{"id":960,"date":"2025-03-13T09:04:40","date_gmt":"2025-03-13T08:04:40","guid":{"rendered":"https:\/\/redargos.com\/do-you-need-to-improve-cybersecurity-in-processes-products-and-services\/"},"modified":"2025-07-04T16:23:38","modified_gmt":"2025-07-04T14:23:38","slug":"do-you-need-to-improve-cybersecurity-in-processes-products-and-services","status":"publish","type":"page","link":"https:\/\/redargos.com\/en\/financing\/do-you-need-to-improve-cybersecurity-in-processes-products-and-services\/","title":{"rendered":"Do you need to improve cybersecurity in processes, products, and services?"},"content":{"rendered":"\n<section class=\"wp-block-microbio-blocks-section is-style-section-pd-xl ramp-primary-strong has-secondary-background-color has-background child-wide section-align-end   alignfull\" style=\"--min-height:350px;--min-height-mobile:0;--img:url('http:\/\/localhost:10192\/wp-content\/uploads\/2025\/02\/header-home-argos.webp');--img-mobile:url('http:\/\/localhost:10192\/wp-content\/uploads\/2025\/02\/header-home-argos-1024x683.webp');--focal:50% 50%;--focal-mobile:50% 50%;--img-large:url('http:\/\/localhost:10192\/wp-content\/uploads\/2025\/02\/header-home-argos-1024x683.webp')\" data-animation-enter=\"alpha\">\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-0 flex-columns  no-wrap flex-max-width theme-margins\" style=\"--custom-gap:0;--flex-max-width:900px\">\n<span class=\"wp-block-microbio-blocks-badge badge-size-default is-style-white\">Castile and Le\u00f3n<\/span>\n\n\n<h1 class=\"wp-block-post-title\">Do you need to improve cybersecurity in processes, products, and services?<\/h1>\n\n\n<p class=\"has-heading-4-font-size\">We finance the costs of implementing cybersecurity processes, products, and services.<\/p>\n<\/div>\n<\/section>\n\n<section class=\"wp-block-microbio-blocks-section is-style-section-pd-xl child-default section-align-center   alignfull\" style=\"--min-height:0;--min-height-mobile:0;--img:url('');--img-mobile:url('');--focal:50% 50%;--focal-mobile:50% 50%\" data-animation-enter=\"alpha\">\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-4 flex-columns  no-wrap\" style=\"--custom-gap:0\">\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-0 flex-columns\" style=\"--custom-gap:0\">\n<h2 class=\"wp-block-heading has-heading-3-font-size\">Beneficiary entities<\/h2>\n\n\n\n<p>SMEs and Midcaps with at least one workplace in Castile and Le\u00f3n.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-0 flex-columns\" style=\"--custom-gap:0\">\n<h2 class=\"wp-block-heading has-heading-3-font-size\">Eligible projects<\/h2>\n\n\n\n<ul class=\"wp-block-microbio-blocks-custom-list\">\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p><strong>Type A projects:<\/strong> Individual projects of cybersecurity innovation applied to business processes that rely on the collaboration of specialized professionals to address this cybersecurity challenge.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p><strong>Type B projects:<\/strong> Individual or collaborative projects for cybersecurity innovation applied to products and services, developed by the company itself, which allow it to ensure that its products and services are more secure and meet the cybersecurity standards required by European and national regulations.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-0 flex-columns\" style=\"--custom-gap:0\">\n<h2 class=\"wp-block-heading has-heading-3-font-size\">Eligible costs and expenses<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-heading-4-font-size\">Type A projects<\/h3>\n\n\n\n<ul class=\"wp-block-microbio-blocks-custom-list\">\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Cybersecurity software and hardware (both in XaaS mode)<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>Consulting and\/or certification (external collaborations through a technology consultant).<\/p>\n\n\n\n<ul class=\"wp-block-microbio-blocks-custom-list\">\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>External audits that assess the company&#8217;s security situation: ethical hacking, annual security audits, and follow-up audits.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting services for designing cybersecurity policies and incident management procedures, as well as their implementation.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting for the implementation of the measures and actions necessary to improve cybersecurity in the company and its processes.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Preparation for certifications\/security seals.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Obtaining cybersecurity certifications.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Provision of cloud services (XaaS) related to cybersecurity.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Specialized consulting for the development of customized cybersecurity solutions (innovation).<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Specialized consulting for the integration of emerging technologies and adaptation of cybersecurity (IA) projects.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting for awareness, sensitization, training and capacity building.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting for testing, experimentation, and validation of potential cybersecurity tools\/solutions.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting for the implementation and\/or adaptation of cybersecurity monitoring systems.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting for identity and access management.