{"id":1853,"date":"2021-10-20T07:03:17","date_gmt":"2021-10-20T10:03:17","guid":{"rendered":"https:\/\/tecnologia5.com\/blog\/?p=1853"},"modified":"2021-10-20T07:03:17","modified_gmt":"2021-10-20T10:03:17","slug":"10-maneras-de-protegerte","status":"publish","type":"post","link":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/","title":{"rendered":"10 maneras de protegerte de los hackers"},"content":{"rendered":"\n<p>Te compartimos 10 maneras de protegerte ante ciber ataques que seguro te van a evitar serios problemas<\/p>\n\n\n\n<p>1. Usa contrase\u00f1as seguras y no las repitas<\/p>\n\n\n\n<p>Como mencion\u00e1bamos en una de nuestra publicaciones anteriores \u00a8\u2026\u00a8 las cualidades de tu contrase\u00f1a ser\u00e1n la primer base de tu sistema de defensa ante ciber delincuentes. Nunca reveles tus contrase\u00f1as a nadie y, en lo posible, no las anotes. Si tienes demasiadas claves, usa un administrador de contrase\u00f1as para que no se te escapen de las manos.<\/p>\n\n\n\n<p>2. Si el correo electr\u00f3nico no fue solicitado, NUNCA uses sus links<\/p>\n\n\n\n<p>Los actos de Phishing empiezan siempre con un click en un enlace que nos llevan a completar datos para que sean sustra\u00eddos. Otras veces estos links poseen archivos de descarga maliciosos.&nbsp;<\/p>\n\n\n\n<p>3. Utiliza sitios web que sean seguros<\/p>\n\n\n\n<p>Siempre corrobora el protocolo de cidrado SSL en tus sitios web.&nbsp;<\/p>\n\n\n\n<p>Revisa la URL y aseg\u00farate de que comience con \u201cHTTPS:\/\/\u201d en lugar de \u201cHTTP:\/\/\u201d.&nbsp;<\/p>\n\n\n\n<p>&nbsp;Evita dejar registrado en sitios de compras tus tarjetas. I existiera un hackeo en dicho establecimiento tus datos quedaran expuestos.<\/p>\n\n\n\n<p>4. Habilita la autenticaci\u00f3n de dos pasos<\/p>\n\n\n\n<p>Como siempre&nbsp;&nbsp;mencionamos, a mayor cantidad de capas de seguridad menores problemas.<\/p>\n\n\n\n<p>Asegurate de poseer dos m\u00e9todos de autenticaci\u00f3n en tus operaciones, de esta forma la posibilidad de que alguien pueda descifrar varios datos tuyos ser\u00e1 mas complicado.<\/p>\n\n\n\n<p>5. Ten cuidado cuando uses una red Wi-Fi p\u00fablica<\/p>\n\n\n\n<p>Cuando una red no tiene protecci\u00f3n ni cifrado, la informaci\u00f3n que compartes con los sitios web puede quedar expuesta a los ojos de un hacker.\u00a0<\/p>\n\n\n\n<p>Es muy importante utilizar un VPN para evitar estos riesgos.<\/p>\n\n\n\n<p>6. Autorellenar es c\u00f3modo pero inseguro<\/p>\n\n\n\n<p>Como venimos mencionando en nuestro articulo \u00a810 maneras de protegerte\u00a8 no siempre lo seguro es lo mas c\u00f3modo.<\/p>\n\n\n\n<p>Si  se auto rellena es porque esta almacenado en alg\u00fan sitio y es aqu\u00ed donde justamente buscaran primero los hackers<\/p>\n\n\n\n<p>7. Piensa al escoger tus apps<\/p>\n\n\n\n<p>Siempre descarga desde las plataformas seguras como appstore o Google Play.<\/p>\n\n\n\n<p>8. Prepara medidas preventivas<\/p>\n\n\n\n<p>En caso de que te roben tu tel\u00e9fono ser\u00e1 fundamental que tenga su plan para borrar y bloquear toda su informaci\u00f3n. Puedes utilizar las plataformas del fabricante o apps independientes.<\/p>\n\n\n\n<p>9. Elimina o restringe los permisos asignados a las apps de terceros<\/p>\n\n\n\n<p>Durante su instalaci\u00f3n, una app puede obtener permiso para acceder a los servicios de ubicaci\u00f3n, para hacer cargas de datos autom\u00e1ticas, para crear copias de seguridad e incluso para mostrar n\u00fameros de tel\u00e9fono personales.&nbsp;<\/p>\n\n\n\n<p>10. Siempre ten un software seguro en todos tus dispositivos<\/p>\n\n\n\n<p>En Tecnolog\u00eda 5 confiamos en Kaspersky Internet Security para proteger tu seguridad y la de toda tu familia.<\/p>\n\n\n\n<p><a href=\"https:\/\/tecnologia5.com\/contacto\">Envianos un mensaje<\/a> y nos pondremos en contacto de inmediato para ayudarte con soluciones a tu medida.