{"id":13643,"date":"2025-01-20T14:22:13","date_gmt":"2025-01-20T13:22:13","guid":{"rendered":"https:\/\/oti.unp.edu.pe\/?p=13643"},"modified":"2025-01-20T14:28:04","modified_gmt":"2025-01-20T13:28:04","slug":"ciberseguridad-cuales-son-los-retos-que-deben-tomar-en-cuenta-las-empresas-este-2025","status":"publish","type":"post","link":"https:\/\/oti.unp.edu.pe\/?p=13643","title":{"rendered":"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13643\" class=\"elementor elementor-13643\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-824805e e-flex e-con-boxed e-con e-parent\" data-id=\"824805e\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f810371 elementor-widget elementor-widget-text-editor\" data-id=\"f810371\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><em><strong>Referencia: <a href=\"https:\/\/gestion.pe\/tecnologia\/ciberseguridad-cuales-son-los-retos-que-deben-tomar-en-cuenta-las-empresas-este-2025-noticia\/?ref=gesr\" target=\"_blank\" rel=\"noopener\">Gesti\u00f3n<\/a><\/strong><\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaf245a elementor-widget elementor-widget-text-editor\" data-id=\"aaf245a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Durante los \u00faltimos a\u00f1os, los incidentes relacionados a\u00a0ciberseguridad\u00a0han aumentado de manera considerable en Per\u00fa. En el 2024, seg\u00fan datos de Kaspersky, se registraron m\u00e1s de 64 millones de detecciones de malware, un incremento de 2.9% con respecto al a\u00f1o anterior. Adem\u00e1s, el\u00a0phishing\u00a0experiment\u00f3 un alza alarmante del 360%, con m\u00e1s de 90 millones de intentos registrados.<\/p><p class=\"story-contents__font-paragraph \" data-mrf-recirculation=\"Enlaces P\u00e1rrafos\">Entre los sectores m\u00e1s afectados est\u00e1n el Gobierno, la energ\u00eda y los servicios p\u00fablicos. Asimismo, este \u00faltimo a\u00f1o se han reportado acceso a datos sensibles de usuarios de distintas instituciones privadas y p\u00fablicas. A esto se suma el desmantelamiento de una red internacional de estafas telef\u00f3nicas, subrayando la creciente sofisticaci\u00f3n de las amenazas.<\/p><p class=\"story-contents__font-paragraph \" data-mrf-recirculation=\"Enlaces P\u00e1rrafos\"><i>\u201cLa ciberseguridad ya no es solo un tema t\u00e9cnico, sino una responsabilidad estrat\u00e9gica que deben tomar mucho m\u00e1s en cuenta las<\/i>\u00a0empresas peruanas<a href=\"https:\/\/gestion.pe\/noticias\/empresas-peruanas\/\" target=\"_blank\" rel=\"noopener\" data-mrf-link=\"https:\/\/gestion.pe\/noticias\/empresas-peruanas\/\"><i><b>.\u00a0<\/b><\/i><\/a><i>Para este 2025, es fundamental que las organizaciones entiendan que la prevenci\u00f3n no es opcional, sino una necesidad\u201d<\/i>, explica Jes\u00fas Bellido, decano de la Facultad de Computaci\u00f3n de la Universidad de Ingenier\u00eda y Tecnolog\u00eda (UTEC).<\/p><p class=\"story-contents__font-paragraph \" data-mrf-recirculation=\"Enlaces P\u00e1rrafos\"><i>\u201cPara lograrlo es necesario priorizar la formaci\u00f3n en ciberseguridad, implementar controles robustos y adoptar tecnolog\u00edas emergentes como inteligencia artificial y\u00a0<\/i>blockchain\u00a0par<i>a proteger datos cr\u00edticos y garantizar la confianza del cliente\u201d,\u00a0<\/i>a\u00f1ade.<\/p><p class=\"story-contents__font-paragraph \" data-mrf-recirculation=\"Enlaces P\u00e1rrafos\">En ese sentido, el especialista comparte las tendencias en ciberseguridad que ser\u00e1n fundamentales conocer para mantener protegida una empresa u organizaci\u00f3n.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e7d3e6 elementor-widget elementor-widget-text-editor\" data-id=\"3e7d3e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"story-contents__paragraph-list\" data-mrf-recirculation=\"Te puede interesar footer\"><li><b>1. Mayor adopci\u00f3n de Inteligencia Artificial (IA).<\/b>\u00a0La\u00a0IAcontinuar\u00e1 siendo clave para detectar patrones an\u00f3malos y responder a incidentes en tiempo real. Empresas de todos los tama\u00f1os est\u00e1n adoptando herramientas avanzadas que les permiten anticiparse a posibles ataques.<\/li><li><b>2. Implementaci\u00f3n de estrategias Zero Trust.<\/b>\u00a0El modelo de confianza cero, que asume que ninguna entidad interna o externa es segura por defecto, est\u00e1 ganando tracci\u00f3n en el Per\u00fa corporativo. Esto implica verificar cada acceso y minimizar los privilegios en redes y sistemas.<\/li><li><b>3. Mayor inversi\u00f3n en educaci\u00f3n y capacitaci\u00f3n.\u00a0<\/b>Las empresas peruanas comenzar\u00e1n a priorizar programas de concienciaci\u00f3n sobre ciberseguridad para sus empleados, abordando una de las principales debilidades: el error humano.<\/li><li><b>4. Ciberseguridad adaptada a microfinancieras y zonas rurales.\u00a0<\/b>Las\u00a0organizacionesque operan en estas \u00e1reas buscar\u00e1n soluciones tecnol\u00f3gicas como blockchain para prevenir fraudes, adem\u00e1s de reforzar la educaci\u00f3n digital de sus clientes.