{"id":11510,"date":"2025-07-11T11:25:34","date_gmt":"2025-07-11T16:25:34","guid":{"rendered":"https:\/\/iqcol.com\/?page_id=11510"},"modified":"2026-04-20T15:09:15","modified_gmt":"2026-04-20T20:09:15","slug":"preguntas-frecuentes","status":"publish","type":"page","link":"https:\/\/iqcol.com\/en\/preguntas-frecuentes\/","title":{"rendered":"Frequently Asked Questions"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"11510\" class=\"elementor elementor-11510\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aedaa15 elementor-section-content-middle elementor-reverse-mobile ct-section-stretched elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"aedaa15\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d40fe\" data-id=\"70d40fe\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ef9ca66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ef9ca66\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ae649c6\" data-id=\"ae649c6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e971e15 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"e971e15\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Frequently Asked questions (FAQ)\n\n\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99ec83b animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"99ec83b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Security in Digital Payments with IQ Information Quality<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d0315a elementor-section-content-middle elementor-reverse-mobile ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"0d0315a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a222d81 elementor-invisible\" data-id=\"a222d81\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6dfd4b animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f6dfd4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Everything you need to know about Compliance in digital payment\n\n\n\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d27a790 elementor-widget elementor-widget-text-editor\" data-id=\"d27a790\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"255\" data-end=\"509\">En el ecosistema actual de pagos digitales, el cumplimiento de est\u00e1ndares de seguridad de la informaci\u00f3n como PCI DSS e ISO 27001 no es opcional: es esencial para proteger los datos de tarjetas, prevenir fraudes y fortalecer la confianza de tus clientes.<\/p><p data-start=\"511\" data-end=\"796\">En IQ Information Quality, resolvemos las preguntas m\u00e1s frecuentes sobre cumplimiento PCI DSS, seguridad en aplicaciones, protecci\u00f3n de datos de pago y ciberseguridad empresarial, ayudando a empresas en Colombia, Am\u00e9rica Latina y el Caribe a tomar decisiones informadas y estrat\u00e9gicas.<\/p><p data-start=\"798\" data-end=\"974\">Estas preguntas frecuentes est\u00e1n basadas en m\u00e1s de 17 a\u00f1os de experiencia acompa\u00f1ando a bancos, fintechs, pasarelas de pago, e-commerce y proveedores tecnol\u00f3gicos en la regi\u00f3n.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bf49db1 animated-fast elementor-invisible\" data-id=\"bf49db1\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea4e7b6 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"ea4e7b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:12,&quot;end&quot;:100}},&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1.jpg\" class=\"attachment-large size-large wp-image-10982\" alt=\"Preguntas Frecuentes\" srcset=\"https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1.jpg 1024w, https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1-300x300.jpg 300w, https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1-150x150.jpg 150w, https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1-768x768.jpg 768w, https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1-12x12.jpg 12w, https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1-330x330.jpg 330w, https:\/\/iqcol.com\/wp-content\/uploads\/2025\/04\/image_fx-5-1-1-180x180.jpg 180w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6213d09 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6213d09\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36c748e\" data-id=\"36c748e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2c835a animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"e2c835a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions\n\n\n\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d07a8a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d07a8a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d4ed7ed\" data-id=\"d4ed7ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9396ea4 elementor-widget elementor-widget-accordion\" data-id=\"9396ea4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1541\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1541\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfQu\u00e9 es PCI DSS y para qu\u00e9 sirve en tu empresa?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1541\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1541\"><p data-start=\"1262\" data-end=\"1409\">El PCI DSS (Payment Card Industry Data Security Standard) es un est\u00e1ndar internacional de seguridad que protege la informaci\u00f3n de tarjetas de pago.<\/p><p data-start=\"1411\" data-end=\"1570\">Aplica a cualquier empresa que procese, transmita o almacene datos de tarjetas, incluyendo e-commerce, fintech, retail y negocios en Colombia o a nivel global.<\/p><p data-start=\"1572\" data-end=\"1678\">Su objetivo es reducir el riesgo de fraude y filtraciones de datos mediante controles en \u00e1reas clave como:<\/p><ul data-start=\"1680\" data-end=\"1827\"><li data-section-id=\"1e34p9q\" data-start=\"1680\" data-end=\"1718\">\ud83d\udd10 Protecci\u00f3n de datos de tarjetas<\/li><li data-section-id=\"t6iskf\" data-start=\"1719\" data-end=\"1744\">\ud83d\udd10 Seguridad de redes<\/li><li data-section-id=\"1kyxhc8\" data-start=\"1745\" data-end=\"1770\">\ud83d\udd10 Control de accesos<\/li><li data-section-id=\"1v7qbj9\" data-start=\"1771\" data-end=\"1799\">\ud83d\udd10 Monitoreo de sistemas<\/li><li data-section-id=\"1bir6jc\" data-start=\"1800\" data-end=\"1827\">\ud83d\udd10 Pruebas de seguridad<\/li><\/ul><p data-start=\"1829\" data-end=\"1988\">Cumplir con PCI DSS no solo mejora la seguridad de tu operaci\u00f3n, sino que tambi\u00e9n fortalece la confianza de tus clientes y evita riesgos legales y financieros.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1542\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1542\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfC\u00f3mo certificar una empresa en PCI DSS?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1542\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1542\"><p data-start=\"188\" data-end=\"413\">Certificarse en PCI DSS (Payment Card Industry Data Security Standard) no significa solo pasar una auditor\u00eda, sino demostrar que tu empresa protege adecuadamente los datos de tarjetas dentro de su infraestructura tecnol\u00f3gica.