{"id":14144,"date":"2020-09-21T08:37:49","date_gmt":"2020-09-21T11:37:49","guid":{"rendered":"https:\/\/ostec.blog\/?p=14144"},"modified":"2020-10-02T11:44:46","modified_gmt":"2020-10-02T14:44:46","slug":"identifying-and-preventing-virtual-attacks","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/","title":{"rendered":"Why should companies invest in identifying and preventing virtual attacks?"},"content":{"rendered":"<p>If you still wonder if you need to invest in identifying and preventing virtual attacks, we\u2019ll bring some data to make our analysis more accurate and grounded, and from there you can draw a conclusion about that need.<\/p>\n<ul>\n<li>In the year 2017 approximately 62 million Brazilians were victims of virtual attacks, this represents 61% of the population with Internet access in the country.<\/li>\n<li>Each victim lost an average of 34 hours of the year as a result of the attacks.<\/li>\n<li>The damages caused by cybercrime in 2017 reached only US $ 22 billion in Brazil, according to the Norton Cyber \u200b\u200bSecurity Report.<\/li>\n<li>It is estimated that by 2019 losses from cybercrime could reach $ 2.1 trillion, according to Cyber \u200b\u200bHandbook studies.<\/li>\n<\/ul>\n<p>As you may note, cybercrime is present and causes more damage than we imagine. And the more society advances and technologies evolve, the more data is shared, the more we depend on technologies and the greater the chance of suffering from virtual attacks.<\/p>\n<p>In this scenario, the question may no longer be \u201c<a href=\"http:\/\/bit.ly\/2zxFZcG\">why should companies invest in identifying and preventing virtual attacks<\/a>\u201d, instead, why is not your company still being forewarned?<\/p>\n<p>Continue reading this content and deepen your knowledge on the topic.<\/p>\n<h2>Damage generated by lack of prevention<\/h2>\n<p>Everyone knows that famous phrase that says \u201cprevention is better than cure\u201d. A global survey conducted by the audit, consulting and outsourcing firm Grant Thornton even found that while companies are aware of the risks of cyber-attacks, 52 percent still do not invest in any kind of prevention.<\/p>\n<p>This study also cites the areas most susceptible to cyber attacks, like financial services (45.8%); health care (23.7%); energy (23.3%); consumer goods (22.4%); education (22.1%); travel, tourism and leisure (19.8%); agriculture (17.9%); productive sector (16.3%); technology, media and telecommunications (13.0%); transport (11.3%); real estate and construction (6.2%) and professional services (4.8%).<\/p>\n<p>The research referenced here goes even further and presents managers\u2019 insight into what the major damages that can be caused to a company suffering from virtual attacks. Such as:<\/p>\n<ul>\n<li>Loss of companies\u2019 reputation (29%);<\/li>\n<li>Time spent on damage management (26%);<\/li>\n<li>Customer loss and turnover (16.4%);<\/li>\n<li>Removal costs (12%);<\/li>\n<li>Direct loss or turnover (7.4%);<\/li>\n<li>Competitiveness (3.6%) and<\/li>\n<li>Customer behavior change (3.1%).<\/li>\n<\/ul>\n<ul>\n<li>In addition, there may be more consequences resulting from virtual attacks, such as loss of business-sensitive data, whether from customers or procedures and operations. This issue should receive special attention, since with the approval of the\u00a0<a href=\"http:\/\/bit.ly\/2zI7rVt\">Data Protection Law<\/a>, companies become responsible for the information they store.<\/li>\n<\/ul>\n<p>Cyber-attacks still often compromise the organization\u2019s infrastructure, because as malware moves in, they infect other software and hardware, slowing down their processing capabilities and slowing them down. This is just one more possible reflex and something that can cause severe damage to a company\u2019s productivity.<\/p>\n<p>And, as if that were not enough, these types of attacks generate costs associated with re-establishing the operation in all affected areas. Machines and software will need to be updated; new security routines will have to be implemented. That is: remedy comes out much more expensive than to prevent.<\/p>\n<h2>Identifying and PreventingVirtual Attacks<\/h2>\n<p>There are a number of attitudes that technology professionals can take to ensure the safety of corporate data. This goes from employee education to the implementation of routines and acquisition of hardware and software capable of blocking threats.<\/p>\n<p>The most common and effective way is through the configuration of Firewalls with technologies of identification and prevention of attacks (<a href=\"http:\/\/bit.ly\/2zA5uu6\"><strong>IDS<\/strong>and IPS<\/a>). These features work together to provide an extra layer of protection for the corporate network.<\/p>\n<p><strong>IDS<\/strong>, Intrusion Detection System, is used to monitor network traffic by detecting and alerting when attacks are suspected. IDS, as the name suggests, only detects the threats and, most of the time, does not block or prevent any action, only verifies if it is a possible threat and alerts the administrator, which is their main characteristic.<\/p>\n<p>On the other hand, the Intrusion Prevention System (IPS) is a better tool, capable of identifying a threat, analyzing its level of criticality and blocking certain events. Therefore, it is a means of active prevention, since based on its logs and configurations can generate specific answers for certain types of alerts.