{"id":1021,"date":"2021-03-10T11:18:14","date_gmt":"2021-03-10T17:18:14","guid":{"rendered":"https:\/\/idsinc.com\/?p=1021"},"modified":"2026-03-09T14:53:11","modified_gmt":"2026-03-09T20:53:11","slug":"recuperacion-de-ataques-de-ransomware","status":"publish","type":"post","link":"https:\/\/idsinc.com\/es\/ransomware-attack-recovery\/","title":{"rendered":"Recuperaci\u00f3n de ataques de ransomware"},"content":{"rendered":"<h3 class=\"wp-block-heading\" id=\"h-ransomware-has-come-a-long-way-since-its-beginning-in-1989-and-so-have-the-options-for-recovering-from-a-ransomware-attack-one-of-the-the-first-variants-was-distributed-via-diskettes-to-attendees-at-a-who-conference\"><strong><em>El ransomware ha recorrido un largo camino desde su inicio en 1989, al igual que las opciones para recuperarse de un ataque de ransomware. Una de las primeras variantes se distribuy\u00f3 en disquetes a los asistentes a una conferencia de la OMS.<\/em><\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">La popularizaci\u00f3n de Internet llev\u00f3 inevitablemente a los delincuentes a encontrar formas de distribuir ataques de ransomware utilizando archivos adjuntos y enlaces de correo electr\u00f3nico. Estos enlaces conduc\u00edan a sitios web comprometidos que inyectaban malware en las computadoras y redes de los usuarios desprevenidos. La verdad es que esto sucede m\u00e1s de lo que uno podr\u00eda pensar, y a menudo sucede con la simple apertura de un correo electr\u00f3nico que parece leg\u00edtimo a simple vista.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Tanto el volumen como la escala de los ataques de ransomware han crecido a un ritmo exponencial. Desafortunadamente, ning\u00fan sector de la econom\u00eda se salva, con innumerables empresas y organizaciones que son v\u00edctimas de ataques de ransomware. En promedio, hay ataques de ransomware en empresas o agencias gubernamentales de EE. UU. aproximadamente cada 11 segundos. Se espera que estos ataques causen da\u00f1os de hasta $20 mil millones a empresas y agencias gubernamentales estadounidenses para fines de este a\u00f1o.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>\u00bfQu\u00e9 hacer si su organizaci\u00f3n se ve afectada por un ataque de ransomware y qu\u00e9 opciones tiene para recuperarse de un ataque?<\/em><\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><em>Identifique qu\u00e9 sistemas se han visto afectados y mu\u00e9vase inmediatamente para contener la infecci\u00f3n<\/em><\/li><li><em>Extraiga su plan de respuesta a incidentes<\/em><\/li><li><em>Revisa tus copias de seguridad<\/em><\/li><li><em>Mira si hay opciones para recuperar tus archivos sin pagar<\/em><\/li><li><em>Eval\u00faa el impacto de pagar y decide si quieres pagar<\/em><\/li><li><em>\u00bfQu\u00e9 sigue? Despu\u00e9s de la recuperaci\u00f3n, \u00bfqu\u00e9 debe hacer?<\/em><\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em><a href=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/recuperacion-rapida-de-un-ataque-de-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Para obtener m\u00e1s informaci\u00f3n sobre la recuperaci\u00f3n r\u00e1pida de los ataques de ransomware<\/a>, te invitamos a revisar nuestro caso de estudio<\/em><\/strong>.<br>___________________________________________________________________________________________________<br><br><em><strong>iDiscovery Solutions es una firma de consultor\u00eda estrat\u00e9gica, tecnolog\u00eda y servicios expertos<\/strong><\/em> - Proporcionar<em><strong> Soluciones personalizadas de eDiscovery, desde an\u00e1lisis forense digital hasta testimonios de expertos para firmas de abogados y corporaciones en los Estados Unidos y Europa.<\/strong><\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><a href=\"https:\/\/idsinc.com\/es\/contacto\/\" target=\"_blank\" rel=\"noreferrer noopener\">Para hablar con alguien en iDS, HAGA CLIC AQU\u00cd.<\/a><\/strong><\/p>\n\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1021\" data-postid=\"1021\" class=\"themify_builder_content themify_builder_content-1021 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Ransomware has come a long way since its beginning in 1989, and so have the options for recovering from a ransomware attack. One of the the first variants was distributed via diskettes to attendees at a WHO conference. The popularization of the internet inevitably led criminals to find ways to distribute ransomware attacks using email [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":1022,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,34],"tags":[15,14,13],"class_list":["post-1021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-privacy","tag-incident-response-plan","tag-ransomware-attack","tag-ransomware-attack-recovery","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Attack Recovery - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/recuperacion-de-ataques-de-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Attack Recovery\" \/>\n<meta