{"id":5196,"date":"2021-05-28T10:32:53","date_gmt":"2021-05-28T08:32:53","guid":{"rendered":"http:\/\/www.re7systems.com\/?p=5196"},"modified":"2021-05-28T10:38:39","modified_gmt":"2021-05-28T08:38:39","slug":"com-aconseguir-la-seguretat-informatica-necessaria","status":"publish","type":"post","link":"https:\/\/www.re7systems.com\/es\/com-aconseguir-la-seguretat-informatica-necessaria\/","title":{"rendered":"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria"},"content":{"rendered":"<p>Protegir els teus sistemes inform\u00e0tics \u00e9s igual d\u2019important que digitalitzar-se i arribar al p\u00fablic. Vetllar per una seguretat inform\u00e0tica \u00e9s clau per al desenvolupament dels projectes. Aix\u00ed com establir protocols de resposta i recuperaci\u00f3 davant de possibles incidents.<\/p>\n\n\n\n<p>Per aquest motiu, a Re7Systems t\u2019ajudem amb la gesti\u00f3 de c\u00f2pies de seguretat, les auditories i donarem resposta davant de possibles incendis i <em>disaster recovery<\/em>.&nbsp;<br><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"http:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica-1.jpg\" alt=\"\" class=\"wp-image-5203\" width=\"310\" height=\"186\" srcset=\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica-1.jpg 1000w, https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica-1-300x180.jpg 300w, https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica-1-768x461.jpg 768w, https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica-1-16x10.jpg 16w\" sizes=\"(max-width: 310px) 100vw, 310px\" \/><\/figure><\/div>\n\n\n\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-2b043040\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-2b043040\">Gesti\u00f3 de c\u00f2pies de segurat<\/h2>\n\n\n\n<p>Entenem com a c\u00f2pies de seguretat aquell proc\u00e9s mitjan\u00e7ant el qual es duplica la informaci\u00f3 existent d\u2019un suport a un altre. L\u2019objectiu principal \u00e9s poder recuperar aquest contingut en cas que falli el sistema principal on s\u2019emmagatzema aquella informaci\u00f3. \u00c9s per aquest motiu que a Re7Systems et portem a terme la planificaci\u00f3, l\u2019execuci\u00f3 i la supervisi\u00f3 del pla de c\u00f2pies de seguretat per garantir la capacitat de superar ensurts inform\u00e0tics que pugui patir la teva empresa.&nbsp;<\/p>\n\n\n\n<p>Addicionalment tamb\u00e9 realitzem<em> backups<\/em> amb l\u2019objectiu de restaurar les dades copiades del sistema inform\u00e0tic despr\u00e9s d\u2019un incident o per tal de restaurar fitxers que s\u2019hagin esborrat accidentalment o s\u2019hagin corromput.&nbsp;<\/p>\n\n\n\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-53e09b63\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-53e09b63\">Auditories de seguretat<\/h2>\n\n\n\n<p>Una auditoria de seguretat consisteix en la realitzaci\u00f3 d\u2019un seguit de proves controlades per determinar l\u2019estat en el qual es troba la infraestructura i les xarxes de la teva empresa en l\u2019\u00e0mbit de seguretat inform\u00e0tica. \u00c9s a dir, una auditoria, permet con\u00e8ixer la situaci\u00f3 exacta dels actius inform\u00e0tics. De la mateixa manera tamb\u00e9 ens ajuda a con\u00e8ixer la protecci\u00f3, el control i les mesures de seguretat en el moment de la seva realitzaci\u00f3.<\/p>\n\n\n\n<p>\u00c9s per aix\u00f2 que Re7Systems t\u2019ajuda a identificar, enumerar i descriure les vulnerabilitats que poden apar\u00e8ixer a la teva empresa. Estem parlant de les estacions de treball, les xarxes de comunicaci\u00f3 i els servidors de la teva empresa. D\u2019aquesta manera, un cop obtinguts els resultats, podrem establir mesures preventives de refor\u00e7 per corregir els errors i amenaces.&nbsp;<\/p>\n\n\n\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-d2591dfc\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-d2591dfc\">Resposta davant d\u2019incendis i disaster recovery<\/h2>\n\n\n\n<p>Finalment, Re7Systems ofereix resposta davant d\u2019incendis i <em>disaster<\/em> <em>recovery<\/em>. Aquest concepte consisteix a recuperar les dades i funcionalitats davant la interrupci\u00f3 d\u2019un sistema. El nostre pla de conting\u00e8ncia inclou protocols d\u2019actuaci\u00f3 i les metodologies a aplicar en cas que es produeixi la suspensi\u00f3 del sistema inform\u00e0tic de la teva empresa.&nbsp;<\/p>\n\n\n\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-fdb6e53b\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-fdb6e53b\">Seguretat a Re7Systems<\/h2>\n\n\n\n<p>Finalment, Re7Systems ofereix resposta davant d\u2019incendis i <em>disaster<\/em> <em>recovery<\/em>. Aquest concepte consisteix a recuperar les dades i funcionalitats davant la interrupci\u00f3 d\u2019un sistema. El nostre pla de conting\u00e8ncia inclou protocols d\u2019actuaci\u00f3 i les metodologies a aplicar en cas que es produeixi la suspensi\u00f3 del sistema inform\u00e0tic de la teva empresa.