{"id":13142,"date":"2023-03-09T23:12:11","date_gmt":"2023-03-09T23:12:11","guid":{"rendered":"https:\/\/kenos.com.mx\/it-auditing-and-enterprise-security-how-are-they-related\/"},"modified":"2023-03-09T23:12:11","modified_gmt":"2023-03-09T23:12:11","slug":"it-auditing-and-enterprise-security-how-are-they-related","status":"publish","type":"post","link":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/","title":{"rendered":"IT auditing and enterprise security: How are they related?"},"content":{"rendered":"<p>Information Technology (IT) is crucial for the proper functioning of any modern organization. As technologies advance and IT systems become more and more common, information security becomes a priority to ensure the stability and sustainable growth of the company.<\/p>\n<p>It is essential to understand the interconnection between IT auditing and enterprise security, as they are critical components in protecting an organization&#8217;s digital assets. In this article, we will explore how these two areas are intrinsically related and how they can be efficiently implemented to ensure the protection of enterprise data.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Understanding IT auditing and enterprise security:<\/strong><\/h2>\n<p>The IT audit is a process that aims to analyze and evaluate a company&#8217;s information systems from an impartial and objective perspective, providing a risk analysis and recommendations based on best practices and security standards. Enterprise security, on the other hand, addresses the protection of all levels of the organization, from the defense of its infrastructure to employee training. It is a comprehensive strategy that includes the implementation of technologies, policies and practices aligned with the company&#8217;s objectives.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The importance of collaboration between IT audit and enterprise security<\/strong><\/h2>\n<p>IT auditing and enterprise security are two complementary and necessary functions to ensure an optimal level of protection in any organization. The IT audit identifies and quantifies the risks associated with information systems, pointing out areas for improvement and providing recommendations to mitigate potential risks. On the other hand, corporate security is concerned with implementing these suggestions and ensuring that security policies and procedures are in line with the identified risks, as well as providing ongoing training to its staff.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Benefits of IT auditing for enterprise security<\/strong><\/h2>\n<p>By performing an IT audit, you also strengthen enterprise security by providing an understanding of problem areas and possible solutions in real time. Some of the benefits include increased information transparency, reduced errors and stronger internal control. It is also an excellent way to keep abreast of the latest trends and techniques in data protection, as well as to comply with the rules and regulations applicable in each sector.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Role of the IT auditor in enterprise security<\/strong><\/h2>\n<p>The IT auditor is in charge of performing a detailed analysis of the company&#8217;s information systems and identifying potential <a href=\"https:\/\/kenos.com.mx\/2022\/10\/25\/medidas-de-prevencion-para-no-tener-vulnerabilidad-de-ti-en-los-servidores\/\">vulnerabilities<\/a> and risks. In addition, its role is to provide appropriate recommendations to improve safety and regulatory compliance, as well as to monitor and verify that these actions have been properly implemented. In addition, the IT auditor can work in conjunction with other enterprise security professionals to ensure that the company always has a complete and up-to-date view of its systems and associated risks.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Steps to implement an IT audit and improve enterprise security<\/strong><\/h2>\n<p>To start an IT audit, it is necessary to establish a framework based on the regulations and security standards applicable in each sector. Next, it is essential to establish an IT audit checklist, including risk assessment and possible solutions in each area of the company. Then comes the audit itself, which must be carried out by specialized and experienced professionals. Finally, it is necessary to implement the identified improvements, <a href=\"https:\/\/www.dynatrace.com\/news\/blog\/dynatrace-os-services-monitoring-ensures-efficiency-and-security\/\">monitor<\/a> and control their progress and maintain a proactive approach to ensure business security in the future.<\/p>\n<p>&nbsp;<\/p>\n<p>It is crucial to base IT audit and enterprise security strategies on these key principles:<\/p>\n<ul>\n<li>Foster communication and collaboration between the teams responsible for IT audit and enterprise security.<\/li>\n<li>Adopt a proactive approach, prioritizing risk prevention and continuous monitoring of the effectiveness of implemented security measures.<\/li>\n<li>Be aware of the threat landscape and constantly updated on new technologies and emerging risks.