{"id":27220,"date":"2020-12-10T01:57:00","date_gmt":"2020-12-10T01:57:00","guid":{"rendered":"https:\/\/acdi.betaweb.site\/?p=27220"},"modified":"2023-07-13T19:59:31","modified_gmt":"2023-07-14T00:59:31","slug":"how-to-proactively-prevent-a-cyberattack","status":"publish","type":"post","link":"https:\/\/acd-inc.com\/es\/blog\/how-to-proactively-prevent-a-cyberattack\/","title":{"rendered":"How to Proactively Prevent a Cyberattack"},"content":{"rendered":"<p>Cybersecurity is always on an IT admin\u2019s radar. However, Cyber vulnerability is at an all-time high. Your organization likely has some critical pieces in place to ensure that you are protected, like firewalls and antivirus. Still, there\u2019s so much more that can make the difference between total disaster or just a small incident. We\u2019ll discuss the statistics of cyberattacks, the most common attacks, their consequences, and the best ways to prevent them.<\/p>\n\n\n\n<p><strong>Statistics:<\/strong><\/p>\n\n\n\n<p>According to the <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">2019 Data Breach Investigations Report<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>94% of malware was delivered through email<\/li><li>34% of data breaches that occurred were due to insiders<\/li><li>22% of data breaches included social attacks<\/li><li>17% of data breaches involved malware<\/li><li>8% of data breaches were due to misuse by authorized users<\/li><li>60% of data breaches among small businesses were due to a negligent employee<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"How to Proactively Prevent a Cyberattack | ACDI Blog\" width=\"885\" height=\"498\" src=\"https:\/\/www.youtube.com\/embed\/QRvghxA03qk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Types of Cyberattacks:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Social Engineering Attacks \u2013 Ex: Phishing Emails \u2013 an attempt to obtain sensitive information such as usernames and passwords, credit card details, social security numbers, or other sensitive data. Phishing emails are also used to encourage victims to download malware.<\/li><li>Malware Attacks \u2013 The most common type of cyber-attack uses malicious software designed to cause damage a computer, server, client, or computer network. Examples include ransomware, which blocks access to the victim\u2019s files or data in demand for a ransom, and trojans can potentially crash a device or expose personal data.<\/li><li>Denial-of-service attacks \u2013 A Denial-of-Service (DoS) attack is meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash. These attacks are difficult to identify.<\/li><\/ol>\n\n\n\n<p><strong>Consequences of Cyberattacks:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Infrastructure breakdowns \u2013 Damaged networks, reduction in performance of systems and equipment, disrupted operations.<\/li><li>Data Breaches of personal information \u2013 Identity theft, additional targeted attacks, damaged brands, psychological impacts, and legal ramifications are examples of the fallout from data breaches.<\/li><li>Financial Implications \u2013 Loss of data, loss of productivity to restore compromised systems, ransoms paid, reduced credit standing, and loss of customer loyalty due to lack of trust in security are just a few of the financial implications of cyberattacks.<\/li><\/ol>\n\n\n\n<p><strong>How to Prevent Cyberattacks:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Restrict administrative access to limited individuals \u2013 This limits users\u2019 ability to download potentially compromised items to a device or network.<\/li><li>Train Users \u2013 How to recognize cybersecurity threats like phishing emails<\/li><li>Back up Data \u2013 Make sure you have a good restore point in case of an attack.<\/li><li>Require frequent password changes or Two-Factor Password Authentication<\/li><\/ol>\n\n\n\n<p>If any of your vulnerabilities come from your print environment,&nbsp;<a href=\"https:\/\/hub.acd-inc.com\/security\/security-with-papercut-mf-acdi\">let us help.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is always on an IT admin\u2019s radar. However, Cyber vulnerability is at an all-time high. Your organization likely has some critical pieces in place to ensure that you are protected, like firewalls and antivirus. Still, there\u2019s so much more that can make the difference between total disaster or just a small incident. We\u2019ll discuss &hellip;<\/p>","protected":false},"author":26,"featured_media":27221,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[149],"tags":[77],"class_list":["post-27220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-print-management","has-thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Proactively Prevent a Cyberattack - ACDI<\/title>\n<meta name=\"description\" content=\"Cybersecurity is always on an IT admin\u2019s radar. It is critical to have some pieces in place to ensure