&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Protegir els teus sistemes inform\u00e0tics \u00e9s igual d\u2019important que digitalitzar-se i arribar al p\u00fablic. Vetllar per una seguretat inform\u00e0tica \u00e9s clau per al desenvolupament dels projectes. Aix\u00ed com establir protocols de resposta i recuperaci\u00f3 davant de possibles incidents. Per aquest motiu, a Re7Systems t\u2019ajudem amb la gesti\u00f3 de c\u00f2pies de [&hellip;]<\/p>","protected":false},"author":1,"featured_media":5199,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria - Re7Systems<\/title>\n<meta name=\"description\" content=\"Quines s\u00f3n els conceptes a tenir en compte a l&#039;hora de contractar un servei de seguretat inform\u00e0tica? Auditories i c\u00f2pies de seguretat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.re7systems.com\/es\/com-aconseguir-la-seguretat-informatica-necessaria\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria - Re7Systems\" \/>\n<meta property=\"og:description\" content=\"Quines s\u00f3n els conceptes a tenir en compte a l&#039;hora de contractar un servei de seguretat inform\u00e0tica? Auditories i c\u00f2pies de seguretat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.re7systems.com\/es\/com-aconseguir-la-seguretat-informatica-necessaria\/\" \/>\n<meta property=\"og:site_name\" content=\"Re7Systems\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-28T08:32:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-28T08:38:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"nauelg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"nauelg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/\"},\"author\":{\"name\":\"nauelg\",\"@id\":\"https:\/\/www.re7systems.com\/#\/schema\/person\/968d46394ef2df4040ce432f25e253b4\"},\"headline\":\"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria\",\"datePublished\":\"2021-05-28T08:32:53+00:00\",\"dateModified\":\"2021-05-28T08:38:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/\"},\"wordCount\":479,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.re7systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/\",\"url\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/\",\"name\":\"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria - Re7Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.re7systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg\",\"datePublished\":\"2021-05-28T08:32:53+00:00\",\"dateModified\":\"2021-05-28T08:38:39+00:00\",\"description\":\"Quines s\u00f3n els conceptes a tenir en compte a l'hora de contractar un servei de seguretat inform\u00e0tica? Auditories i c\u00f2pies de seguretat.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage\",\"url\":\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg\",\"contentUrl\":\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.re7systems.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.re7systems.com\/#website\",\"url\":\"https:\/\/www.re7systems.com\/\",\"name\":\"Re7Systems\",\"description\":\"Consultoria, desenvolupament i seguretat inform\u00e0tica\",\"publisher\":{\"@id\":\"https:\/\/www.re7systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.re7systems.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.re7systems.com\/#organization\",\"name\":\"Re7Systems\",\"url\":\"https:\/\/www.re7systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.re7systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2020\/04\/logo_re7-e1586085030649.png\",\"contentUrl\":\"https:\/\/www.re7systems.com\/wp-content\/uploads\/2020\/04\/logo_re7-e1586085030649.png\",\"width\":200,\"height\":38,\"caption\":\"Re7Systems\"},\"image\":{\"@id\":\"https:\/\/www.re7systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.re7systems.com\/#\/schema\/person\/968d46394ef2df4040ce432f25e253b4\",\"name\":\"nauelg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.re7systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f9e8191f1b0a1bcb4d77d9fd97eee596?