{"id":12,"date":"2024-10-24T17:21:00","date_gmt":"2024-10-24T17:21:00","guid":{"rendered":"https:\/\/deltacontrols.wpenginepowered.com\/?page_id=12"},"modified":"2025-07-21T10:22:56","modified_gmt":"2025-07-21T17:22:56","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/dev.deltacontrols.com\/es\/programs-services\/cybersecurity\/","title":{"rendered":"Ciberseguridad"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"12\" class=\"elementor elementor-12\" data-elementor-post-type=\"page\">\n\t\t\t\t<section class=\"elementor-element elementor-element-07ac068 e-flex e-con-boxed e-con e-parent\" data-id=\"07ac068\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-c179522 e-flex e-con-boxed e-con e-parent\" data-id=\"c179522\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2537ae6 e-con-full e-flex e-con e-child\" data-id=\"2537ae6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9480aae elementor-widget elementor-widget-heading\" data-id=\"9480aae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Programa de ciberseguridad de Delta Controls<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ab5ac4 e-con-full e-flex e-con e-child\" data-id=\"5ab5ac4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ef71dd elementor-widget elementor-widget-text-editor\" data-id=\"5ef71dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En Delta Controls siempre hemos centrado nuestros esfuerzos en brindar soluciones innovadoras, eficaces y f\u00e1ciles de implementar. Y nuestro programa de ciberseguridad hace eso mismo.<\/p><p>Los sistemas actuales de controles de edificios est\u00e1n mucho m\u00e1s conectados y sin duda lo estar\u00e1n a\u00fan m\u00e1s en el futuro a medida que se conecten a Internet m\u00e1s dispositivos. Esto acarrea un mayor riesgo de quedar expuesto a vulnerabilidades y amenazas.<\/p><p>Conforme a las normas de la industria como OWASP, ISO y NIST, Delta Controls ha instaurado pol\u00edticas, procedimientos y pruebas para asegurar que ofrecemos productos seguros. Nos esmeramos en asegurar que las redes de los edificios est\u00e9n siempre protegidas mediante las mejores pr\u00e1cticas de integraci\u00f3n de TI, la evaluaci\u00f3n constante de los productos y las actualizaciones oportunas de seguridad.<\/p><p>Nuestros equipos de ciberseguridad de Delta Controls est\u00e1n a su disposici\u00f3n para ayudarle a navegar las vulnerabilidades y desaf\u00edos de seguridad que enfrentamos d\u00eda a d\u00eda. Vea m\u00e1s abajo las formas en que puede mantenerse informado y participar en nuestro programa de ciberseguridad.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-f89debd e-flex e-con-boxed e-con e-parent\" data-id=\"f89debd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a2814e9 e-con-full e-flex e-con e-child\" data-id=\"a2814e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c700873 elementor-widget elementor-widget-heading\" data-id=\"c700873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Misi\u00f3n y visi\u00f3n de ciberseguridad<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5ecab6 e-con-full e-flex e-con e-child\" data-id=\"d5ecab6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a844297 elementor-widget elementor-widget-text-editor\" data-id=\"a844297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Declaraci\u00f3n de misi\u00f3n<\/strong><\/p><p>Para administrar la seguridad de la informaci\u00f3n de nuestros clientes, los detalles de los empleados, propiedad intelectual y otros recursos que respaldan todas las \u00e1reas de Delta Control y mitigan de forma eficiente todos los intentos de ciberataques con p\u00e9rdida de datos nula.<\/p><p><strong>Declaraci\u00f3n de visi\u00f3n<\/strong><\/p><p>Una infraestructura de informaci\u00f3n segura que inspira la innovaci\u00f3n tecnol\u00f3gica y fomenta el crecimiento sin ninguna demora.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1b82e1b e-flex e-con-boxed e-con e-parent\" data-id=\"1b82e1b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f1ee67 elementor-widget elementor-widget-heading\" data-id=\"2f1ee67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Soluciones impulsadas por la tecnolog\u00eda<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<section class=\"elementor-element elementor-element-c1af91d e-flex e-con-boxed e-con e-parent\" data-id=\"c1af91d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fd0aef8 e-con-full e-flex e-con e-child\" data-id=\"fd0aef8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5cb9d9 elementor-widget elementor-widget-heading\" data-id=\"f5cb9d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ciclo de desarrollo de software seguro de Delta Controls <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b9e078 e-con-full e-flex e-con e-child\" data-id=\"5b9e078\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-457fe19 e-con-full e-flex e-con e-child\" data-id=\"457fe19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ef1ad