{"id":33406,"date":"2019-02-07T06:20:36","date_gmt":"2019-02-07T06:20:36","guid":{"rendered":"https:\/\/www.42gears.com\/?p=33406"},"modified":"2020-04-21T10:11:00","modified_gmt":"2020-04-21T10:11:00","slug":"iot-impact-on-security-issues","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/es\/blog\/iot-impact-on-security-issues\/","title":{"rendered":"How IoT Is Impacting Security Issues"},"content":{"rendered":"<p><img decoding=\"async\" class=\"wp-image-33427 aligncenter\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/IoT-Banner-01.png\" alt=\"IoT Banner\" width=\"827\" height=\"345\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/IoT-Banner-01.png 1774w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/IoT-Banner-01-300x125.png 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/IoT-Banner-01-768x320.png 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/IoT-Banner-01-1024x427.png 1024w\" sizes=\"(max-width: 827px) 100vw, 827px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Internet of things (IoT)<\/strong> devices may &nbsp;easily be hacked or compromised, just like any other mobile devices. And that can adversely affect an organization\u2019s infrastructure and processes. As IoT devices evolve and more such devices become a part of our daily lives, the security aspects have become paramount. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Experts predict that by <strong>2025<\/strong>, there will be about <strong>75 billion<\/strong> connected devices. With this, the number of IoT attacks are likely to rise. A recent Gartner survey found that nearly 20 percent of organizations experienced at least one IoT-based attack in the past three years.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security professionals should recognize such IoT security threats and identify ways to combat them.<\/span><\/p>\n<h3 style=\"font-size: 22px;\"><b>3 common IoT security threats<\/b><\/h3>\n<p><b>Botnets and DDoS attacks :&nbsp;<\/b><span style=\"font-weight: 400;\">The first Botnet attack happened in September 2016 through Mirai botnet, which infected approximately. 2.5 million IoT devices, including printers, cameras and routers. Botnets are used to launch distributed denial of service (DDoS) attacks. Experts says that there will be more such attacks in future.<\/span><\/p>\n<p><b>Lack of consistent Firmware updates :&nbsp;<\/b><span style=\"font-weight: 400;\">Firmware on platforms and applications should be regularly updated or it may provide an opportunity for hackers to access business networks and systems. <\/span><\/p>\n<p><b>Ransomware :&nbsp;<\/b><span style=\"font-weight: 400;\">Ransomware is a malware that locks down file access &nbsp;by encrypting them. Attackers provide the decryption key only after they are paid. Although, traces of such ransomware are usually found on personal and corporate networks, attacks can also be launched on connected devices, such as doors, vehicles and appliances.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\">Unified Endpoint Management (UEM)<\/a> and data security measures can help fight such IoT security issues. Security leaders must know who is accessing the data collected and which systems are being used.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gartner forecasts that the worldwide spending on IoT security to protect against such threats will reach <strong>$ 3.1 billion<\/strong> in <strong>2021<\/strong>.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-33456\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Gartner-Worldwide-IoT-security-spending-forecast-table.png\" alt=\"Gartner Worldwide IoT security spending forecast table\" width=\"646\" height=\"461\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Gartner-Worldwide-IoT-security-spending-forecast-table.png 2127w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Gartner-Worldwide-IoT-security-spending-forecast-table-300x214.png 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Gartner-Worldwide-IoT-security-spending-forecast-table-768x548.png 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Gartner-Worldwide-IoT-security-spending-forecast-table-1024x731.png 1024w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Gartner also predicts that regulatory compliance will be the main influencer for IoT security uptake.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As IoT adoption increases, &nbsp;it is necessary to have comprehensive security strategy in place. Ignoring any security perimeter leaves the opportunity for attackers to cause serious damage to the business.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">UEM solutions can help combat such IoT threats. <a href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\">42Gears UEM<\/a> solutions are built keeping all security aspects in mind. They &nbsp;offer features that support IoT devices and infrastructure. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For exploring the 42Gears UEM solution to secure IoT devices, click <\/span><a href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\"><span style=\"font-weight: 400;\">here.<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet of things (IoT) devices may &nbsp;easily be hacked or compromised, just like any other mobile devices. And that can adversely affect an organization\u2019s infrastructure and processes. As IoT devices evolve and more such devices become a part of our daily lives, the security aspects have become paramount. Experts predict that by 2025, there will&hellip;<\/p>\n","protected":false},"author":7,"featured_media":33437,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[465],"tags":[412,467,466],"class_list":["post-33406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-iot","tag-iot-management","tag-iot-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internet of Things | IoT Management | IoT security issues<\/title>\n<meta name=\"description\" content=\"It has become paramount for security leaders to adopt suitable security measures and ensure a consistent IoT Security Strategy in place.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How IoT Is Impacting Security Issues\" \/>\n<meta property=\"og:description\" content=\"It has become paramount for security leaders to adopt suitable security measures and ensure a consistent IoT Security Strategy in place.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-07T06:20:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-21T10:11:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png\" \/>\n\t<meta property=\"og:image:width\" content=\"499\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"How IoT Is Impacting Security Issues\",\"datePublished\":\"2019-02-07T06:20:36+00:00\",\"dateModified\":\"2020-04-21T10:11:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\"},\"wordCount\":382,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png\",\"keywords\":[\"IoT\",\"IoT Management\",\"IoT Security\"],\"articleSection\":[\"IoT\"],\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\",\"name\":\"Internet of Things | IoT Management | IoT security issues\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png\",\"datePublished\":\"2019-02-07T06:20:36+00:00\",\"dateModified\":\"2020-04-21T10:11:00+00:00\",\"description\":\"It has become paramount for security leaders to adopt suitable security measures and ensure a consistent IoT Security Strategy in place.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png\",\"width\":499,\"height\":330,\"caption\":\"Featured Image -How IoT is impacting on security issues\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How IoT Is Impacting Security Issues\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Internet of Things | IoT Management | IoT security issues","description":"It has become paramount for security leaders to adopt suitable security measures and ensure a consistent IoT Security Strategy in place.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/","og_locale":"es_ES","og_type":"article","og_title":"How IoT Is Impacting Security Issues","og_description":"It has become paramount for security leaders to adopt suitable security measures and ensure a consistent IoT Security Strategy in place.","og_url":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2019-02-07T06:20:36+00:00","article_modified_time":"2020-04-21T10:11:00+00:00","og_image":[{"width":499,"height":330,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png","type":"image\/png"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"How IoT Is Impacting Security Issues","datePublished":"2019-02-07T06:20:36+00:00","dateModified":"2020-04-21T10:11:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/"},"wordCount":382,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png","keywords":["IoT","IoT Management","IoT Security"],"articleSection":["IoT"],"inLanguage":"es-ES","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/","url":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/","name":"Internet of Things | IoT Management | IoT security issues","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png","datePublished":"2019-02-07T06:20:36+00:00","dateModified":"2020-04-21T10:11:00+00:00","description":"It has become paramount for security leaders to adopt suitable security measures and ensure a consistent IoT Security Strategy in place.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png","width":499,"height":330,"caption":"Featured Image -How IoT is impacting on security issues"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/iot-impact-on-security-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/es\/"},{"@type":"ListItem","position":2,"name":"How IoT Is Impacting Security Issues"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/02\/Featured-Image-How-IoT-is-impacting-on-security-issues.png","_links":{"self":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/33406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/comments?post=33406"}],"version-history":[{"count":12,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/33406\/revisions"}],"predecessor-version":[{"id":50715,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/33406\/revisions\/50715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media\/33437"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media?parent=33406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/categories?post=33406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/tags?post=33406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}