{"id":9049,"date":"2025-01-23T17:19:43","date_gmt":"2025-01-23T16:19:43","guid":{"rendered":"https:\/\/www.metrica-global.com\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"},"modified":"2025-07-30T09:52:04","modified_gmt":"2025-07-30T07:52:04","slug":"los-riesgos-ocultos-de-escanear-un-codigo-qr","status":"publish","type":"post","link":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","title":{"rendered":"The Hidden Risks of Scanning a QR Code"},"content":{"rendered":"\r\n<p data-start=\"388\" data-end=\"610\">At <strong data-start=\"391\" data-end=\"402\">METRICA<\/strong>, information security is a top priority, and we want our employees to stay protected against the growing number of digital threats. That\u2019s why we\u2019re highlighting a risk that can often go unnoticed: QR codes.<\/p>\r\n<p data-start=\"612\" data-end=\"824\">Although QR codes have revolutionized how we access information, they can also be used by cybercriminals to compromise your personal data and devices. Here are the most common threats and how to protect yourself.<\/p>\r\n<hr data-start=\"826\" data-end=\"829\" \/>\r\n<h3 data-start=\"831\" data-end=\"872\">Common Threats from Scanning QR Codes<\/h3>\r\n<p data-start=\"874\" data-end=\"1066\">\ud83d\udd3a <strong data-start=\"877\" data-end=\"914\">Redirecting to Malicious Websites<\/strong><br data-start=\"914\" data-end=\"917\" \/>Cybercriminals can place fake QR codes over legitimate ones, redirecting users to phishing pages designed to steal personal or financial information.<\/p>\r\n<p data-start=\"1068\" data-end=\"1217\">\ud83d\udd3a <strong data-start=\"1071\" data-end=\"1092\">Malware Downloads<\/strong><br data-start=\"1092\" data-end=\"1095\" \/>By scanning a QR code, you may unknowingly trigger a download of malicious software that compromises your device and data.<\/p>\r\n<p data-start=\"1219\" data-end=\"1388\">\ud83d\udd3a <strong data-start=\"1222\" data-end=\"1242\">Phishing Attacks<\/strong><br data-start=\"1242\" data-end=\"1245\" \/>Some QR codes lead to fake websites that closely mimic legitimate platforms\u2014like banking or streaming services\u2014to steal your login credentials.<\/p>\r\n<p data-start=\"1390\" data-end=\"1528\">\ud83d\udd3a <strong data-start=\"1393\" data-end=\"1410\">Payment Scams<\/strong><br data-start=\"1410\" data-end=\"1413\" \/>At events or during promotions, fraudulent QR codes can lead you to fake bank accounts, putting your money at risk.<\/p>\r\n<p data-start=\"1530\" data-end=\"1691\">\ud83d\udd3a <strong data-start=\"1533\" data-end=\"1565\">Unsecure Network Connections<\/strong><br data-start=\"1565\" data-end=\"1568\" \/>Certain QR codes can automatically connect your device to insecure Wi-Fi networks, exposing your data to potential attacks.<\/p>\r\n<hr data-start=\"1693\" data-end=\"1696\" \/>\r\n<h3 data-start=\"1698\" data-end=\"1738\">How to Stay Safe When Using QR Codes<\/h3>\r\n<p data-start=\"1740\" data-end=\"1825\">To reduce risks and safeguard your data, we recommend following these best practices:<\/p>\r\n<p data-start=\"1827\" data-end=\"1957\">\ud83d\udd10 <strong data-start=\"1830\" data-end=\"1852\">Verify the Source:<\/strong><br data-start=\"1852\" data-end=\"1855\" \/>Only scan QR codes from trusted sources, such as those provided by the company or well-known services.<\/p>\r\n<p data-start=\"1959\" data-end=\"2084\">\ud83d\udd10 <strong data-start=\"1962\" data-end=\"1987\">Double-Check the URL:<\/strong><br data-start=\"1987\" data-end=\"1990\" \/>Before clicking a link, ensure the URL is legitimate and free of typos or suspicious elements.<\/p>\r\n<p data-start=\"2086\" data-end=\"2190\">\ud83d\udd10 <strong data-start=\"2089\" data-end=\"2114\">Protect Your Devices:<\/strong><br data-start=\"2114\" data-end=\"2117\" \/>Keep your cybersecurity software up to date to prevent malware downloads.<\/p>\r\n<p data-start=\"2192\" data-end=\"2327\">\ud83d\udd10 <strong data-start=\"2195\" data-end=\"2231\">Be Cautious with Sensitive Data:<\/strong><br data-start=\"2231\" data-end=\"2234\" \/>Avoid entering personal or financial information unless you&#8217;re sure the QR code is authentic.<\/p>\r\n<hr data-start=\"2329\" data-end=\"2332\" \/>\r\n<h3 data-start=\"2334\" data-end=\"2375\">METRICA\u2019s Commitment to Cybersecurity<\/h3>\r\n<p data-start=\"2377\" data-end=\"2705\">At <strong data-start=\"2380\" data-end=\"2391\">METRICA<\/strong>, we\u2019re constantly working to raise awareness of digital risks and promote a culture of security across the organization. We\u2019ve shared this topic on our social media channels as part of our <strong data-start=\"2581\" data-end=\"2597\">#MetricaCare<\/strong> initiative, aiming to spread the message to a broader audience. We invite you to check it out and share it.<\/p>\r\n<p data-start=\"2707\" data-end=\"2880\">Remember: technology is a powerful tool when used wisely. Protect your data, apply these tips in your daily life, and let\u2019s work together to strengthen our digital security.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>While QR codes are a convenient tool, cybercriminals can also use them to compromise your data and device security.<\/p>\n","protected":false},"author":1,"featured_media":9050,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[2295],"tags":[2244,2250,2330,2299,2331,2301,2185,2207,2332],"class_list":["post-9049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-quality-en","tag-ciberseguridad-usa","tag-codigo-usa","tag-codigo-qr-usa","tag-consejos-de-seguridad-usa","tag-malware-usa","tag-phishing-usa","tag-sector-it-usa","tag-tecnologia-usa","tag-url-usa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Hidden Risks of Scanning a QR Code - METRICA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Hidden Risks of Scanning a QR Code - METRICA\" \/>\n<meta property=\"og:description\" content=\"While QR codes are a convenient tool, cybercriminals can also use them to compromise your data and device security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\" \/>\n<meta property=\"og:site_name\" content=\"METRICA\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-23T16:19:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T07:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1029\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\"},\"headline\":\"The Hidden Risks of Scanning a QR Code\",\"datePublished\":\"2025-01-23T16:19:43+00:00\",\"dateModified\":\"2025-07-30T07:52:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\"},\"wordCount\":384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"keywords\":[\"Ciberseguridad\",\"C\u00f3digo\",\"C\u00f3digo QR\",\"Consejos De Seguridad\",\"Malware\",\"Phishing\",\"Sector IT\",\"Tecnolog\u00eda\",\"URL\"],\"articleSection\":[\"Quality\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\",\"url\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\",\"name\":\"The Hidden Risks of Scanning a QR Code - METRICA\",\"isPartOf\":{\"@id\":\"https:\/\/www.metrica-global.