{"id":773,"date":"2022-03-14T15:44:02","date_gmt":"2022-03-14T15:44:02","guid":{"rendered":"https:\/\/isec-infosecurity.com\/vip\/?page_id=773"},"modified":"2023-09-29T15:05:58","modified_gmt":"2023-09-29T15:05:58","slug":"infosecurity-ayuda-nuestro-granito-de-arena","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/vip\/infosecurity-ayuda-nuestro-granito-de-arena\/","title":{"rendered":"Infosecurity Ayuda"},"content":{"rendered":"\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-text-color\"><strong>Una de las cosas que m\u00e1s nos hace FELICES es poder AYUDAR!<\/strong>&nbsp;por eso Infosecurity Ayuda te invita a colaborar:<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide has-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:99.9%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"997\" height=\"290\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay1.jpg\" alt=\"\" class=\"wp-image-779\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay1.jpg 997w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay1-300x87.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay1-768x223.jpg 768w\" sizes=\"auto, (max-width: 997px) 100vw, 997px\" \/><\/figure>\n<\/div>\n\n\n<figure class=\"wp-block-video\"><video controls src=\"https:\/\/isec-infosecurity.com\/virtualtour\/wp-content\/uploads\/2023\/09\/ISEC-INFOSECURITY-AYUDA-ENTRE-TODOS-PODEMOS-VIDEO-2.mp4\"><\/video><figcaption class=\"wp-element-caption\">ISEC INFOSECURITY AYUDA<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ISEC INFOSECURITY TOUR 2022\" src=\"https:\/\/player.vimeo.com\/video\/759527110?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">ISEC INFOSECURITY AYUDA<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ISEC INFOSECURITY AYUDA &amp; ENTRE TODOS PODEMOS\" width=\"750\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/dJyj4-TmsOA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2021\/11\/vipayuda1.jpg\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><strong>Alejandra Campolonghi<\/strong><br>Coordinadora Infosecurity Ayuda<br>contacto:&nbsp;<a href=\"mailto:ayuda@isec-infosecurity.com\">ayuda@isec-infosecurity.com<\/a>&nbsp;<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-black-color has-luminous-vivid-amber-background-color has-text-color has-background has-large-font-size\"><strong>2022<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ISEC INFOSECURITY TOUR 2022\" src=\"https:\/\/player.vimeo.com\/video\/759527110?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background\"><strong><strong>REP\u00daBLICA DOMINICANA<\/strong><\/strong> &#8211; <span style=\"\"><b>COLABORACI\u00d3N CON <\/b><\/span><strong><strong>FUNDACI\u00d3N DE NI\u00d1OS \u2013 ALDEAS INFANTILES SOS<\/strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"155\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image013-1024x155.png\" alt=\"\" class=\"wp-image-1063\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image013-1024x155.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image013-300x45.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image013-768x116.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image013.png 1149w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"432\" height=\"243\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image008.jpg\" alt=\"\" class=\"wp-image-1064\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image008.jpg 432w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/04\/image008-300x169.jpg 300w\" sizes=\"auto, (max-width: 432px) 100vw, 432px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Buenas tardes mis estimados,<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Muchas gracias a ustedes por su invitaci\u00f3n al evento, por su empat\u00eda a nuestra causa y por todo el apoyo que nos han brindado. Para nosotros fue un gran honor acompa\u00f1arles y les felicitamos por tan bien organizado y exitoso evento.<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Nos llena de orgullo encontrar personas y empresas con tan alto sentido de responsabilidad social como ustedes y sobre todo que se preocupen por un adecuado desarrollo de la ni\u00f1ez, la juventud y las familias.<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Adicionalmente van m\u00e1s all\u00e1 concedi\u00e9ndonos tanta informaci\u00f3n valiosa como la que nos comparten en este correo.<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Auguramos muchos \u00e9xitos para ustedes y nos disponemos a la orden en lo que les podamos apoyar. Esperamos seguir en contacto y que sean muchas m\u00e1s las iniciativas que podamos desarrollar conjuntamente.<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Dese\u00e1ndoles un feliz resto del d\u00eda y agradeciendo una vez m\u00e1s su noble gesto con nosotros,<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Cort\u00e9smente se despide,<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><strong>RAQUEL MARTY<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Directora de Recaudaci\u00f3n y Comunicaciones<\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\"><a href=\"mailto:raquel.marty@aldeasinfantilessos.org.do\">raquel.marty@aldeasinfantilessos.org.do<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background\"><strong>ARGENTINA \u2013 DONACI\u00d3N EQUIPOS POR PARTE DE COMPA\u00d1\u00cdA MIMO \u2013 VESTIDITOS S.A.&nbsp;<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-luminous-vivid-amber-background-color has-text-color has-background has-medium-font-size\"><strong>CAMPA\u00d1A DE DONACI\u00d3N DE EQUIPOS INFORM\u00c1TICOS<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\">Donados a Instituci\u00f3n MARIA DE LAS CARCELES (mariadelascarceles.org.ar)<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\"> Agradecimiento al Sr Pablo Ciro y Sr Osvaldo Mehle y todo el equipo de la &nbsp;Gerencia de Sistemas que lo hicieron posible.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\">Inventario de equipamiento donado para reacondicionamiento:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top has-black-color has-cyan-bluish-gray-background-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top has-black-color has-text-color is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p class=\"has-text-align-left has-medium-font-size\"><strong>PALLET 1<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">22 PC HP DESKTOP<br>1 PC IBM DESKTOP<br>1 PC GENERICA DESKTOP<br>1 BULTO (CAJA2) CON 13 TECLADOS HP, TECLADOS GENIOUS, 1 TECLADO VERVATIN<br>1 BULTO (CAJA6) CON 2 MONITORES SAMSUNG, 1 MONITOR HP, 9 BASES DE MONITORES, 1 TECLADO GENIOUS, PASTICOS DE IMPRESORAS, 1 DETECTOR DE BILLETES, 1 BASE DE ESCANER<br>1 BULTO (CAJA5) 4 MONITORES SAMSUNG<br>1 BULTO (CAJA1) CON 12 TECLADOS HP Y 4 TECLADOS GENIOUS<br>1 BULTO (CAJA4) CON MOUSE HP 10, GENIOUS , LENOVO2, MXIM 1 HACER 1; TELEFONOS PANASONIC 10, GIGASET1; 6 TUBOS DE TELEFONO;TECLADO HP1, GENIOUS 1;LECTORA DE DV HP; DISKETTES; MEMORIAS; CLABLES; FUENTES; ADATADORES; CARGADORES Y COOLERS<br>4 IMPRESORAS HP<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.34%\">\n<p class=\"has-text-align-left has-medium-font-size\"><strong>PALLET 2<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">14 PC HP DESKTOP<br>1 PC LENOVO DEKTOP<br>2 PC IBM DESKTOP<br>1 ESCANER HP 3800<br>5 IMPRESORA EPSON LX300<br>1 IMPRESORA EPSON FX890<br>1 IMPRESORA HP 3820<br>1 IMPRESORA HP 350 DEKJET<br>1 BULTO (CAJA1) CON 13 TECLADOS HP, 3 LENOVO,3 IBM, 3 GENIOUS, 2 GENERICOS;11 MOUSE;3 TECLADO DE NOTEBOOK ROTOS; NOTEBOOK TOSHIBA CON BATERIA; 1 TELEFONO PROGRAMADOR PANASONIC<br>1 BULTO (CAJA2) CABLES Y TRANSFORMADORES<br>1 BULTO (CAJA3) CON 4 TECLADOS HP, 4 GENIOUS, 1 VERVATIN, 1 IBM, 1 MEGA<br>1 BULTO (CAJA4) CON 1 MONITOR LG, 4 SAMSUNG, 1 VIEWSONIC<br>1 BULTO (CAJA5) CON TONERS Y CARTUCHOS HP<br>1 BULTO (CAJA6) CON 4 TECLADOS, 1 PARLANTE, 1 TELEFONO, 1 ESCANER, 4 MOUSE<br>1 BULTO (CAJA7) 5 HOUSING PARA CAMARAS, CABLE MULTIPAR, 6 SIRENAS, 6 CAMARAS ANALOGICAS, 1 BATERIA 12V, 3 DETECTORES DE HUMO, 6 DETECTORES DE MOVIMIENTO, 1 PULSADOR ANTIPANICO, 1 CAJA CONTROLADORA CONTROL DE ACCESO, 1 PANEL DE ALARMA<br>1 MONITOR DE TUBO HP<br>1 MONITOR LCD HP<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p class=\"has-text-align-left has-medium-font-size\"><strong>PALLET 3<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">30 PC HP DESKTOP<br>2 PC IBM DESKTOP<br>1 PC BOX DESKTOP<br>1 BULTO (CAJA1) CON 2 MONITORES SAMSUNG Y 1 BENQ<br>1 BULTO (CAJA2) CON 3 MONITORES SANMSUNG Y 1 AOC<br>1 BULTO (CAJA3) CON 4 MONITORES LG, 3 SAMSUNG Y 1 AOC<br>1 BULTO (CAJA4) CON 10 TECLADOS HP, 4 GENIOUS, 1 LENOVO Y 1 GENERICO<br>1 BULTO (CAJA5) CON TONER<br>1 BULTO (CAJA6) CON TONER<br>1 BULTO (CAJA7) CON TONERS Y CARTUCHOS HP<br>1 BULTO (CAJA8) CON 14 BATERIAS DE HANDHELD, 2 BATERIAS DE 9V, 2 TELEFONOS FIJOS, 6 LECTORES MAGNETICOS, 16 MOUSE, 12 ESCANER CODIGO DE BARRA, 3 NOTEBOOKS, 1 NETBOOK, 4 HANDHELDS, 2 FUENTES PC, 4 FUENTES SWITCHING, 1 TECLADO NOTEBOOK, 6 TECLADOS PCS, 1 CARTUCHO HP, 2 TONERS, 1 BATERIA NOTEBOOK, 1 BASE TV, CABLES VARIOS, PARTES GABINETE VARIOS<br>1 BULTO (CAJA9) CON 1 ESCANER CODIGO DE BARRA; CABLES VARIOS Y TRANSFORMDORES<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"355\" height=\"473\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay6.jpg\" alt=\"\" class=\"wp-image-795\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay6.jpg 355w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay6-225x300.jpg 225w\" sizes=\"auto, (max-width: 355px) 100vw, 355px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"355\" height=\"473\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay8.jpg\" alt=\"\" class=\"wp-image-794\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay8.jpg 355w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay8-225x300.jpg 225w\" sizes=\"auto, (max-width: 355px) 100vw, 355px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"355\" height=\"473\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay7.jpg\" alt=\"\" class=\"wp-image-793\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay7.jpg 355w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay7-225x300.jpg 225w\" sizes=\"auto, (max-width: 355px) 100vw, 355px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"355\" height=\"473\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay5.jpg\" alt=\"\" class=\"wp-image-792\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay5.jpg 355w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay5-225x300.jpg 225w\" sizes=\"auto, (max-width: 355px) 100vw, 355px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-black-color has-luminous-vivid-amber-background-color has-text-color has-background has-large-font-size\"><strong>Campa\u00f1as Anteriores<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"344\" height=\"336\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay4.png\" alt=\"\" class=\"wp-image-810\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay4.png 344w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay4-300x293.png 300w\" sizes=\"auto, (max-width: 344px) 100vw, 344px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ISEC-INFOSECURITY-MEGAEVENTO-BUENOS-AIRES-INFO-AYUDA.