{"id":6198,"date":"2024-05-10T20:58:34","date_gmt":"2024-05-10T20:58:34","guid":{"rendered":"https:\/\/cirionpresspro.wpenginepowered.com\/2024\/05\/10\/ransomware-y-teletrabajo-claves-para-evitar-el-secuestro-de-datos\/"},"modified":"2025-06-02T20:40:44","modified_gmt":"2025-06-02T20:40:44","slug":"ransomware-teletwork-avoid-data-hijacking","status":"publish","type":"post","link":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/","title":{"rendered":"Ransomware and Telework &#8211; Keys to Avoid Data Hijacking"},"content":{"rendered":"<h1 style=\"text-align: center;\"><strong>Ransomware and Telework &#8211; Keys to Avoid Data Hijacking <\/strong><\/h1>\n<ul>\n<li style=\"text-align: center;\"><em>Data hijacking is the fastest growing type of cyberattack. Oftentimes, remote users\u2019 device or access-related vulnerabilities are targeted for exploitation. <\/em><\/li>\n<li style=\"text-align: center;\"><em>Cirion experts offer critical advice to deal with this issue within the cybersecurity strategy.<\/em><\/li>\n<\/ul>\n<p><em>\u00a0<\/em><\/p>\n<p><strong>Buenos Aires, May 10, 2024 \u2013 <\/strong>According to JLL Consulting, barely 19% of Latin American workers do their job 100% in person &#8212; 71% work in a hybrid mode while 10% do it fully remote. On the other hand, the <em>Global Ransomware Report<\/em> states that region-wide organizations suffered an average of three security breaches each, in 2023.<\/p>\n<p>How are both statistics combined? <em>Ransomware<\/em> or Data hijacking is the most active cyberattack format globally. It consists of \u201ckidnapping\u201d and blocking files through encryption, which will be \u201creleased\u201d upon payment of a ransom.<\/p>\n<p>Since hijackers gain access through <em>phishing<\/em> or unsolicited software to trick users and given the work-from-anywhere modality today, it is increasingly important to have a cybersecurity strategy in place, primarily focused on protecting each access point to the network, wherever they are.<\/p>\n<p>Therefore, following the specific steps detailed below is recommended to improve remote workers\u2019 protection levels:<strong>\u00a0<\/strong><\/p>\n<ul>\n<li><strong>Define the attack surface &#8211;<\/strong> Identify systems, devices and services necessary to keep your businesses online and your inventory active to detect the most vulnerable fronts, which are likely to include teleworkers.<\/li>\n<li><strong>Audit and manage the most vulnerable devices &#8211;<\/strong> perimeter security matters; however, considering employees\u2019 high mobility, a specific protection supplement for end-user devices is of the essence.<\/li>\n<li><strong>Protect your emails &#8211; <\/strong>Keep your email solutions up-to-date and securely protected.<\/li>\n<li><strong>Expand focus on identity &#8211;<\/strong> Implement two-factor authentication mechanisms for remote users and clients.<\/li>\n<li><strong>Monitor Network Ports, Protocols and Services &#8211;<\/strong> prevent malicious applications from exploiting any security gap.<\/li>\n<li><strong>Cybersecurity training and awareness &#8211;<\/strong> have all members of the organization trained to understand the risks and the importance of being responsible upon potential threats.<\/li>\n<\/ul>\n<p>Needless to say that usual ransomware prevention actions must be considered as well:<\/p>\n<ul>\n<li><strong>Recovery systems Protection and Data Backups &#8211;<\/strong> to enable the fastest recovery in the event of an incident. It includes the definition of recovery point objective (RPO), backups frequency and a recovery time objective (RTO).<\/li>\n<li><strong>Run recovery drills<\/strong> \u2013 to ensure data availability, resource recovery, and that everything is working as expected. It includes definition of teams\u2019 and staff&#8217;s responsibilities.<\/li>\n<li><strong>Network Segmentation helps contain malware actions <\/strong>\u2013 \u201cenclosing\u201d the threat in a small fragment of the network and preventing it from continuing to move overwhelmingly.<\/li>\n<li><strong>Strengthen cybersecurity throughout the <em>cyber kill chain <\/em><\/strong>\u2013 identifies what cybercriminals must complete to achieve their objectives.<\/li>\n<li><strong>Have an incident response plan in place <\/strong>\u2013 To ensure a better outcome upon a successful attack.<\/li>\n<\/ul>\n<p>&#8220;The Teleworking model has brought multiple benefits for companies, from greater productivity to higher loyalty levels among workers,&#8221; said Pablo Dubois, Regional Security Product Manager at Cirion. \u201cAn appropriate cybersecurity strategy focused on these remote users is of the essence to continue enjoying these advantages, while minimizing cyberattack-related risks, especially ransomware\u2019s,&#8221; he concluded.<\/p>\n<h2><strong>Cirion&#8217;s Solutions<\/strong><\/h2>\n<p>For all cases, Cirion offers tiered end-to-end solutions, from Denial of Service attack mitigation (<a href=\"https:\/\/www.ciriontechnologies.com\/en-us\/connectivity-solutions\/security-services\/\">DDoS<\/a>) on the outer end to Zero Trust Network Access (ZTNA) to ensure remote users\u2019 secure connectivity to their apps., covering from Web Application and API Protection (WAAP), next generation perimeter firewalls or control tools, which allow organizations to visualize their environment and analyze the state of things.<\/p>\n<p>Additionally, three Security Operations Center (SOCs) are available in Latam &#8211; Argentina, Brazil and Colombia-, with expert resources and broad knowledge, including specific cybersecurity trends that are taking place in the region.