{"id":7265,"date":"2025-01-23T17:19:43","date_gmt":"2025-01-23T16:19:43","guid":{"rendered":"https:\/\/www.metrica-global.com\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"},"modified":"2025-06-17T11:08:40","modified_gmt":"2025-06-17T11:08:40","slug":"los-riesgos-ocultos-de-escanear-un-codigo-qr","status":"publish","type":"post","link":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","title":{"rendered":"Los riesgos ocultos de escanear un C\u00f3digo QR"},"content":{"rendered":"\r\n<p>En Metrica, la seguridad de la informaci\u00f3n es una prioridad, y queremos que nuestros empleados est\u00e9n siempre protegidos frente a las crecientes amenazas digitales. Por eso, en esta ocasi\u00f3n queremos hablar sobre un riesgo que podr\u00eda pasar desapercibido: los c\u00f3digos QR.<\/p>\r\n\r\n\r\n\r\n<p>Aunque son una herramienta pr\u00e1ctica que ha transformado la forma en que accedemos a la informaci\u00f3n, los c\u00f3digos QR tambi\u00e9n pueden ser utilizados por ciberdelincuentes para comprometer la seguridad de tus datos y dispositivos. Aqu\u00ed te explicamos los riesgos m\u00e1s comunes y c\u00f3mo puedes protegerte de ellos.<\/p>\r\n\r\n\r\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><strong>Principales amenazas al escanear c\u00f3digos QR<\/strong><\/h4>\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\">\r\n<li><strong>Redirecci\u00f3n a sitios maliciosos<\/strong><br \/>Los ciberdelincuentes pueden colocar c\u00f3digos QR falsificados sobre los leg\u00edtimos, redirigiendo a p\u00e1ginas dise\u00f1adas para robar datos personales o financieros.<\/li>\r\n\r\n\r\n\r\n<li><strong>Descarga de malware<\/strong><br \/>Al escanear un c\u00f3digo QR, podr\u00edas descargar inadvertidamente software malicioso, poniendo en riesgo la seguridad de tu dispositivo y tus datos.<\/li>\r\n\r\n\r\n\r\n<li><strong>Ataques de phishing<\/strong><br \/>Los c\u00f3digos QR pueden llevar a sitios que imitan p\u00e1ginas leg\u00edtimas, como bancos o plataformas de streaming, con el objetivo de obtener tus credenciales.<\/li>\r\n\r\n\r\n\r\n<li><strong>Fraudes de pago<\/strong><br \/>En eventos o promociones, un c\u00f3digo QR fraudulento podr\u00eda redirigirte a cuentas bancarias falsas y poner en peligro tu dinero.<\/li>\r\n\r\n\r\n\r\n<li><strong>Conexiones no seguras<\/strong><br \/>Algunos c\u00f3digos QR conectan autom\u00e1ticamente tu dispositivo a redes Wi-Fi no seguras, lo que expone tu informaci\u00f3n a posibles ataques.<\/li>\r\n<\/ol>\r\n\r\n\r\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><strong>C\u00f3mo protegerte al usar c\u00f3digos QR<\/strong><\/h4>\r\n\r\n\r\n\r\n<p>Para reducir riesgos y garantizar la seguridad de tus datos, te recomendamos seguir estas buenas pr\u00e1cticas:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li><strong>Verifica la fuente:<\/strong> Aseg\u00farate de escanear \u00fanicamente c\u00f3digos QR de fuentes confiables, como aquellos proporcionados por la empresa o servicios reconocidos.<\/li>\r\n\r\n\r\n\r\n<li><strong>Revisa la URL:<\/strong> Antes de acceder a un enlace, verifica que la direcci\u00f3n sea leg\u00edtima y no tenga errores sospechosos.<\/li>\r\n\r\n\r\n\r\n<li><strong>Protege tus dispositivos:<\/strong> Mant\u00e9n actualizado el software de ciberseguridad en tus equipos para prevenir descargas de malware.<\/li>\r\n\r\n\r\n\r\n<li><strong>Cuidado con datos sensibles:<\/strong> No compartas informaci\u00f3n personal o financiera sin comprobar la autenticidad del c\u00f3digo QR.<\/li>\r\n<\/ul>\r\n\r\n\r\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\r\n\r\n\r\n<h4 class=\"wp-block-heading\"><strong>Nuestro compromiso con la ciberseguridad<\/strong><\/h4>\r\n\r\n\r\n\r\n<p>En Metrica, trabajamos constantemente para crear conciencia sobre los riesgos digitales y fomentar una cultura de seguridad en toda la organizaci\u00f3n. Hemos compartido este tema en nuestras redes sociales como parte de nuestra iniciativa #MetricaCare, con el objetivo de ampliar este mensaje y llegar a m\u00e1s personas. Te invitamos a consultarlo y compartirlo.<\/p>\r\n\r\n\r\n\r\n<p>Recuerda, la tecnolog\u00eda es una herramienta poderosa cuando se utiliza con precauci\u00f3n. Protege tus datos, aplica estos consejos en tu d\u00eda a d\u00eda, y contribuyamos juntos a fortalecer nuestra seguridad digital.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Aunque son una herramienta pr\u00e1ctica que ha transformado la forma en que accedemos a la informaci\u00f3n, los c\u00f3digos QR tambi\u00e9n pueden ser utilizados por ciberdelincuentes para comprometer la seguridad de tus datos y dispositivos.<\/p>\n","protected":false},"author":1,"featured_media":7266,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1463],"tags":[1345,1363,1562,1467,1563,1469,1162,1221,1564],"class_list":["post-7265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-calidad-pe","tag-ciberseguridad-pe","tag-codigo-pe","tag-codigo-qr-pe","tag-consejos-de-seguridad-pe","tag-malware-pe","tag-phishing-pe","tag-sector-it-pe","tag-tecnologia-pe","tag-url-pe"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Los riesgos ocultos de escanear un C\u00f3digo QR - METRICA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los riesgos ocultos de escanear un C\u00f3digo QR - METRICA\" \/>\n<meta property=\"og:description\" content=\"Aunque son una herramienta pr\u00e1ctica que ha transformado la forma en que accedemos a la informaci\u00f3n, los c\u00f3digos QR tambi\u00e9n pueden ser utilizados por ciberdelincuentes para comprometer la seguridad de tus datos y dispositivos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\" \/>\n<meta property=\"og:site_name\" content=\"METRICA\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-23T16:19:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T11:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1029\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\"},\"headline\":\"Los riesgos ocultos de escanear un C\u00f3digo