<\/p><p data-start=\"415\" data-end=\"517\">Este est\u00e1ndar internacional define controles de seguridad que deben implementarse en \u00e1reas clave como:<\/p><ul data-start=\"519\" data-end=\"706\"><li data-section-id=\"xj4gjf\" data-start=\"519\" data-end=\"556\">\ud83d\udd10 Seguridad de redes y firewalls<\/li><li data-section-id=\"1e34p9q\" data-start=\"557\" data-end=\"595\">\ud83d\udd10 Protecci\u00f3n de datos de tarjetas<\/li><li data-section-id=\"1kyxhc8\" data-start=\"596\" data-end=\"621\">\ud83d\udd10 Control de accesos<\/li><li data-section-id=\"tppc7i\" data-start=\"622\" data-end=\"659\">\ud83d\udd10 Monitoreo continuo de sistemas<\/li><li data-section-id=\"1jc7mxb\" data-start=\"660\" data-end=\"706\">\ud83d\udd10 Pruebas de seguridad y vulnerabilidades<\/li><\/ul><p data-start=\"708\" data-end=\"849\">El proceso de cumplimiento PCI DSS var\u00eda seg\u00fan el volumen de transacciones de tu empresa (niveles de comerciante) y puede validarse mediante:<\/p><ul data-start=\"851\" data-end=\"996\"><li data-section-id=\"62aaa7\" data-start=\"851\" data-end=\"925\">\u2714 Cuestionario de autoevaluaci\u00f3n (SAQ \u2013 Self-Assessment Questionnaire)<\/li><li data-section-id=\"dxsd1i\" data-start=\"926\" data-end=\"996\">\u2714 Auditor\u00eda realizada por un <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Qualified Security Assessor (QSA)<\/span><\/span><\/li><\/ul><p data-start=\"998\" data-end=\"1146\">Muchas empresas en Colombia y Am\u00e9rica Latina, especialmente e-commerce, fintech y pasarelas de pago, no tienen claro por d\u00f3nde iniciar este proceso.<\/p><p data-start=\"1148\" data-end=\"1383\">Por eso, el primer paso suele ser realizar un diagn\u00f3stico de brechas (gap analysis) frente a los requisitos definidos por el <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">PCI Security Standards Council<\/span><\/span>, para luego implementar un plan de cumplimiento adaptado a su operaci\u00f3n.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1543\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1543\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfCu\u00e1nto cuesta una auditor\u00eda PCI DSS?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1543\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1543\"><p data-start=\"184\" data-end=\"415\">El costo de una auditor\u00eda PCI DSS (Payment Card Industry Data Security Standard) es una de las dudas m\u00e1s comunes en empresas que manejan pagos digitales. Sin embargo, no existe un precio \u00fanico, ya que depende de m\u00faltiples factores.<\/p><p data-start=\"417\" data-end=\"505\">Entre los principales elementos que influyen en el costo del cumplimiento PCI DSS est\u00e1n:<\/p><ul data-start=\"507\" data-end=\"718\"><li data-section-id=\"ruez0e\" data-start=\"507\" data-end=\"539\">\ud83d\udcb0 Tama\u00f1o de la organizaci\u00f3n<\/li><li data-section-id=\"5cosdn\" data-start=\"540\" data-end=\"584\">\ud83d\udcb0 Volumen de transacciones con tarjetas<\/li><li data-section-id=\"o69k51\" data-start=\"585\" data-end=\"637\">\ud83d\udcb0 Complejidad de la infraestructura tecnol\u00f3gica<\/li><li data-section-id=\"14u3ma\" data-start=\"638\" data-end=\"718\">\ud83d\udcb0 N\u00famero de sistemas que procesan, almacenan o transmiten datos de tarjetas<\/li><\/ul><p data-start=\"720\" data-end=\"799\">Dependiendo del nivel de la empresa, el cumplimiento puede realizarse mediante:<\/p><ul data-start=\"801\" data-end=\"953\"><li data-section-id=\"62aaa7\" data-start=\"801\" data-end=\"875\">\u2714 Cuestionario de autoevaluaci\u00f3n (SAQ \u2013 Self-Assessment Questionnaire)<\/li><li data-section-id=\"m0m0hp\" data-start=\"876\" data-end=\"953\">\u2714 Auditor\u00eda formal realizada por un <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Qualified Security Assessor (QSA)<\/span><\/span><\/li><\/ul><p data-start=\"955\" data-end=\"1118\">En empresas con operaciones m\u00e1s complejas \u2014como e-commerce, fintech o pasarelas de pago en Colombia y Am\u00e9rica Latina\u2014 es m\u00e1s com\u00fan requerir una auditor\u00eda completa.<\/p><p data-start=\"1120\" data-end=\"1208\">Es importante tener en cuenta que el costo no se limita a la auditor\u00eda. Tambi\u00e9n incluye:<\/p><ul data-start=\"1210\" data-end=\"1379\"><li data-section-id=\"1aqrcib\" data-start=\"1210\" data-end=\"1257\">\ud83d\udd10 Implementaci\u00f3n de controles de seguridad<\/li><li data-section-id=\"1v8pyjm\" data-start=\"1258\" data-end=\"1294\">\ud83d\udd10 Adecuaci\u00f3n de infraestructura<\/li><li data-section-id=\"zj0j5d\" data-start=\"1295\" data-end=\"1336\">\ud83d\udd10 Monitoreo y mantenimiento continuo<\/li><li data-section-id=\"1bvh1p7\" data-start=\"1337\" data-end=\"1379\">\ud83d\udd10 Pruebas de seguridad y cumplimiento<\/li><\/ul><p data-start=\"1381\" data-end=\"1604\">Por eso, m\u00e1s que ver la auditor\u00eda como un gasto, debe entenderse como una inversi\u00f3n en seguridad, confianza del cliente y protecci\u00f3n frente a fraudes, alineada con los lineamientos del <a href=\"https:\/\/www.pcisecuritystandards.org\/\" target=\"_blank\" rel=\"noopener\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">PCI Security Standards Council<\/span><\/span>.<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1544\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1544\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u00bfQu\u00e9 riesgos enfrenta tu empresa si no cumple con est\u00e1ndares como PCI DSS o ISO 27001?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1544\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1544\"><p data-start=\"222\" data-end=\"442\">No cumplir con est\u00e1ndares de seguridad de la informaci\u00f3n como PCI DSS, PCI PIN o <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">ISO\/IEC 27001<\/span><\/span> puede exponer a tu organizaci\u00f3n a riesgos cr\u00edticos que afectan tanto la operaci\u00f3n como la reputaci\u00f3n.<\/p><p data-start=\"444\" data-end=\"579\">En empresas de pagos digitales, e-commerce, fintech y sectores regulados en Colombia y Am\u00e9rica Latina, el incumplimiento puede generar:<\/p><ul data-start=\"581\" data-end=\"1022\"><li data-section-id=\"1vjeogk\" data-start=\"581\" data-end=\"679\">\ud83d\udea8 Brechas de seguridad que comprometen datos sensibles, especialmente informaci\u00f3n de tarjetas<\/li><li data-section-id=\"16k6639\" data-start=\"680\" data-end=\"761\">\u26a0\ufe0f Sanciones regulatorias, contractuales o exigidas por adquirentes y aliados<\/li><li data-section-id=\"9ht1gk\" data-start=\"762\" data-end=\"839\">\ud83d\uded1 Restricciones operativas o incluso la p\u00e9rdida de certificaciones clave<\/li><li data-section-id=\"t59csm\" data-start=\"840\" data-end=\"928\">\ud83d\udcc9 Deterioro de la confianza de clientes, socios comerciales y entidades financieras<\/li><li data-section-id=\"m3wd3p\" data-start=\"929\" data-end=\"1022\">\ud83d\udcb0 Altos costos legales, reputacionales y operativos derivados de incidentes de seguridad<\/li><\/ul><p data-start=\"1024\" data-end=\"1216\">Estos est\u00e1ndares, definidos por organismos como el <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">PCI Security Standards Council<\/span><\/span>, establecen las mejores pr\u00e1cticas para proteger la informaci\u00f3n y garantizar la continuidad del negocio.<\/p><p data-start=\"1218\" data-end=\"1427\">Adoptarlos no es solo una obligaci\u00f3n t\u00e9cnica o de cumplimiento normativo: es una decisi\u00f3n estrat\u00e9gica que fortalece la seguridad, la credibilidad y la sostenibilidad de tu empresa en el entorno digital actual.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1545\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1545\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Who is IQ Information Quality, and what makes us different?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1545\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1545\"><p><span style=\"font-weight: 400;\">IQ Information Quality is a signature colombian specialty <\/span><b>exclusively on security in digital payments<\/b><span style=\"font-weight: 400;\">with more than <\/span><b>17 years of experience<\/b><span style=\"font-weight: 400;\"> in Latin america and the Caribbean.