<\/p>\n<p>For more information visit <a href=\"https:\/\/www.ciriontechnologies.com\/en-us\/connectivity-solutions\/voice\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ciriontechnologies.com\/en-us\/integrated-security\/<\/a><\/p>\n<h3><strong>About Cirion<\/strong><\/h3>\n<p>Cirion is a leading digital infrastructure and technology provider, offering a comprehensive suite of fiber network, connectivity, colocation, cloud infrastructure, and communication and collaboration solutions with the purpose of furthering Latin America\u00b4s progress through technology. Cirion serves more than 5,500 Latin American and multinational clients, including enterprises, government agencies, cloud service providers, operators, ISPs, and other leading companies. Cirion owns and operates a portfolio of its own networks and data centers, with extensive coverage throughout the Latin American region. Learn more about Cirion at <a href=\"https:\/\/www.ciriontechnologies.com\/es-ar\/\" target=\"_blank\" rel=\"noopener\">www.ciriontechnologies.com<\/a><\/p>\n<h3><strong>Follow us in Social Media: <\/strong><\/h3>\n<p>LinkedIn | <a href=\"https:\/\/twitter.com\/ciriontech\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> | <a href=\"https:\/\/www.facebook.com\/CirionTechnologies\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> | Instagram | <a href=\"https:\/\/www.youtube.com\/@ciriontechnologies\" target=\"_blank\" rel=\"noopener\">YouTube<\/a> | Blog<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware and Telework &#8211; Keys to Avoid Data Hijacking Data hijacking is the fastest growing type of cyberattack. Oftentimes, remote users\u2019 device or access-related vulnerabilities are targeted for exploitation. Cirion experts offer critical advice to deal with this issue within the cybersecurity strategy. \u00a0 Buenos Aires, May 10, 2024 \u2013 According to JLL Consulting, barely [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":880,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[77],"tags":[91],"idioma_entrada":[93],"anio_publicacion_entrada":[115],"class_list":["post-6198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-argentina","tag-pitch","idioma_entrada-english","anio_publicacion_entrada-115"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware and Telework - Keys to Avoid Data Hijacking<\/title>\n<meta name=\"description\" content=\"El secuestro de datos es el tipo de ciberataque que m\u00e1s crece. En muchos casos, explota vulnerabilidades vinculadas con los dispositivos\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware and Telework - Keys to Avoid Data Hijacking\" \/>\n<meta property=\"og:description\" content=\"El secuestro de datos es el tipo de ciberataque que m\u00e1s crece. En muchos casos, explota vulnerabilidades vinculadas con los dispositivos\" \/>\n<meta property=\"og:url\" content=\"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Cirion Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-10T20:58:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T20:40:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/02\/press-room-seguridad-conectada-1600x500-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cristina Mello\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cristina Mello\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/\"},\"author\":{\"name\":\"Cristina Mello\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#\\\/schema\\\/person\\\/b6d56391c7900c41116a618b8b0bc952\"},\"headline\":\"Ransomware and Telework &#8211; Keys to Avoid Data Hijacking\",\"datePublished\":\"2024-05-10T20:58:34+00:00\",\"dateModified\":\"2025-06-02T20:40:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/\"},\"wordCount\":707,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/press-room-seguridad-conectada-1600x500-1.jpg\",\"keywords\":[\"Pitch\"],\"articleSection\":[\"Argentina\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/\",\"url\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/\",\"name\":\"Ransomware and Telework - Keys to Avoid Data Hijacking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/press-room-seguridad-conectada-1600x500-1.jpg\",\"datePublished\":\"2024-05-10T20:58:34+00:00\",\"dateModified\":\"2025-06-02T20:40:44+00:00\",\"description\":\"El secuestro de datos es el tipo de ciberataque que m\u00e1s crece. En muchos casos, explota vulnerabilidades vinculadas con los dispositivos\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/press-room-seguridad-conectada-1600x500-1.jpg\",\"contentUrl\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/press-room-seguridad-conectada-1600x500-1.jpg\",\"width\":1600,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/2024\\\/05\\\/10\\\/ransomware-teletwork-avoid-data-hijacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and Telework &#8211; Keys to Avoid Data Hijacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/\",\"name\":\"Cirion Technologies\",\"description\":\"Pressroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#organization\",\"name\":\"Cirion Technologies\",\"url\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Cirion_logo_696x696.jpg\",\"contentUrl\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Cirion_logo_696x696.jpg\",\"width\":696,\"height\":696,\"caption\":\"Cirion Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/press.ciriontechnologies.com\\\/en\\\/#\\\/schema\\\/person\\\/b6d56391c7900c41116a618b8b0bc952\",\"name\":\"Cristina Mello\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/342261e31fbe63c5c5d3ed799372db2e8448673ffccbbe240822e8eb3ed7e206?