{"id":11150,"date":"2024-01-03T17:48:00","date_gmt":"2024-01-03T23:48:00","guid":{"rendered":"https:\/\/www.ikusi.com\/en\/?p=11150"},"modified":"2024-01-03T17:48:00","modified_gmt":"2024-01-03T23:48:00","slug":"cybersecurity-focus-beyond-threats-identifying-risk-exposure","status":"publish","type":"post","link":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/","title":{"rendered":"Cybersecurity focus: beyond threats, identifying risk exposure"},"content":{"rendered":"\n<p>With the increase and sophistication of cyberattacks, cybersecurity has become a central concern for individuals and organizations.&nbsp;<\/p>\n\n\n\n<p>In fact, as cyberattacks increase, efforts to prevent and reduce risks also rise. According to estimates by International Data Corporation (<a href=\"https:\/\/www.ituser.es\/seguridad\/2023\/04\/el-gasto-en-ciberseguridad-crecera-por-encima-del-12-en-2023#:~:text=Se%20prev%C3%A9%20que%20el%20gasto,comparaci%C3%B3n%20con%202022%2C%20seg%C3%BAn%20IDC.\" target=\"_blank\" rel=\"noreferrer noopener\">IDC<\/a>), global spending on cybersecurity solutions and services will be $219 billion in 2023 and nearly $300 billion in 2026.\u00a0<\/p>\n\n\n\n<p>When talking about cybersecurity or information security, it refers to all types of protection for infrastructures, systems, networks, and data against threats, damage, or unauthorized access. However, we often forget about end users, who must be considered an essential factor in a company&#8217;s proper cybersecurity posture.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.ikusi.com\/mx\/wp-content\/uploads\/sites\/2\/2024\/01\/interior_01-11.jpg\" alt=\"Ciberseguridad\" class=\"wp-image-13676\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why is it important to protect the end user to preserve cybersecurity?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The end user is a key element to consider in a business cybersecurity strategy. In many cases, the lack of knowledge and awareness among employees increases the risk of falling into cyber traps.&nbsp;<\/p>\n\n\n\n<p>Contrary to popular belief, a large part of cybercriminals do not possess deep computer knowledge. What happens is that they take advantage of small oversights and human errors to successfully and safely access business information.&nbsp;<\/p>\n\n\n\n<p>According to the <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">IBM Security X-Force Threat Intelligence Index 2023<\/a>, phishing is the most common way attackers access users&#8217; confidential information.\u00a0<\/p>\n\n\n\n<p><strong>Phishing<\/strong> refers to the crime of impersonating a company or organization to obtain passwords or other types of confidential data. It is such a sophisticated criminal tactic that the messages sent by criminals are difficult to identify in time.\u00a0<\/p>\n\n\n\n<p><strong>Attacks on cloud infrastructures and networks<\/strong>, as well as ransomware, also top the list of threats to end users.\u00a0<\/p>\n\n\n\n<p>A recent study by <a href=\"https:\/\/insights.infoblox.com\/resources-whitepapers\/mexico-2023-global-state-of-cybersecurity-study?utm_campaign=ams-wat-fy23-sec-gscsreport-mexico-202304&amp;utm_medium=email&amp;utm_source=marketo&amp;utm_term=na&amp;utm_content=na&amp;mkt_tok=MjQwLVBUSy03NTEAAAGOleL4T70hT53pfd2oawOKlESTs-s9FmiaHrhSJY5J-2cz0OCH8h5qiFsM3fZctFWHDvPOG5uZplcA3Dd9Zt8OL49dm-xGnWxOmY4NTq0q7N85BQ\" target=\"_blank\" rel=\"noreferrer noopener\">Infoblox<\/a> in Mexico showed that data breaches and <strong>ransomware<\/strong> were the most concerning attacks for 51% of organizations, followed by direct attacks through cloud services (43%) and attacks through remote worker connections (35%).\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to protect the end user?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>For cybercriminals, any device with internet access can be an opportunity to commit fraud. Therefore, it is important to train end users on the safest ways to navigate the digital space and the most effective measures to protect confidential data.&nbsp;<\/p>\n\n\n\n<p>If you want to safeguard an organization&#8217;s assets, these are the basic measures to achieve it:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Train employees on the most common threats and the safest online practices.\u00a0<\/li>\n\n\n\n<li>Define rules for the use of secure passwords, network access, personal devices, and the management of confidential information.\u00a0<\/li>\n\n\n\n<li>Keep all systems and software used in the organization up to date.\u00a0<\/li>\n\n\n\n<li>Ensure that critical data is backed up in case of loss or damage.\u00a0<\/li>\n\n\n\n<li>Implement specialized technologies to protect any network, computer system, or technology that has internet access and interacts with the organization&#8217;s critical information.\u00a0<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.ikusi.com\/mx\/wp-content\/uploads\/sites\/2\/2024\/01\/interior_01-9.jpg\" alt=\"\u00bfQu\u00e9 tecnolog\u00edas ayudan a proteger al usuario final?\" class=\"wp-image-13677\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What technologies help protect the end user?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>In the field of cybersecurity, there is a wide range of technologies designed to protect the end user and safeguard the data they interact with.&nbsp;<\/p>\n\n\n\n<p>One of these technologies is <strong>Ikusi Threat Protect<\/strong>, a comprehensive solution that deploys two lines of defense: the first in the cloud to safeguard systems and applications, and the second through agents installed on each device connected to the company&#8217;s network.\u00a0<\/p>\n\n\n\n<p>With Ikusi Threat Protect, it is possible to <strong>protect end users while they browse the internet or send emails<\/strong>, detect sophisticated threats in real-time, contain suspicious traffic to reduce attacks, recover information through a backup service offered by Ikusi, and access a unified operations center (Ikusi Once) that provides 24\/7 remote assistance.\u00a0<\/p>\n\n\n\n<p>For more information, visit: <a href=\"https:\/\/www.ikusi.com\/en\/services\/threat-protect\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ikusi Threat Protect<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the increase and sophistication of cyberattacks, cybersecurity has become a central concern for individuals and organizations.