{"id":2075,"date":"2025-12-05T17:35:23","date_gmt":"2025-12-05T20:35:23","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2075"},"modified":"2025-12-05T17:35:23","modified_gmt":"2025-12-05T20:35:23","slug":"the-role-of-hr-in-cybersecurity-awareness-programs","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","title":{"rendered":"El papel de RR.HH. en los programas de concienciaci\u00f3n en ciberseguridad"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">En muchas organizaciones, la iniciativa de llevar a cabo un programa de concienciaci\u00f3n sobre ciberseguridad proviene del departamento de tecnolog\u00eda de la informaci\u00f3n (TI) o del equipo responsable por la seguridad corporativa. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, ense\u00f1ar buenas pr\u00e1cticas sobre seguridad y mantener a los colaboradores informados sobre las amenazas es, en \u00faltima instancia, una cuesti\u00f3n humana, lo que significa que el \u00e1rea de Recursos Humanos tiene mucho para aportar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Las investigaciones sugieren que m\u00e1s del 90 % de los ataques cibern\u00e9ticos son facilitados por un error humano, como un clic o una interacci\u00f3n inapropiada con un atacante. A pesar de la preponderancia del factor humano en el riesgo cibern\u00e9tico, hay algunas cuestiones que dificultan la comprensi\u00f3n del problema.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Una de ellas es que los riesgos que plantea la tecnolog\u00eda rara vez son tan intuitivos, como otros riesgos laborales. La mayor\u00eda de las personas comprenden el riesgo de una ca\u00edda, un ruido muy elevado, o una instalaci\u00f3n el\u00e9ctrica deficiente. Sin embargo, no siempre existe la misma percepci\u00f3n sobre el riesgo intangible de abrir un archivo adjunto o hacer clic en un enlace. Como muchos riesgos en el mundo en l\u00ednea son causados por los ciberdelincuentes, el peligro solo se hace evidente cuando conocemos la mentalidad del invasor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuanto mayor sea la comprensi\u00f3n de los ataques, m\u00e1s visible ser\u00e1 la relevancia del factor humano en la ciberseguridad y el valor de las contribuciones del departamento de RR.HH., que acompa\u00f1a toda la trayectoria del colaborador.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">\u00bfC\u00f3mo puede contribuir RR.HH.?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Uno de los principales objetivos del programa de concienciaci\u00f3n en seguridad es influir en la cultura de la empresa. <a href=\"https:\/\/hackerrangers.siteup.dev\/es\/gamification\/cyberattitudes\/\">Cuando el colaborador entiende que ser\u00e1 valorado por actuar de manera responsable<\/a> durante su trabajo, es m\u00e1s probable que se preocupe por los riesgos o da\u00f1os que sus acciones pueden desencadenar.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cultura<\/span><\/h2>\n<p><b>Recursos Humanos es el primer punto de contacto de un colaborador <\/b><span style=\"font-weight: 400;\">con la empresa y, por lo general, tambi\u00e9n el \u00faltimo. Por lo tanto, la postura de RR.HH. en la comunicaci\u00f3n con los candidatos y los nuevos empleados, ya presenta aspectos de la cultura de la organizaci\u00f3n.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Es importante recordar que RR.HH. tambi\u00e9n almacena los datos personales de los colaboradores. Demostrar conciencia sobre esta responsabilidad, es una forma de expresar el valor de la seguridad y de la privacidad.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Los beneficios otorgados por la empresa \u2013 seguros de salud, clubes, vales de comida, entre otros \u2013 a menudo est\u00e1n vinculados a plataformas digitales y son blanco de estafadores, lo que significa que los colaboradores deben ser instruidos para utilizarlos de manera segura. La situaci\u00f3n inversa ocurre cuando el colaborador abandona la empresa \u2013 en este caso, es necesario asegurarse de que no est\u00e9 llev\u00e1ndose datos sensibles.<\/span><\/p>\n<p><b>La regulaci\u00f3n requiere precauciones de seguridad.<\/b><span style=\"font-weight: 400;\"> La Ley General de Protecci\u00f3n de Datos (LGPD) y otras normas brasile\u00f1as e internacionales prev\u00e9n sanciones para las empresas que violen los datos personales. Si la funci\u00f3n del colaborador involucra datos protegidos, es importante que conozca las reglas aplicables, como el c\u00f3digo de \u00e9tica, desde el primer d\u00eda de trabajo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Si la empresa a\u00fan no ha adaptado sus c\u00f3digos de conducta, es importante que RR.HH. contribuya a la actualizaci\u00f3n de estos documentos y colabore con el departamento de seguridad para garantizar que todos sean conscientes de sus responsabilidades.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Alcance e integraci\u00f3n<\/span><\/h2>\n<p><b>RR.HH. puede fortalecer la continuidad de la concienciaci\u00f3n en seguridad. <\/b><span style=\"font-weight: 400;\">\u00a0Para que el programa de concientizaci\u00f3n no quede aislado y restringido a un solo momento o iniciativa, el departamento de RR.HH. puede cooperar con el departamento de TI para incluir capacitaci\u00f3n, actividades o discusiones sobre seguridad dentro de otras reuniones y campa\u00f1as de RR.HH.