{"id":4417641,"date":"2025-05-05T15:12:59","date_gmt":"2025-05-05T20:12:59","guid":{"rendered":"https:\/\/olartemoure.com\/?p=4417641"},"modified":"2025-05-06T16:19:17","modified_gmt":"2025-05-06T21:19:17","slug":"password-day","status":"publish","type":"post","link":"https:\/\/olartemoure.com\/en\/password-day\/","title":{"rendered":"Infographic | Password day"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_blurb image=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/password-protection.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;password protection&#8221; title_text=&#8221;password protection&#8221; image_icon_width=&#8221;70%&#8221; text_orientation=&#8221;center&#8221; body_font_size=&#8221;1.2em&#8221; body_line_height=&#8221;1.5em&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>You know the drill, set strong passwords, change them regularly, avoid the same one across all accounts. It&#8217;s the bare minimum. But is it really enough to protect your business?<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;custom&#8221; background_position=&#8221;center_right&#8221; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;columns-of-the-acropolis-propilea-athens&#8221; title_text=&#8221;columns-of-the-acropolis-propilea-athens&#8221; background_image=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/columns-of-the-acropolis-propilea-athens.png&#8221; background_image_height=&#8221;100%&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span style=\"color: #003366; font-weight:900;\">A (very) brief history of authentication<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#003366&#8243; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;|||0.6em|false|false&#8221; module_alignment=&#8221;left&#8221; max_width=&#8221;75%&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;on|phone&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8221; content_tablet=&#8221;<\/p>\n<p>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/p>\n<p>&#8220;]<\/p>\n<p>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;custom&#8221; background_position=&#8221;center_right&#8221; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;roman building&#8221; title_text=&#8221;roman building&#8221; background_image_height=&#8221;100%&#8221; sticky_enabled=&#8221;0&#8243; background_enable_image=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#003366&#8243; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;|||0.6em|false|false&#8221; module_alignment=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;off|desktop&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8220;]<\/p>\n<p>Fast forward to the <strong>1920s<\/strong>, when passwords became a clandestine necessity during Prohibition, where a simple password gave you access to speakeasies. <strong>And int 1961, MIT&#8217;s Fernando Corbat\u00f3 created the first digital password to help manage access to mainframe computers.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/password.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;password&#8221; title_text=&#8221;password&#8221; align=&#8221;center&#8221; max_width=&#8221;80%&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span style=\"color: #003366; font-weight: 900;\">The hard truth<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#003366&#8243; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;|||0.6em|false|false&#8221; module_alignment=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;off|desktop&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8220;]A password is just a gatekeeper. And gates can be breached. The digital world is full of hackers who know how to crack even the thoughest passwords. So, what happens when they get through?[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/hacker.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;hacker&#8221; title_text=&#8221;hacker&#8221; icon_placement=&#8221;left&#8221; background_color=&#8221;#003366&#8243; max_width=&#8221;65%&#8221; module_alignment=&#8221;left&#8221; image_icon_width=&#8221;110px&#8221; body_font_size=&#8221;1.25em&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_line_height=&#8221;1.5em&#8221; custom_padding=&#8221;1em||1em||true|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Your business&#8217;s most valuable assets\u2013ideas, data, reputation\u2013are on line. It&#8217;s not just about losing access to an account; it&#8217;s about losing trust, losing clients, losing it all.<\/p>\n<p>[\/et_pb_blurb][et_pb_image src=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/man-with-hood-hacker-1.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;man with hood hacker&#8221; title_text=&#8221;man with hood hacker&#8221; align=&#8221;center&#8221; max_width=&#8221;80%&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span style=\"color: #003366; font-weight: 900;\">So, what&#8217;s next?