{"id":5104,"date":"2017-09-25T17:41:26","date_gmt":"2017-09-25T12:11:26","guid":{"rendered":"https:\/\/www.konstantinfo.com\/blog\/?p=5104"},"modified":"2017-09-25T17:41:45","modified_gmt":"2017-09-25T12:11:45","slug":"enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017","status":"publish","type":"post","link":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/","title":{"rendered":"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017"},"content":{"rendered":"<p>Mobile devices have become an integral part of our lives. The use of mobile devices extends to satisfying our entertainment desires, communication needs and now professional woes. The devices are everywhere and the level of convenience they add is absolutely tremendous.<\/p>\n<p>The work load has been reduced considerably with the advent of mobile devices and with the growing trend of Bring Your Own Device (BYOD) to work. By doing so, employees can quickly access and answer work emails, schedule meets, check to-do lists and achieve targets on the go.<\/p>\n<p>According to Business Insider, <strong>72%<\/strong> of the US workforce will use mobile devices at work by 2021. Till 2016, it was<strong> 65%<\/strong>.<\/p>\n<p>Enterprise app development companies have assisted businesses in incorporating modern ways of operations and improving employee satisfaction. And have also managed to increase the enterprise security vulnerabilities. These vulnerabilities in the devices invite hackers to take advantage of and get away with sensitive information for their vested interest.<\/p>\n<p>Most threats are identified as malware programs that travel from one device to another or directly make way through the Internet to the device. Last year in March, a report stated the leak of more than <strong>1.5 million<\/strong> enterprise customers\u2019 data of Verizon.<\/p>\n<p>Recently, news related to Judy malware came up, which attacked approximately 36 Mn Android devices. So, along with the convenience, the use of mobile devices opens the door for security vulnerabilities. Therefore, to help <a href=\"https:\/\/www.konstantinfo.com\/enterprise-app-development\" target=\"_blank\">top enterprise app development companies<\/a> and business owners, we have listed some serious enterprise mobile security threats that require mitigation.<\/p>\n<h2>1. Authentication flaws<\/h2>\n<p>How often have you heard of a mobile app getting booked for compromising data to a malware? Enterprise apps store a lot of personal as well as confidential data. Whenever a user tries to login the system, the applied procedure asks for several permissions that the user grants straight away. Now, if the app is infected, the malware does its work during the permission phase and steal away all the important company data.<\/p>\n<p>It is necessary to analyze the permissions and grant them only when you believe they are required for your app usage.<\/p>\n<h2>2. Unguarded data storage<\/h2>\n<p>You need to have a special guarding wall to prevent unauthorized access to the official data and store the app data inside a safe environment. A slight error in data storage protection can lead to inevitable misuse, which can\u2019t be undone. This is also one of the prime threats faced by enterprise app development companies nowadays.<\/p>\n<h2>3. Segregation between personal and enterprise apps<\/h2>\n<p>The trend of BYOD to work is prevalent, but there is no segregation between the apps used by employees for their personal use and for work, which causes concerns for enterprises. Being an enterprise owner, you are unaware of the sources of apps downloaded on the employee\u2019s device.<\/p>\n<p>Untrusted app sources can infect your device with malwares. And whenever an employee uses the enterprise app on the infected device, he offers an opportunity to attackers to cash in on the stored data.<\/p>\n<h2>4. Insecure communication<\/h2>\n<p>You, as a user, are often lured by public Wi-Fi or free network access points. But before you connect to them, ensure the level of safety and security it offers. Often, hackers set up fake access points using generic names that make you fall in their trap. It\u2019s important to understand that not all networks are safe to communicate or transfer confidential files. Inquire well before you wish to proceed.<\/p>\n<h2>5. Pre-loaded credentials<\/h2>\n<p>Mobile apps offer you to save your credentials for quick access and on most of the occasions, we tend to opt in. Now, considering the case where the mobile device gets stolen, all your data, files, emails, contacts and stuff that\u2019s private become public. This can leave your business in ruins if the robbery was planned and intended to harm your organization\u2019s plans and diminish your market value.<\/p>\n<h2>6. Ineffective tracking<\/h2>\n<p>The companies are lenient in devising mechanisms that track mobile devices on duty and during non-working hours. Adequate measures need to be taken in order to safeguard data. You need to deny access to enterprise apps once the working hours are over. Plus, active tracking tools need to be deployed so that tracking doesn\u2019t halt at any point in time.<\/p>\n<blockquote>\n<h2>Also Read: <a href=\"https:\/\/www.konstantinfo.com\/blog\/how-much-does-an-enterprise-app-cost-the-answer-is-clear\/\" target=\"_blank\">How Much Does an Enterprise App Cost?<\/a><\/h2>\n<\/blockquote>\n<h2>Final words<\/h2>\n<p>To eradicate above-mentioned and other possible security threats, you need to put effective procedures in place so that monitoring of devices, authentication updates and notifications about infected devices reach you well before time.