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f9e8191f1b0a1bcb4d77d9fd97eee596?s=96&d=mm&r=g\",\"caption\":\"nauelg\"},\"sameAs\":[\"https:\/\/re7.dtsgrup.es\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria - Re7Systems","description":"Quines s\u00f3n els conceptes a tenir en compte a l'hora de contractar un servei de seguretat inform\u00e0tica? Auditories i c\u00f2pies de seguretat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.re7systems.com\/es\/com-aconseguir-la-seguretat-informatica-necessaria\/","og_locale":"es_ES","og_type":"article","og_title":"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria - Re7Systems","og_description":"Quines s\u00f3n els conceptes a tenir en compte a l'hora de contractar un servei de seguretat inform\u00e0tica? Auditories i c\u00f2pies de seguretat.","og_url":"https:\/\/www.re7systems.com\/es\/com-aconseguir-la-seguretat-informatica-necessaria\/","og_site_name":"Re7Systems","article_published_time":"2021-05-28T08:32:53+00:00","article_modified_time":"2021-05-28T08:38:39+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg","type":"image\/jpeg"}],"author":"nauelg","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"nauelg","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#article","isPartOf":{"@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/"},"author":{"name":"nauelg","@id":"https:\/\/www.re7systems.com\/#\/schema\/person\/968d46394ef2df4040ce432f25e253b4"},"headline":"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria","datePublished":"2021-05-28T08:32:53+00:00","dateModified":"2021-05-28T08:38:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/"},"wordCount":479,"commentCount":0,"publisher":{"@id":"https:\/\/www.re7systems.com\/#organization"},"image":{"@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage"},"thumbnailUrl":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg","articleSection":["General"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/","url":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/","name":"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria - Re7Systems","isPartOf":{"@id":"https:\/\/www.re7systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage"},"image":{"@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage"},"thumbnailUrl":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg","datePublished":"2021-05-28T08:32:53+00:00","dateModified":"2021-05-28T08:38:39+00:00","description":"Quines s\u00f3n els conceptes a tenir en compte a l'hora de contractar un servei de seguretat inform\u00e0tica? Auditories i c\u00f2pies de seguretat.","breadcrumb":{"@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#primaryimage","url":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg","contentUrl":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2021\/05\/Seguridad_Informatica.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.re7systems.com\/com-aconseguir-la-seguretat-informatica-necessaria\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.re7systems.com\/"},{"@type":"ListItem","position":2,"name":"Com aconseguir la seguretat inform\u00e0tica necess\u00e0ria"}]},{"@type":"WebSite","@id":"https:\/\/www.re7systems.com\/#website","url":"https:\/\/www.re7systems.com\/","name":"Re7Systems","description":"Consultoria, desenvolupament i seguretat inform\u00e0tica","publisher":{"@id":"https:\/\/www.re7systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.re7systems.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.re7systems.com\/#organization","name":"Re7Systems","url":"https:\/\/www.re7systems.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.re7systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2020\/04\/logo_re7-e1586085030649.png","contentUrl":"https:\/\/www.re7systems.com\/wp-content\/uploads\/2020\/04\/logo_re7-e1586085030649.png","width":200,"height":38,"caption":"Re7Systems"},"image":{"@id":"https:\/\/www.re7systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.re7systems.com\/#\/schema\/person\/968d46394ef2df4040ce432f25e253b4","name":"nauelg","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.re7systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f9e8191f1b0a1bcb4d77d9fd97eee596?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f9e8191f1b0a1bcb4d77d9fd97eee596?s=96&d=mm&r=g","caption":"nauelg"},"sameAs":["https:\/\/re7.dtsgrup.es"]}]}},"_links":{"self":[{"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/posts\/5196"}],"collection":[{"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/comments?post=5196"}],"version-history":[{"count":0,"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/posts\/5196\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/media\/5199"}],"wp:attachment":[{"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/media?parent=5196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/categories?post=5196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.re7systems.com\/es\/wp-json\/wp\/v2\/tags?post=5196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}