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Te compartimos 10 maneras de protegerte ante ciber ataques que seguro te van a evitar serios problemas 1. Usa contrase\u00f1as seguras y no las repitas Como mencion\u00e1bamos en una de nuestra publicaciones anteriores \u00a8\u2026\u00a8 las cualidades de tu contrase\u00f1a ser\u00e1n la primer base de tu sistema de defensa ante ciber delincuentes. Nunca reveles tus contrase\u00f1as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1854,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-notas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 maneras de protegerte de los hackers - Tec5.Tech<\/title>\n<meta name=\"description\" content=\"10 maneras de protegerte de los hackers Notas de Inter\u00e9s 10 calves fundamentales para proteger tus datos sensibles\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 maneras de protegerte de los hackers - Tec5.Tech\" \/>\n<meta property=\"og:description\" content=\"10 maneras de protegerte de los hackers Notas de Inter\u00e9s 10 calves fundamentales para proteger tus datos sensibles\" \/>\n<meta property=\"og:url\" content=\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\" \/>\n<meta property=\"og:site_name\" content=\"Tec5.Tech\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-20T10:03:17+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1318\" \/>\n\t<meta property=\"og:image:height\" content=\"494\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tecnolog\u00eda 5\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnologia5it\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tecnolog\u00eda 5\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\"},\"author\":{\"name\":\"Tecnolog\u00eda 5\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d\"},\"headline\":\"10 maneras de protegerte de los hackers\",\"datePublished\":\"2021-10-20T10:03:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\"},\"wordCount\":477,\"publisher\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg\",\"articleSection\":[\"Notas de Inter\u00e9s\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\",\"url\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\",\"name\":\"10 maneras de protegerte de los hackers - Tec5.Tech\",\"isPartOf\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg\",\"datePublished\":\"2021-10-20T10:03:17+00:00\",\"description\":\"10 maneras de protegerte de los hackers Notas de Inter\u00e9s 10 calves fundamentales para proteger tus datos sensibles\",\"breadcrumb\":{\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage\",\"url\":\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg\",\"contentUrl\":\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg\",\"width\":1318,\"height\":494,\"caption\":\"10 maneras preventivas\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/tec5.tech\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 maneras de protegerte de los hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tec5.tech\/blog\/#website\",\"url\":\"https:\/\/tec5.tech\/blog\/\",\"name\":\"Tec5.Tech\",\"description\":\"Actualidad y Tecnolog\u00eda\",\"publisher\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tec5.tech\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\",\"name\":\"Tec5.Tech\",\"url\":\"https:\/\/tec5.tech\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg\",\"contentUrl\":\"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg\",\"width\":1200,\"height\":300,\"caption\":\"Tec5.Tech\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d\",\"name\":\"Tecnolog\u00eda 5\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g\",\"caption\":\"Tecnolog\u00eda 5\"},\"description\":\"Somos una Consultora de IT que provee soluciones tecnol\u00f3gicas profesionales a empresas de diferentes tama\u00f1os y rubros con el fin de potenciarlas y mejorar su competitividad, la relaci\u00f3n con sus clientes y concentrarse en su negocio.\",\"sameAs\":[\"https:\/\/tecnologia5.com\/home\",\"https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks\",\"https:\/\/www.instagram.com\/tecnologia5it\/\",\"https:\/\/www.linkedin.com\/company\/tecnologia5it\/?viewAsMember=true\",\"https:\/\/x.com\/tecnologia5it\",\"youtube@tecnologia5.com\",\"tecnologia 5\"],\"url\":\"http:\/\/tec5.tech\/blog\/author\/editor-t5\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 maneras de protegerte de los hackers - Tec5.Tech","description":"10 maneras de protegerte de los hackers Notas de Inter\u00e9s 10 calves fundamentales para proteger tus datos sensibles","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/","og_locale":"es_ES","og_type":"article","og_title":"10 maneras de protegerte de los hackers - Tec5.Tech","og_description":"10 maneras de protegerte de los hackers Notas de Inter\u00e9s 10 calves fundamentales para proteger tus datos