{"id":7243,"date":"2024-03-21T10:38:29","date_gmt":"2024-03-21T09:38:29","guid":{"rendered":"https:\/\/www.esferize.com\/?p=7243"},"modified":"2024-04-08T13:17:39","modified_gmt":"2024-04-08T11:17:39","slug":"the-main-secutiry-issues-in-iot-devices","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/","title":{"rendered":"The main security issues in IoT devices"},"content":{"rendered":"<p style=\"font-weight: 400;\">The <a href=\"https:\/\/www.esferize.com\/en\/internet-of-things-day\/\">Internet of Things<\/a> (IoT) has revolutionized the way we interact with the world around us. From smart home devices to industrial infrastructures, ubiquitous connectivity offers countless benefits. However, this interconnected landscape poses significant <strong>challenges<\/strong> in<strong> terms of security<\/strong>.\u00a0 In this blog post, we will explore some of the major IoT security issues and how to address them.<\/p>\n<p>&nbsp;<\/p>\n<h3><\/h3>\n<h2>Obstacles to IoT device security<\/h2>\n<p style=\"font-weight: 400;\">The security risk is not only in consumer devices, but also in the manufacturing of these interconnected systems.<\/p>\n<p style=\"font-weight: 400;\">One of the main obstacles with <a href=\"https:\/\/softwarelab.org\/es\/blog\/que-es-la-seguridad-iot\/\">IoT device security<\/a> is the variety of technologies and standards used. Due to the number of manufacturers and vendors involved in the IoT ecosystem, a wide <strong>variety of devices and protocols<\/strong> with different levels of security have been created. This creates complications in ensuring security in the IoT network.<\/p>\n<p>&nbsp;<\/p>\n<h2>Main IoT security issues<\/h2>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4><strong>Limited device capabilities<\/strong><\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Computers with limited power, processing and memory do not manage <strong>advanced security patterns<\/strong> well and are more at risk of being attacked.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Little experience in Internet of Things technologies<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">There are not many cybersecurity experts specializing in IoT.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Threats and attacks<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">There are specific programs designed to target IoT devices and the ecosystem itself. They modify information, filter user data, cause network crashes, create device failures&#8230;<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Privacy<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">The <strong>clauses<\/strong> that involve signing the contract where the privacy of our information is located are rarely read. They are accepted without understanding, which poses a risk to the user.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Reduced costs<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Manufacturers do not devote sufficient resources to <strong>hardware<\/strong> and device <strong>development<\/strong> to reduce costs, thus putting the user at risk.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Lack of rigor in data processing<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Typically, users are unaware of how their data will be processed due to the poor quality of consent methods. They do not clarify the subsequent treatment of personal information.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Limitation of anonymity<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">It is sometimes assumed that anonymity is guaranteed in any service, but this is not the case. To ensure this, access control techniques, encryption, design privacy, location safeguarding and any basic aspect to prevent any unwanted intervention must be optimized.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Device vulnerabilities<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">IoT devices are designed to be compact and efficient, which often means that security is overlooked in their development. This leaves devices <strong>vulnerable to attacks<\/strong> such as remote infiltration, unauthorized access and data interception. Therefore, it is crucial to implement robust security measures, such as two-factor authentication and end-to-end encryption, to protect these devices against potential threats.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Identity and access management<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Proper identity and access management is critical in any IoT ecosystem. <strong>Lack of adequate access controls<\/strong> can allow attackers to compromise devices and access sensitive data. Implementing granular access policies and robust identity management solutions can help mitigate this risk.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Data privacy<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">With the amount of data generated by IoT devices, privacy becomes a major concern. The collection and sharing of personal data can expose users to risks such as identity theft and unauthorized surveillance. In addition, organizations should adopt robust privacy practices, such as <strong>data anonymization and transparency in information collection<\/strong>, to protect users&#8217; privacy.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">\n<h4>Security updates<\/h4>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">IoT device manufacturers must provide <strong>regular security updates<\/strong> to address newly discovered vulnerabilities and protect against new threats. However, the lack of an effective mechanism for delivering and applying security patches can leave devices unprotected for long periods of time. It is essential to implement efficient and automated firmware update processes to ensure the continued security of IoT devices.