{"id":16273,"date":"2022-12-02T13:37:17","date_gmt":"2022-12-02T12:37:17","guid":{"rendered":"https:\/\/icr-evolution.com\/blog\/como-proteger-un-contact-center-contra-el-ransomware\/"},"modified":"2023-01-19T19:35:44","modified_gmt":"2023-01-19T18:35:44","slug":"how-to-protect-a-contact-center-against-ransomware","status":"publish","type":"post","link":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/","title":{"rendered":"How to protect a Contact Center against ransomware"},"content":{"rendered":"<h2>How ransomware affects a contact center<\/h2>\n<p>In any sector, suffering an attack of this type is a real disaster for the organization, but if we talk about contact centers, <strong>countless data and user records come into play<\/strong>. The affectation can be practically destructive and being prepared or not for it with a good security and data recovery strategy will undoubtedly provide survival options when it comes to acting and will make a big difference.<\/p>\n<h2><a href=\"https:\/\/www.tecsens.com\/servicios-internet-empresas\/seguridad-informatica\/\" target=\"_blank\" rel=\"noopener\">Solutions<\/a> to protect a contact center against ransomware<\/h2>\n<h3>Keep software up to date<\/h3>\n<p>It is essential to maintain the systems without any type of weakness, cybercriminals can come to perceive this long before the administrators themselves. They take advantage of these vulnerabilities to attack and infect systems much faster. For this reason, keep the software and, in general, all the applications in use, <strong>updated, with back up, and monitored to mitigate these attacks.<\/strong><\/p>\n<h3>Back up (BaaS)<\/h3>\n<p>One of the main premises against these attacks and security in general is <strong>making <a href=\"https:\/\/www.tecsens.com\/servicios-cloud-empresas\/cloud-backup\/\" target=\"_blank\" rel=\"noopener\">backup<\/a> copies<\/strong>, you don&#8217;t think about the consequences and affectation of data loss until it happens. Thousands and thousands of critical data are moved daily in the contact center, so <strong>having a backup plan adapted to the needs and characteristics of the organization is crucial.<\/strong><\/p>\n<p>Any backup copy is not valid, they must be <strong>verified and tested<\/strong> since it is the first step towards a successful recovery. IT teams need to automatically verify the integrity of the backup data once they are made, since if a problem is detected, another copy can be made in production. Once it is made, it is not possible to have it, from it for being compromised or considered unreliable and lacking in integrity. For this, it is recommended to follow the <a href=\"https:\/\/www.tecsens.com\/politica-3-2-1-1-0-baas\/\" target=\"_blank\" rel=\"noopener\">backup rule 3-2-1-1-0.<\/a><\/p>\n<h3>Have a contingency plan (DRaaS)<\/h3>\n<p>As we have already mentioned before, having a contingency plan to deal with a ransomware attack is essential, it must include backup (BaaS), but if the organization wants to have a comprehensive disaster strategy,<strong> disaster recovery (DRaaS) ) must also include it.<\/strong><\/p>\n<p>This solution guarantees <a href=\"https:\/\/www.tecsens.com\/servicios-cloud-empresas\/cloud-backup\/\" target=\"_blank\" rel=\"noopener\">business continuity<\/a> and avoids any type of activity interruption, so that in the event of an attack the system crash would be practically negligible. It guarantees the use of servers, networks and data in the recovery process of the affected party, thanks to this the company can keep its systems available without interruptions and minimizing the impact.<\/p>\n<p>&nbsp;<\/p>\n\n\t\t<!--HubSpot Call-to-Action Code -->\n\t\t<span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-3b573c70-6e79-442e-90a7-16ae4f034d42\">\n\t\t<span class=\"hs-cta-node hs-cta-3b573c70-6e79-442e-90a7-16ae4f034d42\" id=\"3b573c70-6e79-442e-90a7-16ae4f034d42\">\n\t\t<!--[if lte IE 8]>\n\t\t<div id=\"hs-cta-ie-element\"><\/div>\n\t\t<![endif]-->\n\t\t<a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/20121242\/3b573c70-6e79-442e-90a7-16ae4f034d42\" >\n\t\t<img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-3b573c70-6e79-442e-90a7-16ae4f034d42\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/20121242\/3b573c70-6e79-442e-90a7-16ae4f034d42.png\"  alt=\"New call-to-action\"\/>\n\t\t<\/a>\n\t\t<\/span>\n\t\t<script charset=\"utf-8\" src=\"\/\/js.hubspot.com\/cta\/current.js\"><\/script>\n\t\t<script>\n\t\thbspt.cta.load(20121242, '3b573c70-6e79-442e-90a7-16ae4f034d42', {});\n\t\t<\/script>\n\t\t<\/span>\n\t\t<!-- end HubSpot Call-to-Action Code -->\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>How ransomware affects a contact center In any sector, suffering an attack of this type is a real disaster for the organization, but if we talk about contact centers, countless data and user records come into play. The affectation can be practically destructive and being prepared or not for it with a good security and [&hellip;]<\/p>\n","protected":false},"author":100015,"featured_media":15208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-16273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect a Contact Center against ransomware<\/title>\n<meta name=\"description\" content=\"Ransomware it&#039;s always ready to attack and it is an existing and inevitable war for which every contact center must be prepared.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect a Contact Center against ransomware\" \/>\n<meta property=\"og:description\" content=\"Ransomware it&#039;s always ready to attack and it is an existing and inevitable war for which every contact center must be prepared.