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"221\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay2.jpg\" alt=\"\" class=\"wp-image-811\"\/><\/a><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ISEC-INFOSECURITY-MEGAEVENTO-BUENOS-AIRES-INFO-AYUDA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">&#8211; ver Informe completo aqu\u00ed &#8211;<\/a><\/figcaption><\/figure>\n<\/div><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-text-color\"><strong>Celebramos los 25 a\u00f1os de servicio de Mar\u00eda de las C\u00e1rceles<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\">-Recibi\u00f3 un reconocimiento en la Legislatura de la Ciudad de Buenos Aires-<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\">Les enviamos un saludo cordial y estamos felices de poder contribuir un poquito en el proyecto&nbsp;<strong>Segunda Oportunidad.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\"><strong>Todas las computadoras y equipamiento inform\u00e1tico que recibimos de las empresas cuando hacemos las campa\u00f1as en Noviembre de recolecci\u00f3n de equipamiento en desuso son enviados a este lugar para reacondicionarlas y dejarlas listas para donar.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\">Junto a la ayuda de ustedes que donan, ellos que las reacondicionan y nosotros formamos una gran red solidaria donde los beneficiarios son escuelas y ni\u00f1os de hogares.<\/p>\n\n\n\n<figure class=\"wp-block-video aligncenter\"><video controls src=\"https:\/\/isec-infosecurity.com\/ayuda\/WhatsApp%20Video%202018-11-07%20at%208.59.27%20PM.mp4\"><\/video><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"605\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9.jpg\" alt=\"\" class=\"wp-image-818\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9-300x177.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9-768x454.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"605\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9.jpg\" alt=\"\" class=\"wp-image-818\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9-300x177.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay9-768x454.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay13.jpg\" alt=\"\" class=\"wp-image-819\" style=\"width:299px;height:448px\" width=\"299\" height=\"448\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay13.jpg 512w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay13-200x300.jpg 200w\" sizes=\"auto, (max-width: 299px) 100vw, 299px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay10.jpg\" alt=\"\" class=\"wp-image-822\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay10.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay10-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay10-768x576.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay12.jpg\" alt=\"\" class=\"wp-image-820\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay12.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay12-300x199.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay12-768x509.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"768\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay11.jpg\" alt=\"\" class=\"wp-image-821\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay11.jpg 946w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay11-300x244.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay11-768x623.jpg 768w\" sizes=\"auto, (max-width: 946px) 100vw, 946px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide has-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>Cuadro de Fundaciones en Latinoam\u00e9rica<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><thead><tr><th>CIUDAD<\/th><th>FUNDACI\u00f3N DE NI\u00f1OS<\/th><\/tr><\/thead><tbody><tr><td>BUENOS AIRES ARGENTINA<\/td><td>ENTRE TODOS ES POSIBLE Y EQUIDAD<\/td><\/tr><tr><td>CARACAS VENEZUELA<\/td><td>ALCALD\u00edA CHACAITO<\/td><\/tr><tr><td>SANTO DOMINGO REP DOMINICANA&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N \u00e1NGELES DE AMOR<\/td><\/tr><tr><td>SAN JUAN PUERTO RICO&nbsp;&nbsp;<\/td><td>FUNDACI\u00d3N \u00c1NGELES DE AMOR<\/td><\/tr><tr><td>BARRANQUILLA&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N EMMANUEL<\/td><\/tr><tr><td>MEDELL\u00edN COLOMBIA&nbsp;&nbsp;<\/td><td>LA CARAVANA DEL ARTE EN MOVIMIENTO<\/td><\/tr><tr><td>BOGOTA COLOMBIA<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>CALI COLOMBIA&nbsp;&nbsp;<\/td><td>CORPORACI\u00f3N MAR\u00edA PEDRAZA<\/td><\/tr><tr><td>QUITO ECUADOR<\/td><td>FUNDACI\u00f3N CHICOS DE LA CALLE<\/td><\/tr><tr><td>GUAYAQUIL ECUADOR<\/td><td>FUNDACI\u00f3N CHICOS DE LA CALLE<\/td><\/tr><tr><td>LIMA PER\u00fa<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>CDMX M\u00e9XICO<\/td><td>FUNDACI\u00f3N AMIGOS NEFRO CA PARA NI\u00f1OS CON INSUFICIENCIA RENAL<\/td><\/tr><tr><td>MONTERREY M\u00e9XICO<\/td><td>FUNDACI\u00f3N NI\u00f1OS<\/td><\/tr><tr><td>MONTEVIDEO URUGUAY&nbsp;&nbsp;<\/td><td>HOGAR LOS PINOS<\/td><\/tr><tr><td>SANTIAGO CHILE&nbsp;&nbsp;<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>SANTA CRUZ BOLIVIA<\/td><td>CENTRO BETANIA<\/td><\/tr><tr><td>LA PAZ BOLIVIA&nbsp;&nbsp;<\/td><td>CENTRO BETANIA<\/td><\/tr><tr><td>ASUNCI\u00f3N PARAGUAY<\/td><td>COMEDOR SOCIAL DE NI\u00d1OS EN SITUACI\u00d3N DE CALLE J F ESTIGARRIBIA<\/td><\/tr><tr><td>SAN SALVADOR EL SALVADOR&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N FE Y ALEGR\u00edA<\/td><\/tr><tr><td>CIUDAD DE GUATEMALA&nbsp;&nbsp;<\/td><td>HOGAR NUESTRA SE\u00f1ORA DE LOS REMEDIOS<\/td><\/tr><tr><td>TEGUCIGALPA HONDURAS&nbsp;&nbsp;<\/td><td>ACOES ASOCIACI\u00f3N COLABORACI\u00f3N Y ESFUERZO HONDURAS<\/td><\/tr><tr><td>MANAGUA NICARAGUA&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N MIRNA UGARTE<\/td><\/tr><tr><td>SAN JOS\u00e9 COSTA RICA&nbsp;&nbsp;<\/td><td>OBRAS DEL ESP\u00edRITU SANTO<\/td><\/tr><tr><td>CIUDAD DE PANAM\u00e1&nbsp;&nbsp;<\/td><td>ORFELINATO SAN JOS\u00e9 DE MALAMBO<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>Campa\u00f1a Centroam\u00e9rica 2018<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-1024x576.jpeg\" alt=\"\" class=\"wp-image-828\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-1024x576.jpeg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-300x169.jpeg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-768x432.jpeg 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15.jpeg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-video\"><video height=\"352\" style=\"aspect-ratio: 640 \/ 352;\" width=\"640\" controls src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/guatemala2018.mp4\"><\/video><\/figure>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"361\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-1024x361.png\" alt=\"\" class=\"wp-image-832\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-1024x361.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-300x106.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-768x271.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16.png 1037w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"391\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-1024x391.png\" alt=\"\" class=\"wp-image-833\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-1024x391.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-300x115.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-768x293.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17.png 1110w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"197\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-1024x197.png\" alt=\"\" class=\"wp-image-834\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-1024x197.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-300x58.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-768x148.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18.png 1103w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>Cuadro de Fundaciones en Latinoam\u00e9rica<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><thead><tr><th>CIUDAD<\/th><th>FUNDACI\u00f3N DE NI\u00f1OS<\/th><\/tr><\/thead><tbody><tr><td>BUENOS AIRES ARGENTINA<\/td><td>ENTRE TODOS ES POSIBLE Y EQUIDAD<\/td><\/tr><tr><td>CARACAS VENEZUELA<\/td><td>ALCALD\u00edA CHACAITO<\/td><\/tr><tr><td>SANTO DOMINGO REP DOMINICANA&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N \u00e1NGELES DE AMOR<\/td><\/tr><tr><td>SAN JUAN PUERTO RICO&nbsp;&nbsp;<\/td><td>FUNDACI\u00d3N \u00c1NGELES DE AMOR<\/td><\/tr><tr><td>BARRANQUILLA&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N EMMANUEL<\/td><\/tr><tr><td>MEDELL\u00edN COLOMBIA&nbsp;&nbsp;<\/td><td>LA CARAVANA DEL ARTE EN MOVIMIENTO<\/td><\/tr><tr><td>BOGOTA COLOMBIA<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>CALI COLOMBIA&nbsp;&nbsp;<\/td><td>CORPORACI\u00f3N MAR\u00edA PEDRAZA<\/td><\/tr><tr><td>QUITO ECUADOR<\/td><td>FUNDACI\u00f3N CHICOS DE LA CALLE<\/td><\/tr><tr><td>GUAYAQUIL ECUADOR<\/td><td>FUNDACI\u00f3N CHICOS DE LA CALLE<\/td><\/tr><tr><td>LIMA PER\u00fa<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>CDMX M\u00e9XICO<\/td><td>FUNDACI\u00f3N AMIGOS NEFRO CA PARA NI\u00f1OS CON INSUFICIENCIA RENAL<\/td><\/tr><tr><td>MONTERREY M\u00e9XICO<\/td><td>FUNDACI\u00f3N NI\u00f1OS<\/td><\/tr><tr><td>MONTEVIDEO URUGUAY&nbsp;&nbsp;<\/td><td>HOGAR LOS PINOS<\/td><\/tr><tr><td>SANTIAGO CHILE&nbsp;&nbsp;<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>SANTA CRUZ BOLIVIA<\/td><td>CENTRO BETANIA<\/td><\/tr><tr><td>LA PAZ BOLIVIA&nbsp;&nbsp;<\/td><td>CENTRO BETANIA<\/td><\/tr><tr><td>ASUNCI\u00f3N PARAGUAY<\/td><td>COMEDOR SOCIAL DE NI\u00d1OS EN SITUACI\u00d3N DE CALLE J F ESTIGARRIBIA<\/td><\/tr><tr><td>SAN SALVADOR EL SALVADOR&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N FE Y ALEGR\u00edA<\/td><\/tr><tr><td>CIUDAD DE GUATEMALA&nbsp;&nbsp;<\/td><td>HOGAR NUESTRA SE\u00f1ORA DE LOS REMEDIOS<\/td><\/tr><tr><td>TEGUCIGALPA HONDURAS&nbsp;&nbsp;<\/td><td>ACOES ASOCIACI\u00f3N COLABORACI\u00f3N Y ESFUERZO HONDURAS<\/td><\/tr><tr><td>MANAGUA NICARAGUA&nbsp;&nbsp;<\/td><td>FUNDACI\u00f3N MIRNA UGARTE<\/td><\/tr><tr><td>SAN JOS\u00e9 COSTA RICA&nbsp;&nbsp;<\/td><td>OBRAS DEL ESP\u00edRITU SANTO<\/td><\/tr><tr><td>CIUDAD DE PANAM\u00e1&nbsp;&nbsp;<\/td><td>ORFELINATO SAN JOS\u00e9 DE MALAMBO<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>Campa\u00f1a Centroam\u00e9rica 2018<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-1024x576.jpeg\" alt=\"\" class=\"wp-image-828\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-1024x576.jpeg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-300x169.jpeg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15-768x432.jpeg 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay15.jpeg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-video\"><video height=\"352\" style=\"aspect-ratio: 640 \/ 352;\" width=\"640\" controls src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/guatemala2018.mp4\"><\/video><\/figure>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"361\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-1024x361.png\" alt=\"\" class=\"wp-image-832\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-1024x361.