&nbsp; In fact, as [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":13678,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[317],"tags":[319],"temas":[303,299],"class_list":["post-11150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aplicacion-de-soluciones-en","tag-cybersecurity","temas-cybersecurity","temas-digital-transformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity focus: beyond threats, identifying risk exposure - Ikusi<\/title>\n<meta name=\"description\" content=\"Explore the importance of protecting the end user to preserve business cybersecurity and learn how Ikusi helps you achieve it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity focus: beyond threats, identifying risk exposure - Ikusi\" \/>\n<meta property=\"og:description\" content=\"Explore the importance of protecting the end user to preserve business cybersecurity and learn how Ikusi helps you achieve it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IkusiVelatia\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-03T23:48:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel Michaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:site\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Michaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\"},\"author\":{\"name\":\"Daniel Michaus\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79\"},\"headline\":\"Cybersecurity focus: beyond threats, identifying risk exposure\",\"datePublished\":\"2024-01-03T23:48:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\"},\"wordCount\":582,\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Solutions Application\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\",\"url\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\",\"name\":\"Cybersecurity focus: beyond threats, identifying risk exposure - Ikusi\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg\",\"datePublished\":\"2024-01-03T23:48:00+00:00\",\"description\":\"Explore the importance of protecting the end user to preserve business cybersecurity and learn how Ikusi helps you achieve it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Enfoque de ciberseguridad: m\u00e1s all\u00e1 de las amenazas, la identificaci\u00f3n de la exposici\u00f3n del riesgo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.ikusi.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity focus: beyond threats, identifying risk exposure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"name\":\"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikusi.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\",\"name\":\"Ikusi\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"width\":1,\"height\":1,\"caption\":\"Ikusi\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IkusiVelatia\",\"https:\/\/x.com\/ikusi_espana\",\"https:\/\/www.instagram.com\/ikusi.velatia\/\",\"https:\/\/www.linkedin.com\/company\/ikusi\/\",\"https:\/\/www.youtube.com\/user\/IkusiGroup\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79\",\"name\":\"Daniel Michaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g\",\"caption\":\"Daniel Michaus\"},\"url\":\"https:\/\/www.ikusi.com\/en\/author\/daniel-michausuxmarketing-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity focus: beyond threats, identifying risk exposure - Ikusi","description":"Explore the importance of protecting the end user to preserve business cybersecurity and learn how Ikusi helps you achieve it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity focus: beyond threats, identifying risk exposure - Ikusi","og_description":"Explore the importance of protecting the end user to preserve business cybersecurity and learn how Ikusi helps you achieve it.","og_url":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/","og_site_name":"Ikusi","article_publisher":"https:\/\/www.facebook.com\/IkusiVelatia","article_published_time":"2024-01-03T23:48:00+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg","type":"image\/jpeg"}],"author":"Daniel Michaus","twitter_card":"summary_large_image","twitter_creator":"@ikusi_espana","twitter_site":"@ikusi_espana","twitter_misc":{"Written by":"Daniel Michaus","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#article","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/"},"author":{"name":"Daniel Michaus","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79"},"headline":"Cybersecurity focus: beyond threats, identifying risk exposure","datePublished":"2024-01-03T23:48:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/"},"wordCount":582,"publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg","keywords":["cybersecurity"],"articleSection":["Solutions Application"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/","url":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/","name":"Cybersecurity focus: beyond threats, identifying risk exposure - Ikusi","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg","datePublished":"2024-01-03T23:48:00+00:00","description":"Explore the importance of protecting the end user to preserve business cybersecurity and learn how Ikusi helps you achieve it.","breadcrumb":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#primaryimage","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2024\/01\/portada-8.jpg","width":1920,"height":1080,"caption":"Enfoque de ciberseguridad: m\u00e1s all\u00e1 de las amenazas, la identificaci\u00f3n de la exposici\u00f3n del riesgo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikusi.com\/en\/blog\/cybersecurity-focus-beyond-threats-identifying-risk-exposure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ikusi.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity focus: beyond threats, identifying risk exposure"}]},{"@type":"WebSite","@id":"https:\/\/www.ikusi.com\/en\/#website","url":"https:\/\/www.ikusi.com\/en\/","name":"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad","description":"","publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikusi.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikusi.com\/en\/#organization","name":"Ikusi","url":"https:\/\/www.ikusi.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","width":1,"height":1,"caption":"Ikusi"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IkusiVelatia","https:\/\/x.com\/ikusi_espana","https:\/\/www.instagram.com\/ikusi.velatia\/","https:\/\/www.linkedin.com\/company\/ikusi\/","https:\/\/www.youtube.com\/user\/IkusiGroup"]},{"@type":"Person","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79","name":"Daniel Michaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g","caption":"Daniel Michaus"},"url":"https:\/\/www.ikusi.com\/en\/author\/daniel-michausuxmarketing-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/11150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/comments?post=11150"}],"version-history":[{"count":0,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/11150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media\/13678"}],"wp:attachment":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media?parent=11150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/categories?post=11150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/tags?post=11150"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/temas?post=11150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}