{"id":253,"date":"2025-05-24T19:43:09","date_gmt":"2025-05-24T19:43:09","guid":{"rendered":"https:\/\/arestech.arestech.us\/?p=253"},"modified":"2026-01-07T00:13:48","modified_gmt":"2026-01-07T00:13:48","slug":"blog-personal-device-security-blind-spot","status":"publish","type":"post","link":"https:\/\/arestech.us\/es\/blog-personal-device-security-blind-spot\/","title":{"rendered":"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot"},"content":{"rendered":"<p>You run a successful business. Your company has firewalls, endpoint protection, a SOC team monitoring threats 24\/7. You&#8217;re confident your corporate data is secure.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><\/blockquote>\n\n\n\n<p> <em>But here&#8217;s the uncomfortable truth: <strong>76% of personal devices have malware.<\/strong><\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<p>While you&#8217;ve invested millions protecting your business, your personal laptop, your spouse&#8217;s tablet, your kids&#8217; phones\u2014the devices that access your bank accounts, private emails, and family photos\u2014are wide open.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>And cybercriminals know it.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Corporate-Personal Security Gap<\/strong><\/h3>\n\n\n\n<p>Let&#8217;s be honest about how this happens.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At the office, you have:<\/li>\n\n\n\n<li>A team of professionals watching for threats<\/li>\n\n\n\n<li>Enterprise-grade endpoint detection and response (EDR)<\/li>\n\n\n\n<li>Network segmentation and monitoring<\/li>\n\n\n\n<li>Regular security audits and patches<\/li>\n<\/ul>\n\n\n\n<p>At home, you have:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Whatever antivirus came pre-installed (if any)<\/li>\n\n\n\n<li>The same WiFi password you&#8217;ve used for 3 years<\/li>\n\n\n\n<li>Smart home devices you set up once and forgot about<\/li>\n\n\n\n<li>Kids downloading apps without a second thought<\/li>\n<\/ul>\n\n\n\n<p>The gap is massive. And attackers exploit it ruthlessly.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why Personal Devices Are Prime Targets<\/strong><\/h3>\n\n\n\n<p>Cybercriminals aren&#8217;t stupid. They know breaching a Fortune 500 company is hard. But compromising an executive&#8217;s personal device? That&#8217;s the easy way in.<\/p>\n\n\n\n<p><strong>1. Corporate Access Through the Back Door<\/strong> Your personal device likely has:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Saved passwords to corporate accounts<\/li>\n\n\n\n<li>Work emails synced to personal apps<\/li>\n\n\n\n<li>VPN credentials stored in browsers<\/li>\n\n\n\n<li>Documents you reviewed over the weekend<\/li>\n<\/ul>\n\n\n\n<p>One compromised personal device = access to corporate networks.<\/p>\n\n\n\n<p><strong>2. Financial Gain<\/strong> High-net-worth individuals are lucrative targets:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Banking apps with saved credentials<\/li>\n\n\n\n<li>Investment account access<\/li>\n\n\n\n<li>Cryptocurrency wallets<\/li>\n\n\n\n<li>Wire transfer capabilities<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Reputation Damage<\/strong> Your personal device contains:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Private communications<\/li>\n\n\n\n<li>Family photos and videos<\/li>\n\n\n\n<li>Sensitive personal information<\/li>\n\n\n\n<li>Embarrassing browsing history<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>All perfect for extortion, blackmail, or public humiliation.<\/p>\n\n\n\n<p><strong>4. Identity Theft and Fraud<\/strong> Your identity is worth more than you think:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tax fraud using your SSN<\/li>\n\n\n\n<li>Credit card applications in your name<\/li>\n\n\n\n<li>Business deals signed with forged credentials<\/li>\n\n\n\n<li>Legal liability for crimes you didn&#8217;t commit<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The 72% Who Are Already Compromised<\/strong><\/h3>\n\n\n\n<p>Here&#8217;s the scarier statistic: <strong>72% of executives already have personal data on the dark web.<\/strong><\/p>\n\n\n\n<p>Not &#8220;at risk of having.&#8221; <strong>Already have.<\/strong><\/p>\n\n\n\n<p>Right now, on dark web marketplaces, you can likely find:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your email addresses and passwords<\/li>\n\n\n\n<li>Credit card numbers<\/li>\n\n\n\n<li>Social Security Number<\/li>\n\n\n\n<li>Driver&#8217;s license information<\/li>\n\n\n\n<li>Family members&#8217; data<\/li>\n<\/ul>\n\n\n\n<p>Most executives don&#8217;t know they&#8217;re compromised until it&#8217;s too late.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-World Scenarios (How This Plays Out)<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Scenario 1: The Home Network Breach<\/strong><\/h4>\n\n\n\n<p>A CEO&#8217;s smart home camera gets hacked. Attackers pivot from the camera to the home network, compromise the CEO&#8217;s laptop, steal saved credentials, and access corporate financial systems. <strong>$2.3M stolen before anyone notices.