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>In conclusion, IT auditing and enterprise security are two critical components for the success and protection of any organization in today&#8217;s environment. By recognizing the essential connection between the two and taking a holistic approach to addressing them, companies can ensure not only the protection of their digital assets, but also regulatory compliance and resilience in the face of growing cyber threats.<\/p>\n<p>Close collaboration between IT audit and enterprise security is essential to stay at the forefront of information systems protection and maintain a high level of trust from customers and business partners. Ultimately, investing in IT auditing and enterprise security can help protect reputation and business continuity over the long term.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Technology (IT) is crucial for the proper functioning of any modern organization. As technologies advance and IT systems become more and more common, information security becomes a priority to ensure the stability and sustainable growth of the company. It is essential to understand the interconnection between IT auditing and enterprise security, as they are [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":12806,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[56],"tags":[65,64],"class_list":["post-13142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-governance-risk-and-compliance","tag-enterprise-security","tag-it-audit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT auditing and enterprise security, how are they related?<\/title>\n<meta name=\"description\" content=\"IT auditing and enterprise security are closely related. Learn about its importance and benefits for your company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT auditing and enterprise security, how are they related?\" \/>\n<meta property=\"og:description\" content=\"IT auditing and enterprise security are closely related. Learn about its importance and benefits for your company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/\" \/>\n<meta property=\"og:site_name\" content=\"Kenos\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-09T23:12:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kenos.com.mx\/wp-content\/uploads\/2023\/03\/Auditoria-de-TI-y-seguridad-empresarial.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fabi\u00e1n Espinosa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabi\u00e1n Espinosa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/\"},\"author\":{\"name\":\"Fabi\u00e1n Espinosa\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#\\\/schema\\\/person\\\/06d779b50d90c31b5fca8092d83b6a39\"},\"headline\":\"IT auditing and enterprise security: How are they related?\",\"datePublished\":\"2023-03-09T23:12:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/\"},\"wordCount\":721,\"publisher\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kenos.com.mx\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Auditoria-de-TI-y-seguridad-empresarial.jpg\",\"keywords\":[\"Enterprise Security\",\"IT Audit\"],\"articleSection\":[\"Governance, Risk and Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/\",\"url\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/\",\"name\":\"IT auditing and enterprise security, how are they related?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kenos.com.mx\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Auditoria-de-TI-y-seguridad-empresarial.jpg\",\"datePublished\":\"2023-03-09T23:12:11+00:00\",\"description\":\"IT auditing and enterprise security are closely related. Learn about its importance and benefits for your company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kenos.com.mx\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Auditoria-de-TI-y-seguridad-empresarial.jpg\",\"contentUrl\":\"https:\\\/\\\/kenos.com.mx\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Auditoria-de-TI-y-seguridad-empresarial.jpg\",\"width\":750,\"height\":467,\"caption\":\"Auditor\u00eda de TI y seguridad empresarial\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/it-auditing-and-enterprise-security-how-are-they-related\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/home-2025\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT auditing and enterprise security: How are they related?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/\",\"name\":\"Kenos\",\"description\":\"Simplificamos la operaci\u00f3n del \u00e1rea de TI con inteligencia operativa\",\"publisher\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#organization\",\"name\":\"Kenos\",\"url\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/kenos.com.mx\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-Logo-Kenos-0.png\",\"contentUrl\":\"https:\\\/\\\/kenos.com.mx\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-Logo-Kenos-0.png\",\"width\":537,\"height\":571,\"caption\":\"Kenos\"},\"image\":{\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/#\\\/schema\\\/person\\\/06d779b50d90c31b5fca8092d83b6a39\",\"name\":\"Fabi\u00e1n Espinosa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g\",\"caption\":\"Fabi\u00e1n Espinosa\"},\"url\":\"https:\\\/\\\/kenos.com.mx\\\/en\\\/author\\\/admin-yu37y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT auditing and enterprise security, how are they related?","description":"IT auditing and enterprise security are closely related. Learn about its importance and benefits for your company.