{"id":45269,"date":"2024-11-26T14:37:01","date_gmt":"2024-11-26T19:37:01","guid":{"rendered":"https:\/\/www.openintl.com\/ambienteTrabajo2\/robust-security-strategies-key-to-operational-resilience\/"},"modified":"2024-11-26T14:37:01","modified_gmt":"2024-11-26T19:37:01","slug":"robust-security-strategies-key-to-operational-resilience","status":"publish","type":"post","link":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/","title":{"rendered":"Robust Security Strategies: Key to Operational Resilience"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"45269\" class=\"elementor elementor-45269 elementor-38692\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-22af30b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"83242\" data-id=\"22af30b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6aa30c9\" data-eae-slider=\"7498\" data-id=\"6aa30c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-303672f elementor-widget elementor-widget-heading\" data-id=\"303672f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The recognition of security as a critical factor for business resilience against cyber threats has driven technology companies like Open Intelligence\u2014a leading provider of advanced technological solutions and creator of Smartflex\u2014to reaffirm their commitment to cybersecurity and their support for utility companies, ensuring compliance with the highest international standards.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b98e542 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"96863\" data-id=\"b98e542\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3a2900\" data-eae-slider=\"21181\" data-id=\"e3a2900\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7551285 elementor-widget elementor-widget-text-editor\" data-id=\"7551285\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today&#8217;s digital landscape, cybersecurity is no longer optional; it is a strategic necessity for utility companies managing critical infrastructures such as energy, water, and telecommunications supply. Cyberattacks on this sector are escalating dramatically. According to a Check Point Research report, U.S. utilities experienced a 70% increase in cyberattacks in 2024 compared to the same period in 2023, underscoring the growing threat to these critical infrastructures.<\/p><p>This trend is further exacerbated as many of these companies rely on outdated systems, making them easy targets for attackers, as noted by cybersecurity expert Douglas McKee of SonicWall. For this reason, it is vital for utilities to work with technology providers that deliver robust cybersecurity strategies capable of anticipating threats and safeguarding their operations in an increasingly hostile environment.<\/p><p>Jairo S\u00e1nchez, Director of Support &amp; Cloud Services at Open, emphasized:<\/p><blockquote><p>\u201cAt Open, we understand that security is not just an additional feature; it&#8217;s an integral commitment to our clients and the entire digital ecosystem. Transparency is fundamental to our relationships, so we are always willing to provide clear information about our security measures and auditing processes. Our constant effort is to stay at the forefront of data protection, not only by securing our infrastructure but also by offering strategic recommendations to ensure the safe and efficient management of our clients&#8217; critical operations.\u201d<\/p><\/blockquote><p>One of the company&#8217;s key security achievements this year was obtaining certification for compliance with the SSAE 18 SOC 2 standard (Statement on Standards for Attestation Engagements No. 18, Service Organization Control 2). This internationally recognized standard ensures that our controls for security, availability, processing integrity, confidentiality, and privacy meet the strictest market requirements.<\/p><p>Compliance with SSAE 18 SOC 2 signifies that Open has adopted continuous monitoring and auditing practices for its security processes, enabling real-time detection and response to potential vulnerabilities.<\/p><p>Drawing on extensive experience working with critical infrastructures and the rising frequency of cyberattacks, Jairo S\u00e1nchez recommends that utility companies adopt cloud infrastructures, such as the SaaS (Software as a Service) model, as a cornerstone of their security strategy:<\/p><blockquote><p>&#8220;Choosing cloud-based solutions not only enhances operational resilience by centralizing security measures but also reduces management complexity, allowing teams to focus on more strategic tasks,&#8221; explained S\u00e1nchez.<\/p><\/blockquote><p>Cloud systems like SaaS enable applications and tools to be hosted on remote servers and accessed via the internet. This eliminates the need for local infrastructure, reducing maintenance costs and improving operational efficiency. Moreover, cloud solutions facilitate centralized data management and offer significant benefits in protection and resilience against cyberattacks through features such as automatic updates, greater scalability, and advanced real-time monitoring and security capabilities. Companies can enjoy benefits such as:<\/p><ul><li><strong>Automatic Updates:<\/strong> Cloud providers manage updates and security patches centrally, ensuring systems are protected against the latest threats without manual intervention.