{"id":13199,"date":"2023-05-18T17:08:05","date_gmt":"2023-05-18T17:08:05","guid":{"rendered":"https:\/\/pulsebyscanda.com\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/"},"modified":"2023-05-18T17:08:05","modified_gmt":"2023-05-18T17:08:05","slug":"how-to-perform-an-effective-hardening-of-the-it-infrastructure","status":"publish","type":"post","link":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/","title":{"rendered":"How to perform an effective hardening of the IT infrastructure?"},"content":{"rendered":"<p><span style=\"color: #000000;\">In the world of information technology (IT), the term <i>Hardening<\/i> refers to the practice of strengthening the security of an IT infrastructure to protect it against malicious attacks and minimize the possibility of a security breach. Hardening involves taking measures to reduce the attack surface of a network, server or device, with the aim of increasing the security of the IT infrastructure. In this article, we will tell you how to effectively harden your IT infrastructure.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>Identify risks and vulnerabilities<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">The first step in implementing effective hardening is to identify risks and vulnerabilities in the IT infrastructure. This involves conducting a risk and vulnerability assessment to identify critical assets, potential threats and known vulnerabilities. This assessment can be performed by an internal security team or by a third party specialized in IT security.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>2. Create a security policy<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">Once the risks and vulnerabilities have been identified, it is important to create a clear and concise security policy. This policy should establish the guidelines and procedures for the hardening of the IT infrastructure. The policy should address all aspects of the infrastructure, including the network, servers, devices and application systems. The policy should also include procedures for incident management and security breach response.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>3. Update software and operating systems<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">Software and operating systems are the most common entry points for computer attacks. It is important to keep software and operating systems up to date to avoid known vulnerabilities. Software and operating system updates often include security patches that fix known vulnerabilities and improve the overall security of the IT infrastructure.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>4. <a style=\"color: #000000;\" href=\"https:\/\/www.redeszone.net\/tutoriales\/configuracion-routers\/activar-configurar-firewall-cortafuegos-router-pc\/\">Correctly configuring firewalls and routers.<\/a><\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">Firewalls and routers are important tools for protecting IT infrastructure. Firewalls filter network traffic and block malicious traffic, while routers direct network traffic. It is important to properly configure firewalls and routers to ensure that unauthorized access to the network is blocked.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>5. Strengthen passwords and authentication policies.<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">They are the first line of defense against computer attacks. It is important to strengthen passwords and authentication policies to prevent unauthorized access to IT infrastructure. Passwords should be complex and changed regularly, and additional authentication policies, such as two-factor authentication, should be used whenever possible.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>6. Limit user permissions<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">User permissions should be limited to prevent users from accessing resources and functions they do not need. Limiting user permissions can help reduce the risk of a malicious user accessing sensitive information or making malicious changes to the IT infrastructure. It is important to establish clear user permission policies and ensure that permissions are reviewed regularly to ensure that users only have access to the necessary resources and functions.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>7. Perform regular penetration tests<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">Penetration testing is an effective way to assess the security of IT infrastructure. Penetration testing simulates a real computer attack to identify vulnerabilities and weaknesses in the infrastructure. It is important to perform regular penetration tests to ensure that new threats are identified and additional hardening measures are implemented.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<h4><span style=\"color: #000000;\"><b>8. Train IT staff and end-users.<\/b> <\/span><\/h4>\n<p><span style=\"color: #000000;\">Training of IT staff and end users is an important part of effective hardening of the IT infrastructure. Employees should be aware of security policies and authentication procedures, and should receive regular training on how to identify and report potential threats. End users should also be educated on security best practices, such as using strong passwords and not opening emails or attachments from unknown sources.  <\/span><\/p>\n<p><span style=\"color: #000000;\">  <\/span><\/p>\n<p><span style=\"color: #000000;\">In conclusion, IT infrastructure hardening is an essential practice for maintaining system security and preventing cyber attacks. The world of cybersecurity is constantly evolving and threats are becoming increasingly sophisticated, so it is essential to adopt an effective hardening strategy to protect against these threats. To do so, it is necessary to take into account the aspects mentioned above.  <\/span><\/p>\n<p><span style=\"color: #000000;\">By implementing these measures, a secure and reliable environment for the IT infrastructure can be ensured, resulting in greater protection of the organization&#8217;s data and information. In short, hardening is an ongoing process that requires constant effort to keep up with new threats and <a style=\"color: #000000;\" href=\"https:\/\/pulsebyscanda.com\/2023\/04\/06\/azure-vs-aws-comparacion-detallada-de-los-dos-gigantes-de-la-nube\/\">adopt up-to-date security measures<\/a>. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of information technology (IT), the term Hardening refers to the practice of strengthening the security of an IT infrastructure to protect it against malicious attacks and minimize the possibility of a security breach. Hardening involves taking measures to reduce the attack surface of a network, server or device, with the aim of [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":12814,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[55],"tags":[],"class_list":["post-13199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-drp-and-hardening"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to perform an effective hardening of the IT infrastructure?<\/title>\n<meta name=\"description\" content=\"The best tips on how to effectively harden your IT infrastructure and make data-driven decisions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to perform an effective hardening of the IT infrastructure?