<\/p>\n<p><strong>IDS<\/strong>and prevention (IPS) modules can be hosted either on the host, on the computer, or on the network, on a switch or router, for example. Through the combination of these solutions the IT professional can have a protection service resistant and adjustable to their needs.<\/p>\n<h2>Prevention is the best medicine<\/h2>\n<p>In the field of information security this maxim is a constant. The implementation of prevention systems are practical solutions, which can guarantee process efficiency, data preservation, stability in systems and applications and thus ensure the success of an organization.<\/p>\n<p>In short, with the ease of getting support from professionals and companies specialized in information security, there is no longer any justification for a company to postpone investment in identifying and preventing virtual attacks. Doing so is entering an unprotected battlefront and cheering for not being targeted. And companies striving for excellence can not just count on luck.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you still wonder if you need to invest in identifying and preventing virtual attacks, we\u2019ll bring some data to make our analysis more accurate and grounded, and from there you can draw a conclusion about that need. In the year 2017 approximately 62 million Brazilians were victims of virtual attacks, this represents 61% of [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":14147,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[411],"tags":[1568,1577],"class_list":["post-14144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-perimeter","tag-ids-en","tag-ips-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why should companies invest in identifying and preventing virtual attacks? - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why should companies invest in identifying and preventing virtual attacks? - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"If you still wonder if you need to invest in identifying and preventing virtual attacks, we\u2019ll bring some data to make our analysis more accurate and grounded, and from there you can draw a conclusion about that need. In the year 2017 approximately 62 million Brazilians were victims of virtual attacks, this represents 61% of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-21T11:37:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T14:44:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"Why should companies invest in identifying and preventing virtual attacks?\",\"datePublished\":\"2020-09-21T11:37:49+00:00\",\"dateModified\":\"2020-10-02T14:44:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\"},\"wordCount\":825,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg\",\"keywords\":[\"ids\",\"ips\"],\"articleSection\":[\"Perimeter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\",\"name\":\"Why should companies invest in identifying and preventing virtual attacks? - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg\",\"datePublished\":\"2020-09-21T11:37:49+00:00\",\"dateModified\":\"2020-10-02T14:44:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg\",\"width\":928,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why should companies invest in identifying and preventing virtual attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why should companies invest in identifying and preventing virtual attacks? - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Why should companies invest in identifying and preventing virtual attacks? - OSTEC | Seguran\u00e7a digital de resultados","og_description":"If you still wonder if you need to invest in identifying and preventing virtual attacks, we\u2019ll bring some data to make our analysis more accurate and grounded, and from there you can draw a conclusion about that need. In the year 2017 approximately 62 million Brazilians were victims of virtual attacks, this represents 61% of [&hellip;]","og_url":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-09-21T11:37:49+00:00","article_modified_time":"2020-10-02T14:44:46+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"Why should companies invest in identifying and preventing virtual attacks?","datePublished":"2020-09-21T11:37:49+00:00","dateModified":"2020-10-02T14:44:46+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/"},"wordCount":825,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg","keywords":["ids","ips"],"articleSection":["Perimeter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/","url":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/","name":"Why should companies invest in identifying and preventing virtual attacks? - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg","datePublished":"2020-09-21T11:37:49+00:00","dateModified":"2020-10-02T14:44:46+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/05\/Teclado-com-luzes.jpg","width":928,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/identifying-and-preventing-virtual-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Why should companies invest in identifying and preventing virtual attacks?"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=14144"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14144\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/14147"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=14144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=14144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=14144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}