{"id":29279,"date":"2022-06-20T16:51:13","date_gmt":"2022-06-20T14:51:13","guid":{"rendered":"https:\/\/www.tecsens.com\/3-2-1-1-0-baas-policy\/"},"modified":"2022-06-20T16:51:19","modified_gmt":"2022-06-20T14:51:19","slug":"3-2-1-1-0-baas-policy","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/","title":{"rendered":"3-2-1-1-0 BaaS Policy"},"content":{"rendered":"\n<p>The 3-2-1 rule has been indispensable for backup solutions, which assesses the risk of data exposure and availability. With the current trend of cloud storage and the increase in cyber threats, it is essential to have a rule capable of assessing vulnerabilities. The 3-2-1 policy is an extended policy in the market as a reference basis for following best practices in the implementation of backup solutions. Veeam our BaaS solution provider has gone a step further by expanding, adding additional changes, the 1-0. Below we will explain this extension from the 3-2-1 policy to the<strong> 3-2-1-1-0 BaaS policy.<\/strong><\/p>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>What is the 3-2-1 rule?<\/strong><\/h2>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Let&#8217;s remember what the<strong> 3-2-1 backup strategy consists of<\/strong><\/p>\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>3.<\/strong> <strong>Three copies of data<\/strong>. The more backups we get, the lower the likelihood of information loss.<\/p>\n\n<p><strong>2. Store two backups<\/strong> on different media, thus minimizing the risk of theft or loss.<\/p>\n\n<p><strong>1. Keep a backup offside<\/strong>, outside the enterprise realm.<\/p>\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>What is the difference with the 3-2-1-1-0 BaaS policy?<\/strong><\/h2>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>The difference between these two rules<strong> is 1 and 0 at the end<\/strong>. It is a version extended by Veeam of the already implemented 3-2-1 rule, which offers greater security. It could be defined as a &#8220;best practice&#8221; or user guide or definition.<\/p>\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/politica-3-2-1-1-0post_Mesa-de-trabajo-1.jpg\" alt=\"policy 3-2-1-1-0\" class=\"wp-image-29053\" width=\"669\" height=\"342\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/politica-3-2-1-1-0post_Mesa-de-trabajo-1.jpg 669w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/politica-3-2-1-1-0post_Mesa-de-trabajo-1-480x245.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 669px, 100vw\" \/><\/figure>\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.tecsens.com\/en\/enterprise-cloud-services\/cloud-backup\/\" style=\"background-color:#0076b2\" target=\"_blank\" rel=\"noreferrer noopener\">More about backup<\/a><\/div>\n<\/div>\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>What do these two numbers consist of?<\/strong><\/p>\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>1.In<\/strong> addition to a copy outside the business environment, <strong>you must have an offline copy<\/strong>, or out of network.<\/p>\n\n<p><strong>0.<\/strong> <strong>You must not have any errors<\/strong> when verifying backup recovery.<\/p>\n\n<p>These two new implementations are vital today. Having an offline or isolated backup helps ensure data recovery in the event of a ransomware attack. In addition, making sure you get 0 failures or errors when restoring the backup offers great confidence.<\/p>\n\n<p>Now more than ever, it is essential to have secure and simple data recovery backup solutions that comply with this 3-2-1-1-0 policy.<\/p>\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Now more than ever it is necessary to have all the data of your company under control. Make sure you do it in the best possible way<\/strong>.<\/h3>\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.tecsens.com\/en\/contact-2\/\" style=\"border-radius:48px;background-color:#0076b2\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us at<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The 3-2-1 rule has been indispensable for backup solutions, which assesses the risk of data exposure and availability. With the current trend of cloud storage and the increase in cyber threats, it is essential to have a rule capable of assessing vulnerabilities. The 3-2-1 policy is an extended policy in the market as a reference [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":29057,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[500,503,504,3],"tags":[162,113,138,392,180,382],"class_list":["post-29279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-en","category-consulting-en","category-it-security","category-networks-en","tag-backup-en","tag-cloud-en","tag-consultoria-en","tag-cybersecurity","tag-network-en","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3-2-1-1-0 BaaS Policy - Tecsens -<\/title>\n<meta name=\"description\" content=\"The 3-2-1 policy is a baseline policy in backup solutions. Veeam has gone a step further by implementing it with the 1-0.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3-2-1-1-0 BaaS Policy - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"The 3-2-1 policy is a baseline policy in backup solutions. Veeam has gone a step further by implementing it with the 1-0.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T14:51:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T14:51:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\"},\"headline\":\"3-2-1-1-0 BaaS Policy\",\"datePublished\":\"2022-06-20T14:51:13+00:00\",\"dateModified\":\"2022-06-20T14:51:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\"},\"wordCount\":352,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg\",\"keywords\":[\"backup\",\"Cloud\",\"Consultancy\",\"Cybersecurity\",\"network\",\"Security\"],\"articleSection\":[\"Cloud\",\"Consulting\",\"IT Security\",\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\",\"name\":\"3-2-1-1-0 BaaS Policy - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg\",\"datePublished\":\"2022-06-20T14:51:13+00:00\",\"dateModified\":\"2022-06-20T14:51:19+00:00\",\"description\":\"The 3-2-1 policy is a baseline policy in backup solutions. Veeam has gone a step further by implementing it with the 1-0.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"Policy 3-2-1-1-0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3-2-1-1-0 BaaS Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"caption\":\"Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3-2-1-1-0 BaaS Policy - Tecsens -","description":"The 3-2-1 policy is a baseline policy in backup solutions. Veeam has gone a step further by implementing it with the 1-0.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/","og_locale":"en_US","og_type":"article","og_title":"3-2-1-1-0 BaaS Policy - Tecsens -","og_description":"The 3-2-1 policy is a baseline policy in backup solutions. Veeam has gone a step further by implementing it with the 1-0.","og_url":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/","og_site_name":"Tecsens","article_published_time":"2022-06-20T14:51:13+00:00","article_modified_time":"2022-06-20T14:51:19+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/"},"author":{"name":"Admin","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859"},"headline":"3-2-1-1-0 BaaS Policy","datePublished":"2022-06-20T14:51:13+00:00","dateModified":"2022-06-20T14:51:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/"},"wordCount":352,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg","keywords":["backup","Cloud","Consultancy","Cybersecurity","network","Security"],"articleSection":["Cloud","Consulting","IT Security","Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/","url":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/","name":"3-2-1-1-0 BaaS Policy - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg","datePublished":"2022-06-20T14:51:13+00:00","dateModified":"2022-06-20T14:51:19+00:00","description":"The 3-2-1 policy is a baseline policy in backup solutions. Veeam has gone a step further by implementing it with the 1-0.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/06\/TECSENS_Politica_3-2-1-1-0_-40.jpg","width":2560,"height":1442,"caption":"Policy 3-2-1-1-0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/3-2-1-1-0-baas-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"3-2-1-1-0 BaaS Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","caption":"Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/29279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=29279"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/29279\/revisions"}],"predecessor-version":[{"id":29280,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/29279\/revisions\/29280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/29057"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=29279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=29279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=29279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}