\" \/>\n<meta property=\"og:description\" content=\"The best tips on how to effectively harden your IT infrastructure and make data-driven decisions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Pulse\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-18T17:08:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2023\/06\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fabi\u00e1n Espinosa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabi\u00e1n Espinosa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/\"},\"author\":{\"name\":\"Fabi\u00e1n Espinosa\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#\\\/schema\\\/person\\\/06d779b50d90c31b5fca8092d83b6a39\"},\"headline\":\"How to perform an effective hardening of the IT infrastructure?\",\"datePublished\":\"2023-05-18T17:08:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/\"},\"wordCount\":668,\"publisher\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pulsebyscanda.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png\",\"articleSection\":[\"DRP and Hardening\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/\",\"url\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/\",\"name\":\"How to perform an effective hardening of the IT infrastructure?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pulsebyscanda.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png\",\"datePublished\":\"2023-05-18T17:08:05+00:00\",\"description\":\"The best tips on how to effectively harden your IT infrastructure and make data-driven decisions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pulsebyscanda.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png\",\"contentUrl\":\"https:\\\/\\\/pulsebyscanda.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png\",\"width\":750,\"height\":467,\"caption\":\"\u00bfC\u00f3mo realizar un Hardening efectivo a la infraestructura TI?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/home-pulse\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to perform an effective hardening of the IT infrastructure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/\",\"name\":\"Pulse\",\"description\":\"Construyendo resilencia empresarial\",\"publisher\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#organization\",\"name\":\"Pulse\",\"url\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pulsebyscanda.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-Logo-Pulse.png\",\"contentUrl\":\"https:\\\/\\\/pulsebyscanda.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-Logo-Pulse.png\",\"width\":509,\"height\":620,\"caption\":\"Pulse\"},\"image\":{\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/#\\\/schema\\\/person\\\/06d779b50d90c31b5fca8092d83b6a39\",\"name\":\"Fabi\u00e1n Espinosa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g\",\"caption\":\"Fabi\u00e1n Espinosa\"},\"url\":\"https:\\\/\\\/pulsebyscanda.com\\\/en\\\/author\\\/admin-yu37y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to perform an effective hardening of the IT infrastructure?","description":"The best tips on how to effectively harden your IT infrastructure and make data-driven decisions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"How to perform an effective hardening of the IT infrastructure?","og_description":"The best tips on how to effectively harden your IT infrastructure and make data-driven decisions.","og_url":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/","og_site_name":"Pulse","article_published_time":"2023-05-18T17:08:05+00:00","og_image":[{"width":750,"height":467,"url":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2023\/06\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png","type":"image\/png"}],"author":"Fabi\u00e1n Espinosa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fabi\u00e1n Espinosa","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#article","isPartOf":{"@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/"},"author":{"name":"Fabi\u00e1n Espinosa","@id":"https:\/\/pulsebyscanda.com\/en\/#\/schema\/person\/06d779b50d90c31b5fca8092d83b6a39"},"headline":"How to perform an effective hardening of the IT infrastructure?","datePublished":"2023-05-18T17:08:05+00:00","mainEntityOfPage":{"@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/"},"wordCount":668,"publisher":{"@id":"https:\/\/pulsebyscanda.com\/en\/#organization"},"image":{"@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2023\/06\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png","articleSection":["DRP and Hardening"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/","url":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/","name":"How to perform an effective hardening of the IT infrastructure?","isPartOf":{"@id":"https:\/\/pulsebyscanda.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2023\/06\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png","datePublished":"2023-05-18T17:08:05+00:00","description":"The best tips on how to effectively harden your IT infrastructure and make data-driven decisions.","breadcrumb":{"@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#primaryimage","url":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2023\/06\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png","contentUrl":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2023\/06\/\u00bfComo-realizar-un-Hardening-efectivo-a-la-infraestructura-TI-.png","width":750,"height":467,"caption":"\u00bfC\u00f3mo realizar un Hardening efectivo a la infraestructura TI?"},{"@type":"BreadcrumbList","@id":"https:\/\/pulsebyscanda.com\/en\/how-to-perform-an-effective-hardening-of-the-it-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/pulsebyscanda.com\/en\/home-pulse\/"},{"@type":"ListItem","position":2,"name":"How to perform an effective hardening of the IT infrastructure?"}]},{"@type":"WebSite","@id":"https:\/\/pulsebyscanda.com\/en\/#website","url":"https:\/\/pulsebyscanda.com\/en\/","name":"Pulse","description":"Construyendo resilencia empresarial","publisher":{"@id":"https:\/\/pulsebyscanda.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pulsebyscanda.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pulsebyscanda.com\/en\/#organization","name":"Pulse","url":"https:\/\/pulsebyscanda.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pulsebyscanda.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2026\/02\/cropped-Logo-Pulse.png","contentUrl":"https:\/\/pulsebyscanda.com\/wp-content\/uploads\/2026\/02\/cropped-Logo-Pulse.png","width":509,"height":620,"caption":"Pulse"},"image":{"@id":"https:\/\/pulsebyscanda.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pulsebyscanda.com\/en\/#\/schema\/person\/06d779b50d90c31b5fca8092d83b6a39","name":"Fabi\u00e1n Espinosa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g","caption":"Fabi\u00e1n Espinosa"},"url":"https:\/\/pulsebyscanda.com\/en\/author\/admin-yu37y\/"}]}},"_links":{"self":[{"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/posts\/13199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/comments?post=13199"}],"version-history":[{"count":0,"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/posts\/13199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/media\/12814"}],"wp:attachment":[{"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/media?parent=13199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/categories?post=13199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pulsebyscanda.com\/en\/wp-json\/wp\/v2\/tags?post=13199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}