{"id":19421,"date":"2020-10-14T10:41:30","date_gmt":"2020-10-14T08:41:30","guid":{"rendered":"https:\/\/maroon-cobra-681026.hostingersite.com\/en\/?p=19421"},"modified":"2023-11-09T10:08:27","modified_gmt":"2023-11-09T09:08:27","slug":"security-telephony-ip","status":"publish","type":null,"link":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/","title":{"rendered":"Is IP telephony safe?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It is normal, when choosing a technology, equipment or telephony for our company, that we ask ourselves a series of questions and that we don&#8217;t want to make any mistakes. And the security of IP telephony is a very important question that we are going to analyse today; is it really safe?\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">IP telephony or traditional telephony?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">IP telephony works through the Internet and that is why many people are suspicious of its security compared to traditional telephony. But traditional calls are no more difficult to locate or listen to than calls over networks and interconnections. In fact,<strong> it is more difficult to spy on a VoIP call because the data is encrypted.\u00a0\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">This distrust results from the little information we have access to about the internet and how this type of telephony really works. If voice travels over the internet, then it must travel over a public network. This is the first myth that people fall into. There are free systems that can allow voice to travel over a public network, but if your company chooses IP telephony<strong>, a private network will be used for the calls made.<\/strong> A private network is not totally inaccessible, but it is much more secure, as to locate and listen to calls you would need to get administrator access to the network equipment. Having a Virtual Private Network (VPN) means a fairly high level of isolation and security against any external attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For this reason, an important factor when implementing IP telephony in a company is <strong>the training of personnel on security risks<\/strong>. Informing and educating employees to avoid the misuse of this technology can prevent future external attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The security of <a href=\"https:\/\/fonvirtual.com\/en\/\">IP telephony<\/a> presents more benefits compared to traditional telephony, even if there are risks when using it.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">The risks of IP telephony<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">We will look at some examples of what could be risks when using this technology, and thus analyse the security of IP telephony in greater depth:\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>A common network<\/b><span style=\"font-weight: 400;\"> : in the case of IP telephony there is only one common network through which both data and voice travel. This allows<strong> more flexibility,<\/strong> but is also dangerous when integrating voice data if no security measures are taken. This is why there are protocols (such as SIP) for initiating, modifying and terminating sessions to maintain control and you can install additional security measures or systems too.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Global attacks <\/b><span style=\"font-weight: 400;\">: when attacking the network, if the company does not have <strong>a good security system<\/strong>, it can end up attacking other levels of the company as well, accessing customer or supplier information. Although this has an easy solution if a specific security system is used for voice data.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Identity theft <\/b><span style=\"font-weight: 400;\">: the legitimate registration of the user is disabled; this is possible as the signalling messages are sent in a plain text and therefore the intruder can locate, modify and send them as he wishes. Furthermore, although authentication is required, the intruder can hack into the account and obtain the user&#8217;s password. Although fortunately this is a risk that <strong>can be prevented relatively easily;<\/strong> we must have a strong password, keep our computer free of malware, even activate the account in two or more steps, etc.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">The security of IP telephony<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Although it can be attacked from outside, the security of IP telephony can be ensured. There are a number of security controls that must be in place and also measures that can reduce most risks and external attacks.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Keep systems updated: <\/b><span style=\"font-weight: 400;\">there must be a control of the systems, and the network administrator must be aware of new updates and their applications on these systems.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Have a secure network infrastructure:<\/b><span style=\"font-weight: 400;\"> It is recommended these anti-virus programs on the network so they can protect it against possible external attacks. Many attacks can be detected thanks to the installation of detection and prevention systems such as IDS (Intrusion Detection System) and IPS (Intrusion Prevention System). These systems examine and analyse packages in search of suspicious data.