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">We are certified by the PCI SSC as:<\/span><\/p><p><span style=\"font-weight: 400;\">\u2705<\/span> <b>QSA (Qualified Security Assessor)<\/b><\/p><p><span style=\"font-weight: 400;\">\u2705<\/span> <b>QPA (Qualified PIN Assessor)<\/b><\/p><p><span style=\"font-weight: 400;\">Us apart:<\/span><\/p><p><span style=\"font-weight: 400;\">\ud83e\udded<\/span> <b>Unbiased approach<\/b><span style=\"font-weight: 400;\">: we do not sell technology or licenses<\/span><\/p><p><span style=\"font-weight: 400;\">\ud83c\udf0e<\/span> <b>Regional experience<\/b><span style=\"font-weight: 400;\">: presence in multiple countries and regulatory environments<\/span><\/p><p><span style=\"font-weight: 400;\">\ud83d\udc65<\/span> <b>Team internationally certified<\/b><span style=\"font-weight: 400;\">: QSA, QPA, CISA, CISSP, CISM<\/span><\/p><p><span style=\"font-weight: 400;\">\ud83d\udce2<\/span> <b>Direct communication, and custom tracking<\/b><\/p><p><span style=\"font-weight: 400;\">\ud83d\udd04<\/span> <b>Tailored solutions<\/b><span style=\"font-weight: 400;\"> the size, maturity and role of each customer<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1546\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1546\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What services do we offer in PCI compliance?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1546\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1546\"><p><span style=\"font-weight: 400;\">We accompany organizations in the standards compliance, PCI DSS and PCI PIN, with strategies adjusted to the operational context of each actor in the ecosystem of payments.<\/span><\/p><p><b>\ud83d\udd10<\/b><b> PCI DSS \u2013 the Protection of card data<\/b><\/p><p><span style=\"font-weight: 400;\">We validate your controls to protect transactions face-to-face and non-face-to-face, in accordance with the requirements of the standard.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>GAP PCI DSS<\/b><span style=\"font-weight: 400;\"> \u2013 We evaluate your current situation with priority focus in front of the PCI requirements<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pre-assessment<\/b><span style=\"font-weight: 400;\">\u2013 Evaluate your situation in front of the PCI requirements applicable<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>SAQ A PCI DSS<\/b><span style=\"font-weight: 400;\"> \u2013 Support in the selection and completion of the SAQ right (SAQ\/AOC), based on validation of evidence.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Reduction of scope of PCI<\/b><span style=\"font-weight: 400;\"> \u2013 Strategies to limit the exposure of data<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Validation in third<\/b><span style=\"font-weight: 400;\"> \u2013 Evaluation to suppliers that process data card<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Tokenization:<\/b><span style=\"font-weight: 400;\"> We evaluate or suggest ways to remove the BREAD from the environment<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>\u00a03D Secure<\/b><span style=\"font-weight: 400;\"> \u2013 Solutions to protect data and authenticate users in digital payments, reducing risk and improving compliance<\/span><\/li><\/ul><p><b>\ud83d\udd11<\/b><b> PCI PIN \u2013 Protection of data of PIN<\/b><\/p><p><span style=\"font-weight: 400;\">We help to meet the technical requirements of safety PIN, both physical and digital.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>GAP-PCI PIN<\/b><span style=\"font-weight: 400;\"> \u2013 Preliminary assessment<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Evaluation officer PCI PIN<\/b><span style=\"font-weight: 400;\"> \u2013 Validation complete with technical approach<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Implementation (Phase I, II, III)<\/b><span style=\"font-weight: 400;\"> \u2013 Accompaniment controls complexes<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Third-party validation<\/b><span style=\"font-weight: 400;\"> \u2013 Evaluation of providers that handle PIN<\/span><\/li><li aria-level=\"1\"><b>Action plans<\/b> \u2013 Closure of findings subsequent to the audit<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1547\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1547\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">4. In addition to the PCI compliance, what are the other services of digital security offer you?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1547\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1547\"><p><span style=\"font-weight: 400;\">We offer a complete portfolio of services that strengthen the digital safety of our customers, beyond regulatory compliance.<\/span><\/p><p><b>\u2699\ufe0f<\/b><b> Vulnerability Management<\/b><\/p><p><span style=\"font-weight: 400;\">We identify, validate and mitigate risks before they become incidents.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ethical Hacking<\/b><span style=\"font-weight: 400;\"> \u2013 Simulation of controlled attacks<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Penetration testing (internal and external)<\/b><span style=\"font-weight: 400;\"> \u2013 Technical verification of actual exposure<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability scanning<\/b><span style=\"font-weight: 400;\"> \u2013 Automation and continuous analysis<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Social engineering<\/b><span style=\"font-weight: 400;\"> \u2013 Simulations of phishing, vishing attacks and face-to-face<\/span><\/li><\/ul><p><b>\ud83d\udee1\ufe0f<\/b><b> Application security<\/b><\/p><p><span style=\"font-weight: 400;\">We validate the safety of your applications from the code to the execution.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Secure code review<\/b><span style=\"font-weight: 400;\"> \u2013 Identification of errors and vulnerabilities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Web Scan<\/b><span style=\"font-weight: 400;\"> \u2013 Automated scanning of web applications<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Penetration testing in apps<\/b><span style=\"font-weight: 400;\"> \u2013 Logical evaluation and technical security<\/span><\/li><\/ul><p><b>\ud83d\udd12<\/b><b> Information security<\/b><\/p><p><span style=\"font-weight: 400;\">Strengthen your ISMS according to the main international standards.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>GAP ISO 27001<\/b><span style=\"font-weight: 400;\"> \u2013 Diagnosis compared to the standard<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk assessment<\/b><span style=\"font-weight: 400;\"> \u2013 Identification and prioritization of threats<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Implementing ISO 27001<\/b><span style=\"font-weight: 400;\"> \u2013 Design, documentation and deployment of the ISMS<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Internal audit ISO<\/b><span style=\"font-weight: 400;\"> \u2013 Check prior to the certification<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Personal data<\/b><span style=\"font-weight: 400;\"> \u2013 Compliance with Habeas Data, GDPR and other regulations<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Transition to ISO 27001:2022<\/b><span style=\"font-weight: 400;\"> \u2013 Support migration from previous versions<\/span><\/li><\/ul><p><b>\ud83c\udf93<\/b><b> Technical training and Executive<\/b><\/p><p><span style=\"font-weight: 400;\">We train your teams to operate safely and comply with standards.