{"id":24076,"date":"2025-08-28T17:52:48","date_gmt":"2025-08-28T17:52:48","guid":{"rendered":"https:\/\/www.ikusi.com\/?p=24076"},"modified":"2025-09-22T20:04:47","modified_gmt":"2025-09-22T20:04:47","slug":"cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data","status":"publish","type":"post","link":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/","title":{"rendered":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data"},"content":{"rendered":"<div class=\"wp-block-post-date\"><time datetime=\"2025-08-28T17:52:48+00:00\">August 28, 2025<\/time><\/div>\n\n\n<p>A&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/taesikyoon\/2012\/08\/02\/what-the-heck\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">high-end financial&nbsp;<\/a><a href=\"https:\/\/www.forbes.com\/sites\/taesikyoon\/2012\/08\/02\/what-the-heck\/?\" target=\"_blank\" rel=\"noreferrer noopener\">software<\/a>&nbsp;once earned rave reviews for its bulletproof reliability and efficiency. Investors flocked to it as their ultimate solution for automated stock trading. Then one day, someone simply forgot to update a single server with the latest code. That small oversight triggered an obsolete function that sent the market into chaos with a torrent of out-of-control automated orders, erasing millions of dollars in minutes.<\/p>\n\n\n\n<p>Today, cloud computing finds itself in the same predicament. Cloud providers promise security that&#8217;s &#8220;baked right in,&#8221; yet organizations keep tripping over configuration mistakes that should be straightforward to avoid.<\/p>\n\n\n\n<p>The harsh reality? Most executives aren&#8217;t ready to hear this. Gartner&#8217;s latest data shows that&nbsp;<a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">over 75% of security&nbsp;<\/a><a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?\" target=\"_blank\" rel=\"noreferrer noopener\">failures<\/a><a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">since 2023<\/a>&nbsp;stem from botched identity and privilege management. That&#8217;s a dramatic spike from the 50% they forecast for 2020. Meanwhile,&nbsp;<a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?\" target=\"_blank\" rel=\"noreferrer noopener\">95<\/a><a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">% of cloud security professionals<\/a>&nbsp;have dealt with configuration incidents, and 92% have watched confidential data slip through the cracks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:100\">When Cloud Dreams Become Nightmares<\/h2>\n\n\n\n<p>Cloud services burst onto the scene with a game-changing promise: enterprise-level infrastructure without the nightmare of managing physical hardware. The pitch was simple. Providers would handle the heavy lifting on infrastructure, while companies just needed to configure their services correctly.<\/p>\n\n\n\n<p>Several decades later, that &#8220;simple&#8221; configuration has become our biggest vulnerability.&nbsp;<a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">The data tells<\/a><a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;<\/a><a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">a troubling story<\/a>:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><thead><tr><th>Metric<\/th><th>2020<\/th><th>2024<\/th><th>Changes<\/th><\/tr><\/thead><tbody><tr><td>Cloud security incidents<\/td><td>Baseline<\/td><td>+154%<\/td><td>Critical<\/td><\/tr><tr><td>Organizations experiencing disruptions<\/td><td>35%<\/td><td>61%<\/td><td>+74%<\/td><\/tr><tr><td>Identity management failures<\/td><td>50%<\/td><td>75%<\/td><td>+50%<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>This surge continues even as security tools become increasingly sophisticated. The takeaway? We don&#8217;t have a technology problem. We have an implementation problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:100\">Where Everything Falls Apart<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-1024x512.jpg\" alt=\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - 1\" class=\"wp-image-24077\" srcset=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-1024x512.jpg 1024w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-300x150.jpg 300w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-768x384.jpg 768w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-1536x768.jpg 1536w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-1400x700.jpg 1400w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-1200x600.jpg 1200w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-1000x500.jpg 1000w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-900x450.jpg 900w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-600x300.jpg 600w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4-400x200.jpg 400w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_01-4.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Understanding the scope of this problem means looking at exactly where these failures occur. Analysis of more than seven million containers reveals a consistent and alarming pattern.