{"id":5384,"date":"2020-10-05T11:00:44","date_gmt":"2020-10-05T08:00:44","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=5384"},"modified":"2020-12-06T14:14:21","modified_gmt":"2020-12-06T12:14:21","slug":"5-steps-to-secure-your-connected-devices","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/","title":{"rendered":"5 steps to secure your connected devices"},"content":{"rendered":"\n<p>As we aim to make our lives simpler to manage, especially in this hurried day and age, we increasingly rely on our connected devices. With Internet of Things (IoT) and smart devices becoming cheaper and more accessible to the masses, it\u2019s easier to incorporate them into our lives. Let\u2019s be honest, who hasn\u2019t used their smartphone-based voice assistant to dictate a note or jot down an appointment in their calendar? Or for that matter, made additions to their household in the form of smart devices; smart televisions, for one, are hard to avoid nowadays.<\/p>\n\n\n\n<p>However, the proliferation of all these devices in our everyday lives also poses a security risk, as the gadgets and gizmos, unless secured properly, can be used as new avenues of attack by cybercriminals. So, what steps can you take to ensure the security of your internet-connected devices and mitigate the chances of falling victim to a cyberattack? As&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/10\/01\/national-cyber-security-awareness-month-is-here\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security Awareness Month (CSAM) is upon us<\/a>, we highlight the ways you can protect yourself. After all, the initiative\u2019s key message this year is: \u201cIf you connect it, protect it.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Secure your Wi-Fi router<\/h2>\n\n\n\n<p>Securing your router should the first step you take towards securing your internet connection; after all, it is the gateway to all your connected devices. A common mistake people make once their Wi-Fi router is installed is that they will stick to the default settings. While it is convenient it can pose a huge security risk, therefore you should immediately change both the password used to connect to the router as well as the password used to access its settings. When changing the router\u2019s password choose the WPA2 option (or WPA 3 on newer routers if all your devices can connect to it). And, as with all devices, don\u2019t forget to keep it updated to the latest firmware; while many routers do that automatically, it doesn\u2019t hurt to check every now and then to make sure that everything is up to date. For further advice, you can check out our handy article on&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/01\/23\/five-ways-router-configured-securely\/\" target=\"_blank\" rel=\"noreferrer noopener\">ways to check if your router is configured securely<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Encrypt your web traffic<\/h2>\n\n\n\n<p>While we\u2019re on the topic of securing your connectivity and addressing your router, another way to increase your web security is by encrypting your web traffic. The simplest way that could be achieved is by&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/03\/18\/work-home-how-set-up-vpn\/\" target=\"_blank\" rel=\"noreferrer noopener\">setting up a Virtual Private Network (VPN)<\/a>, which will work as an encrypted tunnel for your internet traffic. Besides shielding data from prying eyes, it can also allow you to securely access data stored on your home network even if you\u2019re a half a world away. It may also prove to be a prudent measure to set up a separate VPN for all your connected smart devices to mitigate the risks of getting hacked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Be smart with your smartphone<\/h2>\n\n\n\n<p>The smartphone is probably the device that most of us use the most. We don\u2019t just use it for calls anymore; it\u2019s used to take photos, store files, receive and send emails \u2013 basically a small computer in the palm of your hand. And since it\u2019s connected to the internet, you have to protect it. Most smartphones can now be protected with an endpoint security solution that can keep most threats at bay. Meanwhile, for added protection, you should also encrypt all the sensitive data on your phone, so you\u2019ll make it harder for cybercriminals to make use of your data even if they worm their way into your device. You can boost the security of your smartphone by applying the tips we listed out in&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/12\/31\/20-tips-2020-be-smarter-your-smartphone\/\" target=\"_blank\" rel=\"noreferrer noopener\">our 20 tips for 2020 article<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Update your devices<\/h2>\n\n\n\n<p>We cannot stress this point enough: update your devices regularly. True enough, with many connected devices it&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/10\/26\/iot-roomful-conundrums\/\" target=\"_blank\" rel=\"noreferrer noopener\">may not be exactly easy, or even possible<\/a>, to put this advice into action. Still, any fixes, security patches, and updates should be applied as soon as they are released either to remedy specific vulnerabilities that, if left unattended, could be exploited by black hats or to boost the security of the devices further. Do not disregard update prompts or hold off on installing a patch if you learn that one is available.