that you are protected,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acd-inc.com\/es\/blog\/how-to-proactively-prevent-a-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Proactively Prevent a Cyberattack - ACDI\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is always on an IT admin\u2019s radar. It is critical to have some pieces in place to ensure that you are protected,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acd-inc.com\/es\/blog\/how-to-proactively-prevent-a-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"ACDI\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/acdinc\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T01:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-14T00:59:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acd-inc.com\/wp-content\/uploads\/2021\/02\/2020-12-10-660x370-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"370\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gracen Caddy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ACDI\" \/>\n<meta name=\"twitter:site\" content=\"@ACDI\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gracen Caddy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/\"},\"author\":{\"name\":\"Gracen Caddy\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#\\\/schema\\\/person\\\/128bac0dec2d302f545e51549c81d29a\"},\"headline\":\"How to Proactively Prevent a Cyberattack\",\"datePublished\":\"2020-12-10T01:57:00+00:00\",\"dateModified\":\"2023-07-14T00:59:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/\"},\"wordCount\":432,\"publisher\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acd-inc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/2020-12-10-660x370-1.png\",\"keywords\":[\"Print Management\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"es-CO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/\",\"url\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/\",\"name\":\"How to Proactively Prevent a Cyberattack - ACDI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acd-inc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/2020-12-10-660x370-1.png\",\"datePublished\":\"2020-12-10T01:57:00+00:00\",\"dateModified\":\"2023-07-14T00:59:31+00:00\",\"description\":\"Cybersecurity is always on an IT admin\u2019s radar. It is critical to have some pieces in place to ensure that you are protected,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acd-inc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/2020-12-10-660x370-1.png\",\"contentUrl\":\"https:\\\/\\\/acd-inc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/2020-12-10-660x370-1.png\",\"width\":660,\"height\":370},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/blog\\\/how-to-proactively-prevent-a-cyberattack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acd-inc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Proactively Prevent a Cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/\",\"name\":\"ACDI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#organization\",\"name\":\"(ACDI) Access Control Devices Inc.\",\"url\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acd-inc.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Rectangle-80-1.png\",\"contentUrl\":\"https:\\\/\\\/acd-inc.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Rectangle-80-1.png\",\"width\":1440,\"height\":424,\"caption\":\"(ACDI) Access Control Devices Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/acdinc\\\/\",\"https:\\\/\\\/x.com\\\/ACDI\",\"https:\\\/\\\/www.instagram.com\\\/acd_inc\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/acdi---access-control-devices-inc-\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCu5iqXgW3nWsPMTqPQkCu7g\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/#\\\/schema\\\/person\\\/128bac0dec2d302f545e51549c81d29a\",\"name\":\"Gracen Caddy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67bb30919772641809000bff4ff7a3d0db3f1881ad75ffb27d1848453ea7a468?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67bb30919772641809000bff4ff7a3d0db3f1881ad75ffb27d1848453ea7a468?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67bb30919772641809000bff4ff7a3d0db3f1881ad75ffb27d1848453ea7a468?s=96&d=mm&r=g\",\"caption\":\"Gracen Caddy\"},\"sameAs\":[\"http:\\\/\\\/www.acd-inc.com\"],\"url\":\"https:\\\/\\\/acd-inc.com\\\/es\\\/blog\\\/author\\\/gcaddy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Proactively Prevent a Cyberattack - ACDI","description":"Cybersecurity is always on an IT admin\u2019s radar. It is critical to have some pieces in place to ensure that you are protected,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acd-inc.com\/es\/blog\/how-to-proactively-prevent-a-cyberattack\/","og_locale":"es_ES","og_type":"article","og_title":"How to Proactively Prevent a Cyberattack - ACDI","og_description":"Cybersecurity is always on an IT admin\u2019s radar. It is critical to have some pieces in