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ongoing PCI DSS v4.0.1<\/b><span style=\"font-weight: 400;\"> \u2013 Training in technical compliance and documentary<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Course ISO 27001<\/b><span style=\"font-weight: 400;\"> \u2013 Implementation and maintenance of the ISMS<\/span><\/li><\/ul><p><b>Course Development Software assurance<\/b><span style=\"font-weight: 400;\"> \u2013 Good practice for devs and QA<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1548\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1548\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What kind of organizations we accompany them?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1548\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1548\"><p><span style=\"font-weight: 400;\">We work with all the actors that are part of the ecosystem of digital payments, understanding your role, risks and regulatory obligations.<\/span><\/p><p><span style=\"font-weight: 400;\">\ud83d\udcbc<\/span><span style=\"font-weight: 400;\"> Segments we serve:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Financial:<\/b><span style=\"font-weight: 400;\"> banks, issuers, acquirers, processors<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Technology:<\/b><span style=\"font-weight: 400;\"> fintechs, data center, SOCs, payment gateways, call centers<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Trade and consumption:<\/b><span style=\"font-weight: 400;\"> e-commerce platforms, insurance companies, loyalty programs<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Emerging payments:<\/b><span style=\"font-weight: 400;\"> private cards, money orders, instant payments, payments, P2P, open banking, BNPL (Buy now, pay later\u201d)<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">\ud83e\udde9<\/span><span style=\"font-weight: 400;\"> Each type of organization has unique challenges. Our approach is tailored to ensure compliance without slowing your operation.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1549\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1549\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why choose us as your partner in security of payments?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1549\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1549\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\"> We are the <\/span><b>only signing colombian certified as a QSA and QPA<\/b><span style=\"font-weight: 400;\"> by the PCI SSC<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\ud83d\udca7<\/span><span style=\"font-weight: 400;\"> We have <\/span><b>more than 17 years of experience<\/b><span style=\"font-weight: 400;\"> security of payments in Latin america and the Caribbean<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\ud83e\udde0<\/span><span style=\"font-weight: 400;\"> Our team has global certification in security and compliance digital<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u2696\ufe0f<\/span><span style=\"font-weight: 400;\"> We provide a <\/span><b>impartial approach and strategic<\/b><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\ud83d\udccb<\/span><span style=\"font-weight: 400;\"> We integrate <\/span><b>timelines, tracking, and direct support<\/b><span style=\"font-weight: 400;\"> in all the process<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">\ud83d\udd12<\/span> <i><span style=\"font-weight: 400;\">Rather than comply, we ensure that safety accompanies your growth.<\/span><\/i><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15410\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-15410\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is the authentication resistant to phishing and why is it important?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-15410\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-15410\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><p>The authentication resistant to phishing replaces the exclusive use of passwords with more secure methods such as <strong>passkeys, biometrics or physical keys security<\/strong>. These systems are designed to prevent an attacker can capture or reuse credentials, even if the user is tricked with a fake site.<\/p><p><strong>What are the advantages?<\/strong><\/p><ul><li><strong>Better security:<\/strong> The cryptographic keys are unique and can not be intercepted.<\/li><li><strong>Phishing prevention:<\/strong> The credentials do not work outside of the authoritative domain.<\/li><li><strong>Better user experience:<\/strong> No need to remember passwords.<\/li><li><strong>Lower operating costs:<\/strong> Reduced tickets for forgotten passwords.<\/li><li><strong>Regulatory compliance:<\/strong> Technologies such as FIDO2 facilitate compliance with frameworks such as PCI-DSS.<\/li><\/ul><p><strong>What to have in mind to implement it?<\/strong><\/p><ul><li>To assess the current infrastructure.<\/li><li>Adopt technologies such as FIDO2\/WebAuthn.<\/li><li>Design a progressive strategy of adoption.<\/li><li>Train users and technical teams.<\/li><li>To ensure interoperability between devices and browsers.<\/li><\/ul><p>It is not just to change passwords for other tool. It is a transformation in the architecture of authentication. From IQ Information Quality help you to implement these solutions securely and in line with the objectives of the business.<\/p><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15411\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-15411\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How do I confirm that a site is vulnerable to attack scripts?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-15411\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-15411\"><p>Traders can guarantee the security of your payment page in two main ways:<\/p><ol><li><strong> Implementing protection techniques<\/strong><\/li><\/ol><p>To protect your site against attacks of scripts, traders should take the following measures:<\/p><ul><li><strong>To comply with the requirements of PCI DSS<\/strong>: Implementing the practices outlined in the requirements 6.4.3 and 11.6.1 of the PCI DSS, including protection against unauthorised modifications to the source code and the detection of suspicious changes on the site.<\/li><li><strong>Use a Content Security Policy (CSP)<\/strong>: Configure a security policy content that restrict the execution of unauthorized scripts and prevent the loading of malicious code.<\/li><li><strong>Implement Subresource Integrity (SRI)<\/strong>: Ensure that the external scripts are not manipulated by validating their digital signatures.<\/li><li><strong>Monitor and scan the site regularly<\/strong>: Use monitoring tools and scan to detect any unexpected changes in the code or the inclusion of scripts suspects.<\/li><\/ul><p>These measures can be applied by the trader or by a third party specializing in cyber security.<\/p><ol start=\"2\"><li><strong> Obtaining confirmation of the TPSP or payment processor<\/strong><\/li><\/ol><p>Another way to ensure the security of the payment page is to verify that the payment service provider implements techniques of protection against attacks of scripts. To do this, merchants should:<\/p><ul><li style=\"list-style-type: none;\"><ul><li>Confirm with the TPSP that your payment solution embedded is protected against attacks of scripts.<\/li><li>Strictly follow the instructions of the vendor for the correct implementation of the iframe payment.<\/li><li>Request documentation demonstrating compliance with PCI DSS the payment solution offered.<\/li><\/ul><\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"\\u00bfQu\\u00e9 es PCI DSS y para qu\\u00e9 sirve en tu empresa?