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Consulting for policies and implementation of business continuity\/recovery plans, backup systems, and control systems for the use of digital certificates.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Technical consulting provided by business associations.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>And any other consulting services needed to implement the company&#8217;s cybersecurity.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Expenses for managing the aid file (external managing entity)<\/p>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-heading-4-font-size\">Type B projects<\/h3>\n\n\n\n<ul class=\"wp-block-microbio-blocks-custom-list\">\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Cybersecurity software and hardware (both in XaaS mode)<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>Actual costs of personnel dedicated to the implementation of one or more of the following innovation concepts:<\/p>\n\n\n\n<ul class=\"wp-block-microbio-blocks-custom-list\">\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Risk assessment from the design stage.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Secure development tools and platforms.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Security in architecture.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Integrated security testing.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Privacy-focused design.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Initial validation of products\/services with the client: high TRL product that can be validated and adapted to the market \u2013 innovation.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Business continuity in cybersecurity.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Control systems for the use of digital certificates.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Assessment and treatment of third-party risks.<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Preparation and adaptation to obtain seals\/recognition for any of the cybersecurity standards and regulations, NIS2, CRA, DORA (Digital Operational Resilience Act) for the financial and insurance sector, and CER (Critical Entity Resilience).<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Development of Security Operations Centers (SOC).<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Expenses for managing the aid file (external managing entity)<\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p>Expenses arising from the audit.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-0 flex-columns\" style=\"--custom-gap:0\">\n<h2 class=\"wp-block-heading has-heading-3-font-size\">Financing<\/h2>\n\n\n\n<p>The non-repayable grant will be determined as a fixed percentage of a minimum of 70% up to a maximum of 80%.<\/p>\n\n\n\n<p>The minimum and maximum eligible budgets for the different projects will be established as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\" style=\"margin-top:var(--wp--preset--spacing--space-s)\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>PROJECT<\/strong><\/th><th><strong>GUY<\/strong><\/th><th><strong>MINIMUM<\/strong><\/th><th><strong>MAXIMUM<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Type A cybersecurity projects for processes for any company<\/td><td>INDIVIDUALS<\/td><td>3,000 \u20ac<\/td><td>150,000 \u20ac<\/td><\/tr><tr><td rowspan=\"2\">Type B cybersecurity projects for product and service manufacturers, developed by the company itself.<\/td><td>INDIVIDUALS<\/td><td>20,000 \u20ac<\/td><td>\u20ac300,000<\/td><\/tr><tr><td>IN COLLABORATION<\/td><td>100,000 \u20ac<\/td><td>\u20ac500,000<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-0 flex-columns\" style=\"--custom-gap:0\">\n<h2 class=\"wp-block-heading has-heading-3-font-size\">More information<\/h2>\n\n\n\n<ul class=\"wp-block-microbio-blocks-custom-list\">\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p><a href=\"https:\/\/www.tramitacastillayleon.jcyl.es\/web\/jcyl\/AdministracionElectronica\/es\/Plantilla100Detalle\/1251181050732\/Ayuda012\/1285512865442\/Propuesta\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Official information<\/a><\/p>\n<\/li>\n\n\n\n<li class=\"wp-block-microbio-blocks-flex flex-align-start flex-justify-start flex-gap-1  no-wrap\" style=\"--custom-gap:0\">\n<span class=\"wp-block-microbio-blocks-icon icon-size-default has-secondary-color has-text-color has-link-color wp-elements-b2752b91574be61312834e23447d4a89\"><svg><use xlink:href=\"\/wp-content\/plugins\/microbio-blocks\/assets\/images\/icons-library.svg#check\"\/><\/svg><\/span>\n\n\n\n<p><a href=\"https:\/\/portalclienteade.jcyl.es\/adpc\/?solAyuda=196\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Application<\/a><\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":1255,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"_pagina_privada":false,"footnotes":""},"class_list":["post-960","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/pages\/960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/comments?post=960"}],"version-history":[{"count":1,"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/pages\/960\/revisions"}],"predecessor-version":[{"id":966,"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/pages\/960\/revisions\/966"}],"up":[{"embeddable":true,"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/pages\/1255"}],"wp:attachment":[{"href":"https:\/\/redargos.com\/en\/wp-json\/wp\/v2\/media?parent=960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}