elementor-widget elementor-widget-image\" data-id=\"f4ef1ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"337\" height=\"424\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon.jpg\" class=\"attachment-full size-full wp-image-207\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon.jpg 337w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CyberSecurity-Icon-238x300.jpg 238w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-665e2cc e-con-full e-flex e-con e-child\" data-id=\"665e2cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-455cfcd text-list elementor-widget elementor-widget-text-editor\" data-id=\"455cfcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En Delta Controls, nuestros equipos de desarrollo crean productos en un entorno de desarrollo seguro basado en normas y mejores pr\u00e1cticas de ciberseguridad. Al igual que nuestro programa de calidad, incorporamos la ciberseguridad en nuestros productos en cada una de las etapas de su desarrollo. Desde la concepci\u00f3n al lanzamiento, la seguridad es nuestra prioridad.<\/p><ul><li>Equipo dedicado a la seguridad de desarrollo de productos<\/li><li>Frecuentes revisiones de pares para detectar vulnerabilidades comunes de codificaci\u00f3n<\/li><li>El factor seguridad se incluye en los requisitos de los productos<\/li><li>Pruebas de seguridad de los productos usando las \u00faltimas herramientas y t\u00e9cnicas<\/li><li>Desarrollo de productos sobre el m\u00e1s reciente software seguro de terceros.<\/li><li>Tiempo de entrega acelerado para vulnerabilidades reportadas<\/li><li>Mejores pr\u00e1cticas para las bases y repositorios de c\u00f3digos seguros<\/li><li>Gu\u00edas para la protecci\u00f3n de los productos<\/li><li>Mejores pr\u00e1cticas basadas en OWASP, ISO 27002 e IEC 62443 4-1<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-ba981df e-flex e-con-boxed e-con e-parent\" data-id=\"ba981df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ec0ddd8 e-con-full e-flex e-con e-child\" data-id=\"ec0ddd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67293e6 elementor-widget elementor-widget-heading\" data-id=\"67293e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advertencias de seguridad de Delta Controls<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6b71b3 elementor-widget elementor-widget-text-editor\" data-id=\"a6b71b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La comunicaci\u00f3n y la difusi\u00f3n de la informaci\u00f3n es una parte esencial de nuestro programa de ciberseguridad. Delta Controls ofrece las siguientes advertencias sobre productos para ayudarle a manejar y remediar los riesgos de seguridad de sus sitios.<\/p><p>Delta Controls monitorea y reporta las amenazas de ciberseguridad para que los clientes puedan tomar proactivamente las medidas necesarias para mitigarlas o trabajar con el socio de su \u00e1rea para mantener segura la red de su edificio.<\/p><p>Es fundamental estar atento a estas alertas y tomar las medidas necesarias para asegurar que sus sitios siguen teniendo el mayor nivel de seguridad posible. La ciberseguridad es responsabilidad de todos. Nuestro equipo de ciberseguridad y el socio local de Delta Controls est\u00e1n listos para ayudarle con sus problemas y desaf\u00edos de seguridad.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58d7271 e-con-full e-flex e-con e-child\" data-id=\"58d7271\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bfc941b e-con-full e-flex e-con e-child\" data-id=\"bfc941b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1888bdb elementor-align-justify main-btn elementor-widget elementor-widget-button\" data-id=\"1888bdb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjMyMzA5IiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Habilite comunicaciones de ciberseguridad<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfd1600 e-con-full e-flex e-con e-child\" data-id=\"bfd1600\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-661cdac elementor-widget elementor-widget-image\" data-id=\"661cdac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"72\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo.png\" class=\"attachment-large size-large wp-image-206\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo.png 400w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity_web_logo-300x54.