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p data-start=\\\"1262\\\" data-end=\\\"1409\\\">El PCI DSS (Payment Card Industry Data Security Standard) es un est\\u00e1ndar internacional de seguridad que protege la informaci\\u00f3n de tarjetas de pago.<\\\/p><p data-start=\\\"1411\\\" data-end=\\\"1570\\\">Aplica a cualquier empresa que procese, transmita o almacene datos de tarjetas, incluyendo e-commerce, fintech, retail y negocios en Colombia o a nivel global.<\\\/p><p data-start=\\\"1572\\\" data-end=\\\"1678\\\">Su objetivo es reducir el riesgo de fraude y filtraciones de datos mediante controles en \\u00e1reas clave como:<\\\/p><ul data-start=\\\"1680\\\" data-end=\\\"1827\\\"><li data-section-id=\\\"1e34p9q\\\" data-start=\\\"1680\\\" data-end=\\\"1718\\\">\\ud83d\\udd10 Protecci\\u00f3n de datos de tarjetas<\\\/li><li data-section-id=\\\"t6iskf\\\" data-start=\\\"1719\\\" data-end=\\\"1744\\\">\\ud83d\\udd10 Seguridad de redes<\\\/li><li data-section-id=\\\"1kyxhc8\\\" data-start=\\\"1745\\\" data-end=\\\"1770\\\">\\ud83d\\udd10 Control de accesos<\\\/li><li data-section-id=\\\"1v7qbj9\\\" data-start=\\\"1771\\\" data-end=\\\"1799\\\">\\ud83d\\udd10 Monitoreo de sistemas<\\\/li><li data-section-id=\\\"1bir6jc\\\" data-start=\\\"1800\\\" data-end=\\\"1827\\\">\\ud83d\\udd10 Pruebas de seguridad<\\\/li><\\\/ul><p data-start=\\\"1829\\\" data-end=\\\"1988\\\">Cumplir con PCI DSS no solo mejora la seguridad de tu operaci\\u00f3n, sino que tambi\\u00e9n fortalece la confianza de tus clientes y evita riesgos legales y financieros.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfC\\u00f3mo certificar una empresa en PCI DSS?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p data-start=\\\"188\\\" data-end=\\\"413\\\">Certificarse en PCI DSS (Payment Card Industry Data Security Standard) no significa solo pasar una auditor\\u00eda, sino demostrar que tu empresa protege adecuadamente los datos de tarjetas dentro de su infraestructura tecnol\\u00f3gica.<\\\/p><p data-start=\\\"415\\\" data-end=\\\"517\\\">Este est\\u00e1ndar internacional define controles de seguridad que deben implementarse en \\u00e1reas clave como:<\\\/p><ul data-start=\\\"519\\\" data-end=\\\"706\\\"><li data-section-id=\\\"xj4gjf\\\" data-start=\\\"519\\\" data-end=\\\"556\\\">\\ud83d\\udd10 Seguridad de redes y firewalls<\\\/li><li data-section-id=\\\"1e34p9q\\\" data-start=\\\"557\\\" data-end=\\\"595\\\">\\ud83d\\udd10 Protecci\\u00f3n de datos de tarjetas<\\\/li><li data-section-id=\\\"1kyxhc8\\\" data-start=\\\"596\\\" data-end=\\\"621\\\">\\ud83d\\udd10 Control de accesos<\\\/li><li data-section-id=\\\"tppc7i\\\" data-start=\\\"622\\\" data-end=\\\"659\\\">\\ud83d\\udd10 Monitoreo continuo de sistemas<\\\/li><li data-section-id=\\\"1jc7mxb\\\" data-start=\\\"660\\\" data-end=\\\"706\\\">\\ud83d\\udd10 Pruebas de seguridad y vulnerabilidades<\\\/li><\\\/ul><p data-start=\\\"708\\\" data-end=\\\"849\\\">El proceso de cumplimiento PCI DSS var\\u00eda seg\\u00fan el volumen de transacciones de tu empresa (niveles de comerciante) y puede validarse mediante:<\\\/p><ul data-start=\\\"851\\\" data-end=\\\"996\\\"><li data-section-id=\\\"62aaa7\\\" data-start=\\\"851\\\" data-end=\\\"925\\\">\\u2714 Cuestionario de autoevaluaci\\u00f3n (SAQ \\u2013 Self-Assessment Questionnaire)<\\\/li><li data-section-id=\\\"dxsd1i\\\" data-start=\\\"926\\\" data-end=\\\"996\\\">\\u2714 Auditor\\u00eda realizada por un <span class=\\\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\\\"><span class=\\\"whitespace-normal\\\">Qualified Security Assessor (QSA)<\\\/span><\\\/span><\\\/li><\\\/ul><p data-start=\\\"998\\\" data-end=\\\"1146\\\">Muchas empresas en Colombia y Am\\u00e9rica Latina, especialmente e-commerce, fintech y pasarelas de pago, no tienen claro por d\\u00f3nde iniciar este proceso.<\\\/p><p data-start=\\\"1148\\\" data-end=\\\"1383\\\">Por eso, el primer paso suele ser realizar un diagn\\u00f3stico de brechas (gap analysis) frente a los requisitos definidos por el <span class=\\\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\\\"><span class=\\\"whitespace-normal\\\">PCI Security Standards Council<\\\/span><\\\/span>, para luego implementar un plan de cumplimiento adaptado a su operaci\\u00f3n.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfCu\\u00e1nto cuesta una auditor\\u00eda PCI DSS?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p data-start=\\\"184\\\" data-end=\\\"415\\\">El costo de una auditor\\u00eda PCI DSS (Payment Card Industry Data Security Standard) es una de las dudas m\\u00e1s comunes en empresas que manejan pagos digitales. Sin embargo, no existe un precio \\u00fanico, ya que depende de m\\u00faltiples factores.<\\\/p><p data-start=\\\"417\\\" data-end=\\\"505\\\">Entre los principales elementos que influyen en el costo del cumplimiento PCI DSS est\\u00e1n:<\\\/p><ul data-start=\\\"507\\\" data-end=\\\"718\\\"><li data-section-id=\\\"ruez0e\\\" data-start=\\\"507\\\" data-end=\\\"539\\\">\\ud83d\\udcb0 Tama\\u00f1o de la organizaci\\u00f3n<\\\/li><li data-section-id=\\\"5cosdn\\\" data-start=\\\"540\\\" data-end=\\\"584\\\">\\ud83d\\udcb0 Volumen de transacciones con tarjetas<\\\/li><li data-section-id=\\\"o69k51\\\" data-start=\\\"585\\\" data-end=\\\"637\\\">\\ud83d\\udcb0 Complejidad de la infraestructura tecnol\\u00f3gica<\\\/li><li data-section-id=\\\"14u3ma\\\" data-start=\\\"638\\\" data-end=\\\"718\\\">\\ud83d\\udcb0 N\\u00famero de sistemas que procesan, almacenan o transmiten datos de tarjetas<\\\/li><\\\/ul><p data-start=\\\"720\\\" data-end=\\\"799\\\">Dependiendo del nivel de la empresa, el cumplimiento puede realizarse mediante:<\\\/p><ul data-start=\\\"801\\\" data-end=\\\"953\\\"><li data-section-id=\\\"62aaa7\\\" data-start=\\\"801\\\" data-end=\\\"875\\\">\\u2714 Cuestionario de autoevaluaci\\u00f3n (SAQ \\u2013 Self-Assessment Questionnaire)<\\\/li><li data-section-id=\\\"m0m0hp\\\" data-start=\\\"876\\\" data-end=\\\"953\\\">\\u2714 Auditor\\u00eda formal realizada por un <span class=\\\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\\\"><span class=\\\"whitespace-normal\\\">Qualified Security Assessor (QSA)<\\\/span><\\\/span><\\\/li><\\\/ul><p data-start=\\\"955\\\" data-end=\\\"1118\\\">En empresas con operaciones m\\u00e1s complejas \\u2014como e-commerce, fintech o pasarelas de pago en Colombia y Am\\u00e9rica Latina\\u2014 es m\\u00e1s com\\u00fan requerir una auditor\\u00eda completa.<\\\/p><p data-start=\\\"1120\\\" data-end=\\\"1208\\\">Es importante tener en cuenta que el costo no se limita a la auditor\\u00eda. Tambi\\u00e9n incluye:<\\\/p><ul data-start=\\\"1210\\\" data-end=\\\"1379\\\"><li data-section-id=\\\"1aqrcib\\\" data-start=\\\"1210\\\" data-end=\\\"1257\\\">\\ud83d\\udd10 Implementaci\\u00f3n de controles de seguridad<\\\/li><li data-section-id=\\\"1v8pyjm\\\" data-start=\\\"1258\\\" data-end=\\\"1294\\\">\\ud83d\\udd10 Adecuaci\\u00f3n de infraestructura<\\\/li><li data-section-id=\\\"zj0j5d\\\" data-start=\\\"1295\\\" data-end=\\\"1336\\\">\\ud83d\\udd10 Monitoreo y mantenimiento continuo<\\\/li><li data-section-id=\\\"1bvh1p7\\\" data-start=\\\"1337\\\" data-end=\\\"1379\\\">\\ud83d\\udd10 Pruebas de seguridad y cumplimiento<\\\/li><\\\/ul><p data-start=\\\"1381\\\" data-end=\\\"1604\\\">Por eso, m\\u00e1s que ver la auditor\\u00eda como un gasto, debe entenderse como una inversi\\u00f3n en seguridad, confianza del cliente y protecci\\u00f3n frente a fraudes, alineada con los lineamientos del <a href=\\\"https:\\\/\\\/www.pcisecuritystandards.org\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\"><span class=\\\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\\\"><span class=\\\"whitespace-normal\\\">PCI Security Standards Council<\\\/span><\\\/span>.