{"id":10085,"date":"2026-01-12T18:18:28","date_gmt":"2026-01-12T18:18:28","guid":{"rendered":"https:\/\/www.netvoix.com\/?p=10085"},"modified":"2026-01-13T15:07:10","modified_gmt":"2026-01-13T15:07:10","slug":"it-blog-riesgos-invisibles-byod-colegios-madrid","status":"publish","type":"post","link":"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/","title":{"rendered":"Riesgos invisibles: el impacto de BYOD en colegios de Madrid"},"content":{"rendered":"<p>Riesgos<span data-contrast=\"auto\"> que entran solos al colegio cada ma\u00f1ana. Eso ocurre cuando alumnos y docentes conectan sus propios dispositivos a la red sin que el centro sepa exactamente qu\u00e9 podr\u00eda pasar si alguno de ellos se viera comprometido.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: center;\"><span data-contrast=\"auto\">\u00bfTiene la certeza de que un m\u00f3vil infectado no podr\u00eda desencadenar una cadena de incidentes internos y externos?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<\/blockquote>\n<div>En muchos colegios de Madrid, el modelo BYOD \u2014\u201cTrae tu propio dispositivo\u201d, en el que cada usuario conecta m\u00f3viles, tablets o port\u00e1tiles personales\u2014 se ha convertido en parte del d\u00eda a d\u00eda. Esto aporta flexibilidad, pero tambi\u00e9n introduce un nivel de exposici\u00f3n y riesgos operativos que dependen de segmentaciones que rara vez se validan y de per\u00edmetros que, a veces, revelan m\u00e1s de lo que deber\u00edan.<\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Alternar tabla de contenidos\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#BYOD_cuando_un_dispositivo_personal_anade_incertidumbre_tecnica\" >BYOD: cuando un dispositivo personal a\u00f1ade incertidumbre t\u00e9cnica<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#Segmentacion_la_suposicion_mas_peligrosa\" >Segmentaci\u00f3n: la suposici\u00f3n m\u00e1s peligrosa<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#Reputacion_cuando_el_impacto_tecnico_alcanza_a_toda_la_comunidad_educativa\" >Reputaci\u00f3n: cuando el impacto t\u00e9cnico alcanza a toda la comunidad educativa<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#%C2%BFComo_podria_la_IA_identificar_servicios_visibles_que_un_dispositivo_personal_comprometido_podria_intentar_explotar\" >\u00bfC\u00f3mo podr\u00eda la IA identificar servicios visibles que un dispositivo personal comprometido podr\u00eda intentar explotar?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#Cada_dispositivo_personal_anade_un_riesgo_que_usted_no_controla\" >Cada dispositivo personal a\u00f1ade un riesgo que usted no controla<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#Conclusion_el_BYOD_no_es_el_problema_lo_desconocido_en_el_perimetro_si\" >Conclusi\u00f3n: el BYOD no es el problema; lo desconocido en el per\u00edmetro s\u00ed<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#Mientras_los_alumnos_se_conectan_alguien_mas_podria_estar_observando_su_perimetro\" >Mientras los alumnos se conectan, alguien m\u00e1s podr\u00eda estar observando su per\u00edmetro<\/a><\/li><\/ul><\/nav><\/div>\n<h3 aria-level=\"3\"><span class=\"ez-toc-section\" id=\"BYOD_cuando_un_dispositivo_personal_anade_incertidumbre_tecnica\"><\/span>BYOD: cuando un dispositivo personal a\u00f1ade incertidumbre t\u00e9cnica<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div>Un dispositivo personal no gestionado no cumple con las pol\u00edticas de seguridad del colegio. Su estado, su software y su nivel de actualizaci\u00f3n son desconocidos, lo que incrementa los riesgos de acceso no autorizado en la red.<\/div>\n<p><span data-contrast=\"auto\">Seg\u00fan <a href=\"https:\/\/er.educause.edu\/articles\/2025\/02\/navigating-byod-in-education\" target=\"_blank\" rel=\"noopener\">EDUCAUSE<\/a>, <\/span>los entornos educativos que adoptan BYOD afrontan un aumento de la complejidad operativa debido a la diversidad de dispositivos y configuraciones, lo que puede dificultar el control de accesos no autorizados y elevar los <strong>riesgos de seguridad<\/strong>. En un colegio donde conviven decenas, e incluso cientos, de dispositivos distintos, este escenario es cotidiano.<\/p>\n<p><span data-contrast=\"auto\">Un an\u00e1lisis externo de vulnerabilidades no examina esos dispositivos.<\/span><br \/>\n<span data-contrast=\"auto\">Pero s\u00ed revela un aspecto esencial:<\/span> <span data-contrast=\"auto\">si existen\u00a0<\/span><b><span data-contrast=\"auto\">servicios del colegio visibles desde Internet<\/span><\/b><span data-contrast=\"auto\">\u00a0que un dispositivo comprometido podr\u00eda alcanzar una vez conectado a la red.