<\/p>\n\n\n\n<p><strong>The three main offenders:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Weak identities with excessive permissions<\/li>\n\n\n\n<li>Misconfigured services<\/li>\n\n\n\n<li>Poor access and privilege management<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Industry<\/strong><\/a><a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>&nbsp;<\/strong><\/a><a href=\"https:\/\/iworld.com.mx\/95-de-empresas-tuvieron-ataques-relacionados-con-la-nube-informe-cloud-security-outlook-2024\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>impact<\/strong><\/a><strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Technology: 73% report damage<\/li>\n\n\n\n<li>Retail: 72%<\/li>\n\n\n\n<li>Media\/Telecommunications: 57%<\/li>\n\n\n\n<li>Manufacturing: 57%<\/li>\n\n\n\n<li>Banking\/Finance: 53%<\/li>\n<\/ul>\n\n\n\n<p>Here&#8217;s the kicker:&nbsp;<a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">90<\/a><a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?\" target=\"_blank\" rel=\"noreferrer noopener\">%<\/a>&nbsp;of permissions granted to regular users never actually get used. For automated systems and applications, the waste is even worse, with&nbsp;<a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">9<\/a><a href=\"https:\/\/www.computerworld.es\/article\/2105864\/mala-configuracion-el-principal-habilitador-de-los-problemas-en-la-nube.html?\" target=\"_blank\" rel=\"noreferrer noopener\">8%<\/a>&nbsp;of permissions sitting idle throughout their entire lifecycle.<\/p>\n\n\n\n<p>These unused &#8220;ghost&#8221; permissions frequently attach themselves to forgotten accounts like expired test credentials or abandoned contractor access, creating a minefield of potential attack vectors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:100\">The True Cost of Getting It Wrong<\/h2>\n\n\n\n<p>The statistics paint one picture, but&nbsp;<a href=\"https:\/\/cybersecuritynews.com\/cloud-misconfigurations\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">real&nbsp;<\/a><a href=\"https:\/\/cybersecuritynews.com\/cloud-misconfigurations\/?\" target=\"_blank\" rel=\"noreferrer noopener\">incidents<\/a><a href=\"https:\/\/cybersecuritynews.com\/cloud-misconfigurations\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;<\/a><a href=\"https:\/\/cybersecuritynews.com\/cloud-misconfigurations\/?\" target=\"_blank\" rel=\"noreferrer noopener\">show<\/a>&nbsp;the devastating impact. Consider the financial institution that suffered a major breach when attackers exploited a poorly configured web application firewall (WAF) and accessed millions of customer records. The attack exposed a series of systemic failures: inconsistent firewall audits, missing MFA on privileged accounts, and no real-time API monitoring.<\/p>\n\n\n\n<p>Another case involved an automotive tech company where hackers infiltrated the orchestration console through an admin interface with no password protection. While mining cryptocurrency on company resources, they also accessed sensitive vehicle telemetry. The incident highlighted glaring gaps in MFA implementation and network segmentation.<\/p>\n\n\n\n<p><a href=\"https:\/\/cybersecuritynews.com\/cloud-misconfigurations\/?\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>The financial reality<\/strong><\/a><strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Average cost per breach: $4.35 million USD<\/li>\n\n\n\n<li>Regulatory penalties: Significant and highly variable<\/li>\n\n\n\n<li>Brand damage: 63% of customers abandon companies after incidents<\/li>\n\n\n\n<li>2026 projection: $5 trillion USD annually in related costs<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:100\">Breaking the Cycle: Smart Defense Strategies<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"341\" src=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-1024x341.jpg\" alt=\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - 2\" class=\"wp-image-24080\" srcset=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-1024x341.jpg 1024w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-300x100.jpg 300w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-768x256.jpg 768w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-1400x467.jpg 1400w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-1200x400.jpg 1200w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-1000x333.jpg 1000w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-900x300.jpg 900w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-600x200.jpg 600w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2-400x133.jpg 400w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/interior_02-2.jpg 1440w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The solution goes beyond purchasing better security tools. Organizations need a fundamental shift from reactive to proactive security. Industry leaders combine intelligent automation, least-privilege principles, and continuous monitoring to stay ahead of threats.<\/p>\n\n\n\n<p>Despite advances in technology, human error remains the critical factor. An overwhelming 88% of misconfigurations still trace back to human mistakes, making team training essential. This includes cloud certifications, hands-on lab experiences, and just-in-time access controls.<\/p>\n\n\n\n<p>Ikusi\u2019s&nbsp;<a href=\"https:\/\/www.ikusi.com\/en\/services\/cybersecurity\/data-protection-in-multi-cloud-environments\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Protection in Multi \u2013 Cloud Environments<\/a>&nbsp;addresses these challenges through workload protection, risk visibility, secure development practices, and robust Identity and Access Management (IAM). This integrated approach maintains continuous oversight across hybrid environments while ensuring security integrity through smart cloud initiatives and ongoing compliance monitoring.