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-300x106.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16-768x271.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay16.png 1037w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"391\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-1024x391.png\" alt=\"\" class=\"wp-image-833\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-1024x391.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-300x115.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17-768x293.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay17.png 1110w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"197\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-1024x197.png\" alt=\"\" class=\"wp-image-834\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-1024x197.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-300x58.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18-768x148.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay18.png 1103w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-background-color has-background is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><thead><tr><th><strong>Empresa<\/strong><\/th><th><strong>Responsable de la donaci\u00f3n<\/strong><\/th><\/tr><\/thead><tbody><tr><td>COLEGIO EL BUEN AYRE<\/td><td>GRACIELA PERALTA \/ ANDREA COLASANTO<\/td><\/tr><tr><td>DANONE<\/td><td>MARIA PAULA AGLIANO&nbsp;<\/td><\/tr><tr><td>IFF de ARGENTINA<\/td><td>RICARDO POLLIONI<\/td><\/tr><tr><td>ISEC&nbsp;<\/td><td>MONICA DELIBERTI<\/td><\/tr><tr><td>LABORATORIOS DOMINGUEZ<\/td><td>CHRISTIAN ARY PUELLES<\/td><\/tr><tr><td>MINIST. EDUC &#8211; GCIA OPERATIVA DE DESARROLLO DE APLICACIONES<\/td><td>MAXIMILIANO VIAPIANO<\/td><\/tr><tr><td>MONITOREO.COM<\/td><td>ROMINA MONACO<\/td><\/tr><tr><td>ORT ARGENTINA<\/td><td>YARON ZARFATI<\/td><\/tr><tr><td>VIDITEC<\/td><td>MARCELA MENDEZ<\/td><\/tr><tr><td>VINCULO MEDICO ARGENTINA<\/td><td>GUILLERMO PALLI<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong><strong><strong><strong>Campa\u00f1a ARGENTINA de 2017<\/strong><\/strong><\/strong><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"442\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23-1024x442.png\" alt=\"\" class=\"wp-image-854\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23-1024x442.png 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23-300x129.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23-768x331.png 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23.png 1222w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"524\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24.png\" alt=\"\" class=\"wp-image-855\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24.png 871w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24-300x180.png 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24-768x462.png 768w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><\/figure>\n<\/div>\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><thead><tr><th><strong>DETALLE DONACIONES RECIBIDAS<\/strong><\/th><\/tr><\/thead><tbody><tr><td>35 CPUs en BUENAS CONDICIONES &#8211; CON MEMORIA RAM Y SIN DISCOS RIGIDOS \/ 31 TECLADOS \/ 31 MOUSES&nbsp;<\/td><\/tr><tr><td>8 CPUs \/ 4 IMPRESORAS PARA ARREGLAR y 1 MONITOR&nbsp;<\/td><\/tr><tr><td>2 IMPRESORAS \/ 1 MONITOR \/ 2 TECLADOS \/ 1 PARLANTE \/ 2 MOUSES \/ DISCOS RIGIDOS Y MEMORIAS RAM.<\/td><\/tr><tr><td>2 MONITORES 19&#8243;<\/td><\/tr><tr><td>2 MONITORES \/ 3 SWITCH \/ 1 TELEFONO \/ 4 TECLADOS \/ 3 IMPRESORAS \/ 3 CPUs \/ 3 TRANSFORMADORES y CABLES VARIOS<\/td><\/tr><tr><td>1 SERVIDOR \/ 2 MONITORES \/ 6 TECLADOS \/ 1 GABINETE \/ 8 CPUs \/ 1 SWITCH \/ 1 PARLANTE \/ \/ 1 UPS \/ 2 NOTEBOOK \/ 4 MOUSEs Y CABLES VARIOS.<\/td><\/tr><tr><td>2 MONITORES&nbsp; Y UN TECLADO &#8211; Pendiente un escritorio<\/td><\/tr><tr><td>3 GABINETES&nbsp;<\/td><\/tr><tr><td>2 COMPUTADORES DE ESCRITORIO<\/td><\/tr><tr><td>18 Monitores, 15 CPUs, 5 teclados y 1 impresora&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>\u00a1MUCHAS GRACIAS A LAS PRIMERAS 100 ORGANIZACIONES&nbsp; QUE SE SUMARON EN LA PRIMER SEMANA A LA AYUDA A LAS FUNDACIONES CON LOS EQUIPOS INFORM\u00e1TICOS!<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><thead><tr><th>CIUDAD<\/th><th><\/th><\/tr><\/thead><tbody><tr><td>BUENOS AIRES ARGENTINA<\/td><td>ENTRE TODOS ES POSIBLE Y EQUIDAD<\/td><\/tr><tr><td>CARACAS VENEZUELA<\/td><td>ALCALDIA CHACAITO<\/td><\/tr><tr><td>SANTO DOMINGO REP DOMINICANA&nbsp;&nbsp;<\/td><td>FUNDACION ANGELES DE AMOR<\/td><\/tr><tr><td>SAN JUAN PUERTO RICO&nbsp;&nbsp;<\/td><td>FUNDACION ANGELES DE AMOR<\/td><\/tr><tr><td>EJE CAFETERO PEREIRA COLOMBIA&nbsp;&nbsp;<\/td><td>FUNDACION CORAZONES UNIDOS<\/td><\/tr><tr><td>BARRANQUILLA&nbsp;&nbsp;<\/td><td>FUNDACION EMMANUEL<\/td><\/tr><tr><td>MEDELLIN COLOMBIA&nbsp;&nbsp;<\/td><td>LA CARAVANA DEL ARTE EN MOVIMIENTO<\/td><\/tr><tr><td>BOGOTA COLOMBIA<\/td><td>ASOCIACI\u00f3N HOGAR NI\u00f1OS POR UN NUEVO PLANETA<\/td><\/tr><tr><td>CALI COLOMBIA&nbsp;&nbsp;<\/td><td>CORPORACION MARIA PEDRAZA<\/td><\/tr><tr><td>QUITO ECUADOR<\/td><td>CHICOS DE LA CALLE<\/td><\/tr><tr><td>LIMA PERU<\/td><td>DEFENSA CIVIL BOER-PERU DE CHACLACAYO ( BRIGADA OPERATIVA PARA EMERGENCIAS Y RESCATE)<\/td><\/tr><tr><td>DF MEXICO<\/td><td>FUNDACION AMIGOS NEFRO CA PARA NI\u00f1OS CON INSUFICIENCIA RENAL<\/td><\/tr><tr><td>MONTERREY MEXICO<\/td><td>FUNDACION AMIGOS NEFRO CA PARA NI\u00f1OS CON INSUFICIENCIA RENAL<\/td><\/tr><tr><td>MONTEVIDEO URUGUAY&nbsp;&nbsp;<\/td><td>HOGAR LOS PINOS<\/td><\/tr><tr><td>SANTIAGO CHILE&nbsp;&nbsp;<\/td><td>ALDEAS INFANTILES<\/td><\/tr><tr><td>LA PAZ BOLIVIA&nbsp;&nbsp;<\/td><td>CENTRO BETANIA<\/td><\/tr><tr><td>ASUNCION PARAGUAY&nbsp;&nbsp;<\/td><td>COMEDOR SOCIAL DE NI\u00f1OS EN SITUACION DE CALLE J F ESTIGARRIBIA<\/td><\/tr><tr><td>SAN SALVADOR EL SALVADOR&nbsp;&nbsp;<\/td><td>FUNDACION FE Y ALEGRIA<\/td><\/tr><tr><td>CIUDAD DE GUATEMALA&nbsp;&nbsp;<\/td><td>HOGAR NUESTRA SE\u00f1ORA DE LOS REMEDIOS<\/td><\/tr><tr><td>TEGUCIGALPA HONDURAS&nbsp;&nbsp;<\/td><td>ACOES ASOCIACION COLABORACION Y ESFUERZO HONDURAS<\/td><\/tr><tr><td>MANAGUA NICARAGUA&nbsp;&nbsp;<\/td><td>FUNDACION MIRNA UGARTE<\/td><\/tr><tr><td>SAN JOSE COSTA RICA&nbsp;&nbsp;<\/td><td>OBRAS DEL ESPIRITU SANTO<\/td><\/tr><tr><td>CIUDAD DE PANAMA&nbsp;&nbsp;<\/td><td>ORFELINATO SAN JOSE DE MALAMBO<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"862\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay.jpg\" alt=\"\" class=\"wp-image-862\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"620\" data-id=\"864\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay27.jpg\" alt=\"\" class=\"wp-image-864\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay27.jpg 600w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay27-290x300.jpg 290w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"866\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay26.jpg\" alt=\"\" class=\"wp-image-866\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay26.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay26-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay26-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"800\" data-id=\"863\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay25.jpg\" alt=\"\" class=\"wp-image-863\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay25.jpg 600w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay25-225x300.jpg 225w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"865\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24.jpg\" alt=\"\" class=\"wp-image-865\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay24-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" data-id=\"868\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23.jpg\" alt=\"\" class=\"wp-image-868\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay23-768x433.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"869\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay22.jpg\" alt=\"\" class=\"wp-image-869\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay22.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay22-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay22-768x432.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"867\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay21.jpg\" alt=\"\" class=\"wp-image-867\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay21.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay21-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay21-768x432.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<figcaption class=\"blocks-gallery-caption wp-element-caption\"><strong>Im\u00e1genes de Infosecurity Ayuda Argentina 2017<\/strong><\/figcaption><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><thead><tr><th>Pa\u00eds<\/th><th>Ciudad<\/th><th>Responsable<\/th><th>Empresa \/ Instituci\u00f3n<\/th><th>Donaci\u00f3n<\/th><\/tr><\/thead><tbody><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Carlos Lopez<\/td><td>Armada Argentina \/ Universidad Tecnol\u00f3gica Nacional<\/td><td>gabinetes completos, monitores CRT, LED y LCD, perif\u00e9ricos, notebooks, netbooks, memorias, ram, disc os&nbsp; r\u00edgidos y cables de tensi\u00f3n&nbsp;<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Viviana Almada<\/td><td>Banco Naci\u00f3n Argentina<\/td><td>una notebook<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Silvina Puratic<\/td><td>Banco Naci\u00f3n Argentina<\/td><td>una notebook<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Javier G\u00f3mez<\/td><td>Besecure<\/td><td>varios equipos<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Ariel Marin<\/td><td>Colegio de Farmaceuticos de Buenos Aires<\/td><td>Monitores CRT 15\u00a8 (son m\u00e1s de 20)<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Eduardo Diego<\/td><td>Grant Thornton Argentina<\/td><td>equipos o partes de computadoras<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Pablo Barrera<\/td><td>Grupo ODS<\/td><td>varios equipos<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Enrique Chacon \/ Maria Fernanda Paradiso<\/td><td>Machelectronics<\/td><td>Notebook: SONYVAIO Modelo:PCG-9R1 P, Notebook:TOSHIBA Modelo:A100-SP2022, Notebook: DELL Modelo: INSPIRON6400, Notebook: TOSHIBA Modelo: A305SP6923, Monitores de tubo, 1 impresoras Laserjet Hp3020<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Jos\u00e9 Luis Balbano<\/td><td>MEPS<\/td><td>monitor, impresora, parlantes<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Melina Blanco<\/td><td>Particular<\/td><td>una PC (Una Dell Optiplex 320), memorias, disc os&nbsp; r\u00edgidos, etc<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Jose Agustin Piccini<\/td><td>Prensario TI<\/td><td>Perif\u00e9ricos, Computadoras, cables, c\u00e1maras de fotos viejas, etc<\/td><\/tr><tr><td>Argentina<\/td><td>Buenos Aires<\/td><td>Ines Donato<\/td><td>TemisLostalo<\/td><td>6 CPU 3 Monitores 4 Teclados 1 Impresora 2 Notebooks 1 Parlante 2 Cajas con memorias, disc os&nbsp; rigidos, Placas de red<\/td><\/tr><tr><td>Argentina<\/td><td>La Plata<\/td><td>Diego Gomez<\/td><td>Caja de Policia<\/td><td>varios