<\/p>\n<p style=\"font-weight: 400;\">As the Internet of Things continues to proliferate into all aspects of our lives, it is critical to address the associated security challenges. From protecting individual devices to safeguarding sensitive data, IoT security requires a <strong>comprehensive and collaborative approach<\/strong>. By taking proactive measures and focusing on security by design, we can take full advantage of the opportunities offered by the IoT while mitigating its inherent risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) has revolutionized the way we  [&#8230;]<\/p>\n","protected":false},"author":8,"featured_media":7219,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[1641,259,1642,1640,235],"class_list":["post-7243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot-en","tag-devices-security","tag-iot-en","tag-iot-attacks","tag-iot-security","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The main security issues in IoT devices - Esferize<\/title>\n<meta name=\"description\" content=\"Discover the main IoT device security issues and how to tackle them - protect your technology with effective strategies!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The main security issues in IoT devices - Esferize\" \/>\n<meta property=\"og:description\" content=\"Discover the main IoT device security issues and how to tackle them - protect your technology with effective strategies!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-21T09:38:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-08T11:17:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2024\/03\/hand-holding-phone-with-lock-screen-it-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1097\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Soto del R\u00edo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Soto del R\u00edo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/\"},\"author\":{\"name\":\"Cynthia Soto del R\u00edo\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\"},\"headline\":\"The main security issues in IoT devices\",\"datePublished\":\"2024-03-21T09:38:29+00:00\",\"dateModified\":\"2024-04-08T11:17:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hand-holding-phone-with-lock-screen-it-scaled.jpg\",\"keywords\":[\"Devices security\",\"IoT\",\"IoT attacks\",\"IoT Security\",\"Security\"],\"articleSection\":[\"IoT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/\",\"name\":\"The main security issues in IoT devices - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hand-holding-phone-with-lock-screen-it-scaled.jpg\",\"datePublished\":\"2024-03-21T09:38:29+00:00\",\"dateModified\":\"2024-04-08T11:17:39+00:00\",\"description\":\"Discover the main IoT device security issues and how to tackle them - protect your technology with effective strategies!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hand-holding-phone-with-lock-screen-it-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/hand-holding-phone-with-lock-screen-it-scaled.jpg\",\"width\":1920,\"height\":1097,\"caption\":\"Los principales problemas de seguridad en los dispositivos IoT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/the-main-secutiry-issues-in-iot-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The main security issues in IoT devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\",\"name\":\"Cynthia Soto del R\u00edo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"caption\":\"Cynthia Soto del R\u00edo\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/csoto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The main security issues in IoT devices - Esferize","description":"Discover the main IoT device security issues and how to tackle them - protect your technology with effective strategies!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/","og_locale":"en_US","og_type":"article","og_title":"The main security issues in IoT devices - Esferize","og_description":"Discover the main IoT device security issues and how to tackle them - protect your technology with effective strategies!","og_url":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/","og_site_name":"Esferize","article_published_time":"2024-03-21T09:38:29+00:00","article_modified_time":"2024-04-08T11:17:39+00:00","og_image":[{"width":1920,"height":1097,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2024\/03\/hand-holding-phone-with-lock-screen-it-scaled.jpg","type":"image\/jpeg"}],"author":"Cynthia Soto del R\u00edo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cynthia Soto del R\u00edo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/"},"author":{"name":"Cynthia Soto del R\u00edo","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b"},"headline":"The main security issues in IoT devices","datePublished":"2024-03-21T09:38:29+00:00","dateModified":"2024-04-08T11:17:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/"},"wordCount":635,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2024\/03\/hand-holding-phone-with-lock-screen-it-scaled.jpg","keywords":["Devices security","IoT","IoT attacks","IoT Security","Security"],"articleSection":["IoT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/","url":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/","name":"The main security issues in IoT devices - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2024\/03\/hand-holding-phone-with-lock-screen-it-scaled.jpg","datePublished":"2024-03-21T09:38:29+00:00","dateModified":"2024-04-08T11:17:39+00:00","description":"Discover the main IoT device security issues and how to tackle them - protect your technology with effective strategies!","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2024\/03\/hand-holding-phone-with-lock-screen-it-scaled.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2024\/03\/hand-holding-phone-with-lock-screen-it-scaled.jpg","width":1920,"height":1097,"caption":"Los principales problemas de seguridad en los dispositivos IoT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/the-main-secutiry-issues-in-iot-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"The main security issues in IoT devices"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b","name":"Cynthia Soto del R\u00edo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","caption":"Cynthia Soto del R\u00edo"},"url":"https:\/\/www.esferize.com\/en\/author\/csoto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/7243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=7243"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/7243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/7219"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=7243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=7243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=7243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}