{"id":110007,"date":"2025-07-01T16:20:18","date_gmt":"2025-07-01T14:20:18","guid":{"rendered":"http:\/\/www.tressis.com\/blog\/?p=33723"},"modified":"2025-07-01T16:20:18","modified_gmt":"2025-07-01T14:20:18","slug":"phishing-smishing-en-internet-no-todo-es-lo-que-parece-2","status":"publish","type":"post","link":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/","title":{"rendered":"Phishing y smishing: en internet no todo es lo que parece"},"content":{"rendered":"<p><i><strong>Phishing<\/strong><\/i>, o suplantaci\u00f3n de identidad, es un t\u00e9rmino inform\u00e1tico utilizado para definir una t\u00e9cnica utilizada por ciberdelincuentes para obtener informaci\u00f3n personal, confidencial y especialmente bancaria de los usuarios de internet.<\/p>\n<p>&nbsp;<\/p>\n<p>Les env\u00edan mensajes de correo electr\u00f3nico suplantando a una entidad leg\u00edtima como puede ser un banco, una red social, un servicio, una entidad p\u00fablica, etc., para enga\u00f1arlos y manipularlos a fin de que acaben realizando alguna acci\u00f3n que ponga en peligro sus datos.<\/p>\n<p>&nbsp;<\/p>\n<p>De forma an\u00e1loga se hace con mensajes SMS y en este caso se denomina <i><b>smishing<\/b><\/i>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Les informamos de que recientemente han suplantado a Tressis en Instagram<\/strong>. Una cuenta muy parecida a la nuestra, en nombre e imagen, ha abierto un perfil en esta red social para seguir a usuarios y ofrecerles participar en un canal de WhatsApp con posibles soluciones de inversi\u00f3n. Es una estafa. Tressis no tiene una cuenta privada en Instagram y nunca ofrece este tipo de alternativas.<\/p>\n<p>&nbsp;<\/p>\n<p>Si desea seguirnos en redes sociales, le aconsejamos que verifique la identidad del perfil o que lo haga a trav\u00e9s de los enlaces que tenemos en nuestra p\u00e1gina web. En caso de duda, p\u00f3ngase en contacto con nosotros.<\/p>\n<p>&nbsp;<\/p>\n<p>Usted tambi\u00e9n podr\u00eda ser objeto de este fraude, pero hay algunas medidas para detectarlo:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Desconf\u00ede si:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><b>Le piden sus contrase\u00f1as de acceso<\/b> a su \u00e1rea privada o a la <i>app<\/i>. Tressis nunca le pedir\u00e1 esta informaci\u00f3n. Tambi\u00e9n desconf\u00ede si le siguen desde un perfil social que le resulte extra\u00f1o o con mensajes directos para participar en grupos de inversores o por whatsapp.<\/li>\n<li>Recibe un correo con un <b>asunto extra\u00f1o<\/b>, inesperado o en el que le meten prisa en contestar. Como gancho, ocasionalmente, ofrecen regalos.<\/li>\n<li>Se dirigen a usted de forma gen\u00e9rica o hay faltas de ortograf\u00eda o de redacci\u00f3n en el texto del correo electr\u00f3nico. Sospeche si se comunican con usted en un idioma distinto del habitual.<\/li>\n<li>Si no es de confianza, <b>no haga clic en ning\u00fan enlace del correo ni descargue archivos adjuntos. <\/b>Es preferible que compruebe lo que le piden en el correo y acceda directamente a la web desde su navegador.<\/li>\n<li>La <b>direcci\u00f3n del remitente<\/b> contiene caracteres extra\u00f1os. Si sospecha de su legitimidad, verifique su identidad por otra v\u00eda.<\/li>\n<\/ul>\n<p>&nbsp;<br \/>\nPara m\u00e1s informaci\u00f3n sobre seguridad le recomendamos que <a href=\"https:\/\/clientes.tressis.com\/legal\/seguridad.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">visite esta p\u00e1gina<\/a>.<\/p>\n<p>Complemente y ampl\u00ede informaci\u00f3n sobre los fraudes financieros en <a href=\"https:\/\/www.ivoox.com\/podcast-cnmv-evita-estafas-fraudes_sq_f12307925_1.html\" target=\"_blank\" rel=\"noopener\">los siguientes podcast<\/a> de la CNMV.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing, o suplantaci\u00f3n de identidad, es un t\u00e9rmino inform\u00e1tico utilizado para definir una t\u00e9cnica utilizada por ciberdelincuentes para obtener informaci\u00f3n personal, confidencial y especialmente bancaria de los usuarios de internet. &nbsp; Les env\u00edan mensajes de correo electr\u00f3nico suplantando a una entidad leg\u00edtima como puede ser un banco, una red social, un servicio, una entidad p\u00fablica, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":33819,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[1210,8740,8736,8739,8737,8738],"class_list":["post-110007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-varios","tag-cnmv","tag-peligro-de-fraude","tag-phishing","tag-seguridad-y-confidencialidad","tag-smishing","tag-suplantacion-de-identidad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing y smishing: en internet no todo es lo que parece<\/title>\n<meta name=\"description\" content=\"Los ciberdelincuentes se hacen pasar por entidades financieras, para conseguir que proporciones informaci\u00f3n valiosa por correo electr\u00f3nico.