equipos<\/td><\/tr><tr><td>Argentina<\/td><td>Mendoza<\/td><td>Erica Gonzal ez<\/td><td>Aguas Mendocinas<\/td><td>varios equipos<\/td><\/tr><tr><td>Argentina<\/td><td>Mendoza<\/td><td>Gabriel Marchiori<\/td><td>Aguas Mendocinas<\/td><td>varios equipos<\/td><\/tr><tr><td>Bolivia<\/td><td>Santa Cruz<\/td><td>Rene Pinto<\/td><td>Dicosys<\/td><td>Muchos equipos (a reparar)<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Jose Luis Flores Salas<\/td><td>Carabineros<\/td><td>varios equipos<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Jose Guerra<\/td><td>Guerra y Asoc Arquitectura<\/td><td>Plotter, impresoras, pv, monitores<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Karina Gonzal ez<\/td><td>Kapastudy<\/td><td>equipos de impresi\u00f3n<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Andres Grille<\/td><td>Knight Pi\u00e9sold<\/td><td>Varios equipos, impresoras, cables y hardware en general (a reparar algunos)<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Fabian Donoso<\/td><td>Laboratorios gar den House Holding<\/td><td>varios equipos<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Jos\u00e9 Miguel Valenzuela<\/td><td>MANFREDO BRAUCHLE<\/td><td>Varios equipos<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Roberto Silva Ruiz Tagle<\/td><td>RTComputacion<\/td><td>varios equipos<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Jakob Eissler<\/td><td>Seguros Continental<\/td><td>equipos dados de baja (computadores que contienen piezas que podr\u00edan ser de utilidad)<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Luis Fernando Millan Rivera<\/td><td>Surtiventas<\/td><td>Partes de equipos port\u00e1tiles, torres, impresoras, monitores , t\u00f3ner de impresoras laser<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Francisca Basoalto<\/td><td>Teknovoice Ingenieria<\/td><td>varios equipos<\/td><\/tr><tr><td>Chile<\/td><td>Santiago<\/td><td>Daniel Roitburd<\/td><td>ViaRed Computaci\u00f3n<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Barranquilla<\/td><td>Jojanis Bola\u00f1o Horlandy<\/td><td>Particular<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Barranquilla<\/td><td>Leonardo Lobelo<\/td><td>Sicte<\/td><td>partes de equipos&nbsp;<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Mery Aponte<\/td><td>Aspaen<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Jose Jaime Galvis Gomez<\/td><td>BCD tr avel<\/td><td>CPU (a reparar)<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Gretel Torres Espinosa<\/td><td>Cafam<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Martha Yaneth Reyes Gonzal ez<\/td><td>Camale\u00f3n mult imedia<\/td><td>4 torres atx a reparar (no funcionan ni board, ni procesador, ni monitores, ni fuentes)<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Wilmer Rosiasco Rodriguez<\/td><td>Claro<\/td><td>1 PC de Escritorio, 2 Reguladores, 2 Tel\u00e9fonos inal\u00e1mbricos, 2 Tel\u00e9fonos al\u00e1mbricos, 1 Board, 6 tarjetas de Red, 1 Modem, 2 Fuentes de Poder CPU, 1 Teclado Notebook Cables UTP varios<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Jackson Arnuldo Cardenas Escobar<\/td><td>Ejercito Naci\u00f3nal<\/td><td>2 Monitores<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Jeysson R Celis C&nbsp;<\/td><td>Innercia<\/td><td>equipos&nbsp;<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Mauricio Llanos&nbsp;<\/td><td>Medicina Estatal de Colombia<\/td><td>una cpu clone<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Juan Carlos Melandia<\/td><td>Nemo Estudio<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Jonathan Bohorquez<\/td><td>Non Plus Ultra<\/td><td>1 PC de Escritorio (Torre, Monitor CRT, Teclado, Mouse, Camara), 1 Multifuncional, 2 Multitomas, 2 Reguladores, 3 Tel\u00e9fonos inal\u00e1mbricos, 2 Tel\u00e9fonos al\u00e1mbricos 1 Board, tarjetas de Red, 1 Modem, 2 Fuentes de Poder CPU, 1 Teclado Notebook Cables UTP<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Wilmar Guarnizo<\/td><td>Primestone<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Ronald Cardozo<\/td><td>Roa Sarmiento Abogados<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Bogota<\/td><td>Castro Gutierrez Robert Dario<\/td><td>Un Bosque<\/td><td>Portatiles, un monitor CRT para dise\u00f1o grafico,&nbsp; CPU Pentium, etc<\/td><\/tr><tr><td>Colombia<\/td><td>Cali<\/td><td>Jaime Medina<\/td><td>HV<\/td><td>equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Cali<\/td><td>Noelia Leal<\/td><td>Vision y Marketing<\/td><td>Varias pc y otros componentes<\/td><\/tr><tr><td>Colombia<\/td><td>Medellin<\/td><td>David Vitale<\/td><td>A.I.T Technology<\/td><td>equipos de computo, impresoras, UPS<\/td><\/tr><tr><td>Colombia<\/td><td>Medellin<\/td><td>Alvaro Alexander Soto<\/td><td>Asoto Technoogy Group<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Medellin<\/td><td>Martin Abraham Arboleda Montoya<\/td><td>CI Estrada Velasquez<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Medellin<\/td><td>Jose David Castaneda Gomez<\/td><td>Grupo Log\u00edstico TCC<\/td><td>varios equipos<\/td><\/tr><tr><td>Colombia<\/td><td>Medellin<\/td><td>Luis Santiago Hoyos Arango&nbsp;<\/td><td>INVESA<\/td><td>5 portatiles, 2 tablets, 3 celulares<\/td><\/tr><tr><td>Colombia&nbsp;<\/td><td>Bogota<\/td><td>Rene Cardozo<\/td><td>Alarmas y servicios de Colombia<\/td><td>algunos equipos&nbsp;<\/td><\/tr><tr><td>Colombia&nbsp;<\/td><td>Bogota<\/td><td>Luis Ernesto Arias Bernal&nbsp;<\/td><td>Colpatria Multibanca del Grupo Scotiabank&nbsp;<\/td><td>1 monitor CRT y CPU (de las antiguas)<\/td><\/tr><tr><td>Colombia&nbsp;<\/td><td>Bogota<\/td><td>Sandra Patricia Ferreira Perez&nbsp;<\/td><td>Medicina Estatal de Colombia<\/td><td>varios equipos<\/td><\/tr><tr><td>Ecuador<\/td><td>Guayaquil<\/td><td>Marcel Mensch<\/td><td>Tecnoav&nbsp;&nbsp;<\/td><td>varios equipos<\/td><\/tr><tr><td>Ecuador<\/td><td>Quito<\/td><td>William Franco<\/td><td>Aseguradora del Sur<\/td><td>CPU&#8217;s, monitores, cables, accesorios, impresoras, muebles.<\/td><\/tr><tr><td>Ecuador<\/td><td>Quito<\/td><td>Patricia Viracocha<\/td><td>Instituto Tecnol\u00f3gico Superior Cordillera<\/td><td>varios equipos<\/td><\/tr><tr><td>Ecuador<\/td><td>Quito<\/td><td>Pedro Calle<\/td><td>Manager<\/td><td>Case, teclados, monitores, impresoras inyeccion (a reparar)<\/td><\/tr><tr><td>Ecuador<\/td><td>Quito<\/td><td>Pablo Aguilera Carvallo<\/td><td>Mutualista Azuay<\/td><td>varios equipos<\/td><\/tr><tr><td>Ecuador<\/td><td>Quito<\/td><td>Jorge Gonzal ez<\/td><td>Uninova<\/td><td>entregarles equipos, partes de computadores&nbsp;<\/td><\/tr><tr><td>El Salvador<\/td><td>San Salvador<\/td><td>Walter Seballos<\/td><td>Banco Cuscatlan<\/td><td>un cpu , un monitor y un teclado<\/td><\/tr><tr><td>El Salvador<\/td><td>San Salvador<\/td><td>Hector Jimenez<\/td><td>Multivalores<\/td><td>1 Impresor de inyecci\u00f3n de tinta, un disco duro<\/td><\/tr><tr><td>El Salvador<\/td><td>San Salvador<\/td><td>Rene Andrade Hernandez<\/td><td>Superintendencia del Sistema Financiero<\/td><td>varios equipos<\/td><\/tr><tr><td>Guatemala<\/td><td>Guatemala<\/td><td>Brenda Gonzal ez<\/td><td>Bright Star<\/td><td>varios equipos<\/td><\/tr><tr><td>Guatemala<\/td><td>Guatemala<\/td><td>Justiniano Soto Aguilar<\/td><td>Ingenio Pantaleon<\/td><td>algunos equipos que aun funcionan<\/td><\/tr><tr><td>Guatemala<\/td><td>Guatemala<\/td><td>Axel Palma Martinez<\/td><td>Perenco Guatemala<\/td><td>90 equipos (calculadoras, computadoras, desktops, laptops, monitores CRT, teclados)<\/td><\/tr><tr><td>Honduras<\/td><td>Tegucigalpa<\/td><td>Albert Ernesto Varela Salgado<\/td><td>Bancatlan<\/td><td>monitores CRT y CPU<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>Luz Elena Alvarado Rodriguez<\/td><td>Almacenadora Mercader<\/td><td>Computadoras, impresoras, monitores<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>Ignacio Callejas Gonz\u00e1l ez<\/td><td>Colegio Atid<\/td><td>varios equipos<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>Ruben Mu\u00f1iz<\/td><td>Compuexpress<\/td><td>monitores CRT, disc os&nbsp; duros, CPU\u00b4s, gabinetes, etc<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>Ricardo Mones<\/td><td>Cyberpower<\/td><td>1 Impresora SAMSUNG y 1 EPSON<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>Ana Cartagena<\/td><td>Excelerate Systems&nbsp;<\/td><td>laptops, impresoras, fax<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>David Molina<\/td><td>P.T.I. de M\u00e9xico<\/td><td>No Break&nbsp; con Onda&nbsp; Senoidal 1000 VA puerto RS232<\/td><\/tr><tr><td>Mexico<\/td><td>CDMX<\/td><td>Alfredo Vazquez<\/td><td>Solcor Extensiones Electricas<\/td><td>varios equipos<\/td><\/tr><tr><td>Nicaragua<\/td><td>Managua<\/td><td>Yader Hernando Romero<\/td><td>Gildan<\/td><td>varios equipos<\/td><\/tr><tr><td>Panama<\/td><td>Panama<\/td><td>Ivette Ursulina Markland Louis&nbsp;<\/td><td>Cerveceria Naci\u00f3nal de Panama<\/td><td>varios equipos<\/td><\/tr><tr><td>Panama<\/td><td>Panama<\/td><td>Franklin Merida<\/td><td>Ittera<\/td><td>varios equipos<\/td><\/tr><tr><td>Paraguay<\/td><td>Asuncion<\/td><td>Ingrid Gauto<\/td><td>Farmaceutica Paraguaya<\/td><td>varios equipos<\/td><\/tr><tr><td>Paraguay<\/td><td>Asuncion<\/td><td>Soledad Molina de Morales<\/td><td>Mida<\/td><td>varios equipos<\/td><\/tr><tr><td>Peru<\/td><td>Cusco<\/td><td>Julio Revatta Tagle<\/td><td>CIP<\/td><td>varios equipos<\/td><\/tr><tr><td>Peru<\/td><td>Lima<\/td><td>Jose Zegarra Malatesta<\/td><td>Applisys IT USERS Magazine<\/td><td>Routers, impresoras port\u00e1tiles, HDDs, teclados, cables y hubs USB, regletas, etc.<\/td><\/tr><tr><td>Peru<\/td><td>Lima<\/td><td>Sandra Romero<\/td><td>Aramsa<\/td><td>computadoras<\/td><\/tr><tr><td>Peru<\/td><td>Lima<\/td><td>Daniel Alor Garate<\/td><td>Cencosud Peru<\/td><td>2 laptops (a reparar)&nbsp;<\/td><\/tr><tr><td>Peru<\/td><td>Lima<\/td><td>Freddy Rodriguez<\/td><td>Particular<\/td><td>varios equipos<\/td><\/tr><tr><td>Peru<\/td><td>Lima<\/td><td>Enrique Heriz<\/td><td>Kiputronica<\/td><td>equipos<\/td><\/tr><tr><td>Peru<\/td><td>Lima<\/td><td>Julio Rafael Calder\u00f3n Ramos<\/td><td>Sistemas de C\u00f3mputo H&amp;S<\/td><td>varios equipos<\/td><\/tr><tr><td>Peru&nbsp;<\/td><td>Lima<\/td><td>A confirmar<\/td><td>COMEX SER<\/td><td>varios equipos<\/td><\/tr><tr><td>Puerto Rico<\/td><td>San Juan<\/td><td>Keila I Rivera Matos<\/td><td>Comisi\u00f3n Desarrollo Cooperativo de P.R.<\/td><td>varios equipos<\/td><\/tr><tr><td>Puerto Rico<\/td><td>San Juan<\/td><td>Raul Santiago<\/td><td>COSVI<\/td><td>10 computadoras con teclado, mouse y monitor<\/td><\/tr><tr><td>Puerto Rico<\/td><td>San Juan<\/td><td>Pedro Torres<\/td><td>RJA<\/td><td>Horas<\/td><\/tr><tr><td>Puerto Rico<\/td><td>San Juan<\/td><td>Jean Carlos Melendez<\/td><td>Vernetwork<\/td><td>cuadros telef\u00f3nicos, con tel\u00e9fonos, server, desktops, laptops ,etc.