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f46e17d e-con-full e-flex e-con e-child\" data-id=\"f46e17d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2289343 elementor-align-justify main-btn elementor-widget elementor-widget-button\" data-id=\"2289343\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/dev.deltacontrols.com\/es\/vulnerability-reporting-and-handling\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Reportar una vulnerabilidad<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t<section class=\"elementor-element elementor-element-2d46dd1 e-flex e-con-boxed e-con e-parent\" data-id=\"2d46dd1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-151c6b9 e-con-full e-flex e-con e-child\" data-id=\"151c6b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3657aa1 elementor-widget elementor-widget-heading\" data-id=\"3657aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Boletines de seguridad para productos de Delta Controls<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a82f01 e-con-full e-flex e-con e-child\" data-id=\"1a82f01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e6142f elementor-widget elementor-widget-shortcode\" data-id=\"9e6142f\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"responsive-1\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Fecha<\/th><th class=\"column-2\">Number<\/th><th class=\"column-3\">Producto<\/th><th class=\"column-4\">Descripci\u00f3n<\/th><th class=\"column-5\">Adjunto<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">12 de julio de 2025<\/td><td class=\"column-2\">SecB0013<\/td><td class=\"column-3\">enteliWEB (no afectado)<\/td><td class=\"column-4\">CVE-2024-21147 es una vulnerabilidad de gravedad alta (CVSS 7.4), que afecta la m\u00e1quina virtual Java HotSpot en Oracle Java y las distribuciones compatibles, como Amazon Corretto. Esta vulnerabilidad puede permitir a los atacantes remotos comprometer las aplicaciones basadas en Java en determinadas condiciones asociadas a la deserializaci\u00f3n insegura o al manejo de entradas con formato incorrecto.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0013_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">22 de mayo de 2025<\/td><td class=\"column-2\">SecB0012<\/td><td class=\"column-3\">Niagara Framework, Niagara Enterprise Security<\/td><td class=\"column-4\">Actualice su software Niagara para enfrentar las numerosas vulnerabilidades identificadas en Niagara Framework\u00ae<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0012_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">27 de ene. de 2025<\/td><td class=\"column-2\">SecB0011<\/td><td class=\"column-3\">enteliWEB<\/td><td class=\"column-4\">En el ingreso a enteliWEB con Google Chrome, algunos usuarios ven una p\u00e1gina que advierte sobre un \"sitio peligroso\".<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0011_Google-Dangerous-Sites-Security-Bulletin-.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">14 de junio de 2024<\/td><td class=\"column-2\">SecB0010<\/td><td class=\"column-3\">enteliWEB<\/td><td class=\"column-4\">En versiones de PHP anteriores a 3.5 cuando se usa Apache y PHP-CGI en Windows, si el sistema est\u00e1 configurado para usar ciertas p\u00e1ginas de c\u00f3digos, Windows puede usar el comportamiento \"Opci\u00f3n recomendada\" para reemplazar los caracteres en la l\u00ednea de comando proporcionada a las funciones de la API de WinHI. El m\u00f3dulo PHP CGI puede malinterpretar esos caracteres como opciones de PHP, lo que le permitir\u00eda a un usuario malintencionado pasar opciones al binario de PHP que se est\u00e1 ejecutando y, por lo tanto, revelar el c\u00f3digo fuente de scripts, ejecutar im c\u00f3digo PHP arbitrario en el servidor, etc.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0010_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">22 de ene. de 2024<\/td><td class=\"column-2\">SecB0009<\/td><td class=\"column-3\">Niagara Tridium<\/td><td class=\"column-4\">Niagara Framework\u00ae se ha actualizado para arreglar una vulnerabilidad en el componente libwebp que utiliza jxBrowser. <\/td><td class=\"column-5\"><a class=\"download-link\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0009_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">31 de oct. de 2023<\/td><td class=\"column-2\">SecB0008<\/td><td class=\"column-3\">enteliSYNC<\/td><td class=\"column-4\">Se encontr\u00f3 una falla en las versiones de PostgreSQL anteriores a 13.1, anteriores a 12.5, anteriores a 11.10, anteriores a 10.15, anteriores a 9.6.20 y anteriores a 9.5.24.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0008_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">16 de oct. de 2023<\/td><td class=\"column-2\">SecB0007<\/td><td class=\"column-3\">enteliCLOUD<\/td><td class=\"column-4\">Un proveedor de inteligencia de amenazas y soluciones de mitigaci\u00f3n identific\u00f3 por error enteliCLOUD.com como una amenaza de phishing.