{"id":5917,"date":"2017-08-03T18:56:48","date_gmt":"2017-08-03T18:56:48","guid":{"rendered":"http:\/\/www.abrima.com\/blog\/?p=5917"},"modified":"2017-08-03T18:56:48","modified_gmt":"2017-08-03T18:56:48","slug":"5-claves-proteger-correo-electronico-del-phishing","status":"publish","type":"post","link":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/","title":{"rendered":"5 claves para proteger tu correo electr\u00f3nico del phishing"},"content":{"rendered":"<p><img src=\"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709\" alt=\"5 claves para proteger tu correo electr\u00f3nico del phishing\" \/><\/p>\n<p>Aunque una tendencia emergente consiste en que\u00a0<a href=\"http:\/\/www.ticbeat.com\/seguridad\/los-ataques-de-phishing-ya-no-se-ejecutan-por-email-sino-en-las-redes-sociales\/\">los ciberdelincuentes ejecuten los ataques de phishing a trav\u00e9s de redes sociales<\/a>, el correo electr\u00f3nico contin\u00faa siendo uno de los medios favoritos para perpetrar esta peligrosa ciberamenaza, una estafa digital cuyo origen se remonta a la d\u00e9cada de los 90 y que\u00a0<a href=\"http:\/\/www.ticbeat.com\/seguridad\/un-ataque-de-phishing-pone-en-jaque-a-google\/\">sigue siendo uno de los m\u00e9todos m\u00e1s empleados a nivel mundial<\/a>. Su fin no es otro que\u00a0<strong>hacerse con datos confidenciales como credenciales, datos bancarios e informaci\u00f3n sensible de forma fraudulenta.\u00a0<\/strong><\/p>\n<p>En realidad,\u00a0<strong>el phishing es muy c\u00f3modo y sencillo para un hacker<\/strong>\u00a0con respecto a otro tipo de ciberataques que requieren instalaci\u00f3n de malware o ataque a estructuras cr\u00edticas. En lugar de buscar brechas digitales, este mal explota errores humanos y emplea t\u00e9cnicas de ingenier\u00eda social buscando generar alegr\u00eda o euforia y generando una sensaci\u00f3n de urgencia en torno a la demanda que solicitan, que suele ser proporcionar contrase\u00f1as u otros datos.<\/p>\n<p>Si quieres<strong>\u00a0proteger tu correo electr\u00f3nico ante la ciberamenaza del phishing<\/strong>, tenemos algunas claves que te pueden resultar de gran ayuda.<\/p>\n<h3>Las 5 claves para que un ataque de phishing no te pille por sorpresa<\/h3>\n<ul>\n<li><strong>Prohibidos los clics impulsivos<\/strong>: No debes hacer clic en ning\u00fan enlace sospechoso, sino revisar el link de forma detallada y, si recibes un correo sospechoso de parte de tu entidad bancaria o de un supuesto organismo p\u00fablico, acceder a tu espacio privado desde un navegador seguro.\u00a0<strong>Recuerda que no debes responder a los mensajes no solicitados<\/strong>\u00a0ni en las redes sociales como Facebook ni a trav\u00e9s de correo electr\u00f3nico o SMS.<\/li>\n<\/ul>\n<ul>\n<li><strong>Revisa el enlace<\/strong>: Los correos electr\u00f3nicos de phishing se caracterizan por cumplir una serie de caracter\u00edsticas, como un emisor extra\u00f1o -direcciones con\u00a0una letra \u201co\u201d en lugar de un cero o letras mal ordenadas -, muchos destinatarios, un asunto incoherente, una hora de env\u00edo poco habitual, archivos y enlaces adjuntos fraudulentos,\u00a0<a href=\"http:\/\/www.ticbeat.com\/seguridad\/puede-prevenirse-propagacion-malware-por-email\/\">que tambi\u00e9n podr\u00edan contener malware<\/a>.\u00a0<strong>Tambi\u00e9n suelen demandar que realices una acci\u00f3n inmediata que por supuesto, debes denegar.<\/strong><\/li>\n<\/ul>\n<ul>\n<li><strong>Usa el sentido com\u00fan y verifica tu cuenta online<\/strong>: Por muy amenazador o urgente que suene, t\u00f3mate tu tiempo y no obedezcas a los impulsos de clicar, responder o facilitar ning\u00fan tipo de informaci\u00f3n personal. En caso de duda, acude por ti mismo a la sucursal bancaria o realiza una llamada telef\u00f3nica al servicio de atenci\u00f3n al cliente.<strong>\u00a0Tambi\u00e9n es recomendable programar de forma peri\u00f3dica una comprobaci\u00f3n de tus cuentas cuentas bancarias o cobro de recibos y facturas<\/strong>\u00a0como la de tel\u00e9fono para estar al tanto de cualquier irregularidad en las transacciones en l\u00ednea o en las comunicaciones.<\/li>\n<\/ul>\n<ul>\n<li><strong>Inf\u00f3rmate sobre los peligros actuales<\/strong>: Es importante que te mantengas actualizado en materia de ciberseguridad y conozcas las \u00faltimas estafas, virus y ciberamenazas. Para ello puedes recurrir a p\u00e1ginas web y blogs especializados en ciberseguridad y tambi\u00e9n plataformas oficiales de autoridades.