<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#003366&#8243; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;|||0.6em|false|false&#8221; module_alignment=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;off|desktop&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8220;]<\/p>\n<p>It&#8217;s time to think beyond passwords. Strong encryption, device trust and endpoint security tools, multi-layered defenses, constant vigilance: that&#8217;s how you stay ahead.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><span style=\"color: #003366; font-weight: 900;\">The bigger question:<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#003366&#8243; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;1em|2em|1em|1.5em|true|false&#8221; module_alignment=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;off|desktop&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8221; background_color=&#8221;#003366&#8243; alt=&#8221;question mark&#8221; title_text=&#8221;question mark&#8221; background_image=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/question-mark.png&#8221; background_size=&#8221;custom&#8221; background_image_height=&#8221;100%&#8221; background_position=&#8221;center_right&#8221; text_text_color=&#8221;#FFFFFF&#8221;]Are you fully prepared to protect your intellectual property and personal data in an age where data breaches and cyber threats are a constant?[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#003366&#8243; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;|||0.6em|false|false&#8221; module_alignment=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;off|desktop&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8220;]The right strategy isn&#8217;t just about tech; it&#8217;s about understanding the legal landscape that keeps your digital assets safe.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;custom&#8221; background_position=&#8221;center_right&#8221; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;Cartoon Light Bulb&#8221; title_text=&#8221;Cartoon Light Bulb&#8221; background_image=&#8221;https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Cartoon-Light-Bulb.png&#8221; background_image_height=&#8221;100%&#8221; sticky_enabled=&#8221;0&#8243; background_color=&#8221;#003366&#8243; custom_padding=&#8221;4em||3em||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; max_width=&#8221;95%&#8221; module_alignment=&#8221;center&#8221;]<\/p>\n<h2><span style=\"color: #ffffff; font-weight: 900;\">The best defense is proactive<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; text_font_size=&#8221;1.2em&#8221; text_line_height=&#8221;1.5em&#8221; border_color_left=&#8221;#FFFFFF&#8221; border_width_left=&#8221;0.5em&#8221; custom_padding=&#8221;|||0.6em|false|false&#8221; module_alignment=&#8221;center&#8221; max_width=&#8221;95%&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; content_last_edited=&#8221;off|desktop&#8221; content_phone=&#8221;<span style=%22background-color: #ffffffcc;%22>The concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.<\/span>&#8221; text_text_color=&#8221;#FFFFFF&#8221;]<span style=\"background-color: #003366cc;\">And if you&#8217;re ready to level up, we can make sure your business is not just secure but resilient. Because when it comes to your assets, the real risk is not knowing whatt you don&#8217;t know.<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;custom&#8221; background_position=&#8221;center_right&#8221; width=&#8221;100%&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; alt=&#8221;Cartoon Light Bulb&#8221; title_text=&#8221;Cartoon Light Bulb&#8221; background_image_height=&#8221;100%&#8221; sticky_enabled=&#8221;0&#8243; background_enable_image=&#8221;off&#8221; background_color=&#8221;#003366&#8243; custom_padding=&#8221;||||false|false&#8221; custom_margin=&#8221;1em||||false|false&#8221; link_option_url=&#8221;https:\/\/olartemoure.com\/en\/contactenos\/&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; max_width=&#8221;95%&#8221; module_alignment=&#8221;center&#8221; text_font_size=&#8221;1.2em&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221;]<\/p>\n<h3><span style=\"color: #ffffff; font-weight: 900;\">Ready to get ahead of the threats?<\/span><\/h3>\n<p>Contact us.