/22101#wpcf7-f34141-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"34141\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f34141-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p><b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Commercial advisor\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Commercial advisor<\/span><\/label><\/span><\/span><\/span><\/b> - Yes, you already have it clear<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Technical advisor\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Technical advisor<\/span><\/label><\/span><\/span><\/span><\/b> - We guide you to the best solution<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"General information\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">General information<\/span><\/label><\/span><\/span><\/span><\/b><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name*\" value=\"\" type=\"text\" name=\"nombre\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-274\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" value=\"Company\" type=\"text\" name=\"text-274\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail*\" value=\"\" type=\"email\" name=\"email\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"telefono\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone*\" value=\"\" type=\"tel\" name=\"telefono\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"mensaje\"><textarea cols=\"40\" rows=\"6\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message*\" name=\"mensaje\"><\/textarea><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"aceptacion\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"aceptacion\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span> \u00a0I have read and accept the <a href=\"https:\/\/www.tecsens.com\/en\/data-protection\/\" target=\"_blank\">privacy notice.<\/a>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acepta-recibir-info\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acepta-recibir-info\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">\u00a0I wish to receive commercial information by email about TECSENS products and services.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<span class=\"wpcf7-form-control-wrap recaptcha\" data-name=\"recaptcha\"><span data-sitekey=\"6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" class=\"wpcf7-form-control wpcf7-recaptcha g-recaptcha\"><\/span>\r\n<noscript>\r\n\t<div class=\"grecaptcha-noscript\">\r\n\t\t<iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/recaptcha\/api\/fallback?k=6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" frameborder=\"0\" scrolling=\"no\" width=\"310\" height=\"430\">\r\n\t\t<\/iframe>\r\n\t\t<textarea name=\"g-recaptcha-response\" rows=\"3\" cols=\"40\" placeholder=\"reCaptcha Response Here\">\r\n\t\t<\/textarea>\r\n\t<\/div>\r\n<\/noscript>\r\n<\/span>\n<p style=\"text-align:center\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner boton\" type=\"submit\" value=\"SEND\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#5f5e5d&#8221; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;35px||36px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Need to talk to an expert?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;52px||7px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><strong>Our offices<\/strong><\/p>\n<p style=\"text-align: left;\">\n<ul>\n<li style=\"text-align: left;\">Paseo de la Castellana 171, 4\u00ba Izq, 28046 (Madrid)<\/li>\n<li style=\"text-align: left;\">C\/Figueres 8 Despacho 12, 08022 (Barcelona)<\/li>\n<li style=\"text-align: left;\">Edisonstra\u00dfe 63 House A, 1st Floor, 12459 (Berlin)<span style=\"font-size: 19px;\"><\/span> <span style=\"text-align: justify;\"><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||3px|||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;7px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_llamar-1.png\" width=\"20\" height=\"20\" alt=\"icon call\" class=\"wp-image-28495 alignnone size-full\" style=\"float: left;\"><span style=\"font-size: 19px;\"><\/span> <a href=\"tel:%20+34917914400\" title=\"  (+34) 917 914 400\"> <\/a><span style=\"color: #333333;\"><a href=\"tel:%20+34917914400\" title=\" (+34) 917 914 400\">(+34) 917 914<\/a><\/span> 400 \/ (+<a href=\"tel:+34935455600\" style=\"color: #333333;\"> <\/a><a href=\"tel:%20+34935455600\" title=\" (+34) 935 455 600\"> 34) 935 455 600 \/ (+<\/a><a href=\"tel:+493086323849\" data-auth=\"NotApplicable\">49) 30 863 238 49<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||3px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;4px||||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_email.png\" width=\"20\" height=\"20\" alt=\"email icono\" class=\"wp-image-28499 alignnone size-full\">  <a href=\"mailto:info@tecsens.com\">info@tecsens.com<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||3px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Maven Pro||||||||&#8221; text_text_color=&#8221;#5f5e5d&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;Raleway|700|||||||&#8221; header_2_text_color=&#8221;#0076B2&#8243; header_2_font_size=&#8221;36px&#8221; header_2_letter_spacing=&#8221;2px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;2px||52px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_hora.png\" width=\"20\" height=\"20\" alt=\"icon time\" class=\"wp-image-28503 alignnone size-full\">  <strong>Monday to Thursday<\/strong> 9.00-18.30h <strong>Friday<\/strong> 9.00-15.00h<\/span><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow icon_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_social_media_follow_network social_network=&#8221;linkedin&#8221; url=&#8221;https:\/\/www.linkedin.com\/company\/tecsens\/mycompany\/verification\/?viewAsMember=true&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#007bb6&#8243; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221; theme_builder_area=&#8221;post_content&#8221;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8221;twitter&#8221; url=&#8221;https:\/\/twitter.com\/Tecsens&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00aced&#8221; global_colors_info=&#8221;{}&#8221; follow_button=&#8221;off&#8221; url_new_window=&#8221;on&#8221; theme_builder_area=&#8221;post_content&#8221;]twitter[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We study your systems and highlight their vulnerabilities. In an increasingly digitised world, all critical business information is exposed and susceptible to cyber-attacks. Information systems are the most valuable part of an organisation and just as we protect our homes we must protect our businesses. In short, ensuring compliance with the cybersecurity standards required by [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":120,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-22101","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity audit companies - Tecsens<\/title>\n<meta name=\"description\" content=\"The cybersecurity audit service studies systems and highlights vulnerabilities in companies, helping to protect them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity audit companies - Tecsens\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity audit service studies systems and highlights vulnerabilities in companies, helping to protect them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T10:34:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"32 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\"},\"headline\":\"Cybersecurity audit companies\",\"datePublished\":\"2021-04-13T08:06:11+00:00\",\"dateModified\":\"2023-09-19T10:34:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\"},\"wordCount\":6371,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\",\"name\":\"Cybersecurity audit companies - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"datePublished\":\"2021-04-13T08:06:11+00:00\",\"dateModified\":\"2023-09-19T10:34:51+00:00\",\"description\":\"The cybersecurity audit service studies systems and highlights vulnerabilities in companies, helping to protect them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity audit companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"caption\":\"Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity audit companies - Tecsens","description":"The cybersecurity audit service studies systems and highlights vulnerabilities in companies, helping to protect them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity audit companies - Tecsens","og_description":"The cybersecurity audit service studies systems and highlights vulnerabilities in companies, helping to protect them.","og_url":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/","og_site_name":"Tecsens","article_modified_time":"2023-09-19T10:34:51+00:00","og_image":[{"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"32 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/"},"author":{"name":"Admin","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859"},"headline":"Cybersecurity audit companies","datePublished":"2021-04-13T08:06:11+00:00","dateModified":"2023-09-19T10:34:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/"},"wordCount":6371,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/","url":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/","name":"Cybersecurity audit companies - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","datePublished":"2021-04-13T08:06:11+00:00","dateModified":"2023-09-19T10:34:51+00:00","description":"The cybersecurity audit service studies systems and highlights vulnerabilities in companies, helping to protect them.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/cybersecurity-audit-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity audit companies"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","caption":"Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=22101"}],"version-history":[{"count":10,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22101\/revisions"}],"predecessor-version":[{"id":45312,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/pages\/22101\/revisions\/45312"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=22101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}