<\/p>\n<p>Get associated with an experienced group of developers or a reputed organization like ours to build a rigorous mobility system that inspects and wipes out all your security-related troubles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile devices have become an integral part of our lives. The use of mobile devices extends to satisfying our entertainment desires, communication needs and now professional woes. The devices are everywhere and the level of convenience they add is absolutely tremendous. The work load has been reduced considerably with the advent of mobile devices and&hellip; <a class=\"more-link\" href=\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/\">Continue reading <span class=\"screen-reader-text\">Enterprise Mobile Security Vulnerabilities to Mitigate in 2017<\/span><\/a><\/p>\n","protected":false},"author":16,"featured_media":5105,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42],"tags":[1125],"class_list":["post-5104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-app-development","tag-enterprise-mobile-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enterprise Mobile Security Vulnerabilities to Mitigate in 2017 - Konstantinfo<\/title>\n<meta name=\"description\" content=\"Increased use of mobile devices at work have raised security concerns. We examine some serious enterprise mobile security threats that can\u2019t be overlooked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017 - Konstantinfo\" \/>\n<meta property=\"og:description\" content=\"Increased use of mobile devices at work have raised security concerns. We examine some serious enterprise mobile security threats that can\u2019t be overlooked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"Konstantinfo\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/konstant.info\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-25T12:11:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-25T12:11:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1008\" \/>\n\t<meta property=\"og:image:height\" content=\"448\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sahil Miglani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@konstantinfo\" \/>\n<meta name=\"twitter:site\" content=\"@konstantinfo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sahil Miglani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/\",\"url\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/\",\"name\":\"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017 - Konstantinfo\",\"isPartOf\":{\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg\",\"datePublished\":\"2017-09-25T12:11:26+00:00\",\"dateModified\":\"2017-09-25T12:11:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/#\/schema\/person\/9ba37d28c0af3b13aeda92daf763e575\"},\"description\":\"Increased use of mobile devices at work have raised security concerns. We examine some serious enterprise mobile security threats that can\u2019t be overlooked.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#primaryimage\",\"url\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg\",\"contentUrl\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg\",\"width\":1008,\"height\":448,\"caption\":\"Enterprise Mobile Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/#website\",\"url\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/\",\"name\":\"Konstantinfo\",\"description\":\"Welcome to Konstant Info\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/#\/schema\/person\/9ba37d28c0af3b13aeda92daf763e575\",\"name\":\"Sahil Miglani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2016\/09\/Sahil-Miglani-150x150.jpg\",\"contentUrl\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2016\/09\/Sahil-Miglani-150x150.jpg\",\"caption\":\"Sahil Miglani\"},\"description\":\"An IT Engineer, a Digital Marketer and a Content Marketing Specialist, Sahil Miglani enjoys technical as well as non-technical writing. His passion and urge for gaining new insights on gadgets, smartphones and technology has led him to Konstant Infosolutions. He quenches his thirst for technology through his action oriented writing skills and a profound ability to stay up to date with latest industry trends. Besides this, Sahil is a sports appreciator, a Sachin Tendulkar fan and a keen follower of cricket. He also has a flair for writing sports content. He lives with the belief that his hobbies have turned into his profession, no wonder he is writing wonders.\",\"sameAs\":[\"http:\/\/www.konstantinfo.com\",\"https:\/\/www.facebook.com\/konstant.info\",\"https:\/\/x.com\/konstantinfo\"],\"url\":\"https:\/\/www.konstantinfo.com\/konstant-blog\/author\/sahil-miglani\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017 - Konstantinfo","description":"Increased use of mobile devices at work have raised security concerns. We examine some serious enterprise mobile security threats that can\u2019t be overlooked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/","og_locale":"en_US","og_type":"article","og_title":"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017 - Konstantinfo","og_description":"Increased use of mobile devices at work have raised security concerns. We examine some serious enterprise mobile security threats that can\u2019t be