{"id":5803,"date":"2018-04-26T08:25:01","date_gmt":"2018-04-26T11:25:01","guid":{"rendered":"https:\/\/ostec.blog\/generico\/diagnostico-seguranca-informacao"},"modified":"2020-08-28T10:44:47","modified_gmt":"2020-08-28T13:44:47","slug":"information-security-diagnosis","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/","title":{"rendered":"What is Information Security Diagnosis and why is it important?"},"content":{"rendered":"<p>Information Security is a new concept for many technology professionals. This is a critical factor: while analysts and IT managers invest in digital security, their business maturity levels are not always met by the required standards.<\/p>\n<p>Often, the problem is further intensified by not recognizing the fragility and maturity of their business. According to a <strong>Norton by Symantec<\/strong>report, about 61% of the country&#8217;s population was a victim of cybercrime in 2017. This corresponds to approximately 62 million Brazilians connected to the Internet and involves individuals, companies and public agencies.<\/p>\n<p>Companies need to identify where they are most ineffective and thus adjust their efforts to gain full protection. In this blog post, will be presented characteristics of the Information Security Diagnostics (DSI) &#8211; a vital tool for this type of recognition, developed by <a href=\"https:\/\/www.ostec.com.br\/\"><strong>OSTEC<\/strong><\/a>.<\/p>\n<p>If you want to know more about the diagnostics, its importance and what factors are taken into account in the evaluation, keep reading.<\/p>\n<h2>What is the Information Security Diagnostics?<\/h2>\n<p>ISD, an acronym for Information Security Diagnostics, is a tool that assesses (as the name suggests) the processes and resources related to information security of companies,producing a prognosis; that is, it analyzes several areas and generates an evaluation result of the corporation&#8217;s maturity in the digital security standards.<\/p>\n<p>The Information Security Diagnosis developed by OSTEC is not a simple business consultancy. It is mainly a tool that provides autonomy to the user and allows visibility of the general panorama of a business. Its functioning is based on a judicious questionnaire, which seeks the veracity of the answers provided by the individual. Thus, it provides adequate explanations for doubts and identifies potential security bottlenecks in the company.<\/p>\n<p>With ISD, the company&#8217;s Information Security officers can become more comfortable in their day-to-day activities because their efforts will be focused in a way aligned and consistent with the needs of the organization.<\/p>\n<p>It is important to point out, however, that the tool does not detract from the importance of a specific evaluation done by specialists in the area of \u200b\u200bInformation Security.<\/p>\n<h2>What factors are evaluated?<\/h2>\n<p>There are many aspects evaluated in the diagnosis, since security of a corporation must be treated in a detailed way. The fight against virtual threats happens through several factors that contribute, in various ways, to engage the team in its productivity and increase the high availability of the Internet.<\/p>\n<p>Some of the most relevant factors, however, are:<\/p>\n<h3><strong>Governance and Compliance<\/strong><\/h3>\n<p>In this category, the most organizational aspects, the use and compliance of norms and internal policies are evaluated.<\/p>\n<h3><strong>Control and Productivity<\/strong><\/h3>\n<p>Here we analyze whether the controls within the organization are valid, if they provide assistance to employees and influence productivity.<\/p>\n<h3><strong>Availability<\/strong><\/h3>\n<p>Very important factor for the business, in this aspect are evaluated all the items and <a href=\"https:\/\/ostec.blog\/geral\/quando-porque-alta-disponibilidade-firewall\"><strong>resources that need to remain available, without interruption and with high efficiency<\/strong><\/a>.<\/p>\n<h3><strong>Visibility and Traceability<\/strong><\/h3>\n<p>In this, it is verified the tools that detect anomalies in the network structure,\u00a0<a href=\"https:\/\/ostec.blog\/seguranca-perimetro\/ids-o-que-e-e-principais-conceitos\"><strong>allowing the visibility of intrusions<\/strong><\/a>and abnormal processes, in addition to identifying responsible for certain actions.<\/p>\n<h2>The Importance of Information Security Diagnostics<\/h2>\n<p>ISD is not intended exclusively for large corporations, but for corporations that think big. This is because it can be used by all companies regardless of size or industry.<\/p>\n<p>With the tool, you can kick start the activities of the company in relation to information security, improving them assertively. After all, a strategy involves a long set of actions: planning, team awareness, monitoring and continuous improvement. In this way, having a complete diagnosis is to have a guide that can &#8211; and should &#8211; be used for the development and protection of the company.<\/p>\n<p>So, if you&#8217;ve been interested in looking at your company&#8217;s organizational commitment, we have developed a totally free trial that will be released on <strong>May 9th at 3:00 p.m.<\/strong>The tool will be available in an <strong>exclusive webinar<\/strong>for subscribers and with the participation of specialists in Digital Security. Entries for the broadcast are already open and are limited.\u00a0<a href=\"http:\/\/content.ostec.com.br\/webinar-dsi-diagnostico-seguranca-informacao\/\"><strong>Sign up now<\/strong><\/a>and be the first to know the powerful features of ISD.