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Authentication, authorisation and encryption:<\/b><span style=\"font-weight: 400;\"> as mentioned above, it is advisable to configure the devices so that they use more than one step when activating the account. And the devices could also have a limitation of the IP addresses from which they can receive traffic. Correct configuration can greatly reduce external attacks. Encryption can solve most problems of manipulation and playback of messages being exchanged.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>The Secure Real-time Transport Protocol (or SRTP)<\/strong> : a profile that provides authentication and protection when sending data. Using this type of profile as additional security is highly recommended and you can enable or disable the protocols it presents, so you can customize the encryption and profile settings to suit your needs.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The security of IP telephony is an important issue that can generate many doubts, but to which you should give a lot of importance. IP telephony is not infallible but with the right training and up-to-date systems it should not be a cause for concern to anyone.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19423 aligncenter\" src=\"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/webrtc-security.jpg\" alt=\"webrtc-security\" width=\"400\" height=\"266\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">IP telephony and WebRTC<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Web Real Time Communication (WebRTC) is an open standard that provides VoIP features to websites.\u00a0 When a company decides on IP telephony, and has communication systems such as the virtual PBX or call center, if it chooses WebRTC it can use browsers such as Chrome to communicate (calls, messaging, video conferences&#8230;<strong>) without the need for plugins or external devices.\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">In other words, WebRTC is an easy way to get a VoIP communication system through the web. So, what can we expect from the security of IP telephony in this case?<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">What kind of security does WebRTC offer?<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In the case of <a href=\"https:\/\/fonvirtual.com\/en\/blog\/advantages-of-webrtc-technology-over-sip\/\">WebRTC<\/a>, data transmission is carried out via the SRTP (Secure Real-Time Transport Protocol)<strong> so communication is direct<\/strong>, browser to browser and does not require a streaming server. In addition, the same browsers include security patches that are usually updated periodically.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The fact that this technology does not use hardware components or software applications means<strong> one less risk to worry about. <\/strong>Every new external application or hardware is a door that opens for hackers. Without these external systems, web technology is more secure than any other communication system that does need them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secure encryption is also guaranteed with WebRTC through DTLS (Datagram Transport Layer Security) protocols that<strong> provide privacy.\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, the security of IP telephony is unquestionably improved when applied with a technology such as WebRTC that provides flexibility, quality and speed.\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is normal, when choosing a technology, equipment or telephony for our company, that we ask ourselves a series of questions and that we don&#8217;t want to make any mistakes. And the security of IP telephony is a very important question that we are going to analyse today; is it really safe?\u00a0 &nbsp; IP telephony [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":19422,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[33],"tags":[],"class_list":["post-19421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_wp_attached_file":null,"_wp_attachment_metadata":null,"_wp_attachment_image_alt":null,"_wp_page_template":null,"_wpgce_event_tracking_active":null,"_wpgce_event_tracking_code":null,"_wpgce_event_tracking_jquery_code":null,"_wpe_gce_active":null,"_wpe_gce_code":null,"_experiments_wp_code":null,"_wpgce_event_tracking_css_id":null,"_wpgce_event_tracking_css_class":null,"_yoast_wpseo_opengraph-title":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_google-plus-title":null,"_yoast_wpseo_google-plus-description":null,"_yoast_wpseo_google-plus-image":null,"_wpgce_event_tracking_label":null,"_wpgce_event_tracking_action":null,"_wpgce_event_tracking_category":null,"_experiments_wp_active":null,"_oembed_416f6f269dd139bf4a841b01047e0919":null,"hreflang-es_es":null,"hreflang-en_gb":null,"_et_pb_predefined_layout":null,"_et_pb_layout_applicability":null,"notification_id":null,"dismissable":null,"location":null,"version":null,"viewed":null,"expiration":null,"plans":null,"_yoast_wpseo_meta-robots-noindex":null,"_yoast_wpseo_meta-robots-nofollow":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_et_post_bg_color":"#ffffff","