{"id":24868,"date":"2025-03-27T14:16:12","date_gmt":"2025-03-27T13:16:12","guid":{"rendered":"https:\/\/stage2.convotis.com\/es\/?p=24868"},"modified":"2025-08-12T09:40:56","modified_gmt":"2025-08-12T07:40:56","slug":"security-awareness-what-companies-should-look-for-in-their-employees","status":"publish","type":"post","link":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/","title":{"rendered":"Security Awareness: What Companies Should Look for in Their Employees"},"content":{"rendered":"<p>Imagine this: An employee receives an email that appears to come from their manager \u2013 with a link that looks completely harmless. One click is enough \u2013 and a serious security incident is already underway. What starts as routine communication can quickly become the gateway for phishing, malware, or social engineering attacks.<\/p>\n<p>In today\u2019s working world \u2013 shaped by hybrid models, BYOD (Bring Your Own Device), and cloud-based solutions \u2013 it&#8217;s no longer just technical vulnerabilities that cybercriminals exploit. More often, it\u2019s human behavior that opens the door.<\/p>\n<p>While companies invest heavily in firewalls, intrusion detection systems, and endpoint protection, one significant risk factor often remains underestimated: the human element. It&#8217;s rarely a matter of unwillingness to follow security policies \u2013 more often, employees lack continuous, practical knowledge and an understanding of current threat scenarios. No matter how sophisticated the IT infrastructure is \u2013 if employees don&#8217;t know what to watch for, it remains vulnerable.<\/p>\n<p>This is exactly where modern security awareness comes in. It\u2019s not an isolated training initiative, but a key component of a holistic cybersecurity strategy. The goal is to create a deep understanding of IT risks \u2013 where attacks most frequently begin: with people.<\/p>\n<h2><strong>Human Risk Factor: Weak Spot or Security Asset?<\/strong><\/h2>\n<p>Despite mature technologies such as SIEM (Security Information and Event Management), Zero Trust architectures, and multi-factor authentication, attacks continue to succeed \u2013 because they exploit human behavior. Attackers rely on psychological manipulation techniques like CEO fraud or spear phishing. These don\u2019t require technical exploits \u2013 they target employee actions directly.<\/p>\n<p><a href=\"https:\/\/resources.aithority.com\/whitepapers\/LP-SM-iTech-Series-Gartner_SEAK-1.pdf\">According to a Gartner study<\/a>, up to 82% of data breaches are caused by unsafe or unintentional employee behavior. Particularly alarming: 69% of employees admit to knowingly bypassing security policies \u2013 even though 63% acknowledge that their actions pose a risk to the company.<\/p>\n<p>This makes one thing clear: To protect your organization effectively, the human factor must take center stage. That doesn\u2019t just mean \u201cmore training\u201d \u2013 it means a fundamental shift in how security is understood. Away from control \u2013 and toward empowerment.<\/p>\n<h2><strong>Security Awareness Trainings: More Than Just IT Courses<\/strong><\/h2>\n<p>An effective awareness program goes far beyond teaching rules. It builds a mindset around IT security that is embedded in the daily work environment \u2013 from recognizing suspicious emails to safely using mobile devices or collaboration tools like Microsoft Teams or Slack.<\/p>\n<p>Studies show that IT security training not only reduces the risk of attacks but also has a positive impact on corporate culture. <a href=\"https:\/\/resources.aithority.com\/whitepapers\/LP-SM-iTech-Series-Gartner_SEAK-1.pdf\">According to Gartner data<\/a>, there is a great need for action: 65% of employees occasionally or frequently open emails, links or attachments from unknown senders on their work device. 63% save their passwords directly in the browser &#8211; often without approval from the company. A well-thought-out awareness program can make a decisive contribution to minimizing risky behavior and promoting a culture of shared security responsibility. A well-designed awareness program can significantly reduce risky behavior and help establish a culture of shared security responsibility.<\/p>\n<p>What doesn\u2019t work: sending out an annual PDF with security tips or running trainings \u201con the side.\u201d Such one-off actions are ineffective \u2013 especially in complex IT environments with remote access, cloud services, and highly decentralized teams.<\/p>\n<h2><strong>What Works: Modern Formats, Targeted Messaging<\/strong><\/h2>\n<p>To foster lasting security behavior, awareness initiatives must be clear, relevant, and repeatable. Key success factors include:<\/p>\n<ul>\n<li><strong>Customization over one-size-fits-all<\/strong>: Different roles and departments require tailored content. For instance, the IT team should be sensitized to system access attacks, while management needs to be prepared for CEO fraud and compliance risks.