{"id":95360,"date":"2023-12-04T11:34:31","date_gmt":"2023-12-04T11:34:31","guid":{"rendered":"https:\/\/www.42gears.com\/?p=95360"},"modified":"2023-12-06T04:50:43","modified_gmt":"2023-12-06T04:50:43","slug":"understanding-incident-response-and-the-pivotal-role-of-mdm","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/es\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/","title":{"rendered":"Understanding Incident Response and the Pivotal Role of MDM"},"content":{"rendered":"\n<p>Incident response (IR) has emerged as a crucial factor of cybersecurity, providing a structured approach to figuring out, containing, eradicating, and recovering from safety incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phases of Incident Response<\/strong><\/h2>\n\n\n\n<p>The IR process typically encompasses five distinct phases:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Preparation:<\/strong> The foundation of effective IR lies in good preparation. Organizations must establish a comprehensive IR plan, identify and train a dedicated IR team, and implement robust security controls to minimize the likelihood of incidents occurring.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Identification:<\/strong> The ability to promptly detect and classify security incidents is important. This phase involves monitoring logs, analyzing user reports, and identifying anomalous activity indicative of a potential breach.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Containment:<\/strong> Once an incident is identified, swift action is crucial to prevent further damage. Containment measures may include shutting down affected systems, disconnecting networks, or revoking user privileges to halt the spread of malware or unauthorized access.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Eradication:<\/strong> The eradication phase focuses on eliminating the root cause of the incident. This involves removing malware, patching vulnerabilities, and restoring systems to a clean state to ensure their integrity and prevent future compromises.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Recovery:<\/strong> The final phase aims to restore business operations and implement measures to prevent similar incidents from recurring. This may involve updating security policies, conducting additional training, and implementing new security controls.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>MDM: A Catalyst for Effective Incident Response<\/strong><\/h2>\n\n\n\n<p>Mobile device management (MDM) has emerged as a powerful tool that plays a pivotal role in incident response. MDM solutions provide a centralized platform to manage, monitor, and secure mobile devices, enabling organizations to effectively address security incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How MDM Enhances Incident Response<\/strong><\/h2>\n\n\n\n<p><strong>Enforcing Security Policies:<\/strong> MDM allows for the creation and enforcement of security policies across mobile devices, ensuring that endpoints adhere to password compliance, network restrictions, and other security measures.<\/p>\n\n\n\n<p><strong>Early Detection and Notification:<\/strong> MDM can detect and notify IT administrators of non-compliance issues, such as multiple failed password attempts, which may indicate a compromised device.<\/p>\n\n\n\n<p><strong>Device Tracking and Location Services:<\/strong> MDM facilitates device tracking, enabling IT teams to locate lost or stolen devices, expediting recovery and preventing unauthorized access.<\/p>\n\n\n\n<p><strong>Remote Configuration Changes:<\/strong> MDM empowers IT administrators to remotely modify device configurations, such as disabling vulnerable features, restricting network access, or enforcing password policies.<\/p>\n\n\n\n<p><strong>Comprehensive Incident Documentation:<\/strong> MDM meticulously logs and records all actions taken during an incident, providing a valuable resource for post-incident analysis and policy refinement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Practical Example: MDM in Action<\/strong><\/h2>\n\n\n\n<p>Consider a scenario where an organization detects a potential data breach originating from a mobile device. Utilizing MDM capabilities, the IT team can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Track the device&#8217;s location to identify its whereabouts and take steps to recover it.<\/li><li>Remotely disable the device to prevent further data exfiltration and protect sensitive information.<\/li><li>Enforce password reset to regain control of the device and prevent unauthorized access.<\/li><li>Initiate a forensic analysis of the device to identify the root cause of the breach and implement corrective measures.<\/li><\/ul>\n\n\n\n<p>Through these actions, the organization can effectively contain the incident, minimize data loss, and restore device security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>In the ever-evolving cybersecurity landscape, incident response remains a critical pillar of defense. By leveraging the capabilities of MDM solutions, organizations can enhance their incident response capabilities, effectively address security incidents, and safeguard their data and IT infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Incident response (IR) has emerged as a crucial factor of cybersecurity, providing a structured approach to figuring out, containing, eradicating, and recovering from safety incidents. Phases of Incident Response The IR process typically encompasses five distinct phases: Preparation: The foundation of effective IR lies in good preparation. Organizations must establish a comprehensive IR plan, identify&hellip;<\/p>\n","protected":false},"author":35,"featured_media":95361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"latest-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-95360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The