\u00a0<\/span><\/p>\n<p><b>RR.HH. tiene m\u00e1s experiencia que el departamento de TI para llegar a las personas. <\/b><span style=\"font-weight: 400;\">Hay colaboradores que trabajan de forma remota o que a menudo est\u00e1n fuera de la oficina y no tienen acceso frecuente al canal utilizado por el programa de concienciaci\u00f3n. RR.HH. ya ha establecido formas de mantenerse en contacto con estos colaboradores muchas veces y puede compartir esta experiencia para ampliar el alcance de la iniciativa.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">La visi\u00f3n humana en ciberseguridad<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cada empresa u organizaci\u00f3n tiene sus propios desaf\u00edos. Es importante que se establezca un canal de cooperaci\u00f3n constante entre el \u00e1rea de recursos humanos y seguridad digital o TI, para que ambos entiendan las necesidades del otro.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As\u00ed como los profesionales de RR.HH. poco a poco van tomando conciencia del factor humano en la ciberseguridad, los departamentos de TI y seguridad tampoco tienen todas las respuestas, sobre todo cuando las particularidades de cada empresa entran en la ecuaci\u00f3n.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Siempre y cuando entendamos la importancia de mirar al colaborador como un aliado en la tarea de proteger a la empresa, RR.HH. tiene mucho que aportar para que los programas de concienciaci\u00f3n sean m\u00e1s humanos.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>At many organizations, implementing a cybersecurity awareness program comes from the information technology (IT) department or the team responsible for corporate security. But teaching best security practices and keeping employees informed about threats is ultimately a human issue \u2013 and that means Human Resources has a lot to contribute. Research suggests that more than 90% [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2077,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[66,64,96,97,98],"class_list":["post-2075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-awareness","tag-cybersecurity","tag-cybersecurity-awareness-program","tag-hr","tag-human-resources"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The role of HR in cybersecurity awareness programs | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The role of HR in cybersecurity awareness programs | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T20:35:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"The role of HR in cybersecurity awareness programs\",\"datePublished\":\"2025-12-05T20:35:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"keywords\":[\"awareness\",\"cybersecurity\",\"cybersecurity awareness program\",\"HR\",\"Human Resources\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\",\"name\":\"The role of HR in cybersecurity awareness programs | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"datePublished\":\"2025-12-05T20:35:23+00:00\",\"description\":\"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png\",\"width\":1500,\"height\":1000,\"caption\":\"HR cybersecurity awareness programs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The role of HR in cybersecurity awareness programs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The role of HR in cybersecurity awareness programs | Hacker Rangers","description":"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"The role of HR in cybersecurity awareness programs | Hacker Rangers","og_description":"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-05T20:35:23+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"The role of HR in cybersecurity awareness programs","datePublished":"2025-12-05T20:35:23+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/"},"wordCount":716,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","keywords":["awareness","cybersecurity","cybersecurity awareness program","HR","Human Resources"],"articleSection":["Awareness"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/","name":"The role of HR in cybersecurity awareness programs | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","datePublished":"2025-12-05T20:35:23+00:00","description":"See how HR enhances cybersecurity awareness programs through culture-building, training integration, and a human-centered security approach.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/HR-cybersecurity-awareness-programs.png","width":1500,"height":1000,"caption":"HR cybersecurity awareness programs"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/the-role-of-hr-in-cybersecurity-awareness-programs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"The role of HR in cybersecurity awareness programs"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2075"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2075\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2077"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}