<\/li>\n<li><strong>Consistency over one-time efforts<\/strong>: Cyber threats are constantly evolving. Trainings must be updated regularly and delivered multiple times per year \u2013 ideally via a learning platform with built-in feedback mechanisms.<\/li>\n<li><strong>Interactive formats over static content<\/strong>: Formats such as phishing simulations, microlearning modules, video trainings, or gamification increase engagement and retention. An interactive quiz after a module is more effective than a PowerPoint deck.<\/li>\n<li><strong>Motivation over obligation<\/strong>: Security awareness can\u2019t be imposed \u2013 it must grow organically. This includes respectful communication and involving employees as active contributors to the security culture.<\/li>\n<li><strong>Measurable outcomes over assumptions<\/strong>: Only by regularly measuring knowledge retention can training be continuously improved.<\/li>\n<\/ul>\n<h2><strong>How CONVOTIS Supports Companies<\/strong><\/h2>\n<p>With short, practical video trainings, CONVOTIS helps companies strengthen their employees\u2019 security awareness over the long term. Each module is designed to last no more than twelve minutes and can easily be integrated into daily routines \u2013 whether in the office, remotely, or on mobile devices.<\/p>\n<p>The training content is based on up-to-date threat scenarios and is continuously updated \u2013 covering topics like business email compromise, ransomware, or deepfake scams.<\/p>\n<p>The aim is to empower employees to recognize risks early and respond appropriately in critical moments \u2013 whether it&#8217;s a suspicious file in Microsoft SharePoint, an unusual login attempt, or a spoofed sender address.<\/p>\n<p>Thanks to regular repetition and a modular structure, a continuous learning curve is established \u2013 gradually embedding security awareness into the corporate culture. From individuals to entire teams, this creates digital resilience across the organization.<\/p>\n<h2><strong>Security Starts with Awareness<\/strong><\/h2>\n<p>You can implement the best firewall, adopt zero trust principles, and keep every system up to date \u2013 but in the end, it&#8217;s people who make the difference. Not out of ignorance, but because many everyday security decisions are made under time pressure and without full context.<\/p>\n<p>That\u2019s why security awareness is foundational. It belongs where attackers most often strike: in meetings, inboxes, or phone calls. And it belongs at every level of the organization \u2013 not just in IT, but also in finance, administration, and executive leadership.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine this: An employee receives an email that appears to come from their manager \u2013 with a link that looks completely harmless. One click is enough \u2013 and a serious security incident is already underway. What starts as routine communication can quickly become the gateway for phishing, malware, or social engineering attacks. In today\u2019s working [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":28854,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[591],"tags":[],"class_list":["post-24868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Awareness \u2013 Effective Protection Against Cyber Attacks<\/title>\n<meta name=\"description\" content=\"Enhance your company&#039;s IT security with targeted employee security awareness training. Learn to identify and prevent cyber threats early\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Awareness \u2013 Effective Protection Against Cyber Attacks\" \/>\n<meta property=\"og:description\" content=\"Enhance your company&#039;s IT security with targeted employee security awareness training. Learn to identify and prevent cyber threats early\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/\" \/>\n<meta property=\"og:site_name\" content=\"CONVOTIS Iberia\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T13:16:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T07:40:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1090\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"elianamoldovanska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"elianamoldovanska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/\"},\"author\":{\"name\":\"elianamoldovanska\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/person\\\/43069367f8f43b4689f544f0d1e798af\"},\"headline\":\"Security Awareness: What Companies Should Look for in Their Employees\",\"datePublished\":\"2025-03-27T13:16:12+00:00\",\"dateModified\":\"2025-08-12T07:40:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/\"},\"wordCount\":926,\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"articleSection\":[\"Security Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/\",\"name\":\"Security Awareness \u2013 Effective Protection Against Cyber Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"datePublished\":\"2025-03-27T13:16:12+00:00\",\"dateModified\":\"2025-08-12T07:40:56+00:00\",\"description\":\"Enhance your company's IT security with targeted employee security awareness training. Learn to identify and prevent cyber threats early\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/security-awareness-what-companies-should-look-for-in-their-employees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/03\\\/Security-Awareness.png\",\"width\":1090,\"height\":670,\"caption\":\"Security Operations environment with monitoring dashboards and analysts \u2013 representing real-time threat detection, incident response, and continuous protection in enterprise IT.