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/342261e31fbe63c5c5d3ed799372db2e8448673ffccbbe240822e8eb3ed7e206?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/342261e31fbe63c5c5d3ed799372db2e8448673ffccbbe240822e8eb3ed7e206?s=96&d=mm&r=g\",\"caption\":\"Cristina Mello\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware and Telework - Keys to Avoid Data Hijacking","description":"El secuestro de datos es el tipo de ciberataque que m\u00e1s crece. En muchos casos, explota vulnerabilidades vinculadas con los dispositivos","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware and Telework - Keys to Avoid Data Hijacking","og_description":"El secuestro de datos es el tipo de ciberataque que m\u00e1s crece. En muchos casos, explota vulnerabilidades vinculadas con los dispositivos","og_url":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/","og_site_name":"Cirion Technologies","article_published_time":"2024-05-10T20:58:34+00:00","article_modified_time":"2025-06-02T20:40:44+00:00","og_image":[{"width":1600,"height":500,"url":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/02\/press-room-seguridad-conectada-1600x500-1.jpg","type":"image\/jpeg"}],"author":"Cristina Mello","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cristina Mello","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#article","isPartOf":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/"},"author":{"name":"Cristina Mello","@id":"https:\/\/press.ciriontechnologies.com\/en\/#\/schema\/person\/b6d56391c7900c41116a618b8b0bc952"},"headline":"Ransomware and Telework &#8211; Keys to Avoid Data Hijacking","datePublished":"2024-05-10T20:58:34+00:00","dateModified":"2025-06-02T20:40:44+00:00","mainEntityOfPage":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/"},"wordCount":707,"commentCount":0,"publisher":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/#organization"},"image":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/02\/press-room-seguridad-conectada-1600x500-1.jpg","keywords":["Pitch"],"articleSection":["Argentina"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/","url":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/","name":"Ransomware and Telework - Keys to Avoid Data Hijacking","isPartOf":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#primaryimage"},"image":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/02\/press-room-seguridad-conectada-1600x500-1.jpg","datePublished":"2024-05-10T20:58:34+00:00","dateModified":"2025-06-02T20:40:44+00:00","description":"El secuestro de datos es el tipo de ciberataque que m\u00e1s crece. En muchos casos, explota vulnerabilidades vinculadas con los dispositivos","breadcrumb":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#primaryimage","url":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/02\/press-room-seguridad-conectada-1600x500-1.jpg","contentUrl":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/02\/press-room-seguridad-conectada-1600x500-1.jpg","width":1600,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/press.ciriontechnologies.com\/en\/2024\/05\/10\/ransomware-teletwork-avoid-data-hijacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/press.ciriontechnologies.com\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware and Telework &#8211; Keys to Avoid Data Hijacking"}]},{"@type":"WebSite","@id":"https:\/\/press.ciriontechnologies.com\/en\/#website","url":"https:\/\/press.ciriontechnologies.com\/en\/","name":"Cirion Technologies","description":"Pressroom","publisher":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/press.ciriontechnologies.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/press.ciriontechnologies.com\/en\/#organization","name":"Cirion Technologies","url":"https:\/\/press.ciriontechnologies.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/press.ciriontechnologies.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/07\/Cirion_logo_696x696.jpg","contentUrl":"https:\/\/press.ciriontechnologies.com\/wp-content\/uploads\/2024\/07\/Cirion_logo_696x696.jpg","width":696,"height":696,"caption":"Cirion Technologies"},"image":{"@id":"https:\/\/press.ciriontechnologies.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/press.ciriontechnologies.com\/en\/#\/schema\/person\/b6d56391c7900c41116a618b8b0bc952","name":"Cristina Mello","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/342261e31fbe63c5c5d3ed799372db2e8448673ffccbbe240822e8eb3ed7e206?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/342261e31fbe63c5c5d3ed799372db2e8448673ffccbbe240822e8eb3ed7e206?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/342261e31fbe63c5c5d3ed799372db2e8448673ffccbbe240822e8eb3ed7e206?s=96&d=mm&r=g","caption":"Cristina Mello"}}]}},"_links":{"self":[{"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/posts\/6198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/comments?post=6198"}],"version-history":[{"count":0,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/posts\/6198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/media\/880"}],"wp:attachment":[{"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/media?parent=6198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/categories?post=6198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/tags?post=6198"},{"taxonomy":"idioma_entrada","embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/idioma_entrada?post=6198"},{"taxonomy":"anio_publicacion_entrada","embeddable":true,"href":"https:\/\/press.ciriontechnologies.com\/en\/wp-json\/wp\/v2\/anio_publicacion_entrada?post=6198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}