{"id":807,"date":"2023-08-18T13:29:17","date_gmt":"2023-08-18T19:29:17","guid":{"rendered":"https:\/\/www.fundacionyod.org\/sin-categorizar\/protege-tu-negocio-principales-consejos-de-ciberseguridad-para-empresas\/"},"modified":"2024-04-21T14:18:36","modified_gmt":"2024-04-21T20:18:36","slug":"protect-your-business-top-cybersecurity-tips-for-companies","status":"publish","type":"post","link":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/","title":{"rendered":"Protect Your Business: Top Cybersecurity Tips for Companies"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text text_direction=&#8221;default&#8221;]\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"react-scroll-to-bottom--css-yvlam-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-yvlam-1n7m0yu\">\n<div>\n<div class=\"flex flex-col text-sm pb-9\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-129\">\n<div class=\"px-4 py-2 justify-center text-base md:gap-6 m-auto\">\n<div class=\"flex flex-1 text-base mx-auto gap-3 juice:gap-4 juice:md:gap-6 md:px-5 lg:px-1 xl:px-5 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"flex-shrink-0 flex flex-col relative items-end\">\n<div>\n<div class=\"pt-0.5\">\n<div class=\"gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"relative flex w-full flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start gap-3 whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 overflow-x-auto\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"18567a05-2276-400d-b100-72c4eccafca9\">\n<div class=\"markdown prose w-full break-words dark:prose-invert dark\">\n<p>In a world where technology drives business operations, cybersecurity becomes a fundamental pillar for data protection, company reputation, and customer trust. Here&#8217;s a guide of essential tips to keep your business safe in cyberspace.<\/p>\n<ol>\n<li><strong>Education and Awareness:<\/strong><\/li>\n<\/ol>\n<p>Cybersecurity begins with educating your team. Provide regular training on safe online practices, how to detect phishing emails, and how to handle confidential information. Awareness is the first line of defense against threats.<\/p>\n<ol start=\"2\">\n<li><strong>Software Updates:<\/strong><\/li>\n<\/ol>\n<p>Keep all your systems, applications, and devices up to date with the latest security patches. Cybercriminals often exploit known vulnerabilities in outdated software.<\/p>\n<ol start=\"3\">\n<li><strong>Strong Password Policy:<\/strong><\/li>\n<\/ol>\n<p>Establish robust password policies for all employees and ensure they change their passwords regularly. Encouraging the use of unique passwords, combining letters, numbers, and special characters, will strengthen security.<\/p>\n<ol start=\"4\">\n<li><strong>Antivirus and Antimalware Protection:<\/strong><\/li>\n<\/ol>\n<p>Install and keep reliable security solutions updated on all devices. This will help detect and prevent malware and other attacks.<\/p>\n<ol start=\"5\">\n<li><strong>Least Privilege Principle-Based Access:<\/strong><\/li>\n<\/ol>\n<p>Limit access to systems and data only to employees who truly need it. The less access employees have to sensitive information, the lower the risk of exposure in case of a breach.<\/p>\n<ol start=\"6\">\n<li><strong>Regular Backups:<\/strong><\/li>\n<\/ol>\n<p>Perform regular backups of all your critical data and store them in secure locations. In the event of a ransomware attack or other data loss, having intact backups will be vital.<\/p>\n<p>Cybersecurity is an ever-evolving process. Conduct regular security assessments, audits, and penetration testing to identify and address new vulnerabilities.<\/p>\n<p>Protecting your business online is a crucial responsibility. By following these tips and staying informed about the latest cybersecurity trends, you can create a strong digital defense and ensure your assets and data are safe in cyberspace.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"mt-1 flex gap-3 empty:hidden\">\n<div class=\"text-gray-400 flex self-end lg:self-center items-center justify-center lg:justify-start mt-0 -ml-1 h-7 gap-[2px] visible\"><\/div>\n<\/div>\n<div class=\"pr-2 lg:pr-0\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><button class=\"cursor-pointer absolute z-10 rounded-full bg-clip-padding border text-token-text-secondary border-token-border-light right-1\/2 bg-token-main-surface-primary bottom-5\"><\/button><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"w-full pt-2 md:pt-0 dark:border-white\/20 md:border-transparent md:dark:border-transparent md:w-[calc(100%-.5rem)]\">\n<form class=\"stretch mx-2 flex flex-row gap-3 last:mb-2 md:mx-4 md:last:mb-6 lg:mx-auto lg:max-w-2xl xl:max-w-3xl\">\n<div class=\"relative flex h-full flex-1 flex-col\">\n<div class=\"absolute bottom-full left-0 right-0\"><\/div>\n<div class=\"flex w-full items-center\"><\/div>\n<\/div>\n<\/form>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":626,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":{"0":"post-807","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protect