<\/li>\n<\/ul>\n<ul>\n<li><strong>Apuesta por un software de ciberseguridad<\/strong>: Un programa especializado suele abarcar herramientas para identificar y bloquear los emails que contienen phishing de forma autom\u00e1tica y sin que t\u00fa tengas que mover un dedo. Tambi\u00e9n<strong>\u00a0debes mantener todos los programas actualizados y realizar an\u00e1lisis\u00a0<\/strong><b>peri\u00f3dicos<\/b>\u00a0para eliminar las ciberamenazas antes de que se ejecuten en tu dispositivo.<\/li>\n<\/ul>\n<p>Fuente |\u00a0<a href=\"http:\/\/www.pandasecurity.com\/spain\/mediacenter\/consejos\/protege-email-phishing\/\" target=\"_blank\" rel=\"nofollow noopener\">Panda Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aunque una tendencia emergente consiste en que\u00a0los ciberdelincuentes ejecuten los ataques de phishing a trav\u00e9s de redes sociales, el correo electr\u00f3nico contin\u00faa siendo uno de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 claves para proteger tu correo electr\u00f3nico del phishing - Blog de Tecnolog\u00eda - Abrima<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 claves para proteger tu correo electr\u00f3nico del phishing - Blog de Tecnolog\u00eda - Abrima\" \/>\n<meta property=\"og:description\" content=\"Aunque una tendencia emergente consiste en que\u00a0los ciberdelincuentes ejecuten los ataques de phishing a trav\u00e9s de redes sociales, el correo electr\u00f3nico contin\u00faa siendo uno de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de Tecnolog\u00eda - Abrima\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abrimawebs\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-03T18:56:48+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abrima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.abrima.com\/blog\/#organization\",\"name\":\"Abrima\",\"url\":\"https:\/\/www.abrima.com\/blog\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/abrima-soluciones-web\/\",\"https:\/\/www.youtube.com\/user\/abrimawebs\",\"https:\/\/www.facebook.com\/abrimawebs\/\",\"https:\/\/twitter.com\/abrimaweb\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.abrima.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.abrima.com\/blog\/wp-content\/uploads\/2018\/03\/abrima-logo.png\",\"contentUrl\":\"https:\/\/www.abrima.com\/blog\/wp-content\/uploads\/2018\/03\/abrima-logo.png\",\"width\":700,\"height\":700,\"caption\":\"Abrima\"},\"image\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrima.com\/blog\/#website\",\"url\":\"https:\/\/www.abrima.com\/blog\/\",\"name\":\"Blog de Tecnolog\u00eda - Abrima\",\"description\":\"Blog sobre todo lo relacionado con Cloud, Marketing Digital y Web\",\"publisher\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrima.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#primaryimage\",\"url\":\"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709\",\"contentUrl\":\"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#webpage\",\"url\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/\",\"name\":\"5 claves para proteger tu correo electr\u00f3nico del phishing - Blog de Tecnolog\u00eda - Abrima\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#primaryimage\"},\"datePublished\":\"2017-08-03T18:56:48+00:00\",\"dateModified\":\"2017-08-03T18:56:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.abrima.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 claves para proteger tu correo electr\u00f3nico del phishing\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/#\/schema\/person\/b768d5411164cb8b8d58f72cdf4e11e8\"},\"headline\":\"5 claves para proteger tu correo electr\u00f3nico del phishing\",\"datePublished\":\"2017-08-03T18:56:48+00:00\",\"dateModified\":\"2017-08-03T18:56:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#webpage\"},\"wordCount\":578,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709\",\"articleSection\":[\"Otros\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrima.com\/blog\/#\/schema\/person\/b768d5411164cb8b8d58f72cdf4e11e8\",\"name\":\"Abrima\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.abrima.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5cc72c9c6b371583c943a070dff20409?