{"id":6384,"date":"2024-06-27T17:53:30","date_gmt":"2024-06-27T20:53:30","guid":{"rendered":"https:\/\/highdare.com\/?page_id=6384"},"modified":"2024-07-29T12:08:14","modified_gmt":"2024-07-29T15:08:14","slug":"seguridad-de-la-informacion","status":"publish","type":"page","link":"https:\/\/highdare.com\/en\/seguridad-de-la-informacion\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"6384\" class=\"elementor elementor-6384\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f2743b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f2743b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f80676d\" data-id=\"f80676d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62408a1 elementor-widget elementor-widget-heading\" data-id=\"62408a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Information Security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fce7df0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fce7df0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8858836\" data-id=\"8858836\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56f715b elementor-widget elementor-widget-elementskit-heading\" data-id=\"56f715b\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tInformation Security\n\t\t\t\t\t<\/h3><h1 class=\"ekit-heading--title elementskit-section-title  ekit-heading__title-has-border start\">Preventive and reactive measures to safeguard and protect information, seeking to maintain the confidentiality, availability and integrity of data.<\/h1><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12e9a49 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12e9a49\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3e89aac\" data-id=\"3e89aac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab40983 ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"ab40983\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon xsicon xsicon-trust\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Governance Strategy                <\/h3>\n                        \t\t  \t<p>Data governance strategy is implemented to make data useful for decision-making. Mandatory control measures are defined to broaden access while ensuring the security and privacy.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b1ea84a\" data-id=\"b1ea84a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb84d4f ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"fb84d4f\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-protected-content-v3\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Control of Personal Data Protection                <\/h3>\n                        \t\t  \t<p>Control of personal data protection (PDP) is the right to control one's own information when it is processed by a third party, enabling the exercise of rights related to personal data.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d8c005c\" data-id=\"d8c005c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f15711c ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"f15711c\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon xsicon xsicon-monitor\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Risk Assessment                <\/h3>\n                        \t\t  \t<p>Risk assessment identifies IT assets, their vulnerabilities and threats to which they are exposed. It involves 3 vital steps: 1) identifying the hazards; 2) estimating the risk of each hazard - the probability and severity of harm; 3) deciding whether the risk is tolerable.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9b286c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9b286c8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5f04408\" data-id=\"5f04408\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7af1bba ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"7af1bba\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-hand_shake\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Implementation of Security Policies                 <\/h3>\n                        \t\t  \t<p>Seeks to protect information, systems and networks against possible threats (cybersecurity). Guarantees the confidentiality, integrity and availability of information by establishing measures and controls.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e3024f9\" data-id=\"e3024f9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-158594c ekit-equal-height-disable elementor-widget elementor-widget-elementskit-icon-box\" data-id=\"158594c\" data-element_type=\"widget\" data-widget_type=\"elementskit-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >        <!-- link opening -->\n                <a href=\"#\" class=\"ekit_global_links\">\n                <!-- end link opening -->\n\n        <div class=\"elementskit-infobox text-center text- icon-top-align elementor-animation-\">\n                    <div class=\"elementskit-box-header elementor-animation-\">\n                <div class=\"elementskit-info-box-icon\">\n                    <i aria-hidden=\"true\" class=\"elementkit-infobox-icon icon icon-communication\"><\/i>\n                <\/div>\n          <\/div>\n                        <div class=\"box-body\">\n                            <h3 class=\"elementskit-info-box-title\">\n                    Training and Awareness                 <\/h3>\n                        \t\t  \t<p>Raising the understanding and application of practices to maintain the IT security of an entity and ensure risk management.<\/p>\n                                <\/div>\n        \n        \n                <\/div>\n                <\/a>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7a17c62\" data-id=\"7a17c62\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5755a0f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5755a0f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-91861de\" data-id=\"91861de\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25180e0 elementor-widget elementor-widget-elementskit-heading\" data-id=\"25180e0\" data-element_type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tWhat about Highdare, exactly?\n\t\t\t\t\t<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>We believe that IT security involves several relevant aspects that must work in coordination: from legal to technological aspects, from the control of physical and logical security to training and dissemination, from the definition of policies to risk management, from the definition of a strategy to its correct and practical implementation. At HighDare, we work and coordinate with a team that approaches cybersecurity from all its verticals: legal, technical (Ethical Hacking) and risk management teams. We have the foundations that provides us to guarantee the IT security of your company, your clients and all your stakeholders, protects them from cyber-attacks with anti-phishing methods, ransomware, malware, DDoS, MitM, etc.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider elementskit-style-long\"><div class=\"elementskit-border-divider elementskit-style-long\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Seguridad de la informaci\u00f3n Seguridad de la informaci\u00f3n Medidas preventivas y reactivas que permiten resguardar y proteger informaci\u00f3n, buscando mantener la confidencialidad, disponibilidad e integridad de los datos Estrategia de Gobierno Se implementa una estrategia de gobernanza de datos para que estos sean \u00fatiles para la toma de decisiones. Se definen medidas de control obligatorias [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-6384","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/pages\/6384"}],"collection":[{"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/comments?post=6384"}],"version-history":[{"count":52,"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/pages\/6384\/revisions"}],"predecessor-version":[{"id":6753,"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/pages\/6384\/revisions\/6753"}],"wp:attachment":[{"href":"https:\/\/highdare.com\/en\/wp-json\/wp\/v2\/media?parent=6384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}