<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0007_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">16 de noviembre de 2022<\/td><td class=\"column-2\">SecB0006<\/td><td class=\"column-3\">Open SSL Ver. 3.0.0-3.0.6<\/td><td class=\"column-4\">CVE-2022-3786 Y CVE-2022-3602<\/td><td class=\"column-5\"><a class=\"download-link\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0006_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">February 3, 2022<\/td><td class=\"column-2\">SecB005<\/td><td class=\"column-3\">CopperCube<\/td><td class=\"column-4\">CVE-2021-4034 - Vulnerabilidad en el uso de pkexec de Polkit<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0005_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">21 de enero de 2020<\/td><td class=\"column-2\">SecB003<\/td><td class=\"column-3\">enteliWEB versi\u00f3n 4.13<\/td><td class=\"column-4\">Contiene una vulnerabilidad de path traversal de archivos que permite a usuarios enteliWEB autenticados acceder a los archivos del servidor<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0003_Security_Bulletin-enteliWEB-File-path.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">10 de septiembre de 2019<\/td><td class=\"column-2\">SecB002<\/td><td class=\"column-3\">Workbench y Supervisor Delta N4 Controladores JACE Delta<br \/>\nDelta JACE controllers<\/td><td class=\"column-4\">Vulnerabilidades Niagara JACE, Edge 10 QNX<\/td><td class=\"column-5\"><a class=\"download-link\"  target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0002_Security_Bulletin-Tridium.pdf\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">18 de julio de 2019<\/td><td class=\"column-2\">SecB001<\/td><td class=\"column-3\">enteliBUS\t<\/td><td class=\"column-4\">Los controladores enteliBUS que ejecutan firmware 3.40 R5 versi\u00f3n 571848 o anteriores contienen una vulnerabilidad de desbordamiento del b\u00fafer que permite la ejecuci\u00f3n remota de c\u00f3digos<\/td><td class=\"column-5\"><a class=\"download-link\" target=\"_blank\" href=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/SecB0001_Security_Bulletin.pdf\">PDF<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82f8fe9 e-con-full e-flex e-con e-child\" data-id=\"82f8fe9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<section class=\"elementor-element elementor-element-2ad72c8 e-con-full e-flex e-con e-child\" data-id=\"2ad72c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7368978 e-con-full e-flex e-con e-child\" data-id=\"7368978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53588e1 elementor-widget elementor-widget-heading\" data-id=\"53588e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Noticias de ciberseguridad<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edfdb99 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient load-more-align-center elementor-widget elementor-widget-posts\" data-id=\"edfdb99\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;pagination_type&quot;:&quot;load_more_on_click&quot;,&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;load_more_spinner&quot;:{&quot;value&quot;:&quot;fas fa-spinner&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32300 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"644\" height=\"401\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1.png\" class=\"attachment-medium_large size-medium_large wp-image-22\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1.png 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/delta-controls-logo-no-background-1-300x187.png 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" >\n\t\t\t\tVulnerabilidades Apache Foundation Log4j 2 (CVE-2021-44228)\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/cybersecurity\/apache-foundation-log4j-2-vulnerability-cve-2021-44228\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Apache Foundation Log4j 2 Vulnerability (CVE-2021-44228)\" tabindex=\"-1\" >\n\t\t\tLeer m\u00e1s \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tdiciembre 14, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18885 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-general\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/general\/dci-care-packages\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31898\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/care-packages-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/general\/dci-care-packages\/\" >\n\t\t\t\tPaquetes de provisiones Delta Controls - Trabajo bien hecho\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/general\/dci-care-packages\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Delta Controls Care Packages- Doing It Right\" tabindex=\"-1\" >\n\t\t\tLeer m\u00e1s \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tabril 13, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-18421 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-featured\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31899\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/iotforall-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" >\n\t\t\t\tRobert Hemmerdinger en IoT For All\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/featured\/robert-hemmerdinger-featured-on-iot-for-all\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Robert Hemmerdinger featured on IoT For All\" tabindex=\"-1\" >\n\t\t\tLeer m\u00e1s \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tmarzo 16, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-17056 post type-post status-publish format-standard has-post-thumbnail hentry category-awards category-cybersecurity category-events\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/awards\/cv-magazine-awards-2020\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"363\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31902\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/CV-300x169.