<\\\/a><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfQu\\u00e9 riesgos enfrenta tu empresa si no cumple con est\\u00e1ndares como PCI DSS o ISO 27001?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p data-start=\\\"222\\\" data-end=\\\"442\\\">No cumplir con est\\u00e1ndares de seguridad de la informaci\\u00f3n como PCI DSS, PCI PIN o <span class=\\\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\\\"><span class=\\\"whitespace-normal\\\">ISO\\\/IEC 27001<\\\/span><\\\/span> puede exponer a tu organizaci\\u00f3n a riesgos cr\\u00edticos que afectan tanto la operaci\\u00f3n como la reputaci\\u00f3n.<\\\/p><p data-start=\\\"444\\\" data-end=\\\"579\\\">En empresas de pagos digitales, e-commerce, fintech y sectores regulados en Colombia y Am\\u00e9rica Latina, el incumplimiento puede generar:<\\\/p><ul data-start=\\\"581\\\" data-end=\\\"1022\\\"><li data-section-id=\\\"1vjeogk\\\" data-start=\\\"581\\\" data-end=\\\"679\\\">\\ud83d\\udea8 Brechas de seguridad que comprometen datos sensibles, especialmente informaci\\u00f3n de tarjetas<\\\/li><li data-section-id=\\\"16k6639\\\" data-start=\\\"680\\\" data-end=\\\"761\\\">\\u26a0\\ufe0f Sanciones regulatorias, contractuales o exigidas por adquirentes y aliados<\\\/li><li data-section-id=\\\"9ht1gk\\\" data-start=\\\"762\\\" data-end=\\\"839\\\">\\ud83d\\uded1 Restricciones operativas o incluso la p\\u00e9rdida de certificaciones clave<\\\/li><li data-section-id=\\\"t59csm\\\" data-start=\\\"840\\\" data-end=\\\"928\\\">\\ud83d\\udcc9 Deterioro de la confianza de clientes, socios comerciales y entidades financieras<\\\/li><li data-section-id=\\\"m3wd3p\\\" data-start=\\\"929\\\" data-end=\\\"1022\\\">\\ud83d\\udcb0 Altos costos legales, reputacionales y operativos derivados de incidentes de seguridad<\\\/li><\\\/ul><p data-start=\\\"1024\\\" data-end=\\\"1216\\\">Estos est\\u00e1ndares, definidos por organismos como el <span class=\\\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\\\"><span class=\\\"whitespace-normal\\\">PCI Security Standards Council<\\\/span><\\\/span>, establecen las mejores pr\\u00e1cticas para proteger la informaci\\u00f3n y garantizar la continuidad del negocio.<\\\/p><p data-start=\\\"1218\\\" data-end=\\\"1427\\\">Adoptarlos no es solo una obligaci\\u00f3n t\\u00e9cnica o de cumplimiento normativo: es una decisi\\u00f3n estrat\\u00e9gica que fortalece la seguridad, la credibilidad y la sostenibilidad de tu empresa en el entorno digital actual.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfQui\\u00e9n es IQ Information Quality y qu\\u00e9 nos diferencia?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span style=\\\"font-weight: 400;\\\">IQ Information Quality es una firma colombiana especializada <\\\/span><b>exclusivamente en seguridad en pagos digitales<\\\/b><span style=\\\"font-weight: 400;\\\">, con m\\u00e1s de <\\\/span><b>17 a\\u00f1os de experiencia<\\\/b><span style=\\\"font-weight: 400;\\\"> en Latinoam\\u00e9rica y el Caribe.<\\\/span><span style=\\\"font-weight: 400;\\\"><br \\\/><\\\/span><span style=\\\"font-weight: 400;\\\">Estamos certificados por el PCI SSC como:<\\\/span><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\u2705<\\\/span> <b>QSA (Qualified Security Assessor)<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\u2705<\\\/span> <b>QPA (Qualified PIN Assessor)<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Nos diferencia:<\\\/span><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\ud83e\\udded<\\\/span> <b>Enfoque imparcial<\\\/b><span style=\\\"font-weight: 400;\\\">: no vendemos tecnolog\\u00edas ni licencias<\\\/span><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\ud83c\\udf0e<\\\/span> <b>Experiencia regional<\\\/b><span style=\\\"font-weight: 400;\\\">: presencia en m\\u00faltiples pa\\u00edses y entornos regulatorios<\\\/span><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\ud83d\\udc65<\\\/span> <b>Equipo certificado internacionalmente<\\\/b><span style=\\\"font-weight: 400;\\\">: QSA, QPA, CISA, CISSP, CISM<\\\/span><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\ud83d\\udce2<\\\/span> <b>Comunicaci\\u00f3n directa y seguimiento personalizado<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\ud83d\\udd04<\\\/span> <b>Soluciones adaptadas<\\\/b><span style=\\\"font-weight: 400;\\\"> al tama\\u00f1o, madurez y rol de cada cliente<\\\/span><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfQu\\u00e9 servicios ofrecemos en cumplimiento PCI?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span style=\\\"font-weight: 400;\\\">Acompa\\u00f1amos a organizaciones en el cumplimiento de los est\\u00e1ndares PCI DSS y PCI PIN, con estrategias ajustadas al contexto operativo de cada actor del ecosistema de pagos.<\\\/span><\\\/p><p><b>\\ud83d\\udd10<\\\/b><b> PCI DSS \\u2013 Protecci\\u00f3n de datos de tarjeta<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Validamos tus controles para proteger transacciones presenciales y no presenciales, de acuerdo con los requisitos del est\\u00e1ndar.<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>GAP PCI DSS<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Evaluamos tu situaci\\u00f3n actual con enfoque priorizado frente a los requisitos PCI<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Preevaluaci\\u00f3n<\\\/b><span style=\\\"font-weight: 400;\\\">\\u2013 Evaluamos tu situaci\\u00f3n frente a los requisitos PCI aplicables<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>SAQ PCI DSS<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Apoyo en selecci\\u00f3n y diligenciamiento del SAQ adecuado (SAQ\\\/AOC), basado en validaci\\u00f3n de evidencia.<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Reducci\\u00f3n de alcance PCI<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Estrategias para limitar la exposici\\u00f3n de datos<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Validaci\\u00f3n en terceros<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Evaluaci\\u00f3n a proveedores que procesan datos de tarjeta<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Tokenizaci\\u00f3n:<\\\/b><span style=\\\"font-weight: 400;\\\"> Evaluamos o sugerimos formas de eliminar el PAN del entorno<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>\\u00a03D Secure<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Soluciones para proteger datos y autenticar usuarios en pagos digitales, reduciendo riesgo y mejorando el cumplimiento<\\\/span><\\\/li><\\\/ul><p><b>\\ud83d\\udd11<\\\/b><b> PCI PIN \\u2013 Protecci\\u00f3n de datos de PIN<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Ayudamos a cumplir los requisitos t\\u00e9cnicos de seguridad en PIN, tanto f\\u00edsicos como digitales.<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>GAP PCI PIN<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Evaluaci\\u00f3n preliminar<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Evaluaci\\u00f3n oficial PCI PIN<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Validaci\\u00f3n completa con enfoque t\\u00e9cnico<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Implementaci\\u00f3n (Fase I, II, III)<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Acompa\\u00f1amiento en controles complejos<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Validaci\\u00f3n de terceros<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Evaluaci\\u00f3n a proveedores que manejan PIN<\\\/span><\\\/li><li aria-level=\\\"1\\\"><b>Planes de acci\\u00f3n<\\\/b> \\u2013 Cierre de hallazgos posterior a la auditor\\u00eda<\\\/li><\\\/ul>\"}},{\"@type\":\"Question\",\"name\":\"4. Adem\\u00e1s del cumplimiento PCI, \\u00bfqu\\u00e9 otros servicios de seguridad digital ofrecemos?