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5cc72c9c6b371583c943a070dff20409?s=96&d=mm&r=g\",\"caption\":\"Abrima\"},\"url\":\"https:\/\/www.abrima.com\/blog\/author\/abrima\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 claves para proteger tu correo electr\u00f3nico del phishing - Blog de Tecnolog\u00eda - Abrima","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"5 claves para proteger tu correo electr\u00f3nico del phishing - Blog de Tecnolog\u00eda - Abrima","og_description":"Aunque una tendencia emergente consiste en que\u00a0los ciberdelincuentes ejecuten los ataques de phishing a trav\u00e9s de redes sociales, el correo electr\u00f3nico contin\u00faa siendo uno de [&hellip;]","og_url":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/","og_site_name":"Blog de Tecnolog\u00eda - Abrima","article_publisher":"https:\/\/www.facebook.com\/abrimawebs\/","article_published_time":"2017-08-03T18:56:48+00:00","og_image":[{"url":"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709"}],"twitter_misc":{"Escrito por":"Abrima","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.abrima.com\/blog\/#organization","name":"Abrima","url":"https:\/\/www.abrima.com\/blog\/","sameAs":["https:\/\/www.linkedin.com\/company\/abrima-soluciones-web\/","https:\/\/www.youtube.com\/user\/abrimawebs","https:\/\/www.facebook.com\/abrimawebs\/","https:\/\/twitter.com\/abrimaweb"],"logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.abrima.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.abrima.com\/blog\/wp-content\/uploads\/2018\/03\/abrima-logo.png","contentUrl":"https:\/\/www.abrima.com\/blog\/wp-content\/uploads\/2018\/03\/abrima-logo.png","width":700,"height":700,"caption":"Abrima"},"image":{"@id":"https:\/\/www.abrima.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.abrima.com\/blog\/#website","url":"https:\/\/www.abrima.com\/blog\/","name":"Blog de Tecnolog\u00eda - Abrima","description":"Blog sobre todo lo relacionado con Cloud, Marketing Digital y Web","publisher":{"@id":"https:\/\/www.abrima.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrima.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#primaryimage","url":"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709","contentUrl":"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709"},{"@type":"WebPage","@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#webpage","url":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/","name":"5 claves para proteger tu correo electr\u00f3nico del phishing - Blog de Tecnolog\u00eda - Abrima","isPartOf":{"@id":"https:\/\/www.abrima.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#primaryimage"},"datePublished":"2017-08-03T18:56:48+00:00","dateModified":"2017-08-03T18:56:48+00:00","breadcrumb":{"@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.abrima.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 claves para proteger tu correo electr\u00f3nico del phishing"}]},{"@type":"Article","@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#article","isPartOf":{"@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#webpage"},"author":{"@id":"https:\/\/www.abrima.com\/blog\/#\/schema\/person\/b768d5411164cb8b8d58f72cdf4e11e8"},"headline":"5 claves para proteger tu correo electr\u00f3nico del phishing","datePublished":"2017-08-03T18:56:48+00:00","dateModified":"2017-08-03T18:56:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#webpage"},"wordCount":578,"commentCount":0,"publisher":{"@id":"https:\/\/www.abrima.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#primaryimage"},"thumbnailUrl":"http:\/\/cdn3.ticbeat.com\/src\/uploads\/2017\/08\/5-claves-para-protegerte-de-un-ataque-de-phishing-810x540.jpg?x32709","articleSection":["Otros"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrima.com\/blog\/5-claves-proteger-correo-electronico-del-phishing\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.abrima.com\/blog\/#\/schema\/person\/b768d5411164cb8b8d58f72cdf4e11e8","name":"Abrima","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.abrima.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5cc72c9c6b371583c943a070dff20409?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5cc72c9c6b371583c943a070dff20409?s=96&d=mm&r=g","caption":"Abrima"},"url":"https:\/\/www.abrima.com\/blog\/author\/abrima\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/posts\/5917"}],"collection":[{"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/comments?post=5917"}],"version-history":[{"count":1,"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/posts\/5917\/revisions"}],"predecessor-version":[{"id":5918,"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/posts\/5917\/revisions\/5918"}],"wp:attachment":[{"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/media?parent=5917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/categories?post=5917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrima.com\/blog\/wp-json\/wp\/v2\/tags?post=5917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}