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10090\" title=\"Riesgos\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-group-of-children-sitting-at-a-table-with-laptops_72595656-1-1024x683.jpg\" alt=\"Riesgos\" width=\"723\" height=\"482\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-group-of-children-sitting-at-a-table-with-laptops_72595656-1-1024x683.jpg 1024w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-group-of-children-sitting-at-a-table-with-laptops_72595656-1-300x200.jpg 300w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-group-of-children-sitting-at-a-table-with-laptops_72595656-1-768x512.jpg 768w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-group-of-children-sitting-at-a-table-with-laptops_72595656-1-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"Segmentacion_la_suposicion_mas_peligrosa\"><\/span>Segmentaci\u00f3n: la suposici\u00f3n m\u00e1s peligrosa<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Muchos colegios creen que su segmentaci\u00f3n funciona. Pocos la comprueban, y esa confianza infundada genera\u00a0riesgos estructurales dif\u00edciles de detectar.<\/p>\n<p><span data-contrast=\"auto\">El informe <a href=\"https:\/\/www.k12six.org\/cyber-incident-map\" target=\"_blank\" rel=\"noopener\">K12 SIX Cyber Incident Map<\/a> documenta que numerosos incidentes en entornos educativos se agravan cuando configuraciones internas incorrectas permiten que amenazas iniciales alcancen sistemas que deber\u00edan permanecer aislados. Aunque este informe no se centra espec\u00edficamente en Madrid ni en BYOD, s\u00ed confirma un patr\u00f3n com\u00fan: peque\u00f1as fallas en la separaci\u00f3n de redes pueden convertirse en puntos de entrada a recursos cr\u00edticos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Aqu\u00ed es donde un diagn\u00f3stico externo aporta una visibilidad imprescindible:<\/span> <span data-contrast=\"auto\">identifica qu\u00e9 servicios del colegio est\u00e1n expuestos a Internet y podr\u00edan interactuar con un dispositivo BYOD comprometido, lo que facilita un movimiento no deseado entre entornos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span class=\"ez-toc-section\" id=\"Reputacion_cuando_el_impacto_tecnico_alcanza_a_toda_la_comunidad_educativa\"><\/span>Reputaci\u00f3n: cuando el impacto t\u00e9cnico alcanza a toda la comunidad educativa<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Un incidente relacionado con BYOD no afecta \u00fanicamente a la infraestructura. Afecta directamente a la confianza de las familias, del personal y de la comunidad.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><a href=\"https:\/\/www.sans.org\/white-papers\/byod-education-security\" target=\"_blank\" rel=\"noopener\">SANS Institute<\/a> se\u00f1ala que la falta de controles adecuados en entornos BYOD puede derivar en brechas de datos con un impacto reputacional significativo, especialmente en instituciones que manejan informaci\u00f3n sensible de menores y documentaci\u00f3n acad\u00e9mica.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Un dispositivo personal infectado puede desencadenar el incidente.<\/span><br \/>\nUn servicio expuesto desde fuera puede permitir la escalabilidad.<br \/>\n<span data-contrast=\"auto\">Y una filtraci\u00f3n puede convertirse en un problema p\u00fablico que trasciende el \u00e1mbito t\u00e9cnico.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Un diagn\u00f3stico externo, aunque no detiene ataques ni revisa las pol\u00edticas internas, s\u00ed permite identificar qu\u00e9 partes del per\u00edmetro externo podr\u00edan facilitar ese escenario.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span class=\"ez-toc-section\" id=\"%C2%BFComo_podria_la_IA_identificar_servicios_visibles_que_un_dispositivo_personal_comprometido_podria_intentar_explotar\"><\/span>\u00bfC\u00f3mo podr\u00eda la IA identificar servicios visibles que un dispositivo personal comprometido podr\u00eda intentar explotar?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Las preguntas que hoy se realizan a herramientas de IA reflejan el nivel de preocupaci\u00f3n de los responsables de IT:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201c\u00bfPuede un dispositivo infectado detectar servicios expuestos sin conocimientos avanzados?\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u201c\u00bfQu\u00e9 ve un atacante automatizado antes de intentar entrar?\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u201c\u00bfC\u00f3mo saber si mi colegio est\u00e1 publicando algo en Internet sin quererlo?