<\/p>\n<h2>Keep reading<\/h2>\n<p>[latest_post type=&#8217;boxes&#8217; number_of_posts=&#8217;3&#8242; number_of_colums=&#8217;3&#8242; order_by=&#8217;date&#8217; order=&#8217;ASC&#8217; category=&#8217;problem-recognition&#8217; text_length=&#8217;100&#8242; title_tag=&#8217;h4&#8242; display_category=&#8217;0&#8242; display_time=&#8217;0&#8242; display_comments=&#8217;0&#8242; display_like=&#8217;0&#8242; display_share=&#8217;0&#8242;]<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security is a new concept for many technology professionals. This is a critical factor: while analysts and IT managers invest in digital security, their business maturity levels are not always met by the required standards. Often, the problem is further intensified by not recognizing the fragility and maturity of their business. According to a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,992,411],"tags":[1521,1653],"class_list":["post-5803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-learning-and-discovery","category-perimeter","tag-diagnostico-de-seguranca-da-informacao-en","tag-seguranca-da-informacao-empresas-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Information Security Diagnosis and why is it important? - OSTEC<\/title>\n<meta name=\"description\" content=\"Have you ever heard of Information Security Diagnostics? Get to know the tool now and why it&#039;s so important to technology companies and analysts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Information Security Diagnosis and why is it important? - OSTEC\" \/>\n<meta property=\"og:description\" content=\"Have you ever heard of Information Security Diagnostics? Get to know the tool now and why it&#039;s so important to technology companies and analysts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-26T11:25:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-28T13:44:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"What is Information Security Diagnosis and why is it important?\",\"datePublished\":\"2018-04-26T11:25:01+00:00\",\"dateModified\":\"2020-08-28T13:44:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\"},\"wordCount\":738,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg\",\"keywords\":[\"diagn\u00f3stico de seguran\u00e7a da informa\u00e7\u00e3o\",\"seguran\u00e7a da informa\u00e7\u00e3o empresas\"],\"articleSection\":[\"General\",\"Learning and discovery\",\"Perimeter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\",\"url\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\",\"name\":\"What is Information Security Diagnosis and why is it important? - OSTEC\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg\",\"datePublished\":\"2018-04-26T11:25:01+00:00\",\"dateModified\":\"2020-08-28T13:44:47+00:00\",\"description\":\"Have you ever heard of Information Security Diagnostics? Get to know the tool now and why it's so important to technology companies and analysts.\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg\",\"width\":928,\"height\":534,\"caption\":\"Homem sentado em frente ao computador em uma sala escura, com textos de linguagem de programa\u00e7\u00e3o refletidos sobre ele e a parede atr\u00e1s dele\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Information Security Diagnosis and why is it important?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Information Security Diagnosis and why is it important? - OSTEC","description":"Have you ever heard of Information Security Diagnostics? Get to know the tool now and why it's so important to technology companies and analysts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/","og_locale":"en_US","og_type":"article","og_title":"What is Information Security Diagnosis and why is it important? - OSTEC","og_description":"Have you ever heard of Information Security Diagnostics? Get to know the tool now and why it's so important to technology companies and analysts.","og_url":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2018-04-26T11:25:01+00:00","article_modified_time":"2020-08-28T13:44:47+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"What is Information Security Diagnosis and why is it important?","datePublished":"2018-04-26T11:25:01+00:00","dateModified":"2020-08-28T13:44:47+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/"},"wordCount":738,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg","keywords":["diagn\u00f3stico de seguran\u00e7a da informa\u00e7\u00e3o","seguran\u00e7a da informa\u00e7\u00e3o empresas"],"articleSection":["General","Learning and discovery","Perimeter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/","url":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/","name":"What is Information Security Diagnosis and why is it important? - OSTEC","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg","datePublished":"2018-04-26T11:25:01+00:00","dateModified":"2020-08-28T13:44:47+00:00","description":"Have you ever heard of Information Security Diagnostics? Get to know the tool now and why it's so important to technology companies and analysts.","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/04\/Homem-em-frente-ao-computador.jpg","width":928,"height":534,"caption":"Homem sentado em frente ao computador em uma sala escura, com textos de linguagem de programa\u00e7\u00e3o refletidos sobre ele e a parede atr\u00e1s dele"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/perimeter\/information-security-diagnosis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is Information Security Diagnosis and why is it important?"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=5803"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5803\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12766"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=5803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=5803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=5803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}