{"id":533,"date":"2025-11-19T22:49:52","date_gmt":"2025-11-19T22:49:52","guid":{"rendered":"https:\/\/telesma.mx\/?page_id=533"},"modified":"2025-11-19T23:07:49","modified_gmt":"2025-11-19T23:07:49","slug":"gestion-y-monitoreo","status":"publish","type":"page","link":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/","title":{"rendered":"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"533\" class=\"elementor elementor-533\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ff8bbaf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ff8bbaf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f0c8acf\" data-id=\"7f0c8acf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46f9335e elementor-widget elementor-widget-text-editor\" data-id=\"46f9335e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- wp:image {\"id\":535,\"width\":\"560px\",\"height\":\"auto\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} -->\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"800\" src=\"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg\" alt=\"\" class=\"wp-image-535\" style=\"width:560px;height:auto\" srcset=\"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg 533w, https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3-200x300.jpeg 200w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph -->\n<p><strong>Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>En un entorno donde la continuidad operativa y la ciberseguridad son esenciales, <strong>Telesma<\/strong> ofrece un servicio integral de <strong>gesti\u00f3n y monitoreo 24\/7<\/strong> que garantiza el funcionamiento \u00f3ptimo de tus servidores, la protecci\u00f3n de tu infraestructura y la disponibilidad de tu red.<br>Nos convertimos en la extensi\u00f3n de tu equipo de TI, brindando visibilidad total, respuesta inmediata y operaci\u00f3n sin riesgos.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Beneficios:<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Monitoreo continuo 24\/7 desde nuestro Centro de Ciberseguridad Telesma.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Administraci\u00f3n total de servidores f\u00edsicos o virtuales.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Gesti\u00f3n de redes y dispositivos cr\u00edticos con alertas proactivas.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Reducci\u00f3n de riesgos operativos y de seguridad.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Tiempos de respuesta r\u00e1pidos y personal especializado.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Gobierno de TI alineado a est\u00e1ndares internacionales (ITIL \/ ISO27001).<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Optimiza tu infraestructura con el monitoreo inteligente de Telesma.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:details -->\n<details class=\"wp-block-details\"><summary>Nuestros expertoss supervisan en tiempo real la salud de tus servidores, redes y dispositivos cr\u00edticos, detectando incidentes antes de que afecten tu operaci\u00f3n. Incluye paneles de visibilidad, correlaci\u00f3n de eventos y alertas inteligentes.<\/summary><!-- wp:paragraph {\"placeholder\":\"Teclea \/ para a\u00f1adir un bloque oculto\"} -->\n<p>Supervisamos firewalls, switches, routers, balanceadores y enlaces para asegurar una comunicaci\u00f3n estable y segura.<br>Las alertas se generan autom\u00e1ticamente ante anomal\u00edas de tr\u00e1fico, latencia, ca\u00eddas o amenazas.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"placeholder\":\"Teclea \/ para a\u00f1adir un bloque oculto\"} -->\n<p><\/p>\n<!-- \/wp:paragraph --><\/details>\n<!-- \/wp:details -->\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3277e83 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3277e83\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-fb93af3\" data-id=\"fb93af3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dfaee0a elementor-widget elementor-widget-text-editor\" data-id=\"dfaee0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Reducci\u00f3n de riesgos operativos y de seguridad<\/strong><\/p>\n<p>\u00a0<\/p>\n<p data-start=\"1746\" data-end=\"1835\">Gracias al monitoreo continuo, la gesti\u00f3n experta y la respuesta oportuna, minimizamos:<\/p>\n<ul data-start=\"1836\" data-end=\"1942\">\n<li data-start=\"1836\" data-end=\"1865\">\n<p data-start=\"1838\" data-end=\"1865\">Fallas de infraestructura<\/p>\n<\/li>\n<li data-start=\"1866\" data-end=\"1890\">\n<p data-start=\"1868\" data-end=\"1890\">Brechas de seguridad<\/p>\n<\/li>\n<li data-start=\"1891\" data-end=\"1911\">\n<p data-start=\"1893\" data-end=\"1911\">P\u00e9rdida de datos<\/p>\n<\/li>\n<li data-start=\"1912\" data-end=\"1942\">\n<p data-start=\"1914\" data-end=\"1942\">Interrupciones de servicio<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1944\" data-end=\"2006\">Tu infraestructura se mantiene estable, segura y bajo control.<\/p>\n<hr data-start=\"2008\" data-end=\"2011\" \/>\n<h3 data-start=\"2013\" data-end=\"2076\">\u00a0<\/h3>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8df3da8\" data-id=\"8df3da8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-967a849 elementor-widget elementor-widget-text-editor\" data-id=\"967a849\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 data-start=\"2013\" data-end=\"2076\"><strong data-start=\"2017\" data-end=\"2076\">Tiempos de respuesta r\u00e1pidos y personal especializado<\/strong><\/h3>\n<p>\u00a0<\/p>\n<p data-start=\"2077\" data-end=\"2249\">Nuestros servicios operan con SLA estrictos y con un equipo certificado en ciberseguridad, infraestructura, redes y sistemas operativos.<br data-start=\"2213\" data-end=\"2216\" \/>Actuamos en minutos, no en horas.