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span style=\\\"font-weight: 400;\\\">Ofrecemos un portafolio completo de servicios que fortalecen la seguridad digital de nuestros clientes, m\\u00e1s all\\u00e1 del cumplimiento normativo.<\\\/span><\\\/p><p><b>\\u2699\\ufe0f<\\\/b><b> Gesti\\u00f3n de Vulnerabilidades<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Identificamos, validamos y mitigamos riesgos antes de que generen incidentes.<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Ethical Hacking<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Simulaci\\u00f3n controlada de ataques<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Test de intrusi\\u00f3n (interno y externo)<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Verificaci\\u00f3n t\\u00e9cnica de exposici\\u00f3n real<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Escaneo de vulnerabilidades<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Automatizaci\\u00f3n y an\\u00e1lisis continuo<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Ingenier\\u00eda social<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Simulaciones de phishing, vishing y ataques presenciales<\\\/span><\\\/li><\\\/ul><p><b>\\ud83d\\udee1\\ufe0f<\\\/b><b> Seguridad en Aplicaciones<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Validamos la seguridad de tus aplicaciones desde el c\\u00f3digo hasta la ejecuci\\u00f3n.<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Revisi\\u00f3n de c\\u00f3digo seguro<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Identificaci\\u00f3n de errores y vulnerabilidades<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Web Scan<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Escaneo automatizado de aplicaciones web<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Test de intrusi\\u00f3n en apps<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Evaluaci\\u00f3n l\\u00f3gica y t\\u00e9cnica de seguridad<\\\/span><\\\/li><\\\/ul><p><b>\\ud83d\\udd12<\\\/b><b> Seguridad de la Informaci\\u00f3n<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Fortalecemos tu SGSI seg\\u00fan los principales est\\u00e1ndares internacionales.<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>GAP ISO 27001<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Diagn\\u00f3stico frente al est\\u00e1ndar<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Evaluaci\\u00f3n de riesgos<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Identificaci\\u00f3n y priorizaci\\u00f3n de amenazas<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Implementaci\\u00f3n ISO 27001<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Dise\\u00f1o, documentaci\\u00f3n y despliegue del SGSI<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Auditor\\u00eda interna ISO<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Verificaci\\u00f3n previa a la certificaci\\u00f3n<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Datos personales<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Cumplimiento con Habeas Data, GDPR y otras regulaciones<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Transici\\u00f3n ISO 27001:2022<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Apoyo en migraci\\u00f3n desde versiones anteriores<\\\/span><\\\/li><\\\/ul><p><b>\\ud83c\\udf93<\\\/b><b> Capacitaci\\u00f3n T\\u00e9cnica y Ejecutiva<\\\/b><\\\/p><p><span style=\\\"font-weight: 400;\\\">Formamos a tus equipos para operar con seguridad y cumplir con est\\u00e1ndares.<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Curso PCI DSS v4.0.1<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Formaci\\u00f3n en cumplimiento t\\u00e9cnico y documental<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Curso ISO 27001<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Implementaci\\u00f3n y mantenimiento del SGSI<\\\/span><\\\/li><\\\/ul><p><b>Curso Desarrollo Seguro de Software<\\\/b><span style=\\\"font-weight: 400;\\\"> \\u2013 Buenas pr\\u00e1cticas para devs y QA<\\\/span><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfA qu\\u00e9 tipo de organizaciones acompa\\u00f1amos?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p><span style=\\\"font-weight: 400;\\\">Trabajamos con todos los actores que forman parte del ecosistema de pagos digitales, entendiendo su rol, riesgos y obligaciones normativas.<\\\/span><\\\/p><p><span style=\\\"font-weight: 400;\\\">\\ud83d\\udcbc<\\\/span><span style=\\\"font-weight: 400;\\\"> Segmentos a los que atendemos:<\\\/span><\\\/p><ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Financieros:<\\\/b><span style=\\\"font-weight: 400;\\\"> bancos, emisores, adquirentes, procesadores<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Tecnol\\u00f3gicos:<\\\/b><span style=\\\"font-weight: 400;\\\"> fintechs, datacenters, SOCs, pasarelas de pago, call centers<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Comercio y consumo:<\\\/b><span style=\\\"font-weight: 400;\\\"> plataformas de e-commerce, aseguradoras, programas de fidelizaci\\u00f3n<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><b>Pagos emergentes:<\\\/b><span style=\\\"font-weight: 400;\\\"> tarjetas privadas, giros, pagos instant\\u00e1neos, pagos P2P, open banking, BNPL (&#8220;Compra ahora, paga despu\\u00e9s&#8221;)<\\\/span><\\\/li><\\\/ul><p><span style=\\\"font-weight: 400;\\\">\\ud83e\\udde9<\\\/span><span style=\\\"font-weight: 400;\\\"> Cada tipo de organizaci\\u00f3n tiene desaf\\u00edos \\u00fanicos. Nuestro enfoque se adapta para asegurar cumplimiento sin frenar tu operaci\\u00f3n.<\\\/span><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfPor qu\\u00e9 elegirnos como tu aliado en seguridad de pagos?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><span style=\\\"font-weight: 400;\\\">\\u2705<\\\/span><span style=\\\"font-weight: 400;\\\"> Somos la <\\\/span><b>\\u00fanica firma colombiana certificada como QSA y QPA<\\\/b><span style=\\\"font-weight: 400;\\\"> por el PCI SSC<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><span style=\\\"font-weight: 400;\\\">\\ud83d\\udca7<\\\/span><span style=\\\"font-weight: 400;\\\"> Contamos con <\\\/span><b>m\\u00e1s de 17 a\\u00f1os de experiencia<\\\/b><span style=\\\"font-weight: 400;\\\"> en seguridad de pagos en Latinoam\\u00e9rica y el Caribe<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><span style=\\\"font-weight: 400;\\\">\\ud83e\\udde0<\\\/span><span style=\\\"font-weight: 400;\\\"> Nuestro equipo tiene certificaciones globales en cumplimiento y seguridad digital<\\\/span><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><span style=\\\"font-weight: 400;\\\">\\u2696\\ufe0f<\\\/span><span style=\\\"font-weight: 400;\\\"> Brindamos un <\\\/span><b>enfoque imparcial y estrat\\u00e9gico<\\\/b><\\\/li><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><span style=\\\"font-weight: 400;\\\">\\ud83d\\udccb<\\\/span><span style=\\\"font-weight: 400;\\\"> Integramos <\\\/span><b>cronogramas, seguimiento y soporte directo<\\\/b><span style=\\\"font-weight: 400;\\\"> en todo el proceso<\\\/span><\\\/li><\\\/ul><p><span style=\\\"font-weight: 400;\\\">\\ud83d\\udd12<\\\/span> <i><span style=\\\"font-weight: 400;\\\">M\\u00e1s que cumplir, aseguramos que la seguridad acompa\\u00f1e tu crecimiento.<\\\/span><\\\/i><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfQu\\u00e9 es la autenticaci\\u00f3n resistente al phishing y por qu\\u00e9 es importante?