{"id":97354,"date":"2021-05-24T15:43:15","date_gmt":"2021-05-24T14:43:15","guid":{"rendered":"https:\/\/www.colt.net\/?p=97354"},"modified":"2021-05-24T15:43:15","modified_gmt":"2021-05-24T14:43:15","slug":"ciberseguridad-en-la-nueva-normalidad","status":"publish","type":"post","link":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/","title":{"rendered":"Ciberseguridad en la nueva normalidad"},"content":{"rendered":"<p><i><span style=\"font-weight: 400\">Joan Monraba, Country Manager Spain \u2013 Colt Technology Services<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400\">La pandemia de coronavirus ha supuesto nuevos desaf\u00edos para las empresas, en las que trabajar desde casa se ha convertido en la &#8220;nueva normalidad&#8221;. Por ello, <\/span><b>las empresas est\u00e1n acelerando su transformaci\u00f3n digital<\/b><span style=\"font-weight: 400\"> y la ciberseguridad es ahora una de sus mayores preocupaciones.<\/span><\/p>\n<p><span style=\"font-weight: 400\">La seguridad es sin duda una de las principales preocupaciones en el mundo de la tecnolog\u00eda, pero se est\u00e1 haciendo evidente que ser\u00e1 imposible garantizarla sin la <\/span><b>Inteligencia Artificial<\/b><span style=\"font-weight: 400\">. Seg\u00fan un nuevo informe del Capgemini Research Institute, el 69% de los encuestados cree que no podr\u00e1n responder a los ciberataques sin el uso de <\/span><b>IA<\/b><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Es tal la velocidad, el volumen y la variedad de amenazas que se lanzan a las empresas hoy en d\u00eda, que nunca habr\u00e1 suficiente presupuesto u horas en el d\u00eda para que nosotros como personas podamos abordar eficazmente el problema en su totalidad.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Con la introducci\u00f3n de la tecnolog\u00eda <\/span><b>5G<\/b><span style=\"font-weight: 400\">, m\u00e1s productos y servicios <\/span><b>cloud<\/b><span style=\"font-weight: 400\">, los consumidores adoptan cada vez m\u00e1s dispositivos conectados y la <\/span><b>IoT<\/b><span style=\"font-weight: 400\"> se encuentra en su m\u00e1xima expansi\u00f3n. Debido a esto, las amenazas se multiplican y la exposici\u00f3n a los rincones oscuros de la web es cada vez m\u00e1s peligrosa.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Para contrarrestar el aumento del n\u00famero de ciberataques y ciberdelincuentes, los equipos de TI deben ayudar a los usuarios a reconocer y abordar las amenazas. Con un <\/span><b>coste promedio de 3.92 millones de d\u00f3lares cada violaci\u00f3n de datos<\/b><span style=\"font-weight: 400\">, y un <\/span><b>incremento de los ataques DDoS, que han aumentado en un 967% solo este a\u00f1o<\/b><span style=\"font-weight: 400\">, nunca ha sido m\u00e1s importante proteger la red empresarial.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Los sistemas no solo necesitar\u00e1n hacer frente a una mayor cantidad de tr\u00e1fico procedente de los empleados que trabajan desde casa, sino que <\/span><b>un ataque de denegaci\u00f3n de servicio distribuido (DDoS) podr\u00eda tener un impacto m\u00e1s amplio si imposibilita las conexiones remotas.\u00a0<\/b><\/p>\n<p><b>La red de las empresas deber\u00edan incluir servicios de ciberseguridad que monitorean, detectan y protegen los datos y la infraestructura TI de los ciberataques<\/b><span style=\"font-weight: 400\"> y los incidentes de seguridad, adem\u00e1s de ayudar a administrar el riesgo.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/legacy.colt.net\/es\/cybersecurity\/\"><span style=\"font-weight: 400\">Colt Cybersecurity<\/span><\/a><span style=\"font-weight: 400\"> ofrece una cartera de servicios para monitorear y proteger las redes de los clientes de las amenazas cibern\u00e9ticas y administrar el riesgo. Dado que una seguridad eficaz se basa en m\u00faltiples capas de defensa, Colt proporciona un servicio integral con protecci\u00f3n en varios puntos de vulnerabilidad. Ofrecemos una conectividad segura a trav\u00e9s de una gama de productos: <\/span><b>firewalls, protecci\u00f3n DDoS y cifrado de red.