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"datePublished\":\"2025-01-23T16:19:43+00:00\",\"dateModified\":\"2025-07-30T07:52:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg\",\"width\":2560,\"height\":1029,\"caption\":\"BANNER QR scaled 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.metrica-global.com\/usa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Hidden Risks of Scanning a QR Code\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.metrica-global.com\/#website\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"name\":\"METRICA\",\"description\":\"Servicios Globales IT\",\"publisher\":{\"@id\":\"https:\/\/www.metrica-global.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.metrica-global.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.metrica-global.com\/#organization\",\"name\":\"METRICA\",\"url\":\"https:\/\/www.metrica-global.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"contentUrl\":\"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png\",\"width\":332,\"height\":58,\"caption\":\"METRICA\"},\"image\":{\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"url\":\"https:\/\/www.metrica-global.com\/usa\/author\/desarrollo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Hidden Risks of Scanning a QR Code - METRICA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","og_locale":"en_US","og_type":"article","og_title":"The Hidden Risks of Scanning a QR Code - METRICA","og_description":"While QR codes are a convenient tool, cybercriminals can also use them to compromise your data and device security.","og_url":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","og_site_name":"METRICA","article_published_time":"2025-01-23T16:19:43+00:00","article_modified_time":"2025-07-30T07:52:04+00:00","og_image":[{"width":2560,"height":1029,"url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"desarrollo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#article","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"},"author":{"name":"desarrollo","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc"},"headline":"The Hidden Risks of Scanning a QR Code","datePublished":"2025-01-23T16:19:43+00:00","dateModified":"2025-07-30T07:52:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"},"wordCount":384,"commentCount":0,"publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"image":{"@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","keywords":["Ciberseguridad","C\u00f3digo","C\u00f3digo QR","Consejos De Seguridad","Malware","Phishing","Sector IT","Tecnolog\u00eda","URL"],"articleSection":["Quality"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","url":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/","name":"The Hidden Risks of Scanning a QR Code - METRICA","isPartOf":{"@id":"https:\/\/www.metrica-global.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage"},"image":{"@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","datePublished":"2025-01-23T16:19:43+00:00","dateModified":"2025-07-30T07:52:04+00:00","breadcrumb":{"@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#primaryimage","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2025\/01\/BANNER-QR-scaled-1.jpg","width":2560,"height":1029,"caption":"BANNER QR scaled 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metrica-global.com\/usa\/los-riesgos-ocultos-de-escanear-un-codigo-qr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.metrica-global.com\/usa\/"},{"@type":"ListItem","position":2,"name":"The Hidden Risks of Scanning a QR Code"}]},{"@type":"WebSite","@id":"https:\/\/www.metrica-global.com\/#website","url":"https:\/\/www.metrica-global.com\/","name":"METRICA","description":"Servicios Globales IT","publisher":{"@id":"https:\/\/www.metrica-global.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metrica-global.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.metrica-global.com\/#organization","name":"METRICA","url":"https:\/\/www.metrica-global.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","contentUrl":"https:\/\/www.metrica-global.com\/wp-content\/uploads\/2023\/12\/logo-metrica.png","width":332,"height":58,"caption":"METRICA"},"image":{"@id":"https:\/\/www.metrica-global.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/78e8e629d9e5908167469b249f6f2cdc","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.metrica-global.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2653fb8f170e1382a31acc69dcf92e99545e6329805eb11d8a34443b058f3de?s=96&d=mm&r=g","caption":"desarrollo"},"url":"https:\/\/www.metrica-global.com\/usa\/author\/desarrollo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/posts\/9049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/comments?post=9049"}],"version-history":[{"count":2,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/posts\/9049\/revisions"}],"predecessor-version":[{"id":12505,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/posts\/9049\/revisions\/12505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/media\/9050"}],"wp:attachment":[{"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/media?parent=9049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/categories?post=9049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.metrica-global.com\/usa\/wp-json\/wp\/v2\/tags?post=9049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}