QR\",\"datePublished\":\"2025-01-23T16:19:43+00:00\",\"dateModified\":\"2025-06-17T11:08:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\"},\"wordCount\":453,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"keywords\":[\"Ciberseguridad\",\"C\u00f3digo\",\"C\u00f3digo QR\",\"Consejos De Seguridad\",\"Malware\",\"Phishing\",\"Sector IT\",\"Tecnolog\u00eda\",\"URL\"],\"articleSection\":[\"Calidad\"],\"inLanguage\":\"es-PE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\",\"url\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\",\"name\":\"Los riesgos ocultos de escanear un C\u00f3digo QR - METRICA\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"datePublished\":\"2025-01-23T16:19:43+00:00\",\"dateModified\":\"2025-06-17T11:08:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb\"},\"inLanguage\":\"es-PE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-PE\",\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"width\":2560,\"height\":1029,\"caption\":\"BANNER QR scaled 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.metrica-global.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los riesgos ocultos de escanear un C\u00f3digo QR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.metrica-global.com\/#website\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"name\":\"METRICA\",\"description\":\"Servicios Globales IT\",\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.metrica-global.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-PE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.metrica-global.com\/#organization\",\"name\":\"METRICA\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-PE\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"width\":332,\"height\":58,\"caption\":\"METRICA\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-PE\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"url\":\"https:\/\/www.metrica-global.com\/pe\/author\/desarrollo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los riesgos ocultos de escanear un C\u00f3digo QR - METRICA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","og_locale":"es_ES","og_type":"article","og_title":"Los riesgos ocultos de escanear un C\u00f3digo QR - METRICA","og_description":"Aunque son una herramienta pr\u00e1ctica que ha transformado la forma en que accedemos a la informaci\u00f3n, los c\u00f3digos QR tambi\u00e9n pueden ser utilizados por ciberdelincuentes para comprometer la seguridad de tus datos y dispositivos.","og_url":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","og_site_name":"METRICA","article_published_time":"2025-01-23T16:19:43+00:00","article_modified_time":"2025-06-17T11:08:40+00:00","og_image":[{"width":2560,"height":1029,"url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"desarrollo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#article","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"},"author":{"name":"desarrollo","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc"},"headline":"Los riesgos ocultos de escanear un C\u00f3digo QR","datePublished":"2025-01-23T16:19:43+00:00","dateModified":"2025-06-17T11:08:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"},"wordCount":453,"commentCount":0,"publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"image":{"@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","keywords":["Ciberseguridad","C\u00f3digo","C\u00f3digo QR","Consejos De Seguridad","Malware","Phishing","Sector IT","Tecnolog\u00eda","URL"],"articleSection":["Calidad"],"inLanguage":"es-PE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","url":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","name":"Los riesgos ocultos de escanear un C\u00f3digo QR - METRICA","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage"},"image":{"@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","datePublished":"2025-01-23T16:19:43+00:00","dateModified":"2025-06-17T11:08:40+00:00","breadcrumb":{"@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb"},"inLanguage":"es-PE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"]}]},{"@type":"ImageObject","inLanguage":"es-PE","@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","width":2560,"height":1029,"caption":"BANNER QR scaled 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metrica-global.com\/pe\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.metrica-global.com\/en\/"},{"@type":"ListItem","position":2,"name":"Los riesgos ocultos de escanear un C\u00f3digo QR"}]},{"@type":"WebSite","@id":"https:\/\/www.metrica-global.com\/#website","url":"https:\/\/www.metrica-global.com\/","name":"METRICA","description":"Servicios Globales IT","publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metrica-global.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-PE"},{"@type":"Organization","@id":"https:\/\/www.metrica-global.com\/#organization","name":"METRICA","url":"https:\/\/www.metrica-global.com\/","logo":{"@type":"ImageObject","inLanguage":"es-PE","@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","width":332,"height":58,"caption":"METRICA"},"image":{"@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"es-PE","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","caption":"desarrollo"},"url":"https:\/\/www.metrica-global.com\/pe\/author\/desarrollo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/posts\/7265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/comments?post=7265"}],"version-history":[{"count":2,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/posts\/7265\/revisions"}],"predecessor-version":[{"id":7971,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/posts\/7265\/revisions\/7971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/media\/7266"}],"wp:attachment":[{"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/media?parent=7265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/categories?post=7265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.metrica-global.com\/pe\/wp-json\/wp\/v2\/tags?post=7265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}