{"id":3167,"date":"2025-01-30T12:21:53","date_gmt":"2025-01-30T11:21:53","guid":{"rendered":"https:\/\/enthec.com\/?p=3167"},"modified":"2025-01-30T12:36:37","modified_gmt":"2025-01-30T11:36:37","slug":"6-online-threats-that-can-affect-your-business","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/","title":{"rendered":"6 online threats that can affect your business"},"content":{"rendered":"<p>Businesses are increasingly relying on <strong>connectivity and online tools to operate and grow<\/strong>. However, this dependence also brings significant risks: network threats are a real and constant danger that can seriously affect any organization, regardless of its size or sector.<br \/>\nThroughout this article, we&#8217;ll learn about online threats, their main types, and how they can impact your business. We will also show you how to protect yourself with <strong>advanced management tools <\/strong>such as Kartos, a cyber-surveillance solution designed specifically for companies.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/enthec.com\/en\/contact\/\"><img decoding=\"async\" class=\"alignnone size-full wp-image-3072\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB.jpg\" alt=\"\" width=\"1000\" height=\"200\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB.jpg 1000w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB-300x60.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB-768x154.jpg 768w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/ENG-Banner-WEB-350x70.jpg 350w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>What are online threats?<\/h2>\n<p>When we talk about threats on the network, we refer to any <strong>malicious action, program, or actor that seeks to compromise the security of digital systems.<\/strong> These threats can target your data, systems, employees, or corporate reputation.<br \/>\nGlobal interconnectedness makes it easier for organizations to manage international operations, but it also opens the door to cyber risks that previously seemed unlikely. <strong>From targeted attacks to threats that affect entire industries, <\/strong>threats on the online network are constantly evolving, adapting to new technologies and vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3160 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/amenazas-red.jpg\" alt=\"Network Threats\" width=\"600\" height=\"400\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/amenazas-red.jpg 600w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/amenazas-red-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/amenazas-red-350x233.jpg 350w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Featured Types of Network Threats<\/h2>\n<p>To protect your business, it&#8217;s first critical to understand the <strong>online threats you might face.<\/strong><\/p>\n<h3>Malware<\/h3>\n<p>The <a href=\"https:\/\/enthec.com\/en\/types-of-malware-and-keys-to-prevent-these-attacks-from-affecting-the-security-of-your-company\/\">types of malware <\/a>are divided into <strong>viruses, worms, Trojans, and ransomware<\/strong>. These threats seek to infiltrate your systems to steal data, damage information, or hijack files for ransom.<br \/>\nFor example, in May 2023, a well-known ransomware attack hit a financial services company in Europe, <strong>paralyzing its operations for days and causing an estimated loss of millions of euros and significant reputational damage.<\/strong><br \/>\nThis case highlights the need for <strong>robust security measures to prevent such incidents.<\/strong> Ransomware, for example, is particularly dangerous because it can paralyze your entire operations in minutes.<\/p>\n<h3>Phishing<\/h3>\n<p><a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\">Phishing<\/a> is one of the <strong>most common and effective online threats<\/strong>. Cybercriminals impersonate trusted entities, such as banks or suppliers, to trick employees and gain access to sensitive information.<\/p>\n<h3>DDoS (Distributed Denial of Service) attacks<\/h3>\n<p>These attacks overload your company&#8217;s servers, <strong>disrupting services and leaving users without access. <\/strong>While they don&#8217;t always steal information, their impact can devastate the business, reputation, and customer experience.<\/p>\n<h3>Social engineering<\/h3>\n<p>Through psychological tactics, <a href=\"https:\/\/enthec.com\/en\/social-engineering-attacks-on-senior-executives\/\">social engineering attackers<\/a> manipulate employees into revealing sensitive data or taking harmful actions. This type of threat <strong>exploits the weakest link: the human factor.<\/strong><\/p>\n<h3>Credential theft<\/h3>\n<p>Attackers use techniques such as credential stuffing to <strong>gain access to corporate accounts, putting the company, its customers, and its partners at risk.<\/strong><\/p>\n<h3>Insider threats<\/h3>\n<p>Not all threats come from the outside. Disgruntled or careless employees can also put systems at risk by <strong>sharing sensitive data or ignoring security policies.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Why are these threats dangerous?<\/h2>\n<p>Dangers and threats on the network do not only imply an immediate financial loss. <strong>Long-term impacts can be equally or more detrimental:<\/strong><\/p>\n<ul>\n<li><strong>Operational interruptions. <\/strong>Attacks can halt production, crash systems, or disrupt services, directly impacting productivity.<\/li>\n<li><strong>Loss of confidence<\/strong>. Customers expect their data to be secure, and a security breach can irreversibly damage your brand&#8217;s reputation.<\/li>\n<li><strong>Legal sanctions<\/strong>. With regulations such as the GDPR, poor data management can lead to significant fines.<\/li>\n<li><strong>Unexpected costs<\/strong>. From paying ransoms for ransomware to the need to invest in security audits, expenses skyrocket.<\/li>\n<\/ul>\n<p>In a competitive environment, <strong>any vulnerability can be exploited <\/strong>by competitors or cybercriminals to gain an unfair advantage.<\/p>\n<p>&nbsp;<\/p>\n<h2>How can you protect your company from online threats?<\/h2>\n<p>Adopting prevention and preparedness measures against network threats protects your company&#8217;s data and operations and <strong>strengthens the trust of your customers and partners<\/strong>. By being prepared, you can avoid high downtime, protect your reputation, and ensure compliance with legal regulations.