{"id":5826,"date":"2017-01-12T10:25:51","date_gmt":"2017-01-12T10:25:51","guid":{"rendered":"https:\/\/www.apen.es\/?p=5826"},"modified":"2025-03-04T11:33:18","modified_gmt":"2025-03-04T11:33:18","slug":"10-blogs-sobre-seguridad-informatica","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/10-blogs-sobre-seguridad-informatica\/","title":{"rendered":"10 blogs about cybersecurity"},"content":{"rendered":"<p>Cyberattacks block access to certain files on the systems of individuals and companies, demanding a ransom in exchange for removing the encryption. According to analysts, over 100 million threats were reported in the last year alone!<br>In response to these threats,&nbsp;<strong>Windows 10<\/strong>&nbsp;It is now more resistant than ever to ransomware thanks to its latest major Anniversary update, of which we highlight 4 points:<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Microsoft Edge<\/h2>\n\n\n\n<p>&nbsp;<br>It has been verified that the 60% ransomware threat uses programs capable of compromising browsers or their plugins. For this reason&nbsp;<strong>Microsoft<\/strong>&nbsp;Microsoft has strengthened all security measures in Windows 10 and its built-in browser, Microsoft Edge. With this update<strong>&nbsp;Microsoft Edge<\/strong>&nbsp;It runs Flash Player (a very common browser plugin that malware creators use to download ransomware) in an isolated container. This prevents malware from being inadvertently downloaded and running additional payloads on client systems.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware detection<\/h2>\n\n\n\n<p>&nbsp;<br>The primary distribution channel for ransomware is through email attachments. We can say that all machine learning models for detecting email-distributed malware have been improved. This results in enhanced protection levels for both business and personal customers.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Faster analysis<\/h2>\n\n\n\n<p>&nbsp;<br><strong>Windows<\/strong>&nbsp;The 10th Anniversary has been equipped with new technology&nbsp;<strong>Windows<\/strong>&nbsp;Defender reduces the time it takes to detect malware to seconds, increasing the system&#039;s ability to respond to threats even before infection occurs.<br>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advanced Threat Protection<\/h2>\n\n\n\n<p>&nbsp;<br><strong>Windows Defender Advanced Threat Protection<\/strong>&nbsp;(ATP) is a new service that will help companies detect, investigate, and respond to advanced attacks on their networks. It is based on existing security defenses that&nbsp;<strong>Windows 10<\/strong>&nbsp;offers today,&nbsp;<strong>Windows Defender Advanced Threat Protection<\/strong>&nbsp;It provides a new level of protection to the Windows 10 security stack, post-security breach.<br>&nbsp;<br>Definitely,&nbsp;<strong>Microsoft<\/strong>&nbsp;It is positioned as a great ally against these types of threats that can end up compromising the economic stability of our SMEs.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks block access to certain files on the systems of individuals and companies, demanding a ransom\u2026<\/p>","protected":false},"author":4,"featured_media":5827,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,88],"tags":[140,141,73],"class_list":["post-5826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-web","tag-blog-seguridad-informatica","tag-bloggers-informaticos","tag-seguridad-informatica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 blogs sobre seguridad inform\u00e1tica - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Los ataques cibern\u00e9ticos bloquean el acceso a determinados archivos en los sistemas de particulares y empresas, pidiendo una cifra econ\u00f3mica a modo de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/10-blogs-sobre-seguridad-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 blogs sobre seguridad inform\u00e1tica - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Los ataques cibern\u00e9ticos bloquean el acceso a determinados archivos en los sistemas de particulares y empresas, pidiendo una cifra econ\u00f3mica a modo de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/10-blogs-sobre-seguridad-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-12T10:25:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T11:33:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"10 blogs sobre seguridad inform\u00e1tica\",\"datePublished\":\"2017-01-12T10:25:51+00:00\",\"dateModified\":\"2025-03-04T11:33:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/\"},\"wordCount\":399,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/seguridad-inform\u00e1tica.png\",\"keywords\":[\"blog seguridad inform\u00e1tica\",\"bloggers inform\u00e1ticos\",\"Seguridad inform\u00e1tica\"],\"articleSection\":[\"Apen\",\"WEB\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/\",\"name\":\"10 blogs sobre seguridad inform\u00e1tica - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/seguridad-inform\u00e1tica.png\",\"datePublished\":\"2017-01-12T10:25:51+00:00\",\"dateModified\":\"2025-03-04T11:33:18+00:00\",\"description\":\"Los ataques cibern\u00e9ticos bloquean el acceso a determinados archivos en los sistemas de particulares y empresas, pidiendo una cifra econ\u00f3mica a modo de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/seguridad-inform\u00e1tica.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/seguridad-inform\u00e1tica.png\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/10-blogs-sobre-seguridad-informatica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 blogs sobre seguridad inform\u00e1tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 blogs about cybersecurity - Apen Inform\u00e1tica","description":"Cyberattacks block access to certain files on the systems of individuals and companies, demanding a ransom.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/10-blogs-sobre-seguridad-informatica\/","og_locale":"en_US","og_type":"article","og_title":"10 blogs sobre seguridad inform\u00e1tica - Apen Inform\u00e1tica","og_description":"Los ataques cibern\u00e9ticos bloquean el acceso a determinados archivos en los sistemas de particulares y empresas, pidiendo una cifra econ\u00f3mica a modo de","og_url":"https:\/\/www.apen.es\/en\/blog\/10-blogs-sobre-seguridad-informatica\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2017-01-12T10:25:51+00:00","article_modified_time":"2025-03-04T11:33:18+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png","type":"image\/png"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"10 blogs sobre seguridad inform\u00e1tica","datePublished":"2017-01-12T10:25:51+00:00","dateModified":"2025-03-04T11:33:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/"},"wordCount":399,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png","keywords":["blog seguridad inform\u00e1tica","bloggers inform\u00e1ticos","Seguridad inform\u00e1tica"],"articleSection":["Apen","WEB"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/","url":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/","name":"10 blogs about cybersecurity - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png","datePublished":"2017-01-12T10:25:51+00:00","dateModified":"2025-03-04T11:33:18+00:00","description":"Cyberattacks block access to certain files on the systems of individuals and companies, demanding a ransom.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/10-blogs-sobre-seguridad-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"10 blogs sobre seguridad inform\u00e1tica"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":88,"label":"WEB"}],"post_tag":[{"value":140,"label":"blog seguridad inform\u00e1tica"},{"value":141,"label":"bloggers inform\u00e1ticos"},{"value":73,"label":"Seguridad inform\u00e1tica"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2017\/01\/seguridad-inform\u00e1tica.png",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":88,"name":"WEB","slug":"web","term_group":0,"term_taxonomy_id":88,"taxonomy":"category","description":"","parent":0,"count":121,"filter":"raw","term_order":"0","cat_ID":88,"category_count":121,"category_description":"","cat_name":"WEB","category_nicename":"web","category_parent":0}],"tag_info":[{"term_id":140,"name":"blog seguridad inform\u00e1tica","slug":"blog-seguridad-informatica","term_group":0,"term_taxonomy_id":140,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":141,"name":"bloggers inform\u00e1ticos","slug":"bloggers-informaticos","term_group":0,"term_taxonomy_id":141,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":73,"name":"Seguridad inform\u00e1tica","slug":"seguridad-informatica","term_group":0,"term_taxonomy_id":73,"taxonomy":"post_tag","description":"","parent":0,"count":28,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/5826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=5826"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/5826\/revisions"}],"predecessor-version":[{"id":54155,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/5826\/revisions\/54155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/5827"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=5826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=5826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=5826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}