<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Scenario 2: The Family Vulnerability<\/strong><\/h4>\n\n\n\n<p>A teenage daughter downloads a &#8220;free&#8221; game app infected with spyware. Parents&#8217; devices on the same network are compromised. Attackers access the father&#8217;s email, intercept a legitimate wire transfer request, change the account details. <strong>$500K gone.<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Scenario 3: The Public WiFi Mistake<\/strong><\/h4>\n\n\n\n<p>An executive checks email at an airport using public WiFi. Attacker performs a man-in-the-middle attack, captures credentials, accesses corporate email, sends fake invoices to accounting department. <strong>$1.2M paid to fraudulent accounts.<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Scenario 4: The Malicious App<\/strong><\/h4>\n\n\n\n<p>A spouse downloads a popular fitness app that requests excessive permissions. The app is actually malware that logs keystrokes, captures banking credentials, and drains accounts. <strong>$300K stolen over 3 months before discovery.<\/strong><\/p>\n\n\n\n<p>Most executives don&#8217;t know they&#8217;re compromised until it&#8217;s too late.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why Traditional Solutions Fail<\/strong><\/h3>\n\n\n\n<p>&#8220;But I have antivirus on my devices.&#8221;<\/p>\n\n\n\n<p>Consumer antivirus is better than nothing. But it&#8217;s designed for average users with average threats.<\/p>\n\n\n\n<p><strong>You&#8217;re not average. Your threats aren&#8217;t average.<\/strong><\/p>\n\n\n\n<p>Here&#8217;s what consumer solutions miss:<\/p>\n\n\n\n<p>\u274c <strong>No 24\/7 monitoring<\/strong> &#8211; Threats happen at 2 AM on weekends<br>\u274c <strong>No threat intelligence<\/strong> &#8211; They don&#8217;t know about zero-day exploits targeting executives<br>\u274c <strong>No dark web monitoring<\/strong> &#8211; They can&#8217;t tell you if your data is already compromised<br>\u274c <strong>No privacy protection<\/strong> &#8211; They don&#8217;t scan for reputation threats or data leaks<br>\u274c <strong>No network security<\/strong> &#8211; Your home IoT devices are unprotected<br>\u274c <strong>No human expertise<\/strong> &#8211; Automated responses miss sophisticated attacks<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What Enterprise-Grade Personal Protection Looks Like<\/strong><\/h3>\n\n\n\n<p>The solution isn&#8217;t buying more software. It&#8217;s applying corporate security thinking to your personal life.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What you actually need:<\/strong><\/h4>\n\n\n\n<p><strong>1. Comprehensive Device Protection<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>EDR on every personal device (yours, spouse, kids)<\/li>\n\n\n\n<li>Real-time threat detection with AI and machine learning<\/li>\n\n\n\n<li>Automatic patching and updates<\/li>\n\n\n\n<li>Zero-trust security model<\/li>\n<\/ul>\n\n\n\n<p><strong>2. 24\/7 Human Monitoring<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security Operations Center (SOC) watching your ecosystem<\/li>\n\n\n\n<li>Analysts who understand high-net-worth threats<\/li>\n\n\n\n<li>Immediate response to anomalies<\/li>\n\n\n\n<li>Incident response team on standby<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Network Security Across All Residences<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secured WiFi with enterprise-grade encryption<\/li>\n\n\n\n<li>Network segmentation (IoT devices isolated)<\/li>\n\n\n\n<li>Intrusion detection and prevention<\/li>\n\n\n\n<li>Regular vulnerability assessments<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Privacy and Reputation Protection<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dark web monitoring for your data<\/li>\n\n\n\n<li>Social media exposure analysis<\/li>\n\n\n\n<li>Leaked credential detection<\/li>\n\n\n\n<li>Reputation management services<\/li>\n<\/ul>\n\n\n\n<p><strong>5. Communication Security<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encrypted messaging and calls<\/li>\n\n\n\n<li>Detection of surveillance attempts<\/li>\n\n\n\n<li>Protection against spyware<\/li>\n\n\n\n<li>Secure file sharing<\/li>\n<\/ul>\n\n\n\n<p><strong>6. Expert Support When You Need It<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dedicated account manager who knows your case<\/li>\n\n\n\n<li>24\/7 availability via WhatsApp or phone<\/li>\n\n\n\n<li>Response in minutes, not days<\/li>\n\n\n\n<li>Concierge-level service<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<p><strong>Uriel Pe\u00f1a<\/strong><br>Cybersecurity Consultant | Arestech<br><em>Enterprise-grade protection in a single cybersecurity platform \u2014 Comprehensive. Managed. Simple.