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You know the drill, set strong passwords, change them regularly, avoid the same one across all accounts. It&#8217;s the bare minimum. But is it really enough to protect your business?A (very) brief history of authenticationThe concept of authentication\u2013using something secret to prove your identity\u2013dates back to ancient times. In ancient Greece, the historian Polybius described a cipher system used by the Roman army to distinguish friend from foe.Fast forward to the 1920s, when passwords became a clandestine necessity during Prohibition, where a simple password gave you access to speakeasies. And int 1961, MIT&#8217;s Fernando Corbat\u00f3 created the first digital password to help manage access to mainframe computers.The hard truthA password is just a gatekeeper. And gates can be breached. The digital world is full of hackers who know how to crack even the thoughest passwords. So, what happens when they get through?Your business&#8217;s most valuable assets\u2013ideas, data, reputation\u2013are on line. It&#8217;s not just about losing access to an account; it&#8217;s about losing trust, losing clients, losing it all.So, what&#8217;s next?It&#8217;s time to think beyond passwords. Strong encryption, device trust and endpoint security tools, multi-layered defenses, constant vigilance: that&#8217;s how you stay ahead.The bigger question:Are you fully prepared to protect your [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4417642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[117,118,139,156],"tags":[],"class_list":["post-4417641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infografias","category-infographics","category-proteccion-de-datos","category-data-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infographic | Password day - OlarteMoure | Intellectual Property<\/title>\n<meta name=\"description\" content=\"cyber threats have evolve and relying on passwords alone just isn\u2019t anymore.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/olartemoure.com\/en\/password-day\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographic | Password day\" \/>\n<meta property=\"og:description\" content=\"cyber threats have evolve and relying on passwords alone just isn\u2019t anymore.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/olartemoure.com\/en\/password-day\/\" \/>\n<meta property=\"og:site_name\" content=\"OlarteMoure | Intellectual Property\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-05T20:12:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T21:19:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1601\" \/>\n\t<meta property=\"og:image:height\" content=\"837\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicole Diaz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicole Diaz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/\"},\"author\":{\"name\":\"Nicole Diaz\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/#\\\/schema\\\/person\\\/39418ad779f2cd1c62156f11faaf2e31\"},\"headline\":\"Infographic | Password day\",\"datePublished\":\"2025-05-05T20:12:59+00:00\",\"dateModified\":\"2025-05-06T21:19:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/\"},\"wordCount\":1717,\"image\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/olartemoure.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Feature.jpg\",\"articleSection\":[\"Infograf\u00edas\",\"Infographics\",\"Privacidad y Protecci\u00f3n de Datos Personales\",\"Data Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/\",\"url\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/\",\"name\":\"Infographic | Password day - OlarteMoure | Intellectual Property\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/olartemoure.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Feature.jpg\",\"datePublished\":\"2025-05-05T20:12:59+00:00\",\"dateModified\":\"2025-05-06T21:19:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/#\\\/schema\\\/person\\\/39418ad779f2cd1c62156f11faaf2e31\"},\"description\":\"cyber threats have evolve and relying on passwords alone just isn\u2019t anymore.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#primaryimage\",\"url\":\"https:\\\/\\\/olartemoure.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Feature.jpg\",\"contentUrl\":\"https:\\\/\\\/olartemoure.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Feature.jpg\",\"width\":1601,\"height\":837},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/password-day\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infographic | Password day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/#website\",\"url\":\"https:\\\/\\\/olartemoure.com\\\/\",\"name\":\"OlarteMoure | Intellectual Property\",\"description\":\"Firma especializada en Propiedad Intelectual\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/olartemoure.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/olartemoure.com\\\/#\\\/schema\\\/person\\\/39418ad779f2cd1c62156f11faaf2e31\",\"name\":\"Nicole Diaz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6e70a134bc45bb3d433d7aa60e3430b15ff974aaed0e63157795bc7a56800ee8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6e70a134bc45bb3d433d7aa60e3430b15ff974aaed0e63157795bc7a56800ee8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6e70a134bc45bb3d433d7aa60e3430b15ff974aaed0e63157795bc7a56800ee8?s=96&d=mm&r=g\",\"caption\":\"Nicole Diaz\"},\"sameAs\":[\"https:\\\/\\\/www.olartemoure.com\"],\"url\":\"https:\\\/\\\/olartemoure.com\\\/en\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infographic | Password day - OlarteMoure | Intellectual Property","description":"cyber threats have evolve and relying on passwords alone just isn\u2019t anymore.