importance of MDM solutions for enabling effective incident response<\/title>\n<meta name=\"description\" content=\"Dive deep into the importance of incident response and how MDM solutions enable effective incident response for addressing cybersecurity threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Incident Response and the Pivotal Role of MDM\" \/>\n<meta property=\"og:description\" content=\"Dive deep into the importance of incident response and how MDM solutions enable effective incident response for addressing cybersecurity threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-04T11:34:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-06T04:50:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Uma Anand\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Uma Anand\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\"},\"author\":{\"name\":\"Uma Anand\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/dee8c5a278a8a6d78116adbf18136f78\"},\"headline\":\"Understanding Incident Response and the Pivotal Role of MDM\",\"datePublished\":\"2023-12-04T11:34:31+00:00\",\"dateModified\":\"2023-12-06T04:50:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\"},\"wordCount\":536,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\",\"name\":\"The importance of MDM solutions for enabling effective incident response\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg\",\"datePublished\":\"2023-12-04T11:34:31+00:00\",\"dateModified\":\"2023-12-06T04:50:43+00:00\",\"description\":\"Dive deep into the importance of incident response and how MDM solutions enable effective incident response for addressing cybersecurity threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg\",\"width\":1000,\"height\":538},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Incident Response and the Pivotal Role of MDM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/dee8c5a278a8a6d78116adbf18136f78\",\"name\":\"Uma Anand\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e465e5c78e6d59eb61bfd9cd25fcd1e9c5c019a6813dfa356e0c3cb9cbe8aa14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e465e5c78e6d59eb61bfd9cd25fcd1e9c5c019a6813dfa356e0c3cb9cbe8aa14?s=96&d=mm&r=g\",\"caption\":\"Uma Anand\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The importance of MDM solutions for enabling effective incident response","description":"Dive deep into the importance of incident response and how MDM solutions enable effective incident response for addressing cybersecurity threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/","og_locale":"es_ES","og_type":"article","og_title":"Understanding Incident Response and the Pivotal Role of MDM","og_description":"Dive deep into the importance of incident response and how MDM solutions enable effective incident response for addressing cybersecurity threats.","og_url":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2023-12-04T11:34:31+00:00","article_modified_time":"2023-12-06T04:50:43+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg","type":"image\/jpeg"}],"author":"Uma Anand","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"Uma Anand","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/"},"author":{"name":"Uma Anand","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/dee8c5a278a8a6d78116adbf18136f78"},"headline":"Understanding Incident Response and the Pivotal Role of MDM","datePublished":"2023-12-04T11:34:31+00:00","dateModified":"2023-12-06T04:50:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/"},"wordCount":536,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg","articleSection":["Uncategorized"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/","url":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/","name":"The importance of MDM solutions for enabling effective incident response","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg","datePublished":"2023-12-04T11:34:31+00:00","dateModified":"2023-12-06T04:50:43+00:00","description":"Dive deep into the importance of incident response and how MDM solutions enable effective incident response for addressing cybersecurity threats.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg","width":1000,"height":538},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/understanding-incident-response-and-the-pivotal-role-of-mdm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/es\/"},{"@type":"ListItem","position":2,"name":"Understanding Incident Response and the Pivotal Role of MDM"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/dee8c5a278a8a6d78116adbf18136f78","name":"Uma Anand","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e465e5c78e6d59eb61bfd9cd25fcd1e9c5c019a6813dfa356e0c3cb9cbe8aa14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e465e5c78e6d59eb61bfd9cd25fcd1e9c5c019a6813dfa356e0c3cb9cbe8aa14?s=96&d=mm&r=g","caption":"Uma Anand"}}]}},"author_meta":{"ID":"35","user_nicename":"uma-anand42gears-com","user_email":"uma.anand@42gears.com","user_registered":"2023-09-01 10:23:54","display_name":"Uma Anand","first_name":"Uma","last_name":"Anand"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2023\/12\/Featured-banner.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/95360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/comments?post=95360"}],"version-history":[{"count":9,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/95360\/revisions"}],"predecessor-version":[{"id":95412,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/95360\/revisions\/95412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media\/95361"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media?parent=95360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/categories?post=95360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/tags?post=95360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}