sensibles","og_url":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/","og_site_name":"Tec5.Tech","article_author":"https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks","article_published_time":"2021-10-20T10:03:17+00:00","og_image":[{"width":1318,"height":494,"url":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg","type":"image\/jpeg"}],"author":"Tecnolog\u00eda 5","twitter_card":"summary_large_image","twitter_creator":"@tecnologia5it","twitter_misc":{"Escrito por":"Tecnolog\u00eda 5","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#article","isPartOf":{"@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/"},"author":{"name":"Tecnolog\u00eda 5","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d"},"headline":"10 maneras de protegerte de los hackers","datePublished":"2021-10-20T10:03:17+00:00","mainEntityOfPage":{"@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/"},"wordCount":477,"publisher":{"@id":"https:\/\/tec5.tech\/blog\/#organization"},"image":{"@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage"},"thumbnailUrl":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg","articleSection":["Notas de Inter\u00e9s"],"inLanguage":"es"},{"@type":"WebPage","@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/","url":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/","name":"10 maneras de protegerte de los hackers - Tec5.Tech","isPartOf":{"@id":"https:\/\/tec5.tech\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage"},"image":{"@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage"},"thumbnailUrl":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg","datePublished":"2021-10-20T10:03:17+00:00","description":"10 maneras de protegerte de los hackers Notas de Inter\u00e9s 10 calves fundamentales para proteger tus datos sensibles","breadcrumb":{"@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#primaryimage","url":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg","contentUrl":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg","width":1318,"height":494,"caption":"10 maneras preventivas"},{"@type":"BreadcrumbList","@id":"http:\/\/tec5.tech\/blog\/10-maneras-de-protegerte\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/tec5.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"10 maneras de protegerte de los hackers"}]},{"@type":"WebSite","@id":"https:\/\/tec5.tech\/blog\/#website","url":"https:\/\/tec5.tech\/blog\/","name":"Tec5.Tech","description":"Actualidad y Tecnolog\u00eda","publisher":{"@id":"https:\/\/tec5.tech\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tec5.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/tec5.tech\/blog\/#organization","name":"Tec5.Tech","url":"https:\/\/tec5.tech\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/","url":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg","contentUrl":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg","width":1200,"height":300,"caption":"Tec5.Tech"},"image":{"@id":"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d","name":"Tecnolog\u00eda 5","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g","caption":"Tecnolog\u00eda 5"},"description":"Somos una Consultora de IT que provee soluciones tecnol\u00f3gicas profesionales a empresas de diferentes tama\u00f1os y rubros con el fin de potenciarlas y mejorar su competitividad, la relaci\u00f3n con sus clientes y concentrarse en su negocio.","sameAs":["https:\/\/tecnologia5.com\/home","https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks","https:\/\/www.instagram.com\/tecnologia5it\/","https:\/\/www.linkedin.com\/company\/tecnologia5it\/?viewAsMember=true","https:\/\/x.com\/tecnologia5it","youtube@tecnologia5.com","tecnologia 5"],"url":"http:\/\/tec5.tech\/blog\/author\/editor-t5\/"}]}},"featured_image_url":"http:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/4.jpg","_links":{"self":[{"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/comments?post=1853"}],"version-history":[{"count":1,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1853\/revisions"}],"predecessor-version":[{"id":1855,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1853\/revisions\/1855"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/media\/1854"}],"wp:attachment":[{"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/media?parent=1853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/categories?post=1853"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/tags?post=1853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}