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"name\":\"CONVOTIS\",\"description\":\"For Europe&#039;s digital future.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\",\"name\":\"CONVOTIS\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"width\":2560,\"height\":411,\"caption\":\"CONVOTIS\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/convotis-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/person\\\/43069367f8f43b4689f544f0d1e798af\",\"name\":\"elianamoldovanska\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"caption\":\"elianamoldovanska\"},\"sameAs\":[\"https:\\\/\\\/www.convotis.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Awareness \u2013 Effective Protection Against Cyber Attacks","description":"Enhance your company's IT security with targeted employee security awareness training. Learn to identify and prevent cyber threats early","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/","og_locale":"en_US","og_type":"article","og_title":"Security Awareness \u2013 Effective Protection Against Cyber Attacks","og_description":"Enhance your company's IT security with targeted employee security awareness training. Learn to identify and prevent cyber threats early","og_url":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/","og_site_name":"CONVOTIS Iberia","article_published_time":"2025-03-27T13:16:12+00:00","article_modified_time":"2025-08-12T07:40:56+00:00","og_image":[{"width":1090,"height":670,"url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","type":"image\/png"}],"author":"elianamoldovanska","twitter_card":"summary_large_image","twitter_misc":{"Written by":"elianamoldovanska","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/#article","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/"},"author":{"name":"elianamoldovanska","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af"},"headline":"Security Awareness: What Companies Should Look for in Their Employees","datePublished":"2025-03-27T13:16:12+00:00","dateModified":"2025-08-12T07:40:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/"},"wordCount":926,"publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","articleSection":["Security Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/","url":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/","name":"Security Awareness \u2013 Effective Protection Against Cyber Attacks","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/#primaryimage"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","datePublished":"2025-03-27T13:16:12+00:00","dateModified":"2025-08-12T07:40:56+00:00","description":"Enhance your company's IT security with targeted employee security awareness training. Learn to identify and prevent cyber threats early","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/en\/news\/security-awareness-what-companies-should-look-for-in-their-employees\/#primaryimage","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/03\/Security-Awareness.png","width":1090,"height":670,"caption":"Security Operations environment with monitoring dashboards and analysts \u2013 representing real-time threat detection, incident response, and continuous protection in enterprise IT."},{"@type":"WebSite","@id":"https:\/\/www.convotis.com\/es\/#website","url":"https:\/\/www.convotis.com\/es\/","name":"CONVOTIS","description":"For Europe&#039;s digital future.","publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convotis.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.convotis.com\/es\/#organization","name":"CONVOTIS","url":"https:\/\/www.convotis.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","width":2560,"height":411,"caption":"CONVOTIS"},"image":{"@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/convotis-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af","name":"elianamoldovanska","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","caption":"elianamoldovanska"},"sameAs":["https:\/\/www.convotis.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/24868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/comments?post=24868"}],"version-history":[{"count":7,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/24868\/revisions"}],"predecessor-version":[{"id":42979,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/24868\/revisions\/42979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media\/28854"}],"wp:attachment":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media?parent=24868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/categories?post=24868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/tags?post=24868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}