{"id":3124,"date":"2025-03-13T15:52:57","date_gmt":"2025-03-13T14:52:57","guid":{"rendered":"https:\/\/ukotek.com\/?page_id=3124"},"modified":"2025-03-13T17:48:48","modified_gmt":"2025-03-13T16:48:48","slug":"seguridad-moderna-resistente-al-phishing","status":"publish","type":"page","link":"https:\/\/ukotek.com\/en\/soluciones\/seguridad-moderna-resistente-al-phishing\/","title":{"rendered":"Modern phishing-resistant security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3124\" class=\"elementor elementor-3124\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5434624 e-flex e-con-boxed e-con e-parent\" data-id=\"5434624\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-578b51a elementor-widget elementor-widget-spacer\" data-id=\"578b51a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cac65dd e-flex e-con-boxed e-con e-parent\" data-id=\"cac65dd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3813b42 e-con-full e-flex e-con e-child\" data-id=\"3813b42\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb7717 elementor-widget elementor-widget-heading\" data-id=\"4cb7717\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Modern phishing-resistant security<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f55f4f0 elementor-widget elementor-widget-heading\" data-id=\"f55f4f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Avoid Identity Theft with Yubikey<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2305f73 e-con-full e-flex e-con e-child\" data-id=\"2305f73\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9207cc8 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9207cc8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"521\" height=\"139\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\" class=\"attachment-full size-full wp-image-3126\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png 521w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1-300x80.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1-18x5.png 18w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-490fdf3 e-flex e-con-boxed e-con e-parent\" data-id=\"490fdf3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4c8fe2 elementor-pagination-position-outside elementor--h-position-center elementor--v-position-middle elementor-widget elementor-widget-slides\" data-id=\"d4c8fe2\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;dots&quot;,&quot;transition&quot;:&quot;fade&quot;,&quot;autoplay_speed&quot;:2000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-4355350 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Did you know that basic MFA methods are vulnerable to phishing?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-de8bff6 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Does your current MFA stop sophisticated phishing attacks?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-2b2f965 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">How do you ensure secure remote access without relying on mobile devices?<\/h3><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-755d3ab e-flex e-con-boxed e-con e-parent\" data-id=\"755d3ab\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-513587b e-con-full e-flex e-con e-child\" data-id=\"513587b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09843c5 elementor-widget elementor-widget-text-editor\" data-id=\"09843c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Yubico redefines authentication, offering hardware-based phishing resistant solutions (Yubikey) that eliminate the vulnerabilities of traditional MFA methods such as SMS and authentication applications, providing robust and reliable security for organisations of any size.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-744f705 elementor-widget elementor-widget-premium-addon-button\" data-id=\"744f705\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRequest a Consultation\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d4616c e-con-full e-flex e-con e-child\" data-id=\"1d4616c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-872cd5d elementor-widget elementor-widget-text-editor\" data-id=\"872cd5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>KEY DATA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-069e353 premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"069e353\" data-element_type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\r\n\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-5629bd8 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Prevenci\u00f3n total: Bloquea intentos de phishing con tecnolog\u00eda FIDO2 y WebAuthn.\"> Total prevention: Blocks phishing attempts with FIDO2 and WebAuthn technology. <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bc4eed1 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Escalabilidad: F\u00e1cil de implementar con opciones llave en mano.\"> Scalability: Easy to implement with turnkey options. <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bb67e4a premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Compatible: M\u00e1s de 1.000 integraciones\"> Compatible: More than 1,000 integrations <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-70c1743 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Ideal para entornos h\u00edbridos y remotos.\"> Ideal for hybrid and remote environments. <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-feaa6a1 e-flex e-con-boxed e-con e-parent\" data-id=\"feaa6a1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-acb3f48 e-con-full e-flex e-con e-child\" data-id=\"acb3f48\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-376f28c elementor-widget elementor-widget-text-editor\" data-id=\"376f28c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>THE CHALLENGE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29c0e16 elementor-widget elementor-widget-text-editor\" data-id=\"29c0e16\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Authentication methods such as SMS and one-time codes are vulnerable to phishing attacks, malware, SIM spoofing and man-in-the-middle attacks. Research by Google, NYU and UCSD based on 350,000 cases shows that these solutions are not effective against account theft and targeted attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c45709b e-con-full e-flex e-con e-child\" data-id=\"c45709b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5848a5 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"c5848a5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"706\" height=\"353\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1.png\" class=\"attachment-full size-full wp-image-3131\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1.png 706w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1-300x150.