\u201d\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">La automatizaci\u00f3n puede correlacionar servicios visibles con vulnerabilidades conocidas. <\/span><span data-contrast=\"auto\">Si el colegio no conoce su exposici\u00f3n externa, alguien m\u00e1s podr\u00eda descubrirla antes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10092\" title=\"Riesgos\" src=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-1024x683.jpg\" alt=\"Riesgos\" width=\"727\" height=\"485\" srcset=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-1024x683.jpg 1024w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-300x200.jpg 300w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-768x512.jpg 768w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-1536x1024.jpg 1536w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-2048x1365.jpg 2048w, https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_a-child-is-playing-on-a-tablet-computer-in-a-classroom_68736655-18x12.jpg 18w\" sizes=\"auto, (max-width: 727px) 100vw, 727px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"Cada_dispositivo_personal_anade_un_riesgo_que_usted_no_controla\"><\/span>Cada dispositivo personal a\u00f1ade un riesgo que usted no controla<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">La superficie de exposici\u00f3n var\u00eda seg\u00fan cada conexi\u00f3n.<\/span><br \/>\n<span data-contrast=\"auto\">\u00bfListo\u00a0para contactarnos y llevar tu escuela a otro nivel?\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">Diagn\u00f3stico externo: ver la exposici\u00f3n que podr\u00eda amplificarse por un BYOD infectado<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p>El an\u00e1lisis de vulnerabilidades externas se limita a las direcciones IP p\u00fablicas del colegio.<br \/>\n<span data-contrast=\"auto\">No inspecciona dispositivos personales.<\/span><br \/>\n<span data-contrast=\"auto\">No valida la segmentaci\u00f3n interna.<\/span><br \/>\n<span data-contrast=\"auto\">No monitoriza el tr\u00e1fico.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Identifica:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Qu\u00e9 servicios responden desde el exterior,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Qu\u00e9 informaci\u00f3n t\u00e9cnica revelan,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u00bfY qu\u00e9 puntos del per\u00edmetro podr\u00edan ser aprovechados si un dispositivo comprometido se conecta a la red interna y establece comunicaci\u00f3n con el exterior?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Es el punto de partida necesario para priorizar correcciones basadas en la exposici\u00f3n real del centro.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion_el_BYOD_no_es_el_problema_lo_desconocido_en_el_perimetro_si\"><\/span>Conclusi\u00f3n: el BYOD no es el problema; lo desconocido en el per\u00edmetro s\u00ed<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">El modelo BYOD seguir\u00e1 expandi\u00e9ndose en los colegios de Madrid. No es el origen del riesgo.<\/span><br \/>\n<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">El riesgo surge cuando el colegio no sabe qu\u00e9 muestra en Internet ni qu\u00e9 podr\u00eda amplificar un incidente iniciado desde un dispositivo personal.\u00a0<\/span><\/p>\n<p>Un diagn\u00f3stico externo no corrige los fallos de segmentaci\u00f3n ni protege los dispositivos.<br \/>\n<span data-contrast=\"auto\">Pero s\u00ed revela qu\u00e9 ve un atacante antes que el propio colegio.<\/span><br \/>\n<span data-contrast=\"auto\">Y esa diferencia es la base para tomar decisiones informadas.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Mientras_los_alumnos_se_conectan_alguien_mas_podria_estar_observando_su_perimetro\"><\/span>Mientras los alumnos se conectan, alguien m\u00e1s podr\u00eda estar observando su per\u00edmetro<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span data-contrast=\"auto\">Cada dispositivo personal a\u00f1ade una variable.<\/span><br \/>\n<span data-contrast=\"auto\">Cada servicio expuesto es una oportunidad.<\/span><br \/>\n<span data-contrast=\"auto\">La red evoluciona cada minuto.<\/span><br \/>\n<span data-contrast=\"auto\">Y la exposici\u00f3n tambi\u00e9n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\">Conozca hoy su exposici\u00f3n real. <a href=\"https:\/\/www.netvoix.com\/contact-us\/\" target=\"_blank\" rel=\"noopener\">Solicite su diagn\u00f3stico externo<\/a> y tome el control antes que otros.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Riesgos que entran solos al colegio cada ma\u00f1ana. Eso ocurre cuando alumnos y docentes conectan sus propios dispositivos a la red sin que el centro sepa exactamente qu\u00e9 podr\u00eda pasar si alguno de ellos se viera comprometido. \u00bfTiene la certeza de que un m\u00f3vil infectado no podr\u00eda desencadenar una cadena de incidentes internos y externos?\u00a0 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":10091,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[120,151],"tags":[],"class_list":["post-10085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education","category-spanish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Riesgos invisibles: el impacto de BYOD en colegios de Madrid - NetVoiX<\/title>\n<meta name=\"description\" content=\"El modelo BYOD expone vulnerabilidades cr\u00edticas en colegios de Madrid. Descubre c\u00f3mo gestionar riesgos y proteger la infraestructura.