<\/b><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joan Monraba, Country Manager Spain \u2013 Colt Technology Services La pandemia de coronavirus ha supuesto nuevos desaf\u00edos para las empresas, en las que trabajar desde casa se ha convertido en la &#8220;nueva normalidad&#8221;. Por ello, las empresas est\u00e1n acelerando su transformaci\u00f3n digital y la ciberseguridad es ahora una de sus mayores preocupaciones. La seguridad es&#8230;<\/p>\n","protected":false},"author":143,"featured_media":80929,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"colt_type":[1174],"colt_ind":[1214,1254,1259],"colt_products":[1264,1344,1635,1319,1636,1638,1637,1750,1419],"colt_solutions":[1785],"class_list":["post-97354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","colt_type-blog-es","colt_ind-business-es","colt_ind-technology-es","colt_ind-telecoms-es","colt_products-business-connect-es","colt_products-security-es","colt_products-voice-and-collaboration-es","colt_products-dca-es","colt_products-ethernet-es","colt_products-ip-es","colt_products-on-demand-colt-iq-network-es","colt_products-on-demand-es","colt_products-voice-on-demand-es","colt_solutions-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberseguridad en la nueva normalidad - Colt Technology Services<\/title>\n<meta name=\"description\" content=\"Ciberseguridad en la nueva normalidad Colt Technology Services\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad en la nueva normalidad - Colt Technology Services\" \/>\n<meta property=\"og:description\" content=\"Ciberseguridad en la nueva normalidad Colt Technology Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/\" \/>\n<meta property=\"og:site_name\" content=\"Colt Technology Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-24T14:43:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stuart Brameld\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:site\" content=\"@colt_technology\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stuart Brameld\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/\"},\"author\":{\"name\":\"Stuart Brameld\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/7d1bf598b4d64d8b5dd04c0ca4f2762d\"},\"headline\":\"Ciberseguridad en la nueva normalidad\",\"datePublished\":\"2021-05-24T14:43:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/\"},\"wordCount\":442,\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg\",\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/\",\"url\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/\",\"name\":\"Ciberseguridad en la nueva normalidad - Colt Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/legacy.colt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg\",\"datePublished\":\"2021-05-24T14:43:15+00:00\",\"description\":\"Ciberseguridad en la nueva normalidad Colt Technology Services\",\"breadcrumb\":{\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg\",\"width\":1200,\"height\":675,\"caption\":\"\u30b5\u30a4\u30d0\u30fc\u30a2\u30bf\u30c3\u30af\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/legacy.colt.net\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\/\/legacy.colt.net\/es\/resources\/type\/blog-es\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ciberseguridad en la nueva normalidad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legacy.colt.net\/#website\",\"url\":\"https:\/\/legacy.colt.net\/\",\"name\":\"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e\",\"description\":\"Managed Network &amp; Voice Services Provider\",\"publisher\":{\"@id\":\"https:\/\/legacy.colt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legacy.colt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/legacy.colt.net\/#organization\",\"name\":\"Colt Technology Services\",\"url\":\"https:\/\/legacy.colt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"contentUrl\":\"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png\",\"width\":195,\"height\":77,\"caption\":\"Colt Technology Services\"},\"image\":{\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ColtTechnologyServices\/\",\"https:\/\/x.com\/colt_technology\",\"https:\/\/www.instagram.com\/colttechnologyservices\/\",\"https:\/\/www.linkedin.com\/company\/colt-technology-services\",\"https:\/\/www.youtube.com\/user\/ColtTechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/7d1bf598b4d64d8b5dd04c0ca4f2762d\",\"name\":\"Stuart Brameld\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dd4154f82c8fd0286fda59ef617214be3f50817b36d05ab30a80c5a9a789913b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dd4154f82c8fd0286fda59ef617214be3f50817b36d05ab30a80c5a9a789913b?s=96&d=mm&r=g\",\"caption\":\"Stuart Brameld\"},\"url\":\"https:\/\/legacy.colt.net\/es\/resources\/author\/stuartgrowthmethod-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad en la nueva normalidad - Colt Technology Services","description":"Ciberseguridad en la nueva normalidad Colt Technology Services","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Ciberseguridad en la nueva normalidad - Colt Technology Services","og_description":"Ciberseguridad en la nueva normalidad Colt Technology Services","og_url":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/","og_site_name":"Colt Technology