{"id":2015,"date":"2025-12-03T11:36:47","date_gmt":"2025-12-03T14:36:47","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2015"},"modified":"2025-12-03T11:36:47","modified_gmt":"2025-12-03T14:36:47","slug":"cybersecurity-in-healthcare-a-challenge-for-data-sharing","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","title":{"rendered":"La ciberseguridad en el \u00e1rea de la salud: un desaf\u00edo para la puesta en com\u00fan de datos"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">La tecnolog\u00eda de la informaci\u00f3n es capaz de transformar varios procesos y, de hecho, se est\u00e1 usando cada vez m\u00e1s para volverlos m\u00e1s \u00e1giles y eficaces. Por eso no sorprende a nadie que la tecnolog\u00eda tambi\u00e9n ocupe un espacio cada vez mayor en el \u00e1rea de la salud, como en los registros de datos de los pacientes en historias cl\u00ednicas e informes m\u00e9dicos electr\u00f3nicos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">M\u00e1s recientemente, hay una demanda de \u201cportabilidad de datos\u201d, o sea, de que los datos de los pacientes se digitalicen para facilitar la migraci\u00f3n entre diferentes seguros o instituciones prestadoras de servicios de salud. La idea es que los datos est\u00e9n disponibles para cualquier instituci\u00f3n que reciba a un paciente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, el desarrollo de sistemas de informaci\u00f3n no siempre ha ocurrido al mismo ritmo en todas las instituciones, lo que se traduce en problemas t\u00e9cnicos para la puesta en com\u00fan de los datos. No todos los sistemas \u201cconversan\u201d entre s\u00ed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Es bastante probable que ese cambio se produzca en los pr\u00f3ximos a\u00f1os por medio de bases de datos estandarizadas por entidades regulatorias o mediante soluciones creadas por organizaciones especializadas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Esto significa que los datos siempre estar\u00e1n en un formato digital, aunque su recogida inicial haya sido estrictamente \u201canal\u00f3gica\u201d. En consecuencia, la seguridad de los sistemas de informaci\u00f3n de las instituciones de salud se volver\u00e1 cada vez m\u00e1s relevante.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">El aporte del colaborador<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">La integraci\u00f3n de los sistemas digitales de salud significa que diversos datos esenciales para atender a los pacientes estar\u00e1n disponibles digitalmente, como los relacionados a prescripciones, alergias, procedimientos anteriores, medicaciones de uso continuo, entre otros.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adem\u00e1s, los hospitales, cl\u00ednicas e instituciones prestadoras de salud tambi\u00e9n son organizaciones que dependen de departamentos administrativos y, como en cualquier otra organizaci\u00f3n moderna, esos departamentos ya han adaptado (o est\u00e1n adaptando) sus rutinas a los canales digitales.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, a medida que el trabajo diario se integra a la tecnolog\u00eda, necesitamos tener la conciencia de que esos departamentos tambi\u00e9n est\u00e1n sujetos a los riesgos derivados de fallas, ataques e incidentes vinculados a la seguridad digital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como muchos dispositivos est\u00e1n conectados, cualquier colaborador puede terminar cometiendo errores o siendo enga\u00f1ado por un invasor que podr\u00e1 llevarlo a realizar una acci\u00f3n que conduzca a alg\u00fan incidente de seguridad. Phishing y malware son dos t\u00e1cticas usadas por los delincuentes en  escenarios como ese. Por lo tanto, conocer esas y otras t\u00e1cticas de los invasores y saber c\u00f3mo evitar sus ataques es una forma de contribuir a la seguridad de la instituci\u00f3n y de los pacientes.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">La puesta en com\u00fan y la privacidad<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Aunque, de preferencia, los datos relacionados con la salud deben estar estandarizados y puestos a disposici\u00f3n a favor de los pacientes, el derecho a la intimidad y a la privacidad de la informaci\u00f3n tambi\u00e9n se debe resguardar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ya existen casos en los que los delincuentes han usado datos de estudios m\u00e9dicos y de procedimientos para enga\u00f1ar a pacientes. Los malhechores se hacen pasar por representantes de hospitales para cobrar valores por servicios ya saldados, cubiertos por el seguro de salud o por salud p\u00fablica. Hoy en d\u00eda, esas estafas dependen de una invasi\u00f3n de los sistemas responsables por guardar los datos de salud, invasi\u00f3n que, muchas veces, se perpetra por medio de ataques contra los colaboradores de las instituciones. Adem\u00e1s, esos casos se podr\u00e1n agravar a medida en que la integraci\u00f3n de los datos vaya evolucionando.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como sociedad, a\u00fan estamos descubriendo el camino para llegar a un punto de equilibrio, pero no podemos perder de vista los beneficios que esos cambios pueden aportar. La ley brasile\u00f1a, por ejemplo, ya prev\u00e9 la autorizaci\u00f3n para la puesta en com\u00fan en beneficio del paciente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, es necesario que tengamos conciencia sobre el derecho a la privacidad y sobre la necesidad de estar atentos a situaciones que podr\u00edan poner ese derecho en riesgo, sobre todo cuando no es posible validar la autenticidad de un pedido de informaci\u00f3n.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La evoluci\u00f3n de las plataformas de puesta en com\u00fan y almacenamiento de datos de pacientes conllevar\u00e1 un aumento del flujo de informaci\u00f3n, lo que significa que ser\u00e1 necesario tener un cuidado mayor con esos datos. La seguridad de la informaci\u00f3n, ya sea por medio de los expertos del \u00e1rea o <a href=\"https:\/\/hackerrangers.siteup.dev\/es\/gamification\/cyberattitudes\/\">del aporte de cada colaborador en la prevenci\u00f3n de riesgos<\/a>, siempre ser\u00e1 un pilar de apoyo para garantizar que esa infraestructura se pueda mantener confiable y accesible.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it&#8217;s no surprise that technology is also playing an increasingly important role in the healthcare sector, such as when registering patient data in medical records and electronic reports. More recently, there has been a demand for &#8220;data [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2019,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[64,80],"class_list":["post-2015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-healthcare"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it&#039;s no surprise that\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it&#039;s no surprise that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T14:36:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Cybersecurity in healthcare: a challenge for data sharing\",\"datePublished\":\"2025-12-03T14:36:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\"},\"wordCount\":576,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"keywords\":[\"cybersecurity\",\"healthcare\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\",\"name\":\"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"datePublished\":\"2025-12-03T14:36:47+00:00\",\"description\":\"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png\",\"width\":1500,\"height\":1000,\"caption\":\"cybersecurity healthcare ()\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in healthcare: a challenge for data sharing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers","description":"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers","og_description":"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-03T14:36:47+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Cybersecurity in healthcare: a challenge for data sharing","datePublished":"2025-12-03T14:36:47+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/"},"wordCount":576,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","keywords":["cybersecurity","healthcare"],"articleSection":["Cybersecurity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/","name":"Cybersecurity in healthcare: a challenge for data sharing | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","datePublished":"2025-12-03T14:36:47+00:00","description":"Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it's no surprise that","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/cybersecurity-healthcare-1.png","width":1500,"height":1000,"caption":"cybersecurity healthcare ()"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-healthcare-a-challenge-for-data-sharing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in healthcare: a challenge for data sharing"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2015"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2015\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2019"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}