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Riesgos invisibles: el impacto de BYOD en colegios de Madrid - NetVoiX\" \/>\n<meta property=\"og:description\" content=\"El modelo BYOD expone vulnerabilidades cr\u00edticas en colegios de Madrid. Descubre c\u00f3mo gestionar riesgos y proteger la infraestructura.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\" \/>\n<meta property=\"og:site_name\" content=\"NetVoiX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-12T18:18:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-13T15:07:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NetVoiX Inc.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netvoix\" \/>\n<meta name=\"twitter:site\" content=\"@netvoix\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NetVoiX Inc.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\"},\"author\":{\"name\":\"NetVoiX Inc.\",\"@id\":\"https:\/\/www.netvoix.com\/#\/schema\/person\/113061930c4088a184fe870320f0bb9c\"},\"headline\":\"Riesgos invisibles: el impacto de BYOD en colegios de Madrid\",\"datePublished\":\"2026-01-12T18:18:28+00:00\",\"dateModified\":\"2026-01-13T15:07:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\"},\"wordCount\":947,\"publisher\":{\"@id\":\"https:\/\/www.netvoix.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg\",\"articleSection\":[\"Education\",\"Espa\u00f1ol\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\",\"url\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\",\"name\":\"Riesgos invisibles: el impacto de BYOD en colegios de Madrid - NetVoiX\",\"isPartOf\":{\"@id\":\"https:\/\/www.netvoix.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg\",\"datePublished\":\"2026-01-12T18:18:28+00:00\",\"dateModified\":\"2026-01-13T15:07:10+00:00\",\"description\":\"El modelo BYOD expone vulnerabilidades cr\u00edticas en colegios de Madrid. Descubre c\u00f3mo gestionar riesgos y proteger la infraestructura.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage\",\"url\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg\",\"width\":2560,\"height\":1463,\"caption\":\"Riesgos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netvoix.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Riesgos invisibles: el impacto de BYOD en colegios de Madrid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netvoix.com\/#website\",\"url\":\"https:\/\/www.netvoix.com\/\",\"name\":\"NetVoiX\",\"description\":\"Managed IT Services. Network and Wireless Infrastructure\",\"publisher\":{\"@id\":\"https:\/\/www.netvoix.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netvoix.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netvoix.com\/#organization\",\"name\":\"NetVoiX\",\"url\":\"https:\/\/www.netvoix.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png\",\"contentUrl\":\"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png\",\"width\":300,\"height\":100,\"caption\":\"NetVoiX\"},\"image\":{\"@id\":\"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/\",\"https:\/\/x.com\/netvoix\",\"https:\/\/www.linkedin.com\/company\/3362194\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netvoix.com\/#\/schema\/person\/113061930c4088a184fe870320f0bb9c\",\"name\":\"NetVoiX Inc.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/63c55000a4edbb855bfbb8e4cf0278505bf291328b7e17b42e67b4a9a3927bb3?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/63c55000a4edbb855bfbb8e4cf0278505bf291328b7e17b42e67b4a9a3927bb3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/63c55000a4edbb855bfbb8e4cf0278505bf291328b7e17b42e67b4a9a3927bb3?s=96&d=mm&r=g\",\"caption\":\"NetVoiX Inc.\"},\"description\":\"Netvoix helps companies maximize their technology investments by providing comprehensive, timely, and cost-effective IT services. VALUE-DRIVEN SOLUTIONS THROUGH TECHNOLOGY\",\"url\":\"https:\/\/www.netvoix.com\/es\/author\/nvx-mmunoz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Riesgos invisibles: el impacto de BYOD en colegios de Madrid - NetVoiX","description":"El modelo BYOD expone vulnerabilidades cr\u00edticas en colegios de Madrid. Descubre c\u00f3mo gestionar riesgos y proteger la infraestructura.