Services","article_publisher":"https:\/\/www.facebook.com\/ColtTechnologyServices\/","article_published_time":"2021-05-24T14:43:15+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg","type":"image\/jpeg"}],"author":"Stuart Brameld","twitter_card":"summary_large_image","twitter_image":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg","twitter_creator":"@colt_technology","twitter_site":"@colt_technology","twitter_misc":{"Written by":"Stuart Brameld","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#article","isPartOf":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/"},"author":{"name":"Stuart Brameld","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/7d1bf598b4d64d8b5dd04c0ca4f2762d"},"headline":"Ciberseguridad en la nueva normalidad","datePublished":"2021-05-24T14:43:15+00:00","mainEntityOfPage":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/"},"wordCount":442,"publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"image":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg","inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/","url":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/","name":"Ciberseguridad en la nueva normalidad - Colt Technology Services","isPartOf":{"@id":"https:\/\/legacy.colt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage"},"image":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage"},"thumbnailUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg","datePublished":"2021-05-24T14:43:15+00:00","description":"Ciberseguridad en la nueva normalidad Colt Technology Services","breadcrumb":{"@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#primaryimage","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2020\/09\/cyber-alert-JA.jpg","width":1200,"height":675,"caption":"\u30b5\u30a4\u30d0\u30fc\u30a2\u30bf\u30c3\u30af"},{"@type":"BreadcrumbList","@id":"https:\/\/legacy.colt.net\/es\/resources\/ciberseguridad-en-la-nueva-normalidad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/legacy.colt.net\/es\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/legacy.colt.net\/es\/resources\/type\/blog-es\/"},{"@type":"ListItem","position":3,"name":"Ciberseguridad en la nueva normalidad"}]},{"@type":"WebSite","@id":"https:\/\/legacy.colt.net\/#website","url":"https:\/\/legacy.colt.net\/","name":"Colt\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30b5\u30fc\u30d3\u30b9\u682a\u5f0f\u4f1a\u793e","description":"Managed Network &amp; Voice Services Provider","publisher":{"@id":"https:\/\/legacy.colt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legacy.colt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/legacy.colt.net\/#organization","name":"Colt Technology Services","url":"https:\/\/legacy.colt.net\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/","url":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","contentUrl":"https:\/\/legacy.colt.net\/wp-content\/uploads\/2019\/02\/Colt-Logo.png","width":195,"height":77,"caption":"Colt Technology Services"},"image":{"@id":"https:\/\/legacy.colt.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ColtTechnologyServices\/","https:\/\/x.com\/colt_technology","https:\/\/www.instagram.com\/colttechnologyservices\/","https:\/\/www.linkedin.com\/company\/colt-technology-services","https:\/\/www.youtube.com\/user\/ColtTechnology"]},{"@type":"Person","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/7d1bf598b4d64d8b5dd04c0ca4f2762d","name":"Stuart Brameld","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/legacy.colt.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dd4154f82c8fd0286fda59ef617214be3f50817b36d05ab30a80c5a9a789913b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dd4154f82c8fd0286fda59ef617214be3f50817b36d05ab30a80c5a9a789913b?s=96&d=mm&r=g","caption":"Stuart Brameld"},"url":"https:\/\/legacy.colt.net\/es\/resources\/author\/stuartgrowthmethod-com\/"}]}},"_links":{"self":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/posts\/97354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/comments?post=97354"}],"version-history":[{"count":0,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/posts\/97354\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/media\/80929"}],"wp:attachment":[{"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/media?parent=97354"}],"wp:term":[{"taxonomy":"colt_type","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_type?post=97354"},{"taxonomy":"colt_ind","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_ind?post=97354"},{"taxonomy":"colt_products","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_products?post=97354"},{"taxonomy":"colt_solutions","embeddable":true,"href":"https:\/\/legacy.colt.net\/es\/wp-json\/wp\/v2\/colt_solutions?post=97354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}