<\/td><\/tr><tr><td>Rep Dominicana<\/td><td>Santo Domingo<\/td><td>Benjamin Solano<\/td><td>Compuser<\/td><td>varios equipos<\/td><\/tr><tr><td>Uruguay<\/td><td>Montevideo<\/td><td>Enrique Massonnier<\/td><td>Banco&nbsp; Oriental<\/td><td>Un equipo<\/td><\/tr><tr><td>Uruguay<\/td><td>Montevideo<\/td><td>Ignacio Puig<\/td><td>C\u00e1mara de Comercio y Servicios del Uruguay&nbsp;&nbsp;<\/td><td>20 torres de PC, 5 monitores ,30 impresoras, etc<\/td><\/tr><tr><td>Uruguay<\/td><td>Montevideo<\/td><td>Diego Lanza<\/td><td>Creditel<\/td><td>10 torres de PC , monitor CRT, varias Impresoras, cables variados<\/td><\/tr><tr><td>Uruguay<\/td><td>Montevideo<\/td><td>Alejandro Ferreira<\/td><td>Datacom<\/td><td>varios equipos<\/td><\/tr><tr><td>Venezuela<\/td><td>Caracas<\/td><td>Francisco Sanchez<\/td><td>Alcaldia de Silva<\/td><td>varios equipos<\/td><\/tr><tr><td>Venezuela<\/td><td>Caracas<\/td><td>Sheyla Coromoto Von der Brelje Delli Compagni<\/td><td>Ceyde Consultores<\/td><td>monitores CRT, varios CPU , teclados, mouses P S 2 y unidades de CD de 52x<\/td><\/tr><tr><td>Venezuela<\/td><td>Caracas<\/td><td>Abel Ulacio&nbsp;<\/td><td>Data Corp 21<\/td><td>varios equipos<\/td><\/tr><tr><td>Venezuela<\/td><td>Caracas<\/td><td>Edwin Fuentes<\/td><td>Sitef de Venezuela<\/td><td>varios equipos<\/td><\/tr><tr><td>Venezuela<\/td><td>Caracas<\/td><td>Vicente Rodriguez<\/td><td>Sudeban<\/td><td>horas<\/td><\/tr><tr><td>Venezuela<\/td><td>Caracas<\/td><td>Danny Villar<\/td><td>VR2001Consulting Group<\/td><td>Monitores CRT, partes y piezas de computadores, case y fuentes.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>Campa\u00f1a 2016 &#8211; 2015<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"717\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay30-1024x717.jpg\" alt=\"\" class=\"wp-image-884\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay30-1024x717.jpg 1024w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay30-300x210.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay30-768x538.jpg 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay30.jpg 1100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" data-id=\"885\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0001.jpg\" alt=\"\" class=\"wp-image-885\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0001.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0001-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0001-768x432.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" data-id=\"893\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0002.jpg\" alt=\"\" class=\"wp-image-893\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0002.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0002-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0002-768x432.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"887\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0003.jpg\" alt=\"\" class=\"wp-image-887\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0003.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0003-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"886\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0004.jpg\" alt=\"\" class=\"wp-image-886\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0004.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0004-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"888\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0005.jpg\" alt=\"\" class=\"wp-image-888\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0005.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0005-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"890\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0006.jpg\" alt=\"\" class=\"wp-image-890\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0006.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0006-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"894\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0007.jpg\" alt=\"\" class=\"wp-image-894\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0007.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0007-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"891\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0008.jpg\" alt=\"\" class=\"wp-image-891\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0008.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0008-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"889\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0009.jpg\" alt=\"\" class=\"wp-image-889\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0009.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0009-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"921\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0010.jpg\" alt=\"\" class=\"wp-image-921\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0010.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0010-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"904\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0011.jpg\" alt=\"\" class=\"wp-image-904\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0011.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0011-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"923\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0012.jpg\" alt=\"\" class=\"wp-image-923\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0012.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0012-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"905\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0013.jpg\" alt=\"\" class=\"wp-image-905\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0013.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0013-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"922\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0014.jpg\" alt=\"\" class=\"wp-image-922\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0014.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0014-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"597\" height=\"625\" data-id=\"940\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0015.jpg\" alt=\"\" class=\"wp-image-940\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0015.jpg 597w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0015-287x300.jpg 287w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"941\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0016.jpg\" alt=\"\" class=\"wp-image-941\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0016.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0016-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0016-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"979\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0017.jpg\" alt=\"\" class=\"wp-image-979\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0017.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0017-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0017-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"980\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0018.jpg\" alt=\"\" class=\"wp-image-980\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0018.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0018-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0018-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"943\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0019.jpg\" alt=\"\" class=\"wp-image-943\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0019.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0019-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0019-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"958\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0020.jpg\" alt=\"\" class=\"wp-image-958\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0020.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0020-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0020-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"977\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0021.jpg\" alt=\"\" class=\"wp-image-977\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0021.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0021-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0021-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"970\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0022.jpg\" alt=\"\" class=\"wp-image-970\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0022.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0022-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0022-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"963\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0023.jpg\" alt=\"\" class=\"wp-image-963\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0023.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0023-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0023-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"973\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0024.jpg\" alt=\"\" class=\"wp-image-973\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0024.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0024-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0024-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"972\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0025.jpg\" alt=\"\" class=\"wp-image-972\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0025.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0025-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0025-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"896\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0026.jpg\" alt=\"\" class=\"wp-image-896\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0026.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0026-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"897\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0027.jpg\" alt=\"\" class=\"wp-image-897\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0027.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0027-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"907\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0028.jpg\" alt=\"\" class=\"wp-image-907\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0028.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0028-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"942\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0029.jpg\" alt=\"\" class=\"wp-image-942\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0029.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0029-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"640\" data-id=\"906\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0030.jpg\" alt=\"\" class=\"wp-image-906\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0030.jpg 480w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0030-225x300.jpg 225w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"924\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0031.jpg\" alt=\"\" class=\"wp-image-924\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0031.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0031-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"925\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0032.jpg\" alt=\"\" class=\"wp-image-925\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0032.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0032-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"926\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0033.jpg\" alt=\"\" class=\"wp-image-926\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0033.