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/awards\/cv-magazine-awards-2020\/\" >\n\t\t\t\tMejor Compa\u00f1\u00eda de Sistemas de Automatizaci\u00f3n de Edificios Comerciales 2020\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/awards\/cv-magazine-awards-2020\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Best Commercial Building Automation Systems Company 2020\" tabindex=\"-1\" >\n\t\t\tLeer m\u00e1s \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tenero 5, 2021\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-31855 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-general category-updates\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/general\/o3-sensor-us-patent-approva\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"321\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover.jpg\" class=\"attachment-medium_large size-medium_large wp-image-31856\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover.jpg 571w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/AwardWinning-O3-2021-cover-300x169.jpg 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/general\/o3-sensor-us-patent-approva\/\" >\n\t\t\t\tLa relevancia de la aprobaci\u00f3n de nuestra galardonada patente nacional de Sensor O3\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/general\/o3-sensor-us-patent-approva\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre The Significance of Our Award-Winning O3 Sensor\u2019s US Patent Approval\" tabindex=\"-1\" >\n\t\t\tLeer m\u00e1s \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tdiciembre 14, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16872 post type-post status-publish format-standard has-post-thumbnail hentry category-cybersecurity category-events category-updates\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/updates\/automatedbuildings-vcon\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"401\" src=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER.jpg\" class=\"attachment-medium_large size-medium_large wp-image-32179\" alt=\"\" srcset=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER.jpg 644w, https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/RoberH-COVER-300x187.jpg 300w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/updates\/automatedbuildings-vcon\/\" >\n\t\t\t\tAutomatedBuildings.com Entrevista a Delta Controls\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dev.deltacontrols.com\/es\/news-events\/updates\/automatedbuildings-vcon\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre AutomatedBuildings.com Q&#038;A with Delta Controls\" tabindex=\"-1\" >\n\t\t\tLeer m\u00e1s \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tdiciembre 1, 2020\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\t\t\t<span class=\"e-load-more-spinner\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-spinner\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M304 48c0 26.51-21.49 48-48 48s-48-21.49-48-48 21.49-48 48-48 48 21.49 48 48zm-48 368c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zm208-208c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.49-48-48-48zM96 256c0-26.51-21.49-48-48-48S0 229.49 0 256s21.49 48 48 48 48-21.49 48-48zm12.922 99.078c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.491-48-48-48zm294.156 0c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48c0-26.509-21.49-48-48-48zM108.922 60.922c-26.51 0-48 21.49-48 48s21.49 48 48 48 48-21.49 48-48-21.491-48-48-48z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"4\" data-next-page=\"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/pages\/12\/page\/2\/\"><\/div>\n\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Cargar m\u00e1s<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<div class=\"e-load-more-message\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Delta Controls Cybersecurity Program Delta Controls has always focused our efforts on providing solutions that are innovative, responsive, and easy to implement, and our cybersecurity program is no different. The<\/p>","protected":false},"author":1,"featured_media":209,"parent":31400,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-12","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity | Delta Controls<\/title>\n<meta name=\"description\" content=\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.deltacontrols.com\/es\/programs-services\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.deltacontrols.com\/es\/programs-services\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Delta Intelligent Building Technologies (Canada) Inc.