{"id":3118,"date":"2026-05-08T06:29:28","date_gmt":"2026-05-08T09:29:28","guid":{"rendered":"https:\/\/ciberseguridad.uncoma.edu.ar\/?p=3118"},"modified":"2026-05-08T06:30:53","modified_gmt":"2026-05-08T09:30:53","slug":"charla-taller-como-gestionar-tus-contrasenas-y-no-fracasar-en-el-intento","status":"publish","type":"post","link":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/charla-taller-como-gestionar-tus-contrasenas-y-no-fracasar-en-el-intento\/","title":{"rendered":"Charla\/Taller &#8220;C\u00f3mo gestionar tus contrase\u00f1as y no fracasar en el intento&#8221;"},"content":{"rendered":"<p><iframe title=\"Charla\/Taller &quot;C\u00f3mo gestionar tus contrase\u00f1as y no fracasar en el intento&quot;\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/v1dL904-O5o?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/live\/v1dL904-O5o\">link al video<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Charla\/Taller sobre gestores de contrase\u00f1as<br \/>\n&#8220;C\u00f3mo gestionar tus contrase\u00f1as y no fracasar en el intento&#8221;<br \/>\nComisi\u00f3n de Transformaci\u00f3n Digital del Consejo Interuniversitario Nacional (CIN)<br \/>\nSubcomisi\u00f3n de Ciberseguridad &#8211; 7 de mayo -11 horas<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70,57,22],"tags":[38,21,58,23],"class_list":["post-3118","post","type-post","status-publish","format-standard","hentry","category-contrasenas","category-mfa","category-recomendaciones","tag-cin","tag-contrasenas","tag-mfa","tag-recomendaciones"],"_links":{"self":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/3118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/comments?post=3118"}],"version-history":[{"count":3,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/3118\/revisions"}],"predecessor-version":[{"id":3121,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/3118\/revisions\/3121"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media?parent=3118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/categories?post=3118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/tags?post=3118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}