place to ensure that you are protected,","og_url":"https:\/\/acd-inc.com\/es\/blog\/how-to-proactively-prevent-a-cyberattack\/","og_site_name":"ACDI","article_publisher":"https:\/\/www.facebook.com\/acdinc\/","article_published_time":"2020-12-10T01:57:00+00:00","article_modified_time":"2023-07-14T00:59:31+00:00","og_image":[{"width":660,"height":370,"url":"https:\/\/acd-inc.com\/wp-content\/uploads\/2021\/02\/2020-12-10-660x370-1.png","type":"image\/png"}],"author":"Gracen Caddy","twitter_card":"summary_large_image","twitter_creator":"@ACDI","twitter_site":"@ACDI","twitter_misc":{"Escrito por":"Gracen Caddy","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#article","isPartOf":{"@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/"},"author":{"name":"Gracen Caddy","@id":"https:\/\/acd-inc.com\/es\/#\/schema\/person\/128bac0dec2d302f545e51549c81d29a"},"headline":"How to Proactively Prevent a Cyberattack","datePublished":"2020-12-10T01:57:00+00:00","dateModified":"2023-07-14T00:59:31+00:00","mainEntityOfPage":{"@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/"},"wordCount":432,"publisher":{"@id":"https:\/\/acd-inc.com\/es\/#organization"},"image":{"@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/acd-inc.com\/wp-content\/uploads\/2021\/02\/2020-12-10-660x370-1.png","keywords":["Print Management"],"articleSection":["Security"],"inLanguage":"es-CO"},{"@type":"WebPage","@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/","url":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/","name":"How to Proactively Prevent a Cyberattack - ACDI","isPartOf":{"@id":"https:\/\/acd-inc.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/acd-inc.com\/wp-content\/uploads\/2021\/02\/2020-12-10-660x370-1.png","datePublished":"2020-12-10T01:57:00+00:00","dateModified":"2023-07-14T00:59:31+00:00","description":"Cybersecurity is always on an IT admin\u2019s radar. It is critical to have some pieces in place to ensure that you are protected,","breadcrumb":{"@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#primaryimage","url":"https:\/\/acd-inc.com\/wp-content\/uploads\/2021\/02\/2020-12-10-660x370-1.png","contentUrl":"https:\/\/acd-inc.com\/wp-content\/uploads\/2021\/02\/2020-12-10-660x370-1.png","width":660,"height":370},{"@type":"BreadcrumbList","@id":"https:\/\/acd-inc.com\/blog\/how-to-proactively-prevent-a-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acd-inc.com\/"},{"@type":"ListItem","position":2,"name":"How to Proactively Prevent a Cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/acd-inc.com\/es\/#website","url":"https:\/\/acd-inc.com\/es\/","name":"ACDI","description":"","publisher":{"@id":"https:\/\/acd-inc.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acd-inc.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/acd-inc.com\/es\/#organization","name":"(ACDI) Access Control Devices Inc.","url":"https:\/\/acd-inc.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/acd-inc.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/acd-inc.com\/wp-content\/uploads\/2020\/12\/Rectangle-80-1.png","contentUrl":"https:\/\/acd-inc.com\/wp-content\/uploads\/2020\/12\/Rectangle-80-1.png","width":1440,"height":424,"caption":"(ACDI) Access Control Devices Inc."},"image":{"@id":"https:\/\/acd-inc.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/acdinc\/","https:\/\/x.com\/ACDI","https:\/\/www.instagram.com\/acd_inc\/","https:\/\/www.linkedin.com\/company\/acdi---access-control-devices-inc-\/","https:\/\/www.youtube.com\/channel\/UCu5iqXgW3nWsPMTqPQkCu7g"]},{"@type":"Person","@id":"https:\/\/acd-inc.com\/es\/#\/schema\/person\/128bac0dec2d302f545e51549c81d29a","name":"Gracen Caddy","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/67bb30919772641809000bff4ff7a3d0db3f1881ad75ffb27d1848453ea7a468?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/67bb30919772641809000bff4ff7a3d0db3f1881ad75ffb27d1848453ea7a468?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/67bb30919772641809000bff4ff7a3d0db3f1881ad75ffb27d1848453ea7a468?s=96&d=mm&r=g","caption":"Gracen Caddy"},"sameAs":["http:\/\/www.acd-inc.com"],"url":"https:\/\/acd-inc.com\/es\/blog\/author\/gcaddy\/"}]}},"_links":{"self":[{"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/posts\/27220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/comments?post=27220"}],"version-history":[{"count":1,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/posts\/27220\/revisions"}],"predecessor-version":[{"id":27222,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/posts\/27220\/revisions\/27222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/media\/27221"}],"wp:attachment":[{"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/media?parent=27220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/categories?post=27220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acd-inc.com\/es\/wp-json\/wp\/v2\/tags?post=27220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}