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0033-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"927\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0034.jpg\" alt=\"\" class=\"wp-image-927\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0034.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0034-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"944\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0035.jpg\" alt=\"\" class=\"wp-image-944\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0035.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0035-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0035-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"964\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0036.jpg\" alt=\"\" class=\"wp-image-964\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0036.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0036-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0036-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"971\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0037.jpg\" alt=\"\" class=\"wp-image-971\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0037.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0037-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0037-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"975\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0038.jpg\" alt=\"\" class=\"wp-image-975\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0038.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0038-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0038-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"800\" data-id=\"952\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0039.jpg\" alt=\"\" class=\"wp-image-952\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0039.jpg 600w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0039-225x300.jpg 225w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"930\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0040.jpg\" alt=\"\" class=\"wp-image-930\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0040.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0040-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0040-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"929\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0041.jpg\" alt=\"\" class=\"wp-image-929\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0041.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0041-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"909\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0042.jpg\" alt=\"\" class=\"wp-image-909\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0042.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0042-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"898\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0043.jpg\" alt=\"\" class=\"wp-image-898\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0043.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0043-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"910\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0044.jpg\" alt=\"\" class=\"wp-image-910\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0044.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0044-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"931\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0045.jpg\" alt=\"\" class=\"wp-image-931\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0045.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0045-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"945\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0046.jpg\" alt=\"\" class=\"wp-image-945\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0046.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0046-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"911\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0047.jpg\" alt=\"\" class=\"wp-image-911\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0047.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0047-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"908\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0048.jpg\" alt=\"\" class=\"wp-image-908\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0048.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0048-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"912\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0049.jpg\" alt=\"\" class=\"wp-image-912\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0049.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0049-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"640\" data-id=\"913\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0050.jpg\" alt=\"\" class=\"wp-image-913\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0050.jpg 480w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0050-225x300.jpg 225w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"932\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0051.jpg\" alt=\"\" class=\"wp-image-932\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0051.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0051-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0051-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"946\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0052.jpg\" alt=\"\" class=\"wp-image-946\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0052.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0052-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0052-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"949\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0053.jpg\" alt=\"\" class=\"wp-image-949\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0053.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0053-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0053-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"966\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0054.jpg\" alt=\"\" class=\"wp-image-966\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0054.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0054-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0054-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"895\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0055.jpg\" alt=\"\" class=\"wp-image-895\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0055.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0055-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"914\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0056.jpg\" alt=\"\" class=\"wp-image-914\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0056.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0056-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"640\" data-id=\"915\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0057.jpg\" alt=\"\" class=\"wp-image-915\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0057.jpg 480w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0057-225x300.jpg 225w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"899\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0058.jpg\" alt=\"\" class=\"wp-image-899\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0058.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0058-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"933\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0059.jpg\" alt=\"\" class=\"wp-image-933\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0059.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0059-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"934\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0060.jpg\" alt=\"\" class=\"wp-image-934\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0060.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0060-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"954\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0061.jpg\" alt=\"\" class=\"wp-image-954\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0061.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0061-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0061-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"935\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0062.jpg\" alt=\"\" class=\"wp-image-935\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0062.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0062-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0062-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"959\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0063.jpg\" alt=\"\" class=\"wp-image-959\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0063.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0063-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0063-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"976\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0064.jpg\" alt=\"\" class=\"wp-image-976\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0064.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0064-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0064-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"948\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0065.jpg\" alt=\"\" class=\"wp-image-948\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0065.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0065-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0065-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"955\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0066.jpg\" alt=\"\" class=\"wp-image-955\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0066.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0066-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0066-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"960\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0067.jpg\" alt=\"\" class=\"wp-image-960\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0067.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0067-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0067-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"962\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0068.jpg\" alt=\"\" class=\"wp-image-962\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0068.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0068-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0068-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"916\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0069.jpg\" alt=\"\" class=\"wp-image-916\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0069.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0069-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"917\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0070.jpg\" alt=\"\" class=\"wp-image-917\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0070.