Your Business: Top Cybersecurity Tips for Companies - Fundaci\u00f3n YOD<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Business: Top Cybersecurity Tips for Companies - Fundaci\u00f3n YOD\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"Fundaci\u00f3n YOD\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T19:29:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-21T20:18:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paula\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paula\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/\",\"url\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/\",\"name\":\"Protect Your Business: Top Cybersecurity Tips for Companies - Fundaci\u00f3n YOD\",\"isPartOf\":{\"@id\":\"https:\/\/www.fundacionyod.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg\",\"datePublished\":\"2023-08-18T19:29:17+00:00\",\"dateModified\":\"2024-04-21T20:18:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.fundacionyod.org\/#\/schema\/person\/24b78641f355a5516fbb9efbeeb9ba27\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#primaryimage\",\"url\":\"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg\",\"contentUrl\":\"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.fundacionyod.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Business: Top Cybersecurity Tips for Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fundacionyod.org\/#website\",\"url\":\"https:\/\/www.fundacionyod.org\/\",\"name\":\"Fundaci\u00f3n YOD\",\"description\":\"ONG\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fundacionyod.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fundacionyod.org\/#\/schema\/person\/24b78641f355a5516fbb9efbeeb9ba27\",\"name\":\"Paula\",\"sameAs\":[\"http:\/\/www.fundacionyod.org\"],\"url\":\"https:\/\/www.fundacionyod.org\/en\/author\/paulafrancheska\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Business: Top Cybersecurity Tips for Companies - Fundaci\u00f3n YOD","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Business: Top Cybersecurity Tips for Companies - Fundaci\u00f3n YOD","og_description":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;...","og_url":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/","og_site_name":"Fundaci\u00f3n YOD","article_published_time":"2023-08-18T19:29:17+00:00","article_modified_time":"2024-04-21T20:18:36+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg","type":"image\/jpeg"}],"author":"Paula","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Paula","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/","url":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/","name":"Protect Your Business: Top Cybersecurity Tips for Companies - Fundaci\u00f3n YOD","isPartOf":{"@id":"https:\/\/www.fundacionyod.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#primaryimage"},"image":{"@id":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg","datePublished":"2023-08-18T19:29:17+00:00","dateModified":"2024-04-21T20:18:36+00:00","author":{"@id":"https:\/\/www.fundacionyod.org\/#\/schema\/person\/24b78641f355a5516fbb9efbeeb9ba27"},"breadcrumb":{"@id":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#primaryimage","url":"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg","contentUrl":"https:\/\/www.fundacionyod.org\/wp-content\/uploads\/2023\/08\/p-herramientas-de-seguridad-informatica.jpg-1024x683-1.jpeg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.fundacionyod.org\/en\/blog-en\/protect-your-business-top-cybersecurity-tips-for-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.fundacionyod.org\/en\/"},{"@type":"ListItem","position":2,"name":"Protect Your Business: Top Cybersecurity Tips for Companies"}]},{"@type":"WebSite","@id":"https:\/\/www.fundacionyod.org\/#website","url":"https:\/\/www.fundacionyod.org\/","name":"Fundaci\u00f3n YOD","description":"ONG","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fundacionyod.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.fundacionyod.org\/#\/schema\/person\/24b78641f355a5516fbb9efbeeb9ba27","name":"Paula","sameAs":["http:\/\/www.fundacionyod.org"],"url":"https:\/\/www.fundacionyod.org\/en\/author\/paulafrancheska\/"}]}},"_links":{"self":[{"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/posts\/807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/comments?post=807"}],"version-history":[{"count":2,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/posts\/807\/revisions"}],"predecessor-version":[{"id":809,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/posts\/807\/revisions\/809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/media\/626"}],"wp:attachment":[{"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/media?parent=807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/categories?post=807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fundacionyod.org\/en\/wp-json\/wp\/v2\/tags?post=807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}