overlooked.","og_url":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/","og_site_name":"Konstantinfo","article_author":"https:\/\/www.facebook.com\/konstant.info","article_published_time":"2017-09-25T12:11:26+00:00","article_modified_time":"2017-09-25T12:11:45+00:00","og_image":[{"width":1008,"height":448,"url":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg","type":"image\/jpeg"}],"author":"Sahil Miglani","twitter_card":"summary_large_image","twitter_creator":"@konstantinfo","twitter_site":"@konstantinfo","twitter_misc":{"Written by":"Sahil Miglani","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/","url":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/","name":"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017 - Konstantinfo","isPartOf":{"@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg","datePublished":"2017-09-25T12:11:26+00:00","dateModified":"2017-09-25T12:11:45+00:00","author":{"@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/#\/schema\/person\/9ba37d28c0af3b13aeda92daf763e575"},"description":"Increased use of mobile devices at work have raised security concerns. We examine some serious enterprise mobile security threats that can\u2019t be overlooked.","breadcrumb":{"@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#primaryimage","url":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg","contentUrl":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2017\/09\/Enterprise-Mobile-Security.jpg","width":1008,"height":448,"caption":"Enterprise Mobile Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/enterprise-mobile-security-vulnerabilities-to-mitigate-in-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.konstantinfo.com\/konstant-blog\/"},{"@type":"ListItem","position":2,"name":"Enterprise Mobile Security Vulnerabilities to Mitigate in 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/#website","url":"https:\/\/www.konstantinfo.com\/konstant-blog\/","name":"Konstantinfo","description":"Welcome to Konstant Info","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.konstantinfo.com\/konstant-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/#\/schema\/person\/9ba37d28c0af3b13aeda92daf763e575","name":"Sahil Miglani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.konstantinfo.com\/konstant-blog\/#\/schema\/person\/image\/","url":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2016\/09\/Sahil-Miglani-150x150.jpg","contentUrl":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2016\/09\/Sahil-Miglani-150x150.jpg","caption":"Sahil Miglani"},"description":"An IT Engineer, a Digital Marketer and a Content Marketing Specialist, Sahil Miglani enjoys technical as well as non-technical writing. His passion and urge for gaining new insights on gadgets, smartphones and technology has led him to Konstant Infosolutions. He quenches his thirst for technology through his action oriented writing skills and a profound ability to stay up to date with latest industry trends. Besides this, Sahil is a sports appreciator, a Sachin Tendulkar fan and a keen follower of cricket. He also has a flair for writing sports content. He lives with the belief that his hobbies have turned into his profession, no wonder he is writing wonders.","sameAs":["http:\/\/www.konstantinfo.com","https:\/\/www.facebook.com\/konstant.info","https:\/\/x.com\/konstantinfo"],"url":"https:\/\/www.konstantinfo.com\/konstant-blog\/author\/sahil-miglani\/"}]}},"show_toc":false,"table_of_content":[],"faq":[],"related_blogs":[{"id":12341,"title":"AI in Real Estate Industry &#8211; Benefits, Use Cases, Applications and Challenges","slug":"ai-in-real-estate","link":"https:\/\/www.konstantinfo.com\/konstant-blog\/ai-in-real-estate\/","modified":"2026-05-07 17:49:19","excerpt":"The real-estate industry is predominantly run by human expertise and manual processes including buying, selling, and building lands and property....","image":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2025\/04\/ai-in-real-estate.webp"},{"id":12324,"title":"10 Top Education App Development Companies (2026)","slug":"education-app-development-companies","link":"https:\/\/www.konstantinfo.com\/konstant-blog\/education-app-development-companies\/","modified":"2026-05-07 15:22:39","excerpt":"What started as an extension of traditional classrooms became a billion-dollar industry. The online education sector has flourished massively. It...","image":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2025\/04\/education-app-development-companies.webp"},{"id":12333,"title":"10 Best eCommerce App Development Companies (2026)","slug":"ecommerce-app-development-companies","link":"https:\/\/www.konstantinfo.com\/konstant-blog\/ecommerce-app-development-companies\/","modified":"2026-05-05 17:18:51","excerpt":"We have curated a comprehensive list of top eCommerce app development companies to assist you in developing top-notch eCommerce applications....","image":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-content\/uploads\/2025\/04\/best-ecommerce-app-development-companies.webp"}],"_links":{"self":[{"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/posts\/5104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/comments?post=5104"}],"version-history":[{"count":0,"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/posts\/5104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/media\/5105"}],"wp:attachment":[{"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/media?parent=5104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/categories?post=5104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.konstantinfo.com\/konstant-blog\/wp-json\/wp\/v2\/tags?post=5104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}