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Blogcrown_passkey-r2-NEW-1-18x9.png 18w\" sizes=\"(max-width: 706px) 100vw, 706px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b2843e e-flex e-con-boxed e-con e-parent\" data-id=\"7b2843e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a66f0ec e-con-full e-flex e-con e-child\" data-id=\"a66f0ec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b85668 elementor-widget elementor-widget-text-editor\" data-id=\"9b85668\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>THE SOLUTION<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c27239f elementor-widget elementor-widget-heading\" data-id=\"c27239f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Yubico: Phishing-resistant authentication<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a38dbeb elementor-widget elementor-widget-text-editor\" data-id=\"a38dbeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Distributing YubiKeys and onboarding users is easy thanks to our expert advice, enterprise subscriptions and turnkey services. We tailor the process to your needs, ensuring a smooth transition to more secure authentication.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abcc59b e-flex e-con-boxed e-con e-parent\" data-id=\"abcc59b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-638094f e-con-full e-flex e-con e-child\" data-id=\"638094f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-399a7b9 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"399a7b9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"643\" height=\"465\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1.png\" class=\"attachment-full size-full wp-image-3132\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1.png 643w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1-300x217.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubikey-1-18x12.png 18w\" sizes=\"(max-width: 643px) 100vw, 643px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-196fc44 e-con-full e-flex e-con e-child\" data-id=\"196fc44\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-832be35 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"832be35\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"> Protection against phishing:<\/h3><p class=\"elementor-image-box-description\">It replaces mobile authenticators with the YubiKey, based on open standards such as FIDO2 and WebAuthn.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63315cf elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"63315cf\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Remote access security<\/h3><p class=\"elementor-image-box-description\">Enables phishing-resistant MFA for VPNs and remote access with PIV, OTP, FIDO U2F and FIDO2.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e7919d elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"0e7919d\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Secure login on computers<\/h3><p class=\"elementor-image-box-description\">Adds multi-factor authentication on Mac, Windows and directory systems such as Active Directory and Entra AD.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f03986 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"5f03986\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Secure password management<\/h3><p class=\"elementor-image-box-description\">Integrates YubiKey with managers such as 1Password, Dashlane and LastPass, avoiding risks due to weak policies.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6982e13 e-flex e-con-boxed e-con e-parent\" data-id=\"6982e13\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f54b72 e-con-full e-flex e-con e-child\" data-id=\"9f54b72\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ecd28 elementor-widget elementor-widget-heading\" data-id=\"b8ecd28\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our Process<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-484905e e-grid e-con-full e-con e-child\" data-id=\"484905e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3164aeb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3164aeb\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"113\" height=\"143\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-01.png\" class=\"attachment-full size-full wp-image-3141\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-01.png 113w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-01-9x12.png 9w\" sizes=\"(max-width: 113px) 100vw, 113px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">1. Planning<\/h3><p class=\"elementor-image-box-description\">Ensures preparation and alignment prior to execution.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2326f98 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2326f98\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"168\" height=\"113\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-02.png\" class=\"attachment-full size-full wp-image-3140\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-02.png 168w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-02-18x12.png 18w\" sizes=\"(max-width: 168px) 100vw, 168px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">2. Validation<\/h3><p class=\"elementor-image-box-description\">Test with a small group of users before full implementation.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb0bcf elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0bb0bcf\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"112\" height=\"133\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-03.png\" class=\"attachment-full size-full wp-image-3139\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-03.png 112w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-03-10x12.png 10w\" sizes=\"(max-width: 112px) 100vw, 112px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">3. Integration<\/h3><p class=\"elementor-image-box-description\">Make sure that key applications are compatible with YubiKey.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-faaa265 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"faaa265\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"80\" height=\"149\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-04.png\" class=\"attachment-full size-full wp-image-3138\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-04.png 80w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-04-6x12.png 6w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">4. Launch<\/h3><p class=\"elementor-image-box-description\">Distribute keys with turnkey services or channel partners.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acc437b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"acc437b\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"166\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-05.png\" class=\"attachment-full size-full wp-image-3137\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-05.png 100w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-05-7x12.png 7w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">5. Adoption<\/h3><p class=\"elementor-image-box-description\">Encourage use with training and best practices.