{"id":210040,"date":"2024-09-05T11:00:43","date_gmt":"2024-09-05T16:00:43","guid":{"rendered":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/?p=210040"},"modified":"2024-09-05T11:05:47","modified_gmt":"2024-09-05T16:05:47","slug":"uso-seguro-de-la-plataforma-zoom-pro-en-la-ucm","status":"publish","type":"post","link":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/uso-seguro-de-la-plataforma-zoom-pro-en-la-ucm\/","title":{"rendered":"Uso seguro de la plataforma Zoom Pro en la UCM"},"content":{"rendered":"\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"1753\" src=\"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/09\/Recomendaciones-zoom-01.png\" alt=\"\" class=\"wp-image-210041\" srcset=\"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/09\/Recomendaciones-zoom-01.png 800w, https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/09\/Recomendaciones-zoom-01-480x1052.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"boton_generico wp-block-button__link wp-element-button\" href=\"https:\/\/ucmconecta.edu.co\/estrategias\/wp-content\/uploads\/2020\/03\/Guia%20para%20sesiones%20seguras%20en%20Zoom.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Gu\u00eda r\u00e1pida para la realizaci\u00f3n segura de sesiones en Zoom<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"boton_generico wp-block-button__link wp-element-button\" href=\"https:\/\/ucmconecta.edu.co\/estrategias\/wp-content\/uploads\/2020\/03\/recomendaciones.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Recomendaciones para el desarrollo de sesiones seguras en Zoom<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"222\" src=\"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/09\/Recomendaciones-zoom-05.png\" alt=\"\" class=\"wp-image-210044\" srcset=\"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/09\/Recomendaciones-zoom-05.png 800w, https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/09\/Recomendaciones-zoom-05-480x133.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":210042,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-210040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria"],"_links":{"self":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts\/210040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/comments?post=210040"}],"version-history":[{"count":3,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts\/210040\/revisions"}],"predecessor-version":[{"id":210048,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts\/210040\/revisions\/210048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/media\/210042"}],"wp:attachment":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/media?parent=210040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/categories?post=210040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/tags?post=210040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}