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-042b4ae\" data-id=\"042b4ae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec67194 elementor-widget elementor-widget-text-editor\" data-id=\"ec67194\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Dosis; font-style: normal;\" data-start=\"2256\" data-end=\"2337\"><span style=\"font-size: 18px; font-weight: 600;\" data-start=\"2260\" data-end=\"2337\">Gobierno de TI alineado a est\u00e1ndares internacionales (ITIL \/ ISO 27001)<\/span><\/h3>\n<p style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Dosis; font-size: 15px; font-style: normal; font-weight: 400;\" data-start=\"2338\" data-end=\"2450\">Los procesos y controles operativos se ejecutan bajo marcos globales de calidad y seguridad, lo que garantiza:<\/p>\n<p style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Dosis; font-size: 15px; font-style: normal; font-weight: 400;\">\u00a0<\/p>\n<ul style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Dosis; font-size: 15px; font-style: normal; font-weight: 400;\" data-start=\"2451\" data-end=\"2572\">\n<li style=\"font-size: 15px;\" data-start=\"2451\" data-end=\"2475\">\n<p style=\"font-size: 15px;\" data-start=\"2453\" data-end=\"2475\">Atenci\u00f3n consistente<\/p>\n<\/li>\n<li style=\"font-size: 15px;\" data-start=\"2476\" data-end=\"2498\">\n<p style=\"font-size: 15px;\" data-start=\"2478\" data-end=\"2498\">Trazabilidad total<\/p>\n<\/li>\n<li style=\"font-size: 15px;\" data-start=\"2499\" data-end=\"2545\">\n<p style=\"font-size: 15px;\" data-start=\"2501\" data-end=\"2545\">Gesti\u00f3n de incidentes y cambios controlada<\/p>\n<\/li>\n<li style=\"font-size: 15px;\" data-start=\"2546\" data-end=\"2572\">\n<p style=\"font-size: 15px;\" data-start=\"2548\" data-end=\"2572\">Cumplimiento regulatorio<\/p>\n<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-509720c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"509720c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-680cc00\" data-id=\"680cc00\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9074935 elementor-widget elementor-widget-spacer\" data-id=\"9074935\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes En un entorno donde la continuidad operativa y la ciberseguridad son esenciales, Telesma ofrece un servicio integral de gesti\u00f3n y monitoreo 24\/7 que garantiza el funcionamiento \u00f3ptimo de tus servidores, la protecci\u00f3n de tu infraestructura y la disponibilidad de tu red.Nos convertimos en la extensi\u00f3n de tu [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-533","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes - Telesma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes - Telesma\" \/>\n<meta property=\"og:description\" content=\"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes En un entorno donde la continuidad operativa y la ciberseguridad son esenciales, Telesma ofrece un servicio integral de gesti\u00f3n y monitoreo 24\/7 que garantiza el funcionamiento \u00f3ptimo de tus servidores, la protecci\u00f3n de tu infraestructura y la disponibilidad de tu red.Nos convertimos en la extensi\u00f3n de tu [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/\" \/>\n<meta property=\"og:site_name\" content=\"Telesma\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T23:07:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/telesma.mx\/#website\",\"url\":\"https:\/\/telesma.mx\/\",\"name\":\"Telesma\",\"description\":\"Information Risk Management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/telesma.mx\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg\",\"contentUrl\":\"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg\",\"width\":533,\"height\":800},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#webpage\",\"url\":\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/\",\"name\":\"Gesti\\u00f3n y Monitoreo \\u2013 Servidores, Seguridad y Redes - Telesma\",\"isPartOf\":{\"@id\":\"https:\/\/telesma.mx\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#primaryimage\"},\"datePublished\":\"2025-11-19T22:49:52+00:00\",\"dateModified\":\"2025-11-19T23:07:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/telesma.mx\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gesti\\u00f3n y Monitoreo \\u2013 Servidores, Seguridad y Redes\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes - Telesma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/","og_locale":"es_ES","og_type":"article","og_title":"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes - Telesma","og_description":"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes En un entorno donde la continuidad operativa y la ciberseguridad son esenciales, Telesma ofrece un servicio integral de gesti\u00f3n y monitoreo 24\/7 que garantiza el funcionamiento \u00f3ptimo de tus servidores, la protecci\u00f3n de tu infraestructura y la disponibilidad de tu red.Nos convertimos en la extensi\u00f3n de tu [&hellip;]","og_url":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/","og_site_name":"Telesma","article_modified_time":"2025-11-19T23:07:49+00:00","og_image":[{"url":"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/telesma.mx\/#website","url":"https:\/\/telesma.mx\/","name":"Telesma","description":"Information Risk Management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telesma.mx\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#primaryimage","inLanguage":"es","url":"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg","contentUrl":"https:\/\/telesma.mx\/wp-content\/uploads\/2025\/11\/Unknown-3.jpeg","width":533,"height":800},{"@type":"WebPage","@id":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#webpage","url":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/","name":"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes - Telesma","isPartOf":{"@id":"https:\/\/telesma.mx\/#website"},"primaryImageOfPage":{"@id":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#primaryimage"},"datePublished":"2025-11-19T22:49:52+00:00","dateModified":"2025-11-19T23:07:49+00:00","breadcrumb":{"@id":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telesma.mx\/index.php\/gestion-y-monitoreo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/telesma.mx\/"},{"@type":"ListItem","position":2,"name":"Gesti\u00f3n y Monitoreo \u2013 Servidores, Seguridad y Redes"}]}]}},"_links":{"self":[{"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/pages\/533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/comments?post=533"}],"version-history":[{"count":8,"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/pages\/533\/revisions"}],"predecessor-version":[{"id":543,"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/pages\/533\/revisions\/543"}],"wp:attachment":[{"href":"https:\/\/telesma.mx\/index.php\/wp-json\/wp\/v2\/media?parent=533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}