<\/p>\n<h3>Constant training of staff<\/h3>\n<p>Employees are your first line of defense. Ensure they <strong>understand how to identify suspicious emails, maintain strong passwords, and follow security policies.<\/strong><\/p>\n<h3>Security Software Implementation<\/h3>\n<p>Installing <strong>antivirus, firewalls, and intrusion detection systems<\/strong> is critical to protecting your networks and devices.<\/p>\n<h3>Regular Backups<\/h3>\n<p><strong>Make automatic and frequent backups <\/strong>to ensure your information is safe even during an attack.<\/p>\n<h3>Continuous monitoring<\/h3>\n<p>A continuous threat exposure management solution, such as Kartos, allows you <strong>to identify vulnerabilities and respond quickly to any incident.<\/strong><\/p>\n<h3>Access control<\/h3>\n<p>Implement <strong>multiple levels of authentication and ensure that only authorized personnel have access to sensitive information.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Kartos: Your ally in the fight against online threats<\/h2>\n<p>Faced with an ever-changing cyber threat landscape, businesses need tools that react and anticipate risks. This is where <a href=\"https:\/\/enthec.com\/en\/kartos\/\">Kartos<\/a> makes a difference. Unlike other solutions on the market that focus solely on detection and response, <strong>Kartos takes a proactive approach by providing continuous threat exposure management (CTEM).<\/strong><br \/>\nIts ability to analyze threats in real-time, generate customized reports, and scale according to each company&#8217;s specific needs makes it an <strong>indispensable ally for protecting data, corporate reputation, and business continuity.<\/strong><\/p>\n<p><strong>No company can ignore network threats. <\/strong>From malware to phishing, the dangers are varied and constantly evolving. But your business can be one step ahead with the right strategy and advanced tools like Kartos. Don&#8217;t let cyber risks compromise your success.<\/p>\n<p><strong>Protect your future today with cutting-edge solutions that help you continuously and effectively manage and mitigate threats.<\/strong><\/p>\n<p>Find out how Kartos can transform your cybersecurity. <a href=\"https:\/\/enthec.com\/en\/contact\/\">Contact us<\/a> now and <strong>give your company the protection it deserves.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses are increasingly relying on connectivity and online tools to operate and grow. However, this dependence also brings significant risks: [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3163,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,32,38],"class_list":["post-3167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-kartos-en","tag-organizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Network Threats: 6 Highlights | Enthec<\/title>\n<meta name=\"description\" content=\"Discover 6 online threats that can affect your business \u27a1\ufe0f Learn about their risks and how to protect yourself with advanced solutions like Kartos\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Network Threats: 6 Highlights | Enthec\" \/>\n<meta property=\"og:description\" content=\"Discover 6 online threats that can affect your business \u27a1\ufe0f Learn about their risks and how to protect yourself with advanced solutions like Kartos\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-30T11:21:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-30T11:36:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"6 online threats that can affect your business\",\"datePublished\":\"2025-01-30T11:21:53+00:00\",\"dateModified\":\"2025-01-30T11:36:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\"},\"wordCount\":874,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg\",\"keywords\":[\"Cybersecurity\",\"Kartos\",\"Organizations\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\",\"url\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\",\"name\":\"\u25b7 Network Threats: 6 Highlights | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg\",\"datePublished\":\"2025-01-30T11:21:53+00:00\",\"dateModified\":\"2025-01-30T11:36:37+00:00\",\"description\":\"Discover 6 online threats that can affect your business \u27a1\ufe0f Learn about their risks and how to protect yourself with advanced solutions like Kartos\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg\",\"width\":7952,\"height\":5304,\"caption\":\"Amenazas de red comunes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 online threats that can affect your business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Network Threats: 6 Highlights | Enthec","description":"Discover 6 online threats that can affect your business \u27a1\ufe0f Learn about their risks and how to protect yourself with advanced solutions like Kartos","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Network Threats: 6 Highlights | Enthec","og_description":"Discover 6 online threats that can affect your business \u27a1\ufe0f Learn about their risks and how to protect yourself with advanced solutions like Kartos","og_url":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-01-30T11:21:53+00:00","article_modified_time":"2025-01-30T11:36:37+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes-1024x683.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"6 online threats that can affect your business","datePublished":"2025-01-30T11:21:53+00:00","dateModified":"2025-01-30T11:36:37+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/"},"wordCount":874,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg","keywords":["Cybersecurity","Kartos","Organizations"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/","url":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/","name":"\u25b7 Network Threats: 6 Highlights | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg","datePublished":"2025-01-30T11:21:53+00:00","dateModified":"2025-01-30T11:36:37+00:00","description":"Discover 6 online threats that can affect your business \u27a1\ufe0f Learn about their risks and how to protect yourself with advanced solutions like Kartos","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/01\/Amenazas-red-comunes.jpg","width":7952,"height":5304,"caption":"Amenazas de red comunes"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/6-online-threats-that-can-affect-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/"},{"@type":"ListItem","position":2,"name":"6 online threats that can affect your business"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3167"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3163"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}