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"ICR Evolution\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-02T12:37:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-19T18:35:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2022\/12\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juanjo Lopez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juanjo Lopez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/\"},\"author\":{\"name\":\"Juanjo Lopez\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/person\\\/aa0041cffb9cde84fc0b87529c4d968e\"},\"headline\":\"How to protect a Contact Center against ransomware\",\"datePublished\":\"2022-12-02T12:37:17+00:00\",\"dateModified\":\"2023-01-19T18:35:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/\"},\"wordCount\":429,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg\",\"articleSection\":[\"Innovation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/\",\"name\":\"How to protect a Contact Center against ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg\",\"datePublished\":\"2022-12-02T12:37:17+00:00\",\"dateModified\":\"2023-01-19T18:35:44+00:00\",\"description\":\"Ransomware it's always ready to attack and it is an existing and inevitable war for which every contact center must be prepared.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.icr-evolution.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg\",\"width\":2560,\"height\":1920,\"caption\":\"ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/blog\\\/how-to-protect-a-contact-center-against-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect a Contact Center against ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\",\"name\":\"ICR Evolution\",\"description\":\"Software para Call Center Omnicanal\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\",\"name\":\"ICR Evolution\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/icr-evolution.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logo-icrevolution.png\",\"contentUrl\":\"https:\\\/\\\/icr-evolution.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logo-icrevolution.png\",\"width\":376,\"height\":76,\"caption\":\"ICR Evolution\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/person\\\/aa0041cffb9cde84fc0b87529c4d968e\",\"name\":\"Juanjo Lopez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g\",\"caption\":\"Juanjo Lopez\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect a Contact Center against ransomware","description":"Ransomware it's always ready to attack and it is an existing and inevitable war for which every contact center must be prepared.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"How to protect a Contact Center against ransomware","og_description":"Ransomware it's always ready to attack and it is an existing and inevitable war for which every contact center must be prepared.","og_url":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/","og_site_name":"ICR Evolution","article_published_time":"2022-12-02T12:37:17+00:00","article_modified_time":"2023-01-19T18:35:44+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2022\/12\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Juanjo Lopez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juanjo Lopez","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/"},"author":{"name":"Juanjo Lopez","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/person\/aa0041cffb9cde84fc0b87529c4d968e"},"headline":"How to protect a Contact Center against ransomware","datePublished":"2022-12-02T12:37:17+00:00","dateModified":"2023-01-19T18:35:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/"},"wordCount":429,"commentCount":0,"publisher":{"@id":"https:\/\/www.icr-evolution.com\/en\/#organization"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2022\/12\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg","articleSection":["Innovation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/","url":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/","name":"How to protect a Contact Center against ransomware","isPartOf":{"@id":"https:\/\/www.icr-evolution.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2022\/12\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg","datePublished":"2022-12-02T12:37:17+00:00","dateModified":"2023-01-19T18:35:44+00:00","description":"Ransomware it's always ready to attack and it is an existing and inevitable war for which every contact center must be prepared.","breadcrumb":{"@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#primaryimage","url":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2022\/12\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg","contentUrl":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2022\/12\/muha-ajjan-sL2BRR1cuvM-unsplash-scaled.jpg","width":2560,"height":1920,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.icr-evolution.com\/en\/blog\/how-to-protect-a-contact-center-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.icr-evolution.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to protect a Contact Center against ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.icr-evolution.com\/en\/#website","url":"https:\/\/www.icr-evolution.com\/en\/","name":"ICR Evolution","description":"Software para Call Center Omnicanal","publisher":{"@id":"https:\/\/www.icr-evolution.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.icr-evolution.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.icr-evolution.com\/en\/#organization","name":"ICR Evolution","url":"https:\/\/www.icr-evolution.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/icr-evolution.com\/wp-content\/uploads\/2020\/11\/logo-icrevolution.png","contentUrl":"https:\/\/icr-evolution.com\/wp-content\/uploads\/2020\/11\/logo-icrevolution.png","width":376,"height":76,"caption":"ICR Evolution"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/person\/aa0041cffb9cde84fc0b87529c4d968e","name":"Juanjo Lopez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783727a3187ab0d9e151d710496358303c3950fc59932e04f7573969e2d34c71?s=96&d=mm&r=g","caption":"Juanjo Lopez"}}]}},"_links":{"self":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/posts\/16273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/users\/100015"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/comments?post=16273"}],"version-history":[{"count":0,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/posts\/16273\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/media\/15208"}],"wp:attachment":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/media?parent=16273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/categories?post=16273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/tags?post=16273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}