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Referencia: Gesti\u00f3n Durante los \u00faltimos a\u00f1os, los incidentes relacionados a\u00a0ciberseguridad\u00a0han<\/p>\n","protected":false},"author":1,"featured_media":13644,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58,5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025? - Oficina de Tecnolog\u00eda de Informaci\u00f3n<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oti.unp.edu.pe\/?p=13643\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025? - Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Referencia: Gesti\u00f3n Durante los \u00faltimos a\u00f1os, los incidentes relacionados a\u00a0ciberseguridad\u00a0han\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oti.unp.edu.pe\/?p=13643\" \/>\n<meta property=\"og:site_name\" content=\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T13:22:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-20T13:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"677\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#article\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\"},\"headline\":\"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025?\",\"datePublished\":\"2025-01-20T13:22:13+00:00\",\"dateModified\":\"2025-01-20T13:28:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643\"},\"wordCount\":415,\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg\",\"articleSection\":[\"Seguridad Inform\u00e1tica\",\"Tecnolog\u00eda\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643\",\"url\":\"https:\/\/oti.unp.edu.pe\/?p=13643\",\"name\":\"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025? - Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg\",\"datePublished\":\"2025-01-20T13:22:13+00:00\",\"dateModified\":\"2025-01-20T13:28:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/oti.unp.edu.pe\/?p=13643\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg\",\"width\":1200,\"height\":677},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13643#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/oti.unp.edu.pe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/oti.unp.edu.pe\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"width\":736,\"height\":385,\"caption\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"sameAs\":[\"https:\/\/oti.unp.edu.pe\/webotiunp\"],\"url\":\"https:\/\/oti.unp.edu.pe\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025? - Oficina de Tecnolog\u00eda de Informaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oti.unp.edu.pe\/?p=13643","og_locale":"es_ES","og_type":"article","og_title":"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025? - Oficina de Tecnolog\u00eda de Informaci\u00f3n","og_description":"Referencia: Gesti\u00f3n Durante los \u00faltimos a\u00f1os, los incidentes relacionados a\u00a0ciberseguridad\u00a0han","og_url":"https:\/\/oti.unp.edu.pe\/?p=13643","og_site_name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","article_published_time":"2025-01-20T13:22:13+00:00","article_modified_time":"2025-01-20T13:28:04+00:00","og_image":[{"width":1200,"height":677,"url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"desarrollo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oti.unp.edu.pe\/?p=13643#article","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13643"},"author":{"name":"desarrollo","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c"},"headline":"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025?","datePublished":"2025-01-20T13:22:13+00:00","dateModified":"2025-01-20T13:28:04+00:00","mainEntityOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13643"},"wordCount":415,"publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg","articleSection":["Seguridad Inform\u00e1tica","Tecnolog\u00eda"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/oti.unp.edu.pe\/?p=13643","url":"https:\/\/oti.unp.edu.pe\/?p=13643","name":"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025? - Oficina de Tecnolog\u00eda de Informaci\u00f3n","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg","datePublished":"2025-01-20T13:22:13+00:00","dateModified":"2025-01-20T13:28:04+00:00","breadcrumb":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13643#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oti.unp.edu.pe\/?p=13643"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/?p=13643#primaryimage","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/TR635ONFNVHD7PWW3EK5AUIAVY.jpg","width":1200,"height":677},{"@type":"BreadcrumbList","@id":"https:\/\/oti.unp.edu.pe\/?p=13643#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/oti.unp.edu.pe\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad: \u00bfCu\u00e1les son los retos que deben tomar en cuenta las empresas este 2025?"}]},{"@type":"WebSite","@id":"https:\/\/oti.unp.edu.pe\/#website","url":"https:\/\/oti.unp.edu.pe\/","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","description":"","publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oti.unp.edu.pe\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/oti.unp.edu.pe\/#organization","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","url":"https:\/\/oti.unp.edu.pe\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","width":736,"height":385,"caption":"Oficina de Tecnolog\u00eda de Informaci\u00f3n"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","caption":"desarrollo"},"sameAs":["https:\/\/oti.unp.edu.pe\/webotiunp"],"url":"https:\/\/oti.unp.edu.pe\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13643"}],"collection":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13643"}],"version-history":[{"count":4,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13643\/revisions"}],"predecessor-version":[{"id":13648,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13643\/revisions\/13648"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/media\/13644"}],"wp:attachment":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}