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing y smishing: en internet no todo es lo que parece\" \/>\n<meta property=\"og:description\" content=\"Los ciberdelincuentes se hacen pasar por entidades financieras, para conseguir que proporciones informaci\u00f3n valiosa por correo electr\u00f3nico.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Tressis\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tressis\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-01T14:20:18+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/test.tressis.com\/wp-content\/uploads\/2020\/02\/phising.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"487\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lola\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TressisSV\" \/>\n<meta name=\"twitter:site\" content=\"@TressisSV\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lola\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/\"},\"author\":{\"name\":\"Lola\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#\\\/schema\\\/person\\\/b833c1d724d8764920b6d6852c70584e\"},\"headline\":\"Phishing y smishing: en internet no todo es lo que parece\",\"datePublished\":\"2025-07-01T14:20:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/\"},\"wordCount\":445,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tressis.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/phising.jpg\",\"keywords\":[\"CNMV\",\"peligro de fraude\",\"Phishing\",\"seguridad y confidencialidad\",\"smishing\",\"suplantaci\u00f3n de identidad\"],\"articleSection\":[\"Varios\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/\",\"url\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/\",\"name\":\"Phishing y smishing: en internet no todo es lo que parece\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tressis.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/phising.jpg\",\"datePublished\":\"2025-07-01T14:20:18+00:00\",\"description\":\"Los ciberdelincuentes se hacen pasar por entidades financieras, para conseguir que proporciones informaci\u00f3n valiosa por correo electr\u00f3nico.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tressis.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/phising.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tressis.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/phising.jpg\",\"width\":1100,\"height\":487,\"caption\":\"Phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Morning meeting\",\"item\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/blog\\\/categorias\\\/morning-meeting-ca\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing y smishing: en internet no todo es lo que parece\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/\",\"name\":\"Tressis banca privada\",\"description\":\"Tressis | Planificaci\u00f3n financiera y gesti\u00f3n de patrimonios\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#organization\",\"name\":\"Tressis\",\"url\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.tressis.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/logo-tressis-112.png\",\"contentUrl\":\"https:\\\/\\\/www.tressis.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/logo-tressis-112.png\",\"width\":112,\"height\":112,\"caption\":\"Tressis\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Tressis\\\/\",\"https:\\\/\\\/x.com\\\/TressisSV\",\"https:\\\/\\\/www.instagram.com\\\/tressissv\\\/?hl=es\",\"https:\\\/\\\/linkedin.com\\\/company\\\/tressis\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/tressissv\",\"https:\\\/\\\/open.spotify.com\\\/show\\\/3jmTe1Nf0wqMILl7diWV6h?si=d7112519f13c4593&nd=1\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tressis.com\\\/ca\\\/#\\\/schema\\\/person\\\/b833c1d724d8764920b6d6852c70584e\",\"name\":\"Lola\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/05e646486b23ff45df9649110609c7e31b8c4a3e2821caa23d6317f405e0c51d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/05e646486b23ff45df9649110609c7e31b8c4a3e2821caa23d6317f405e0c51d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/05e646486b23ff45df9649110609c7e31b8c4a3e2821caa23d6317f405e0c51d?s=96&d=mm&r=g\",\"caption\":\"Lola\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing y smishing: en internet no todo es lo que parece","description":"Los ciberdelincuentes se hacen pasar por entidades financieras, para conseguir que proporciones informaci\u00f3n valiosa por correo electr\u00f3nico.