_et_post_bg_layout":"light","_et_pb_show_title":"on","_yoast_wpseo_primary_category":"33","_yoast_wpseo_opengraph-image-id":null,"_wp_attachment_backup_sizes":null,"_xmlsf_exclude":null,"_yoast_wpseo_canonical":null,"_et_pb_module_type":null,"_schema_categories":null,"_schema_type":null,"_schema_article_type":null,"_schema_post_types":null,"_schema_post_meta_box_enabled":null,"_schema_post_meta_box_title":null,"_schema_post_meta_box":null,"_schema_video_object_type":null,"_schema_audio_object_type":null,"_et_autogenerated_title":null,"_et_default":null,"_et_enabled":null,"_et_header_layout_id":null,"_et_header_layout_enabled":null,"_et_body_layout_id":null,"_et_body_layout_enabled":null,"_et_footer_layout_id":null,"_et_footer_layout_enabled":null,"_imagify_optimization_level":null,"_imagify_status":null,"_imagify_data":null,"_rocket_exclude_lazyload":null,"_rocket_exclude_lazyload_iframes":null,"_rocket_exclude_minify_css":null,"_rocket_exclude_minify_js":null,"_rocket_exclude_cdn":null,"_rocket_exclude_defer_all_js":null,"_rocket_exclude_delay_js":null,"_sc_disable_sc":null,"_sc_disable_admin":null,"_sc_editor":null,"_sc_allowed_devices":null,"yarpp_meta":{"yarpp_display_for_this_post":1},"_rocket_exclude_remove_unused_css":null,"_oembed_79f80bd7168b3189efa370edf193fbe6":null,"_et_pb_row_layout":null,"_et_use_on":null,"_et_pb_light_text_color":null,"_et_template":null,"_oembed_3106f03df1b49016f7fdca1c3ec6ce18":null,"_oembed_7477bcd2452b8f09f89fc3ecfc2f7346":null,"_megamenu":null,"perfmatters_exclude_minify_js":null,"perfmatters_exclude_lazy_loading":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"hreflang-fr":null,"hreflang-es_ar":null,"hreflang-fr_be":null,"hreflang-es_mx":null,"hreflang-en":null,"hreflang-fr_fr":null,"_wp_trash_meta_status":null,"_wp_trash_meta_time":null,"_edit_last":"24","_et_pb_page_layout":"et_right_sidebar","_et_pb_use_builder":"","_et_pb_old_content":"","_yoast_wpseo_focuskw":"IP telephony security","_yoast_wpseo_title":"Everything you need to know about IP telephony security","_yoast_wpseo_metadesc":"Let's talk about the security of IP telephony; a very important issue when choosing a communications platform.","_yoast_wpseo_linkdex":"74","_edit_lock":"1699520775:24","_yoast_wpseo_focuskw_text_input":null,"_et_pb_built_for_post_type":null,"_et_pb_post_hide_nav":"default","_et_pb_side_nav":"off","_et_pb_enable_shortcode_tracking":null,"_et_pb_custom_css":null,"_et_builder_version":null,"_yoast_wpseo_content_score":"30","_et_pb_ab_stats_refresh_interval":null,"_thumbnail_id":"19422","_wp_old_date":"2020-10-15","_et_pb_show_page_creation":null,"_et_pb_ab_subjects":null,"_et_pb_ab_current_shortcode":null,"_wp_old_slug":null,"_schema_ref":"12660","_et_pb_first_image":"","_et_pb_truncate_post":"","_et_pb_truncate_post_date":"","_et_pb_gutter_width":null,"search_volume":null,"_yoast_wpseo_estimated-reading-time-minutes":"5","_schema_json":{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/"},"url":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/","headline":"Everything you need to know about IP telephony security","datePublished":"2020-10-14T10:41:30+02:00","dateModified":"2023-11-09T10:08:27+01:00","publisher":{"@type":"Organization","@id":"https:\/\/fonvirtual.com\/en\/#organization","name":"Fonvirtual","logo":{"@type":"ImageObject","url":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2019\/03\/fonvirtual-logo-blanco-sin-fondo_optim-min.png","width":600,"height":60}},"image":{"@type":"ImageObject","url":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg","width":696,"height":274},"articleSection":"Technology","description":"Let's talk about the security of IP telephony; a very important issue when choosing a communications platform.","author":{"@type":"Person","name":"Adminfon","url":"https:\/\/fonvirtual.com\/en\/blog\/author\/adminfon\/","image":{"@type":"ImageObject","url":"https:\/\/secure.gravatar.com\/avatar\/38780a4da6014197432b18a9d77d845a0856244fb797588c6fe8cfc8c50024ba?s=96&d=mm&r=g","height":96,"width":96}},"commentCount":0},"_schema_json_timestamp":"1776819830","_global_colors_info":null,"_et_builder_dynamic_assets_loading_attr_threshold":"4","_yoast_wpseo_wordproof_timestamp":"","_wp_desired_post_slug":null,"_et_theme_builder_marked_as_unused":null,"_monsterinsights_sitenote_active":null,"_xmlsf_image_attached":{"loc":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/webrtc-security.jpg","title":"webrtc-security","caption":""},"_et_dynamic_cached_shortcodes":["et_pb_column_inner","et_pb_social_media_follow_network","et_pb_post_content","et_pb_section","et_pb_column","et_pb_row_inner","et_pb_blog","et_pb_blurb","et_pb_comments","et_pb_image","et_pb_post_title","et_pb_social_media_follow","et_pb_text"],"_et_dynamic_cached_attributes":{"specialty":["on"],"social_network":["linkedin"],"font_icon":["&#xf879;||fa||900"],"background_enable_color":"off"},"_et_builder_module_features_cache":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Everything you need to know about IP telephony security<\/title>\n<meta name=\"description\" content=\"Let&#039;s talk about the security of IP telephony; a very important issue when choosing a communications platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything you need to know about IP telephony security\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s