\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-21T17:22:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2249\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@deltacontrols\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity | Delta Controls\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"datePublished\":\"2024-10-24T17:21:00+00:00\",\"dateModified\":\"2025-07-21T17:22:56+00:00\",\"description\":\"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"contentUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Cybersecurity-Web-Banner.jpg\",\"width\":2249,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programs &#038; Services\",\"item\":\"https:\\\/\\\/dev.deltacontrols.com\\\/programs-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#website\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\",\"name\":\"Delta Intelligent Building Technologies (Canada) Inc.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dev.deltacontrols.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#organization\",\"name\":\"Delta Intelligent Building Technologies (Canada) Inc.\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png\",\"contentUrl\":\"https:\\\/\\\/dev.deltacontrols.com\\\/wp-content\\\/uploads\\\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png\",\"width\":1124,\"height\":542,\"caption\":\"Delta Intelligent Building Technologies (Canada) Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.deltacontrols.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/deltacontrols\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/delta-controls\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity | Delta Controls","description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.deltacontrols.com\/es\/programs-services\/cybersecurity\/","og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity","og_description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","og_url":"https:\/\/dev.deltacontrols.com\/es\/programs-services\/cybersecurity\/","og_site_name":"Delta Intelligent Building Technologies (Canada) Inc.","article_modified_time":"2025-07-21T17:22:56+00:00","og_image":[{"width":2249,"height":555,"url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@deltacontrols","twitter_misc":{"Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/","url":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/","name":"Cybersecurity | Delta Controls","isPartOf":{"@id":"https:\/\/dev.deltacontrols.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","datePublished":"2024-10-24T17:21:00+00:00","dateModified":"2025-07-21T17:22:56+00:00","description":"Delta\u2019s built-in cybersecurity protects your BAS with secure-by-design hardware, software, and protocols that meet global standards.","breadcrumb":{"@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#primaryimage","url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","contentUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner.jpg","width":2249,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/dev.deltacontrols.com\/programs-services\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.deltacontrols.com\/"},{"@type":"ListItem","position":2,"name":"Programs &#038; Services","item":"https:\/\/dev.deltacontrols.com\/programs-services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/dev.deltacontrols.com\/#website","url":"https:\/\/dev.deltacontrols.com\/","name":"Delta Intelligent Building Technologies (Canada) Inc.","description":"","publisher":{"@id":"https:\/\/dev.deltacontrols.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.deltacontrols.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/dev.deltacontrols.com\/#organization","name":"Delta Intelligent Building Technologies (Canada) Inc.","url":"https:\/\/dev.deltacontrols.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/dev.deltacontrols.com\/#\/schema\/logo\/image\/","url":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png","contentUrl":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Delta-Controls-Logo-2024-RGB_WhiteWithRed.png","width":1124,"height":542,"caption":"Delta Intelligent Building Technologies (Canada) Inc."},"image":{"@id":"https:\/\/dev.deltacontrols.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/deltacontrols","https:\/\/www.linkedin.com\/company\/delta-controls"]}]}},"featured_image_src":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner-600x400.jpg","featured_image_src_square":"https:\/\/dev.deltacontrols.com\/wp-content\/uploads\/Cybersecurity-Web-Banner-600x555.jpg","_links":{"self":[{"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":0,"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/pages\/31400"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/media\/209"}],"wp:attachment":[{"href":"https:\/\/dev.deltacontrols.com\/es\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}