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<ul><li style=\\\"font-weight: 400;\\\" aria-level=\\\"1\\\"><p>La autenticaci\\u00f3n resistente al phishing reemplaza el uso exclusivo de contrase\\u00f1as con m\\u00e9todos m\\u00e1s seguros como <strong>passkeys, biometr\\u00eda o llaves f\\u00edsicas de seguridad<\\\/strong>. Estos sistemas est\\u00e1n dise\\u00f1ados para evitar que un atacante pueda capturar o reutilizar credenciales, incluso si el usuario es enga\\u00f1ado con un sitio falso.<\\\/p><p><strong>\\u00bfQu\\u00e9 ventajas ofrece?<\\\/strong><\\\/p><ul><li><strong>Mayor seguridad:<\\\/strong> Las claves criptogr\\u00e1ficas son \\u00fanicas y no pueden ser interceptadas.<\\\/li><li><strong>Prevenci\\u00f3n de phishing:<\\\/strong> Las credenciales no funcionan fuera del dominio autorizado.<\\\/li><li><strong>Mejor experiencia de usuario:<\\\/strong> No hay que recordar contrase\\u00f1as.<\\\/li><li><strong>Menores costos operativos:<\\\/strong> Se reducen los tickets por contrase\\u00f1as olvidadas.<\\\/li><li><strong>Cumplimiento normativo:<\\\/strong> Tecnolog\\u00edas como FIDO2 facilitan cumplir con marcos como PCI DSS.<\\\/li><\\\/ul><p><strong>\\u00bfQu\\u00e9 tener en cuenta para implementarla?<\\\/strong><\\\/p><ul><li>Evaluar la infraestructura actual.<\\\/li><li>Adoptar tecnolog\\u00edas como FIDO2\\\/WebAuthn.<\\\/li><li>Dise\\u00f1ar una estrategia progresiva de adopci\\u00f3n.<\\\/li><li>Capacitar a los usuarios y equipos t\\u00e9cnicos.<\\\/li><li>Asegurar interoperabilidad entre dispositivos y navegadores.<\\\/li><\\\/ul><p>No se trata solo de cambiar contrase\\u00f1as por otra herramienta. Es una transformaci\\u00f3n en la arquitectura de autenticaci\\u00f3n. Desde IQ Information Quality ayudamos a implementar estas soluciones de forma segura y alineadas con los objetivos del negocio.<\\\/p><\\\/li><\\\/ul>\"}},{\"@type\":\"Question\",\"name\":\"\\u00bfC\\u00f3mo confirmar que un sitio no es vulnerable a ataques de scripts?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Los comerciantes pueden garantizar la seguridad de su p\\u00e1gina de pago de dos maneras principales:<\\\/p><ol><li><strong> Implementando t\\u00e9cnicas de protecci\\u00f3n<\\\/strong><\\\/li><\\\/ol><p>Para proteger su p\\u00e1gina contra ataques de scripts, los comerciantes deben adoptar las siguientes medidas:<\\\/p><ul><li><strong>Cumplir con los requisitos de PCI DSS<\\\/strong>: Implementar las pr\\u00e1cticas descritas en los requisitos 6.4.3 y 11.6.1 de PCI DSS, que incluyen la protecci\\u00f3n contra modificaciones no autorizadas del c\\u00f3digo fuente y la detecci\\u00f3n de cambios sospechosos en el sitio.<\\\/li><li><strong>Utilizar Content Security Policy (CSP)<\\\/strong>: Configurar una pol\\u00edtica de seguridad de contenido que restrinja la ejecuci\\u00f3n de scripts no autorizados y prevenga la carga de c\\u00f3digo malicioso.<\\\/li><li><strong>Implementar Subresource Integrity (SRI)<\\\/strong>: Asegurar que los scripts externos no sean manipulados mediante la validaci\\u00f3n de sus firmas digitales.<\\\/li><li><strong>Monitorear y escanear el sitio regularmente<\\\/strong>: Utilizar herramientas de monitoreo y escaneo para detectar cualquier cambio inesperado en el c\\u00f3digo o la inclusi\\u00f3n de scripts sospechosos.<\\\/li><\\\/ul><p>Estas medidas pueden ser aplicadas por el propio comerciante o por un tercero especializado en seguridad cibern\\u00e9tica.<\\\/p><ol start=\\\"2\\\"><li><strong> Obteniendo confirmaci\\u00f3n del TPSP o procesador de pagos<\\\/strong><\\\/li><\\\/ol><p>Otra forma de garantizar la seguridad de la p\\u00e1gina de pago es verificar que el proveedor de servicios de pago implementa t\\u00e9cnicas de protecci\\u00f3n contra ataques de scripts. Para ello, los comerciantes deben:<\\\/p><ul><li style=\\\"list-style-type: none;\\\"><ul><li>Confirmar con el TPSP que su soluci\\u00f3n de pago incrustada est\\u00e1 protegida contra ataques de scripts.<\\\/li><li>Seguir estrictamente las instrucciones del proveedor para la correcta implementaci\\u00f3n del iframe de pago.<\\\/li><li>Solicitar documentaci\\u00f3n que demuestre el cumplimiento de las normas PCI DSS en la soluci\\u00f3n de pago ofrecida.<\\\/li><\\\/ul><\\\/li><\\\/ul>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1caab73 elementor-section-content-middle elementor-reverse-mobile ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"1caab73\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f99a0d5 elementor-invisible\" data-id=\"f99a0d5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fa9c9a elementor-widget elementor-widget-text-editor\" data-id=\"2fa9c9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We hope that this section of the faq you may have provided greater clarity on the challenges, regulations and good practices in the security of digital payments. In IQ Information Quality, we are committed to assisting you in the comprehensive strengthening of the security in your processes and environments of payment, with a focus on strategic, customized and aligned to the highest standards in the industry.<\/p><p>If you still have any questions, concerns, or need more specific guidance, we invite you to schedule a free consultation with our experts. We will be glad to help you to protect your transactions and to build a digital ecosystem more reliable and resilient.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-70e25cf elementor-section-content-middle elementor-reverse-mobile ct-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"70e25cf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e20b0d5\" data-id=\"e20b0d5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-428ee9a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"428ee9a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-dc5af4f\" data-id=\"dc5af4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6ef7c9 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"d6ef7c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How can you get started?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd9b84c animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"bd9b84c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">We offer a free consultation with one of our experts.<br>\nIn 30 minutes, we evaluate your situation and we propose a clear path.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91172d6 elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"91172d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ultimate_floating_fx_translate_y&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/wa.link\/ghr9rm\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"><strong>Agenda your diagnosis here<\/strong><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Preguntas Frecuentes (FAQ) Seguridad en Pagos Digitales con IQ Information Quality Todo lo que necesitas saber sobre Cumplimiento en pago digitales En el ecosistema actual de pagos digitales, el cumplimiento de est\u00e1ndares de seguridad de la informaci\u00f3n como PCI DSS e ISO 27001 no es opcional: es esencial para proteger los datos de tarjetas, prevenir [&hellip;]<\/p>","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-11510","page","type-page","status-publish","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/pages\/11510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/comments?post=11510"}],"version-history":[{"count":0,"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/pages\/11510\/revisions"}],"wp:attachment":[{"href":"https:\/\/iqcol.com\/en\/wp-json\/wp\/v2\/media?parent=11510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}