<\/li><li><strong>Flexible Scalability:<\/strong> The cloud allows for adjusting security resources as business needs evolve, ensuring the appropriate level of protection without compromising efficiency.<\/li><li><strong>Backup and Disaster Recovery:<\/strong> By securely distributing data across multiple geographic locations, cloud providers ensure rapid recovery of operations with minimal data loss in the event of an attack or incident.<\/li><li><strong>Continuous Monitoring:<\/strong> Cloud infrastructures include advanced tools for real-time threat detection, enabling potential risks to be identified and addressed before they escalate.<\/li><\/ul><p>Organizations implementing these strategies not only better protect their data and systems but also significantly reduce costs associated with security breaches. According to Gartner, companies implementing advanced security approaches like the Zero Trust strategy have reduced the risk of breaches by 50%. Similarly, a study on Cybersecurity Statistics and Trends found that well-designed incident response plans can reduce breach-related costs by 61%, representing savings of $2.66 million.<\/p><p>In conclusion, partnering with technology providers that offer robust cybersecurity strategies is essential for any company, particularly those managing critical infrastructures like utilities. Beyond anticipating threats and responding effectively during crises, these providers should integrate cloud infrastructure technologies as a core component of their approach. Cloud-based solutions like SaaS enhance operational resilience, centralize security management, and enable agile responses to cyberattacks. These systems provide scalability, reduce operational costs, and deliver real-time protection, ensuring business continuity and data security in an increasingly sophisticated threat landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"has_eae_slider elementor-element elementor-element-e77188f e-flex e-con-boxed e-con e-parent\" data-eae-slider=\"21641\" data-id=\"e77188f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c543757 elementor-widget elementor-widget-heading\" data-id=\"c543757\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Discover how our solution can transform your operations.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f84ce9 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6f84ce9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/platform\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">MEET SMARTFLEX NOW<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover how robust cybersecurity strategies and cloud solutions like SaaS enhance operational resilience for utilities. Learn how Open Intelligence ensures data protection, compliance, and real-time threat detection to secure critical infrastructures.<\/p>\n","protected":false},"author":9,"featured_media":45270,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9465],"tags":[9472,9478],"class_list":["post-45269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-articles-en-emea","tag-emea-en-emea","tag-inteligencia-artificial-en-emea","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Robust Security Strategies: Key to Operational Resilience | Open Intelligence<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Robust Security Strategies: Key to Operational Resilience\" \/>\n<meta property=\"og:description\" content=\"Discover how robust cybersecurity strategies and cloud solutions like SaaS enhance operational resilience for utilities. Learn how Open Intelligence ensures data protection, compliance, and real-time threat detection to secure critical infrastructures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Open Intelligence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OpenSmartflex\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-26T19:37:01+00:00\" \/>\n<meta name=\"author\" content=\"Oscar Garcia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@opensmartflex\" \/>\n<meta name=\"twitter:site\" content=\"@opensmartflex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oscar Garcia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/\"},\"author\":{\"name\":\"Oscar Garcia\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/43d525f6634d15ab4484ee51612ef69a\"},\"headline\":\"Robust Security Strategies: Key to Operational Resilience\",\"datePublished\":\"2024-11-26T19:37:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg\",\"keywords\":[\"EMEA\",\"inteligencia artificial\"],\"articleSection\":[\"Industry articles\"],\"inLanguage\":\"en-EMEA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/\",\"name\":\"Robust Security Strategies: Key to Operational Resilience | Open Intelligence\",\"isPartOf\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg\",\"datePublished\":\"2024-11-26T19:37:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#breadcrumb\"},\"inLanguage\":\"en-EMEA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-EMEA\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg\",\"contentUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg\",\"width\":1088,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Robust Security Strategies: Key to