property=\"og:description\" content=\"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/recuperacion-de-ataques-de-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-10T17:18:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T20:53:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Kirtley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Kirtley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\"},\"author\":{\"name\":\"Robert Kirtley\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\"},\"headline\":\"Ransomware Attack Recovery\",\"datePublished\":\"2021-03-10T17:18:14+00:00\",\"dateModified\":\"2026-03-09T20:53:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\"},\"wordCount\":308,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"keywords\":[\"incident response plan\",\"ransomware attack\",\"ransomware attack recovery\"],\"articleSection\":[\"Blog\",\"Privacy + Compliance\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\",\"name\":\"Ransomware Attack Recovery - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"datePublished\":\"2021-03-10T17:18:14+00:00\",\"dateModified\":\"2026-03-09T20:53:11+00:00\",\"description\":\"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/RansomwareAttackRecovery.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Ransomware attack recovery, incident response plan, Ransomware, Ransomware attacks, WHO\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/ransomware-attack-recovery\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Attack Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d7d20eb9b63cf42c3b7f3efcaa76ef9a\",\"name\":\"Robert Kirtley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g\",\"caption\":\"Robert Kirtley\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/author\\\/robert\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Recuperaci\u00f3n de ataques de ransomware - Soluciones iDiscovery","description":"Hay ataques de ransomware a empresas cada 11 segundos. \u00bfSu organizaci\u00f3n tiene un plan de recuperaci\u00f3n de ataques de ransomware?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/recuperacion-de-ataques-de-ransomware\/","og_locale":"es_ES","og_type":"article","og_title":"Ransomware Attack Recovery","og_description":"There are ransomware attacks on businesses every 11 seconds. Does your organization have a ransomware attack recovery plan?","og_url":"https:\/\/idsinc.com\/es\/recuperacion-de-ataques-de-ransomware\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2021-03-10T17:18:14+00:00","article_modified_time":"2026-03-09T20:53:11+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","type":"image\/jpeg"}],"author":"Robert Kirtley","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Robert Kirtley","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/"},"author":{"name":"Robert Kirtley","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a"},"headline":"Ransomware Attack Recovery","datePublished":"2021-03-10T17:18:14+00:00","dateModified":"2026-03-09T20:53:11+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/"},"wordCount":308,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","keywords":["incident response plan","ransomware attack","ransomware attack recovery"],"articleSection":["Blog","Privacy + Compliance"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/ransomware-attack-recovery\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/","url":"https:\/\/idsinc.com\/ransomware-attack-recovery\/","name":"Recuperaci\u00f3n de ataques de ransomware - Soluciones iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","datePublished":"2021-03-10T17:18:14+00:00","dateModified":"2026-03-09T20:53:11+00:00","description":"Hay ataques de ransomware a empresas cada 11 segundos. \u00bfSu organizaci\u00f3n tiene un plan de recuperaci\u00f3n de ataques de ransomware?","breadcrumb":{"@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/ransomware-attack-recovery\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/RansomwareAttackRecovery.jpg","width":2500,"height":1250,"caption":"Ransomware attack recovery, incident response plan, Ransomware, Ransomware attacks, WHO"},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/ransomware-attack-recovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Ransomware Attack Recovery"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d7d20eb9b63cf42c3b7f3efcaa76ef9a","name":"Roberto Kirtley","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb530376e8130b6026aafa153e17c557e2d6fdf3efdff66a980f8ef2150550db?s=96&d=mm&r=g","caption":"Robert Kirtley"},"url":"https:\/\/idsinc.com\/es\/author\/robert\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=1021"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1021\/revisions"}],"predecessor-version":[{"id":9474,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/posts\/1021\/revisions\/9474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/1022"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=1021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/categories?post=1021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/tags?post=1021"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}