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0070-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"936\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0071.jpg\" alt=\"\" class=\"wp-image-936\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0071.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0071-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"947\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0072.jpg\" alt=\"\" class=\"wp-image-947\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0072.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0072-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0072-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"956\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0073.jpg\" alt=\"\" class=\"wp-image-956\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0073.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0073-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0073-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"950\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0074.jpg\" alt=\"\" class=\"wp-image-950\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0074.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0074-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0074-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"974\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0075.jpg\" alt=\"\" class=\"wp-image-974\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0075.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0075-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0075-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"967\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0076.jpg\" alt=\"\" class=\"wp-image-967\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0076.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0076-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0076-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"957\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0077.jpg\" alt=\"\" class=\"wp-image-957\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0077.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0077-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0077-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"951\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0078.jpg\" alt=\"\" class=\"wp-image-951\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0078.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0078-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0078-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"901\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0079.jpg\" alt=\"\" class=\"wp-image-901\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0079.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0079-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"939\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0080.jpg\" alt=\"\" class=\"wp-image-939\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0080.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0080-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"938\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0081.jpg\" alt=\"\" class=\"wp-image-938\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0081.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0081-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"900\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0082.jpg\" alt=\"\" class=\"wp-image-900\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0082.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0082-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"919\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0083.jpg\" alt=\"\" class=\"wp-image-919\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0083.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0083-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" data-id=\"937\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0084.jpg\" alt=\"\" class=\"wp-image-937\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0084.jpg 640w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0084-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"953\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0085.jpg\" alt=\"\" class=\"wp-image-953\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0085.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0085-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0085-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"961\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0086.jpg\" alt=\"\" class=\"wp-image-961\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0086.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0086-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0086-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"978\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0087.jpg\" alt=\"\" class=\"wp-image-978\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0087.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0087-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0087-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"965\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0088.jpg\" alt=\"\" class=\"wp-image-965\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0088.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0088-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0088-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"968\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0089.jpg\" alt=\"\" class=\"wp-image-968\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0089.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0089-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0089-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" data-id=\"969\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0090.jpg\" alt=\"\" class=\"wp-image-969\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0090.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0090-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0090-768x576.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"758\" height=\"600\" data-id=\"892\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0094.jpg\" alt=\"\" class=\"wp-image-892\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0094.jpg 758w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0094-300x237.jpg 300w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"758\" height=\"600\" data-id=\"902\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0095.jpg\" alt=\"\" class=\"wp-image-902\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0095.jpg 758w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0095-300x237.jpg 300w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"758\" height=\"600\" data-id=\"903\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0096.jpg\" alt=\"\" class=\"wp-image-903\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0096.jpg 758w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0096-300x237.jpg 300w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" data-id=\"918\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0097.jpg\" alt=\"\" class=\"wp-image-918\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0097.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0097-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0097-768x432.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" data-id=\"920\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0098.jpg\" alt=\"\" class=\"wp-image-920\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0098.jpg 800w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0098-300x169.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ayuda0098-768x432.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/figure>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\"><strong>Agradecemos el aporte de las Instituciones:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><tbody><tr><td>ActivePMO<\/td><td>Adriana Cibelli<\/td><\/tr><tr><td>Allianz Argentina Cia. De Seg. S.A.<\/td><td>Martin Corti<\/td><\/tr><tr><td>AVC<\/td><td>Eduardo Livio&nbsp;<\/td><\/tr><tr><td>Banco de Valores<\/td><td>Diana N. Gando<\/td><\/tr><tr><td>Claro<\/td><td>Fernanda Jandula Torres&nbsp;<\/td><\/tr><tr><td>COPITEC<\/td><td>Myriam E. Torres<\/td><\/tr><tr><td>Galileo Technologies<\/td><td>Emiliano Pungitore<\/td><\/tr><tr><td>Telef\u00f3nica<\/td><td>Mariano Baldinelli<\/td><\/tr><tr><td>Grupo San Miguel<\/td><td>Juan Carlos Bruno Moreno<\/td><\/tr><tr><td>IAFE.UBA<\/td><td>Raul Gabellone<\/td><\/tr><tr><td>ISAURA<\/td><td>Vallejos F\u00e9lix&nbsp;<\/td><\/tr><tr><td>ISEC INFOSECURITY<\/td><td>Alejandra Campolonghi y Mart\u00edn Vila<\/td><\/tr><tr><td>Laboratorios Bag\u00f3<\/td><td>Muzzupappa Jose Luis&nbsp;<\/td><\/tr><tr><td>Laboratorios Bag\u00f3<\/td><td>Mucilli Roberto<\/td><\/tr><tr><td>Macowens<\/td><td>Sebasti\u00e1n Mora&nbsp;<\/td><\/tr><tr><td>Metrogas<\/td><td>Viviana Baril\u00e1<\/td><\/tr><tr><td>O.S.Pe.Con. &#8211; Red Social U.O.C.R.A.<\/td><td>Javier J. L\u00f3pez<\/td><\/tr><tr><td>O.S.Pe.Con. &#8211; Red Social U.O.C.R.A.<\/td><td>Nahuel Garcia<\/td><\/tr><tr><td>Obra social DIBA (Armada Argentina)<\/td><td>Omar Horacio Mesiano<\/td><\/tr><tr><td>Panda<\/td><td>Alvaro Posada&nbsp;<\/td><\/tr><tr><td>Particular<\/td><td>Juan Carlos Fondevila<\/td><\/tr><tr><td>Provicanje<\/td><td>Claudio Carrizo&nbsp;<\/td><\/tr><tr><td>SMC<\/td><td>Santiago Recondo&nbsp;<\/td><\/tr><tr><td>Starwood Hotels&nbsp;<\/td><td>Oscar Maglio<\/td><\/tr><tr><td>Telecom Argentina<\/td><td>Marcelo Carella&nbsp;<\/td><\/tr><tr><td>Universidad Cat\u00f3lica Argentina<\/td><td>Cesar Augusto Wallasch&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-black-color has-text-color\"><tbody><tr><td>Impresora<\/td><td>20<\/td><\/tr><tr><td>Monitor<\/td><td>10<\/td><\/tr><tr><td>Computadoras de escritorio<\/td><td>55<\/td><\/tr><tr><td>Switch<\/td><td>1<\/td><\/tr><tr><td>Calculadora<\/td><td>2<\/td><\/tr><tr><td>Fax<\/td><td>2<\/td><\/tr><tr><td>Scanner<\/td><td>2<\/td><\/tr><tr><td>Central Telef\u00f3nica<\/td><td>1<\/td><\/tr><tr><td>Auriculares<\/td><td>1<\/td><\/tr><tr><td>Cables de conexi\u00f3n y cargadores<\/td><td>1 bolsa<\/td><\/tr><tr><td>Computadoras de escritorio<\/td><td>61<\/td><\/tr><tr><td>Discos R\u00edgidos<\/td><td>49<\/td><\/tr><tr><td>Faxes<\/td><td>9<\/td><\/tr><tr><td>Gabinetes, mothers, micros<\/td><td>26<\/td><\/tr><tr><td>Impresoras<\/td><td>31<\/td><\/tr><tr><td>Insumos para reparaci\u00f3n, placas, etc.<\/td><td>1 caja<\/td><\/tr><tr><td>Lectoras de CD\/DVD<\/td><td>23<\/td><\/tr><tr><td>Memorias<\/td><td>119<\/td><\/tr><tr><td>Modems<\/td><td>6<\/td><\/tr><tr><td>Monitores<\/td><td>77<\/td><\/tr><tr><td>Mouses<\/td><td>2<\/td><\/tr><tr><td>Notebooks<\/td><td>4<\/td><\/tr><tr><td>Parlantes<\/td><td>1<\/td><\/tr><tr><td>Proyectores<\/td><td>1<\/td><\/tr><tr><td>Scanners<\/td><td>2<\/td><\/tr><tr><td>Tablets<\/td><td>5<\/td><\/tr><tr><td>Teclados<\/td><td>3<\/td><\/tr><tr><td>Tel\u00e9fonos fijos<\/td><td>2<\/td><\/tr><tr><td>Unidades de red (servidores para rack)<\/td><td>3<\/td><\/tr><tr><td>Unidades de potencia interrumpida y Bater\u00edas<\/td><td>21<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"\u00bfQu\u00e9 es la Fundaci\u00f3n Equidad?