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protect your smart TV<\/h2>\n\n\n\n<p>Nowadays finding a TV that doesn\u2019t have smart features embedded is a rare occurrence, and while non-smart TVs still do exist, people miss the utility and convenience of the smart features so much they upgrade them with external streaming devices like a Chromecast or Roku. However, like various other devices,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/08\/02\/smart-tvs-way-attackers-home\/\" target=\"_blank\" rel=\"noreferrer noopener\">smart TVs can be compromised<\/a>&nbsp;and hijacked by cybercriminals as well. Black hats could exploit vulnerabilities to control the TV remotely, or it could be infested by malware. To&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/10\/01\/protecting-your-smart-tv\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect your smart TV<\/a>, you should start by properly configuring it and going through its settings in detail; while you\u2019re at it you should check for any firmware updates as well, and last but not least there are security solutions available that can be downloaded that will boost the security of your device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do your bit!<\/h2>\n\n\n\n<p>With the number of connected devices in most households steadily increasing, we must adapt and adopt better cybersecurity practices as well. While the convenience that smart devices provide is great and makes our lives simpler, we should never forget about the security aspect as well. A tiny crack is all a cyber criminal needs to make a dent in your wallet. So, don\u2019t forget: \u201cIf you connect it, protect it!\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we aim to make our lives simpler to manage, especially in this hurried day and age, we increasingly rely on our connected devices. With Internet of Things (IoT) and smart devices becoming cheaper and more accessible to the masses, it\u2019s easier to incorporate them into our lives. Let\u2019s be honest, who hasn\u2019t used their<\/p>\n","protected":false},"author":5,"featured_media":5385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[141],"tags":[],"class_list":["post-5384","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 steps to secure your connected devices - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 steps to secure your connected devices\" \/>\n<meta property=\"og:description\" content=\"As we aim to make our lives simpler to manage, especially in this hurried day and age, we increasingly rely on our connected devices. With Internet of Things (IoT) and smart devices becoming cheaper and more accessible to the masses, it\u2019s easier to incorporate them into our lives. Let\u2019s be honest, who hasn\u2019t used their\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-05T08:00:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T12:14:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/12\/snart_devices_landscape_no_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1253\" \/>\n\t<meta property=\"og:image:height\" content=\"712\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"5 steps to secure your connected devices\",\"datePublished\":\"2020-10-05T08:00:44+00:00\",\"dateModified\":\"2020-12-06T12:14:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/\"},\"wordCount\":928,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/snart_devices_landscape_no_logo.png\",\"articleSection\":[\"android\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/\",\"name\":\"5 steps to secure your connected devices - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/snart_devices_landscape_no_logo.png\",\"datePublished\":\"2020-10-05T08:00:44+00:00\",\"dateModified\":\"2020-12-06T12:14:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/snart_devices_landscape_no_logo.png\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/snart_devices_landscape_no_logo.png\",\"width\":1253,\"height\":712},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 steps to secure your connected devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/05\\\/5-steps-to-secure-your-connected-devices\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 steps to secure your connected devices - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/","og_locale":"en_US","og_type":"article","og_title":"5 steps to secure your connected devices","og_description":"As we aim to make our lives simpler to manage, especially in this hurried day and age, we increasingly rely on our connected devices. With Internet of Things (IoT) and smart devices becoming cheaper and more accessible to the masses, it\u2019s easier to incorporate them into our lives. Let\u2019s be honest, who hasn\u2019t used their","og_url":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2020-10-05T08:00:44+00:00","article_modified_time":"2020-12-06T12:14:21+00:00","og_image":[{"width":1253,"height":712,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/12\/snart_devices_landscape_no_logo.png","type":"image\/png"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"5 steps to secure your connected devices","datePublished":"2020-10-05T08:00:44+00:00","dateModified":"2020-12-06T12:14:21+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/"},"wordCount":928,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/12\/snart_devices_landscape_no_logo.png","articleSection":["android"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/","url":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/","name":"5 steps to secure your connected devices - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/12\/snart_devices_landscape_no_logo.png","datePublished":"2020-10-05T08:00:44+00:00","dateModified":"2020-12-06T12:14:21+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/12\/snart_devices_landscape_no_logo.png","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/12\/snart_devices_landscape_no_logo.png","width":1253,"height":712},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"5 steps to secure your connected devices"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/05\/5-steps-to-secure-your-connected-devices\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/5384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=5384"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/5384\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/5385"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=5384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=5384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=5384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}