{"id":50204,"date":"2024-12-17T11:10:51","date_gmt":"2024-12-17T10:10:51","guid":{"rendered":"https:\/\/www.tecsens.com\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/"},"modified":"2024-12-17T11:10:59","modified_gmt":"2024-12-17T10:10:59","slug":"the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/","title":{"rendered":"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#8217;t Overlook"},"content":{"rendered":"\n<p><strong>Computer security is a critical need for every business<\/strong>. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences. A clear example of this is the recent case of Telef\u00f3nica, which was fined <strong>1.3 million euros<\/strong> after a cyberattack that exposed data of more than one million customers <a href=\"https:\/\/www.eldiario.es\/tecnologia\/multa-1-3-millones-euros-telefonica-ciberataque-afecto-millon-clientes_1_11880159.html\">(According to the 5\/12\/24 edition of diario.es<\/a>).  <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Consequences of security breaches<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\"><strong>Economic:<\/strong> <\/h3>\n\n<p>Companies can face financial penalties for failing to comply with data protection regulations, such as the GDPR or the National Security Scheme (ENS). In addition, after a cyberattack, large amounts of money must be invested to restore systems, repair damaged infrastructure, and hire cybersecurity experts to prevent future incidents. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Reputational:<\/strong> <\/h3>\n\n<p>Customer trust is one of the most valuable assets for any business. When data security is compromised, users often look for more reliable alternatives. The loss of trust can translate into the loss of customers, resulting in a reputational crisis that is difficult to repair.  <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Operational:<\/strong> <\/h3>\n\n<p>Cyberattacks can cripple a company&#8217;s operations for days or weeks, affecting both productivity and revenue. Operational disruptions, especially in key sectors, can cause irreversible damage to competitiveness and stability. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Legal:<\/strong> <\/h3>\n\n<p>Companies have an obligation to comply with increasingly stringent data protection regulations. Failure to comply with these regulations, even in the event of an external attack, can lead to costly legal proceedings and penalties that affect long-term operations. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>How to prevent these consequences?<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Prevention is the key to preventing a cyberattack from becoming a disaster. At <strong>Tecsens<\/strong>, we understand that every company has different needs and resources, so we offer customized solutions that fit your specific requirements. <\/p>\n\n<p>Our commitment to cybersecurity is backed by the <strong>National Security Scheme (ENS)<\/strong> certification, which ensures that we implement the best measures to protect both companies and their customers&#8217; data. In addition, our solutions not only prevent attacks, but also help you comply with current legal regulations, avoiding financial penalties. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\">Some essential measures we recommend include:<\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>Regular audits<\/strong> to detect vulnerabilities.<\/li>\n\n\n\n<li><strong>Rapid incident response protocols<\/strong> .<\/li>\n\n\n\n<li><strong>Constant updates<\/strong> of systems and software.<\/li>\n\n\n\n<li><strong>Continuous training<\/strong> of staff in good cybersecurity practices.<\/li>\n<\/ul>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>The case of Telef\u00f3nica shows that no company, regardless of its size, is exempt from cyberattacks. The consequences can be devastating, but they are often avoidable with the right measures. At <strong>Tecsens<\/strong>, we specialize in helping companies protect their systems, identify risks, and ensure regulatory compliance.  <\/p>\n\n<p>If you haven&#8217;t already reviewed your company&#8217;s security, it&#8217;s time to do so. Having an expert cybersecurity partner can make the difference between a minor incident and a crisis that seriously affects the future of your business.   <strong>Investing in cybersecurity is not an expense, it is an investment in stability, trust, and long-term success.<\/strong><\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>From Tecsens we want to accompany and help you review the security systems, contact us here to explain the measures to be carried out:<br\/><\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/forms.office.com\/e\/MHLEGxs4Jg\">Request your meeting<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences. A clear example of this is the recent case of Telef\u00f3nica, which was fined 1.3 million euros after a cyberattack that exposed data of more than [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":50192,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[503],"tags":[],"class_list":["post-50204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#039;t Overlook - Tecsens -<\/title>\n<meta name=\"description\" content=\"Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#039;t Overlook - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-17T10:10:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-17T10:10:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#8217;t Overlook\",\"datePublished\":\"2024-12-17T10:10:51+00:00\",\"dateModified\":\"2024-12-17T10:10:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg\",\"articleSection\":[\"Consulting\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\",\"name\":\"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can't Overlook - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg\",\"datePublished\":\"2024-12-17T10:10:51+00:00\",\"dateModified\":\"2024-12-17T10:10:59+00:00\",\"description\":\"Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"Cyber Lessons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#8217;t Overlook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can't Overlook - Tecsens -","description":"Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/","og_locale":"en_US","og_type":"article","og_title":"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can't Overlook - Tecsens -","og_description":"Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences.","og_url":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/","og_site_name":"Tecsens","article_published_time":"2024-12-17T10:10:51+00:00","article_modified_time":"2024-12-17T10:10:59+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#8217;t Overlook","datePublished":"2024-12-17T10:10:51+00:00","dateModified":"2024-12-17T10:10:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/"},"wordCount":493,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg","articleSection":["Consulting"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/","url":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/","name":"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can't Overlook - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg","datePublished":"2024-12-17T10:10:51+00:00","dateModified":"2024-12-17T10:10:59+00:00","description":"Computer security is a critical need for every business. Cyberattacks not only threaten the integrity of information and systems, but can also have devastating economic, legal, and reputational consequences.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Lecciones-Ciber-02-scaled.jpg","width":2560,"height":1442,"caption":"Cyber Lessons"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/the-high-cost-of-ignoring-cybersecurity-the-lesson-telefonica-and-other-companies-cant-overlook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"The High Cost of Ignoring Cybersecurity: The Lesson Telefonica and Other Companies Can&#8217;t Overlook"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/50204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=50204"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/50204\/revisions"}],"predecessor-version":[{"id":50205,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/50204\/revisions\/50205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/50192"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=50204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=50204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=50204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}