\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/U5UciZolZXo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>&nbsp;PROGRAMA TECNOACTIVA&nbsp; &#8211; MI BARRIO MI LUGAR 2014<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"557\" height=\"100\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay31.jpg\" alt=\"\" class=\"wp-image-1000\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay31.jpg 557w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay31-300x54.jpg 300w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/MKTG-SOCIAL.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">La nueva era del marketing,&nbsp;LA RESPONSABILIDAD SOCIAL&nbsp;(ampliar&#8230;)<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ISECTOUR2014.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Informe de prensa&nbsp;INFOSECURITY TOUR 2014&nbsp;(ampliar&#8230;)<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/Press.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Social Team&nbsp;AGENCIA DE RESPONSABILIDAD SOCIAL&nbsp;(ampliar&#8230;)<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color has-medium-font-size\">\u201cEl equipo de&nbsp;SOCIAL TEAM&nbsp;comparti\u00f3 un evento del d\u00eda del ni\u00f1o \u00fanico en la&nbsp;Asociaci\u00f3n R\u00edo Luj\u00e1n\u00bb<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"1024\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay33-482x1024.jpeg\" alt=\"\" class=\"wp-image-1008\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay33-482x1024.jpeg 482w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay33-141x300.jpeg 141w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay33.jpeg 600w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-black-color has-text-color\" style=\"font-size:14px\">Integrados en el programa MI BARRIO, MI LUGAR, SOCIAL TEAM y sus partners compartieron el evento del d\u00eda del ni\u00f1o que convoc\u00f3 a los j\u00f3venes de la regi\u00f3n de Campana en la Asociaci\u00f3n R\u00edo Luj\u00e1n.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\" style=\"font-size:14px\">El d\u00eda del ni\u00f1o se festejaba en la Asociaci\u00f3n de ni\u00f1os R\u00edo Luj\u00e1n cuando el equipo de SOCIAL TEAM se integro con sus partners para darle una nueva alegr\u00eda. Con sorpresas, regalos y aportes para la instituci\u00f3n, el equipo sorprendi\u00f3 a los ni\u00f1os y sus familias que obtuvieron nuevos obsequios.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\" style=\"font-size:14px\">Un gran show de entrega de los productos de tecnolog\u00eda divirti\u00f3 a toda la comunidad, con la felicidad de cada ni\u00f1o que iba recibiendo su premio. Este evento se contin\u00fao con una gran merienda llena de dulces y bebidas en donde toda la comunidad y su parroquia asistieron.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\" style=\"font-size:14px\">Esta acci\u00f3n enmarcada en el programa social MI BARRIO, MI LUGAR de atenci\u00f3n a instituciones infantiles se pudo realizar conjuntamente con la integraci\u00f3n de los partners sociales de SOCIAL TEAM que formaron un equipo socialmente responsable;<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; WEBER SAINT-GOBAIN quien integro sus gorros y remeras para los ni\u00f1os.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; DONWEB y sus herramientas de conectividad tecnol\u00f3gicas potenciaron el evento hac\u00eda toda la comunidad.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; FABER CASTELL comparti\u00f3 sus productos escolares de todo tipo, equipando los talleres art\u00edsticos de ambas organizaciones y regal\u00e1ndole \u00fatiles a los ni\u00f1os de cada una.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; MARENGO y sus golosinas sorprendieron a todos los ni\u00f1os.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; INFOSECURITY participo con las hamburguesas, panes y alimentos para un gran almuerzo junto a los j\u00f3venes de Grupo Esperanza.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; SOFITEL \u2013 RESERVA \u201cLOS CARDALES\u201d potencio todos los eventos con sus dulces, golosinas y entretenimientos en shows art\u00edsticos.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; ORFANO PANADER\u00edA le ofreci\u00f3 a los j\u00f3venes sus dulces y delicias para que disfruten un gran desayuno y merienda.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; WITY WITY y sus sorpresas brindaron una alegr\u00eda a los ni\u00f1os m\u00e1s peque\u00f1os con sus productos infantiles.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; ARIATA &amp; CLUB DEL POSTER y sus vestimentas equiparon a todo el equipo de SOCIAL TEAM con sus nuevas remeras.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">&#8211; ACEGAME y sus productos de tecnolog\u00eda alegraron a todos los ni\u00f1os con nuevos juegos y entretenimientos.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1018\" height=\"450\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay32.jpeg\" alt=\"\" class=\"wp-image-1005\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay32.jpeg 1018w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay32-300x133.jpeg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay32-768x339.jpeg 768w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/figure>\n<\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-black-background-color has-text-color has-background has-medium-font-size\"><strong>2015 PRIMER INFOSECURITY AYUDA<\/strong>&nbsp;en<strong>&nbsp;Buenos Aires<\/strong>, en el<strong>&nbsp;HOTEL PANAMERICANO<\/strong>&nbsp;frente al Obelisco.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Este a\u00f1o desde ISEC vamos a<strong>&nbsp;DONAR el 100%<\/strong>&nbsp;de lo recaudado de parte de los Patrocinadores a  la<strong>&nbsp;FUNDACI\u00f3N PUPI.<\/strong>&nbsp;Para poder asistir a las tradicionales<strong>&nbsp;CONFERENCIAS ACAD\u00e9MICAS CON expositores de Estados Unidos y varios pa\u00edses mas, como desde hace 10 a\u00f1os<\/strong>, le pedimos pueda<strong>&nbsp;COLABORAR trayendo<\/strong>&nbsp;alg\u00fan elemento que pudiera servirle a los Ni\u00f1os de la Fundaci\u00f3n (nos solicitaron principalmente<strong>&nbsp;\u00faTILES ESCOLARES<\/strong>, pero tambi\u00e9n puede ser vestimenta, alimentaci\u00f3n, juguetes, por favor traerlo en sobre CERRADO para que solo UD conozca cual es su colaboraci\u00f3n y lo entregara a las personas de la FUNDACI\u00f3N que estar\u00e1n en la RECEPCI\u00f3N).<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Muchas gracias a los mas de<strong>&nbsp;1000<\/strong>&nbsp;asistentes y empresas que en tan poco tiempo se han sumado a colaborar. Compartimos el agradecimiento de la FUNDACION PUPI con todos uds de parte del todo el equipo de ISEC INFOSECURITY.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Esto demuestra que cada uno de nosotros somos un eslab\u00f3n important\u00edsimo de una gran cadena de valor solidario a favor de garantizar el cumplimiento de los derechos de los ni\u00f1os.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Como fundaci\u00f3n estamos muy agradecidos y apoyamos siempre este tipo de iniciativas porque creemos&nbsp; en la responsabilidad social y en la solidaridad que promueve la inclusi\u00f3n, por eso agradecemos a Info Security por la importante ayuda recibida y a todos los que colaboraron. Muchas gracias\u201d<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay35-683x1024.jpg\" alt=\"\" class=\"wp-image-1013\" style=\"width:180px;height:269px\" width=\"180\" height=\"269\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay35-683x1024.jpg 683w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay35-200x300.jpg 200w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay35-768x1152.jpg 768w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay35.jpg 794w\" sizes=\"auto, (max-width: 180px) 100vw, 180px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"348\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay34.jpg\" alt=\"\" class=\"wp-image-1014\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay34.jpg 460w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay34-300x227.jpg 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"529\" data-id=\"1016\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay39.jpg\" alt=\"\" class=\"wp-image-1016\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay39.jpg 794w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay39-300x200.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay39-768x512.jpg 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"529\" data-id=\"1018\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay38.jpg\" alt=\"\" class=\"wp-image-1018\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay38.jpg 794w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay38-300x200.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay38-768x512.jpg 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"529\" data-id=\"1017\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay37.jpg\" alt=\"\" class=\"wp-image-1017\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay37.jpg 794w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay37-300x200.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay37-768x512.jpg 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"529\" data-id=\"1015\" src=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay36.jpg\" alt=\"\" class=\"wp-image-1015\" srcset=\"https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay36.jpg 794w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay36-300x200.jpg 300w, https:\/\/isec-infosecurity.com\/vip\/wp-content\/uploads\/2022\/03\/ay36-768x512.jpg 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure>\n<\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cLa verdad que me pone muy feliz la convocatoria y es un motivo de orgullo que en un evento tan importante como este se realice esta acci\u00f3n de responsabilidad social empresaria a beneficio de la Fundaci\u00f3n PUPI.<\/p>\n<cite>PUPI Zannetti<\/cite><\/blockquote>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una de las cosas que m\u00e1s nos hace FELICES es poder AYUDAR!&nbsp;por eso Infosecurity Ayuda te invita a colaborar: 2022 REP\u00daBLICA DOMINICANA &#8211; COLABORACI\u00d3N CON FUNDACI\u00d3N DE NI\u00d1OS \u2013 ALDEAS INFANTILES SOS Buenas tardes mis estimados, Muchas gracias a ustedes<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-builder.php","meta":{"footnotes":""},"class_list":["post-773","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages\/773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/comments?post=773"}],"version-history":[{"count":85,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages\/773\/revisions"}],"predecessor-version":[{"id":2247,"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/pages\/773\/revisions\/2247"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/vip\/wp-json\/wp\/v2\/media?parent=773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}