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/","og_locale":"ca_ES","og_type":"article","og_title":"Phishing y smishing: en internet no todo es lo que parece","og_description":"Los ciberdelincuentes se hacen pasar por entidades financieras, para conseguir que proporciones informaci\u00f3n valiosa por correo electr\u00f3nico.","og_url":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/","og_site_name":"Tressis","article_publisher":"https:\/\/www.facebook.com\/Tressis\/","article_published_time":"2025-07-01T14:20:18+00:00","og_image":[{"width":1100,"height":487,"url":"http:\/\/test.tressis.com\/wp-content\/uploads\/2020\/02\/phising.jpg","type":"image\/jpeg"}],"author":"Lola","twitter_card":"summary_large_image","twitter_creator":"@TressisSV","twitter_site":"@TressisSV","twitter_misc":{"Escrit per":"Lola","Temps estimat de lectura":"2 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#article","isPartOf":{"@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/"},"author":{"name":"Lola","@id":"https:\/\/www.tressis.com\/ca\/#\/schema\/person\/b833c1d724d8764920b6d6852c70584e"},"headline":"Phishing y smishing: en internet no todo es lo que parece","datePublished":"2025-07-01T14:20:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/"},"wordCount":445,"commentCount":0,"publisher":{"@id":"https:\/\/www.tressis.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tressis.com\/wp-content\/uploads\/2020\/02\/phising.jpg","keywords":["CNMV","peligro de fraude","Phishing","seguridad y confidencialidad","smishing","suplantaci\u00f3n de identidad"],"articleSection":["Varios"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/","url":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/","name":"Phishing y smishing: en internet no todo es lo que parece","isPartOf":{"@id":"https:\/\/www.tressis.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#primaryimage"},"image":{"@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tressis.com\/wp-content\/uploads\/2020\/02\/phising.jpg","datePublished":"2025-07-01T14:20:18+00:00","description":"Los ciberdelincuentes se hacen pasar por entidades financieras, para conseguir que proporciones informaci\u00f3n valiosa por correo electr\u00f3nico.","breadcrumb":{"@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#primaryimage","url":"https:\/\/www.tressis.com\/wp-content\/uploads\/2020\/02\/phising.jpg","contentUrl":"https:\/\/www.tressis.com\/wp-content\/uploads\/2020\/02\/phising.jpg","width":1100,"height":487,"caption":"Phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tressis.com\/ca\/blog\/phishing-smishing-en-internet-no-todo-es-lo-que-parece-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.tressis.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Morning meeting","item":"https:\/\/www.tressis.com\/ca\/blog\/categorias\/morning-meeting-ca\/"},{"@type":"ListItem","position":3,"name":"Phishing y smishing: en internet no todo es lo que parece"}]},{"@type":"WebSite","@id":"https:\/\/www.tressis.com\/ca\/#website","url":"https:\/\/www.tressis.com\/ca\/","name":"Tressis banca privada","description":"Tressis | Planificaci\u00f3n financiera y gesti\u00f3n de patrimonios","publisher":{"@id":"https:\/\/www.tressis.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tressis.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.tressis.com\/ca\/#organization","name":"Tressis","url":"https:\/\/www.tressis.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.tressis.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.tressis.com\/wp-content\/uploads\/2025\/06\/logo-tressis-112.png","contentUrl":"https:\/\/www.tressis.com\/wp-content\/uploads\/2025\/06\/logo-tressis-112.png","width":112,"height":112,"caption":"Tressis"},"image":{"@id":"https:\/\/www.tressis.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tressis\/","https:\/\/x.com\/TressisSV","https:\/\/www.instagram.com\/tressissv\/?hl=es","https:\/\/linkedin.com\/company\/tressis\/","https:\/\/www.youtube.com\/user\/tressissv","https:\/\/open.spotify.com\/show\/3jmTe1Nf0wqMILl7diWV6h?si=d7112519f13c4593&nd=1"]},{"@type":"Person","@id":"https:\/\/www.tressis.com\/ca\/#\/schema\/person\/b833c1d724d8764920b6d6852c70584e","name":"Lola","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/05e646486b23ff45df9649110609c7e31b8c4a3e2821caa23d6317f405e0c51d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/05e646486b23ff45df9649110609c7e31b8c4a3e2821caa23d6317f405e0c51d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/05e646486b23ff45df9649110609c7e31b8c4a3e2821caa23d6317f405e0c51d?s=96&d=mm&r=g","caption":"Lola"}}]}},"_links":{"self":[{"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/posts\/110007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/comments?post=110007"}],"version-history":[{"count":0,"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/posts\/110007\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/media\/33819"}],"wp:attachment":[{"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/media?parent=110007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/categories?post=110007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tressis.com\/ca\/wp-json\/wp\/v2\/tags?post=110007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}