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/olartemoure.com\/en\/password-day\/","og_locale":"en_US","og_type":"article","og_title":"Infographic | Password day","og_description":"cyber threats have evolve and relying on passwords alone just isn\u2019t anymore.","og_url":"https:\/\/olartemoure.com\/en\/password-day\/","og_site_name":"OlarteMoure | Intellectual Property","article_published_time":"2025-05-05T20:12:59+00:00","article_modified_time":"2025-05-06T21:19:17+00:00","og_image":[{"width":1601,"height":837,"url":"https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Feature.jpg","type":"image\/jpeg"}],"author":"Nicole Diaz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nicole Diaz","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/olartemoure.com\/en\/password-day\/#article","isPartOf":{"@id":"https:\/\/olartemoure.com\/en\/password-day\/"},"author":{"name":"Nicole Diaz","@id":"https:\/\/olartemoure.com\/#\/schema\/person\/39418ad779f2cd1c62156f11faaf2e31"},"headline":"Infographic | Password day","datePublished":"2025-05-05T20:12:59+00:00","dateModified":"2025-05-06T21:19:17+00:00","mainEntityOfPage":{"@id":"https:\/\/olartemoure.com\/en\/password-day\/"},"wordCount":1717,"image":{"@id":"https:\/\/olartemoure.com\/en\/password-day\/#primaryimage"},"thumbnailUrl":"https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Feature.jpg","articleSection":["Infograf\u00edas","Infographics","Privacidad y Protecci\u00f3n de Datos Personales","Data Privacy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/olartemoure.com\/en\/password-day\/","url":"https:\/\/olartemoure.com\/en\/password-day\/","name":"Infographic | Password day - OlarteMoure | Intellectual Property","isPartOf":{"@id":"https:\/\/olartemoure.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/olartemoure.com\/en\/password-day\/#primaryimage"},"image":{"@id":"https:\/\/olartemoure.com\/en\/password-day\/#primaryimage"},"thumbnailUrl":"https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Feature.jpg","datePublished":"2025-05-05T20:12:59+00:00","dateModified":"2025-05-06T21:19:17+00:00","author":{"@id":"https:\/\/olartemoure.com\/#\/schema\/person\/39418ad779f2cd1c62156f11faaf2e31"},"description":"cyber threats have evolve and relying on passwords alone just isn\u2019t anymore.","breadcrumb":{"@id":"https:\/\/olartemoure.com\/en\/password-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/olartemoure.com\/en\/password-day\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/olartemoure.com\/en\/password-day\/#primaryimage","url":"https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Feature.jpg","contentUrl":"https:\/\/olartemoure.com\/wp-content\/uploads\/2025\/05\/Feature.jpg","width":1601,"height":837},{"@type":"BreadcrumbList","@id":"https:\/\/olartemoure.com\/en\/password-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/olartemoure.com\/en\/"},{"@type":"ListItem","position":2,"name":"Infographic | Password day"}]},{"@type":"WebSite","@id":"https:\/\/olartemoure.com\/#website","url":"https:\/\/olartemoure.com\/","name":"OlarteMoure | Intellectual Property","description":"Firma especializada en Propiedad Intelectual","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/olartemoure.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/olartemoure.com\/#\/schema\/person\/39418ad779f2cd1c62156f11faaf2e31","name":"Nicole Diaz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6e70a134bc45bb3d433d7aa60e3430b15ff974aaed0e63157795bc7a56800ee8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6e70a134bc45bb3d433d7aa60e3430b15ff974aaed0e63157795bc7a56800ee8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e70a134bc45bb3d433d7aa60e3430b15ff974aaed0e63157795bc7a56800ee8?s=96&d=mm&r=g","caption":"Nicole Diaz"},"sameAs":["https:\/\/www.olartemoure.com"],"url":"https:\/\/olartemoure.com\/en\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/posts\/4417641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/comments?post=4417641"}],"version-history":[{"count":0,"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/posts\/4417641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/media\/4417642"}],"wp:attachment":[{"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/media?parent=4417641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/categories?post=4417641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olartemoure.com\/en\/wp-json\/wp\/v2\/tags?post=4417641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}