<\/em><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>You run a successful business. Your company has firewalls, endpoint protection, a SOC team monitoring threats 24\/7. You&#8217;re confident your corporate data is secure. But here&#8217;s the uncomfortable truth: 76% of personal devices have malware. While you&#8217;ve invested millions protecting your business, your personal laptop, your spouse&#8217;s tablet, your kids&#8217; phones\u2014the devices that access your [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[3],"tags":[2],"class_list":["post-253","post","type-post","status-publish","format-standard","hentry","category-tools","tag-for-individuals"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot - Ares Tech<\/title>\n<meta name=\"description\" content=\"Your company has enterprise security. Your personal life doesn&#039;t. Learn why 76% of personal devices have malware and what high-net-worth individuals do about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arestech.us\/es\/blog-personal-device-security-blind-spot\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot - Ares Tech\" \/>\n<meta property=\"og:description\" content=\"Your company has enterprise security. Your personal life doesn&#039;t. Learn why 76% of personal devices have malware and what high-net-worth individuals do about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arestech.us\/es\/blog-personal-device-security-blind-spot\/\" \/>\n<meta property=\"og:site_name\" content=\"Ares Tech\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-24T19:43:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-07T00:13:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot\",\"datePublished\":\"2025-05-24T19:43:09+00:00\",\"dateModified\":\"2026-01-07T00:13:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/\"},\"wordCount\":849,\"commentCount\":0,\"keywords\":[\"For Individuals\"],\"articleSection\":[\"Tools\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/\",\"url\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/\",\"name\":\"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot - Ares Tech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arestech.us\\\/#website\"},\"datePublished\":\"2025-05-24T19:43:09+00:00\",\"dateModified\":\"2026-01-07T00:13:48+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Your company has enterprise security. Your personal life doesn't. Learn why 76% of personal devices have malware and what high-net-worth individuals do about it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/arestech.us\\\/blog-personal-device-security-blind-spot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/arestech.us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/arestech.us\\\/#website\",\"url\":\"https:\\\/\\\/arestech.us\\\/\",\"name\":\"Ares Tech\",\"description\":\"An eye on everything\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/arestech.us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/arestech.us\\\/es\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot - Ares Tech","description":"Your company has enterprise security. Your personal life doesn't. Learn why 76% of personal devices have malware and what high-net-worth individuals do about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arestech.us\/es\/blog-personal-device-security-blind-spot\/","og_locale":"es_MX","og_type":"article","og_title":"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot - Ares Tech","og_description":"Your company has enterprise security. Your personal life doesn't. Learn why 76% of personal devices have malware and what high-net-worth individuals do about it.","og_url":"https:\/\/arestech.us\/es\/blog-personal-device-security-blind-spot\/","og_site_name":"Ares Tech","article_published_time":"2025-05-24T19:43:09+00:00","article_modified_time":"2026-01-07T00:13:48+00:00","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/#article","isPartOf":{"@id":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/"},"author":{"name":"","@id":""},"headline":"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot","datePublished":"2025-05-24T19:43:09+00:00","dateModified":"2026-01-07T00:13:48+00:00","mainEntityOfPage":{"@id":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/"},"wordCount":849,"commentCount":0,"keywords":["For Individuals"],"articleSection":["Tools"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/","url":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/","name":"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot - Ares Tech","isPartOf":{"@id":"https:\/\/arestech.us\/#website"},"datePublished":"2025-05-24T19:43:09+00:00","dateModified":"2026-01-07T00:13:48+00:00","author":{"@id":""},"description":"Your company has enterprise security. Your personal life doesn't. Learn why 76% of personal devices have malware and what high-net-worth individuals do about it.","breadcrumb":{"@id":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/arestech.us\/blog-personal-device-security-blind-spot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arestech.us\/"},{"@type":"ListItem","position":2,"name":"The 76% Problem: Why Personal Devices Are Your Biggest Security Blind Spot"}]},{"@type":"WebSite","@id":"https:\/\/arestech.us\/#website","url":"https:\/\/arestech.us\/","name":"Ares Tech","description":"An eye on everything","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arestech.us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"","url":"https:\/\/arestech.us\/es\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":10,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":517,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/posts\/253\/revisions\/517"}],"wp:attachment":[{"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arestech.us\/es\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}