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/","og_locale":"es_ES","og_type":"article","og_title":"Riesgos invisibles: el impacto de BYOD en colegios de Madrid - NetVoiX","og_description":"El modelo BYOD expone vulnerabilidades cr\u00edticas en colegios de Madrid. Descubre c\u00f3mo gestionar riesgos y proteger la infraestructura.","og_url":"https:\/\/www.netvoix.com\/es\/it-blog-riesgos-invisibles-byod-colegios-madrid\/","og_site_name":"NetVoiX","article_publisher":"https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/","article_published_time":"2026-01-12T18:18:28+00:00","article_modified_time":"2026-01-13T15:07:10+00:00","og_image":[{"width":2560,"height":1463,"url":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg","type":"image\/jpeg"}],"author":"NetVoiX Inc.","twitter_card":"summary_large_image","twitter_creator":"@netvoix","twitter_site":"@netvoix","twitter_misc":{"Escrito por":"NetVoiX Inc.","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#article","isPartOf":{"@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/"},"author":{"name":"NetVoiX Inc.","@id":"https:\/\/www.netvoix.com\/#\/schema\/person\/113061930c4088a184fe870320f0bb9c"},"headline":"Riesgos invisibles: el impacto de BYOD en colegios de Madrid","datePublished":"2026-01-12T18:18:28+00:00","dateModified":"2026-01-13T15:07:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/"},"wordCount":947,"publisher":{"@id":"https:\/\/www.netvoix.com\/#organization"},"image":{"@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg","articleSection":["Education","Espa\u00f1ol"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/","url":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/","name":"Riesgos invisibles: el impacto de BYOD en colegios de Madrid - NetVoiX","isPartOf":{"@id":"https:\/\/www.netvoix.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage"},"image":{"@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg","datePublished":"2026-01-12T18:18:28+00:00","dateModified":"2026-01-13T15:07:10+00:00","description":"El modelo BYOD expone vulnerabilidades cr\u00edticas en colegios de Madrid. Descubre c\u00f3mo gestionar riesgos y proteger la infraestructura.","breadcrumb":{"@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#primaryimage","url":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg","contentUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2026\/01\/vecteezy_student-engaged-in-digital-learning-interacting-with-tablet_69740437-1-scaled.jpg","width":2560,"height":1463,"caption":"Riesgos"},{"@type":"BreadcrumbList","@id":"https:\/\/www.netvoix.com\/it-blog-riesgos-invisibles-byod-colegios-madrid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netvoix.com\/"},{"@type":"ListItem","position":2,"name":"Riesgos invisibles: el impacto de BYOD en colegios de Madrid"}]},{"@type":"WebSite","@id":"https:\/\/www.netvoix.com\/#website","url":"https:\/\/www.netvoix.com\/","name":"NetVoiX","description":"Servicios de TI gestionados. Infraestructura de red e inal\u00e1mbrica","publisher":{"@id":"https:\/\/www.netvoix.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netvoix.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.netvoix.com\/#organization","name":"NetVoiX","url":"https:\/\/www.netvoix.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png","contentUrl":"https:\/\/www.netvoix.com\/wp-content\/uploads\/2022\/05\/logo_website_v1.png","width":300,"height":100,"caption":"NetVoiX"},"image":{"@id":"https:\/\/www.netvoix.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Netvoix-Inc\/100064032305668\/","https:\/\/x.com\/netvoix","https:\/\/www.linkedin.com\/company\/3362194\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.netvoix.com\/#\/schema\/person\/113061930c4088a184fe870320f0bb9c","name":"NetVoiX Inc.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/63c55000a4edbb855bfbb8e4cf0278505bf291328b7e17b42e67b4a9a3927bb3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/63c55000a4edbb855bfbb8e4cf0278505bf291328b7e17b42e67b4a9a3927bb3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63c55000a4edbb855bfbb8e4cf0278505bf291328b7e17b42e67b4a9a3927bb3?s=96&d=mm&r=g","caption":"NetVoiX Inc."},"description":"Netvoix ayuda a las empresas a maximizar sus inversiones en tecnolog\u00eda proporcion\u00e1ndoles servicios inform\u00e1ticos completos, puntuales y rentables. SOLUCIONES DE VALOR A\u00d1ADIDO A TRAV\u00c9S DE LA TECNOLOG\u00cdA","url":"https:\/\/www.netvoix.com\/es\/author\/nvx-mmunoz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/posts\/10085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/comments?post=10085"}],"version-history":[{"count":4,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/posts\/10085\/revisions"}],"predecessor-version":[{"id":10115,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/posts\/10085\/revisions\/10115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/media\/10091"}],"wp:attachment":[{"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/media?parent=10085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/categories?post=10085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netvoix.com\/es\/wp-json\/wp\/v2\/tags?post=10085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}