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8a3753 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c8a3753\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"143\" height=\"144\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-06.png\" class=\"attachment-full size-full wp-image-3136\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-06.png 143w, https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/DCT-1026-icon-06-12x12.png 12w\" sizes=\"(max-width: 143px) 100vw, 143px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">6. Evaluation<\/h3><p class=\"elementor-image-box-description\">It measures the impact on security and business value.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e4a63d e-flex e-con-boxed e-con e-parent\" data-id=\"9e4a63d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e3a5b14 e-con-full e-flex e-con e-child\" data-id=\"e3a5b14\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16df70d elementor-widget elementor-widget-heading\" data-id=\"16df70d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UKOTEK - official YUBICO partner in Spain<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b890969 elementor-widget elementor-widget-text-editor\" data-id=\"b890969\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With more than 20 years in the cybersecurity sector, the Ukotek team assists organisations in implementing advanced solutions to protect their digital assets and ensure their operational continuity.<\/p><p>We specialise in delivering innovative technologies that protect businesses from ever-evolving cyber threats. Our team of experts provides personalised advice and technical support to ensure each customer receives optimal protection.<\/p><p>We offer scalable solutions adapted to the needs of each organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7645c3b e-con-full e-flex e-con e-child\" data-id=\"7645c3b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f6425 elementor-widget elementor-widget-heading\" data-id=\"e3f6425\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I would like to receive more information about YUBICO<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2599036 elementor-widget elementor-widget-html\" data-id=\"2599036\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script> <script> hbspt.forms.create({ portalId: \"144892228\", formId: \"bfdc8528-4f7e-4dc2-bdbb-37ae10e30056\" }); <\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Seguridad moderna resistente al phishing Evita la Suplantaci\u00f3n de Identidad con la Yubikey\u200b \u00bfSab\u00edas que los m\u00e9todos b\u00e1sicos de MFA son vulnerables al phishing? \u00bfTu MFA actual detiene ataques de phishing sofisticados? \u00bfC\u00f3mo garantizas acceso remoto seguro sin depender de dispositivos m\u00f3viles? Yubico redefine la autenticaci\u00f3n, ofreciendo soluciones resistentes al phishing basadas en hardware (Yubikey) [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-3124","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seguridad moderna resistente al phishing - Ukotek<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/en\/soluciones\/seguridad-moderna-resistente-al-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad moderna resistente al phishing - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Seguridad moderna resistente al phishing Evita la Suplantaci\u00f3n de Identidad con la Yubikey\u200b \u00bfSab\u00edas que los m\u00e9todos b\u00e1sicos de MFA son vulnerables al phishing? \u00bfTu MFA actual detiene ataques de phishing sofisticados? \u00bfC\u00f3mo garantizas acceso remoto seguro sin depender de dispositivos m\u00f3viles? Yubico redefine la autenticaci\u00f3n, ofreciendo soluciones resistentes al phishing basadas en hardware (Yubikey) [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/en\/soluciones\/seguridad-moderna-resistente-al-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T16:48:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"139\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/\",\"url\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/\",\"name\":\"Seguridad moderna resistente al phishing - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\",\"datePublished\":\"2025-03-13T14:52:57+00:00\",\"dateModified\":\"2025-03-13T16:48:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/ukotek.com\/soluciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seguridad moderna resistente al phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad moderna resistente al phishing - Ukotek","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/en\/soluciones\/seguridad-moderna-resistente-al-phishing\/","og_locale":"en_GB","og_type":"article","og_title":"Seguridad moderna resistente al phishing - Ukotek","og_description":"Seguridad moderna resistente al phishing Evita la Suplantaci\u00f3n de Identidad con la Yubikey\u200b \u00bfSab\u00edas que los m\u00e9todos b\u00e1sicos de MFA son vulnerables al phishing? \u00bfTu MFA actual detiene ataques de phishing sofisticados? \u00bfC\u00f3mo garantizas acceso remoto seguro sin depender de dispositivos m\u00f3viles? Yubico redefine la autenticaci\u00f3n, ofreciendo soluciones resistentes al phishing basadas en hardware (Yubikey) [&hellip;]","og_url":"https:\/\/ukotek.com\/en\/soluciones\/seguridad-moderna-resistente-al-phishing\/","og_site_name":"Ukotek","article_modified_time":"2025-03-13T16:48:48+00:00","og_image":[{"width":521,"height":139,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/","url":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/","name":"Seguridad moderna resistente al phishing - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png","datePublished":"2025-03-13T14:52:57+00:00","dateModified":"2025-03-13T16:48:48+00:00","breadcrumb":{"@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2025\/03\/Yubico-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/soluciones\/seguridad-moderna-resistente-al-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/ukotek.com\/soluciones\/"},{"@type":"ListItem","position":3,"name":"Seguridad moderna resistente al phishing"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/3124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/comments?post=3124"}],"version-history":[{"count":16,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/3124\/revisions"}],"predecessor-version":[{"id":3167,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/3124\/revisions\/3167"}],"up":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/pages\/46"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/media?parent=3124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}