Operational Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/\",\"name\":\"Open Intelligence\",\"description\":\"Software for utility companies\",\"publisher\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization\"},\"alternateName\":\"Open\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-EMEA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization\",\"name\":\"Open Intelligence\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-EMEA\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png\",\"contentUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png\",\"width\":974,\"height\":378,\"caption\":\"Open Intelligence\"},\"image\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/OpenSmartflex\/\",\"https:\/\/x.com\/opensmartflex\",\"https:\/\/www.linkedin.com\/company\/weareopenintelligence\",\"https:\/\/www.youtube.com\/channel\/UCHpHSdiqVTs0OvdEYJxCqiQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/43d525f6634d15ab4484ee51612ef69a\",\"name\":\"Oscar Garcia\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Robust Security Strategies: Key to Operational Resilience | Open Intelligence","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Robust Security Strategies: Key to Operational Resilience","og_description":"Discover how robust cybersecurity strategies and cloud solutions like SaaS enhance operational resilience for utilities. Learn how Open Intelligence ensures data protection, compliance, and real-time threat detection to secure critical infrastructures.","og_url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/","og_site_name":"Open Intelligence","article_publisher":"https:\/\/www.facebook.com\/OpenSmartflex\/","article_published_time":"2024-11-26T19:37:01+00:00","author":"Oscar Garcia","twitter_card":"summary_large_image","twitter_creator":"@opensmartflex","twitter_site":"@opensmartflex","twitter_misc":{"Written by":"Oscar Garcia","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#article","isPartOf":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/"},"author":{"name":"Oscar Garcia","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/43d525f6634d15ab4484ee51612ef69a"},"headline":"Robust Security Strategies: Key to Operational Resilience","datePublished":"2024-11-26T19:37:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/"},"wordCount":749,"publisher":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization"},"image":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg","keywords":["EMEA","inteligencia artificial"],"articleSection":["Industry articles"],"inLanguage":"en-EMEA"},{"@type":"WebPage","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/","name":"Robust Security Strategies: Key to Operational Resilience | Open Intelligence","isPartOf":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg","datePublished":"2024-11-26T19:37:01+00:00","breadcrumb":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#breadcrumb"},"inLanguage":"en-EMEA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-EMEA","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#primaryimage","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg","contentUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2024\/11\/estrategias-de-seguridad-solidas.jpg","width":1088,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/robust-security-strategies-key-to-operational-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.openintl.com\/ambienteTrabajo2\/"},{"@type":"ListItem","position":2,"name":"Robust Security Strategies: Key to Operational Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/","name":"Open Intelligence","description":"Software for utility companies","publisher":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization"},"alternateName":"Open","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.openintl.com\/ambienteTrabajo2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-EMEA"},{"@type":"Organization","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization","name":"Open Intelligence","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/","logo":{"@type":"ImageObject","inLanguage":"en-EMEA","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png","contentUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png","width":974,"height":378,"caption":"Open Intelligence"},"image":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OpenSmartflex\/","https:\/\/x.com\/opensmartflex","https:\/\/www.linkedin.com\/company\/weareopenintelligence","https:\/\/www.youtube.com\/channel\/UCHpHSdiqVTs0OvdEYJxCqiQ"]},{"@type":"Person","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/43d525f6634d15ab4484ee51612ef69a","name":"Oscar Garcia"}]}},"_links":{"self":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/posts\/45269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/comments?post=45269"}],"version-history":[{"count":0,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/posts\/45269\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/media\/45270"}],"wp:attachment":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/media?parent=45269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/categories?post=45269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/en-emea\/wp-json\/wp\/v2\/tags?post=45269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}