talk about the security of IP telephony; a very important issue when choosing a communications platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/\" \/>\n<meta property=\"og:site_name\" content=\"Fonvirtual\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-14T08:41:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-09T09:08:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"274\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adminfon\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adminfon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everything you need to know about IP telephony security","description":"Let's talk about the security of IP telephony; a very important issue when choosing a communications platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/","og_locale":"es_ES","og_type":"article","og_title":"Everything you need to know about IP telephony security","og_description":"Let's talk about the security of IP telephony; a very important issue when choosing a communications platform.","og_url":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/","og_site_name":"Fonvirtual","article_published_time":"2020-10-14T08:41:30+00:00","article_modified_time":"2023-11-09T09:08:27+00:00","og_image":[{"width":400,"height":274,"url":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg","type":"image\/jpeg"}],"author":"Adminfon","twitter_misc":{"Escrito por":"Adminfon","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#article","isPartOf":{"@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/"},"author":{"name":"Adminfon","@id":"https:\/\/fonvirtual.com\/en\/#\/schema\/person\/e229ec32cb4b8dce008c9c7dfcfdae92"},"headline":"Is IP telephony safe?","datePublished":"2020-10-14T08:41:30+00:00","dateModified":"2023-11-09T09:08:27+00:00","mainEntityOfPage":{"@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/"},"wordCount":1084,"publisher":{"@id":"https:\/\/fonvirtual.com\/en\/#organization"},"image":{"@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#primaryimage"},"thumbnailUrl":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg","articleSection":["Technology"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/","url":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/","name":"Everything you need to know about IP telephony security","isPartOf":{"@id":"https:\/\/fonvirtual.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#primaryimage"},"image":{"@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#primaryimage"},"thumbnailUrl":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg","datePublished":"2020-10-14T08:41:30+00:00","dateModified":"2023-11-09T09:08:27+00:00","description":"Let's talk about the security of IP telephony; a very important issue when choosing a communications platform.","breadcrumb":{"@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#primaryimage","url":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg","contentUrl":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2020\/10\/ip-telephony-security.jpg","width":400,"height":274,"caption":"ip-telephony-security"},{"@type":"BreadcrumbList","@id":"https:\/\/fonvirtual.com\/en\/blog\/security-telephony-ip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/fonvirtual.com\/en\/"},{"@type":"ListItem","position":2,"name":"Is IP telephony safe?"}]},{"@type":"WebSite","@id":"https:\/\/fonvirtual.com\/en\/#website","url":"https:\/\/fonvirtual.com\/en\/","name":"Fonvirtual","description":"Your best virtual phone number and virtual PBX option","publisher":{"@id":"https:\/\/fonvirtual.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fonvirtual.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/fonvirtual.com\/en\/#organization","name":"Fonvirtual.com","url":"https:\/\/fonvirtual.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/fonvirtual.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2019\/06\/Logo-2.png","contentUrl":"https:\/\/fonvirtual.com\/en\/wp-content\/uploads\/2019\/06\/Logo-2.png","width":300,"height":300,"caption":"Fonvirtual.com"},"image":{"@id":"https:\/\/fonvirtual.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/fonvirtual.com\/en\/#\/schema\/person\/e229ec32cb4b8dce008c9c7dfcfdae92","name":"Adminfon","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/38780a4da6014197432b18a9d77d845a0856244fb797588c6fe8cfc8c50024ba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/38780a4da6014197432b18a9d77d845a0856244fb797588c6fe8cfc8c50024ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/38780a4da6014197432b18a9d77d845a0856244fb797588c6fe8cfc8c50024ba?s=96&d=mm&r=g","caption":"Adminfon"},"url":"https:\/\/fonvirtual.com\/en\/blog\/author\/adminfon\/"}]}},"_links":{"self":[{"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/posts\/19421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/comments?post=19421"}],"version-history":[{"count":0,"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/posts\/19421\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/media\/19422"}],"wp:attachment":[{"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/media?parent=19421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/categories?post=19421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fonvirtual.com\/en\/wp-json\/wp\/v2\/tags?post=19421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}