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/","og_locale":"en_US","og_type":"article","og_title":"IT auditing and enterprise security, how are they related?","og_description":"IT auditing and enterprise security are closely related. Learn about its importance and benefits for your company.","og_url":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/","og_site_name":"Kenos","article_published_time":"2023-03-09T23:12:11+00:00","og_image":[{"width":750,"height":467,"url":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2023\/03\/Auditoria-de-TI-y-seguridad-empresarial.jpg","type":"image\/jpeg"}],"author":"Fabi\u00e1n Espinosa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fabi\u00e1n Espinosa","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#article","isPartOf":{"@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/"},"author":{"name":"Fabi\u00e1n Espinosa","@id":"https:\/\/kenos.com.mx\/en\/#\/schema\/person\/06d779b50d90c31b5fca8092d83b6a39"},"headline":"IT auditing and enterprise security: How are they related?","datePublished":"2023-03-09T23:12:11+00:00","mainEntityOfPage":{"@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/"},"wordCount":721,"publisher":{"@id":"https:\/\/kenos.com.mx\/en\/#organization"},"image":{"@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#primaryimage"},"thumbnailUrl":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2023\/03\/Auditoria-de-TI-y-seguridad-empresarial.jpg","keywords":["Enterprise Security","IT Audit"],"articleSection":["Governance, Risk and Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/","url":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/","name":"IT auditing and enterprise security, how are they related?","isPartOf":{"@id":"https:\/\/kenos.com.mx\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#primaryimage"},"image":{"@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#primaryimage"},"thumbnailUrl":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2023\/03\/Auditoria-de-TI-y-seguridad-empresarial.jpg","datePublished":"2023-03-09T23:12:11+00:00","description":"IT auditing and enterprise security are closely related. Learn about its importance and benefits for your company.","breadcrumb":{"@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#primaryimage","url":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2023\/03\/Auditoria-de-TI-y-seguridad-empresarial.jpg","contentUrl":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2023\/03\/Auditoria-de-TI-y-seguridad-empresarial.jpg","width":750,"height":467,"caption":"Auditor\u00eda de TI y seguridad empresarial"},{"@type":"BreadcrumbList","@id":"https:\/\/kenos.com.mx\/en\/it-auditing-and-enterprise-security-how-are-they-related\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/kenos.com.mx\/en\/home-2025\/"},{"@type":"ListItem","position":2,"name":"IT auditing and enterprise security: How are they related?"}]},{"@type":"WebSite","@id":"https:\/\/kenos.com.mx\/en\/#website","url":"https:\/\/kenos.com.mx\/en\/","name":"Kenos","description":"Simplificamos la operaci\u00f3n del \u00e1rea de TI con inteligencia operativa","publisher":{"@id":"https:\/\/kenos.com.mx\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kenos.com.mx\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kenos.com.mx\/en\/#organization","name":"Kenos","url":"https:\/\/kenos.com.mx\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kenos.com.mx\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2026\/02\/cropped-Logo-Kenos-0.png","contentUrl":"https:\/\/kenos.com.mx\/wp-content\/uploads\/2026\/02\/cropped-Logo-Kenos-0.png","width":537,"height":571,"caption":"Kenos"},"image":{"@id":"https:\/\/kenos.com.mx\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kenos.com.mx\/en\/#\/schema\/person\/06d779b50d90c31b5fca8092d83b6a39","name":"Fabi\u00e1n Espinosa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c79af5485250c66fb310075028853545643c9f3dbe1eebc7ffcc6118071b038?s=96&d=mm&r=g","caption":"Fabi\u00e1n Espinosa"},"url":"https:\/\/kenos.com.mx\/en\/author\/admin-yu37y\/"}]}},"_links":{"self":[{"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/posts\/13142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/comments?post=13142"}],"version-history":[{"count":0,"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/posts\/13142\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/media\/12806"}],"wp:attachment":[{"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/media?parent=13142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/categories?post=13142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kenos.com.mx\/en\/wp-json\/wp\/v2\/tags?post=13142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}