<\/p>\n\n\n\n<p>The cloud security paradox isn&#8217;t really about technology. It&#8217;s fundamentally about implementation and organizational culture. Companies that recognize this reality and adopt comprehensive approaches will navigate today&#8217;s complex cloud security landscape far more successfully.<\/p>\n\n\n<script type=\"text\/javascript\">var gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o){gform.domLoaded&&gform.scriptsLoaded?o():!gform.domLoaded&&gform.scriptsLoaded?window.addEventListener(\"DOMContentLoaded\",o):document.addEventListener(\"gform_main_scripts_loaded\",o)},hooks:{action:{},filter:{}},addAction:function(o,n,r,t){gform.addHook(\"action\",o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook(\"filter\",o,n,r,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,n){gform.removeHook(\"action\",o,n)},removeFilter:function(o,n,r){gform.removeHook(\"filter\",o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+\"_\"+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==n?t.apply(null,r):r[0]=t.apply(null,r)})),\"filter\"==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});<\/script>\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_6' >\n                        <div class='gform_heading'>\n                            <p class='gform_description'>Send us your information and we will contact you.<\/p>\n\t\t\t\t\t\t\t<p class='gform_required_legend'><\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_6'  action='\/en\/wp-json\/wp\/v2\/posts\/24076' data-formid='6' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_6' class='gform_fields top_label form_sublabel_above description_below'><div id=\"field_6_1\"  class=\"gfield gfield--type-text gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_1\"><label class='gfield_label gform-field-label' for='input_6_1' >Full name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_6_1' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_6_4\"  class=\"gfield gfield--type-email gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_4\"><label class='gfield_label gform-field-label' for='input_6_4' >Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_4' id='input_6_4' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_6_5\"  class=\"gfield gfield--type-text field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_5\"><label class='gfield_label gform-field-label' for='input_6_5' >Company<\/label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_6_5' type='text' value='' class='large'      aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_6_6\"  class=\"gfield gfield--type-phone gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_6\"><label class='gfield_label gform-field-label' for='input_6_6' >Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_6' id='input_6_6' type='tel' value='' class='large'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_6_7\"  class=\"gfield gfield--type-text gfield--width-full field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_7\"><label class='gfield_label gform-field-label' for='input_6_7' >Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_6_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_6_9\"  class=\"gfield gfield--type-textarea gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_9\"><label class='gfield_label gform-field-label' for='input_6_9' >Message<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_9' id='input_6_9' class='textarea large'     aria-required=\"true\" aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_6_10\"  class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible\"  data-js-reload=\"field_6_10\"><legend class='gfield_label gform-field-label gfield_label_before_complex'  >Recibir informaci\u00f3n<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_6_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_6_10_1' >I wish to receive information on Velatia products and services.<\/label><input type='hidden' name='input_10.2' value='I wish to receive information on Velatia products and services.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='3' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_6_12\"  class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible\"  data-js-reload=\"field_6_12\"><legend class='gfield_label gform-field-label gfield_label_before_complex'  >Pol\u00edtica de privacidad<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_12.1' id='input_6_12_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_6_12_1' >I confirm that I have read the privacy policy.<span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/label><input type='hidden' name='input_12.2' value='I confirm that I have read the privacy policy.' class='gform_hidden' \/><input type='hidden' name='input_12.3' value='3' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_6_13\"  class=\"gfield gfield--type-captcha gfield--width-full field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible\"  data-js-reload=\"field_6_13\"><label class='gfield_label gform-field-label' for='input_6_13' >CAPTCHA<\/label><div id='input_6_13' class='ginput_container ginput_recaptcha' data-sitekey='6Ld_bpMrAAAAACrOQplbK1Wh3uZ4CM8idmAl4fM7'  data-theme='light' data-tabindex='0'  data-badge=''><\/div><\/div><\/div><\/div>\n        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_6' class='gform_button button' value='Send'  onclick='if(window[\"gf_submitting_6\"]){return false;}  if( !jQuery(\"#gform_6\")[0].checkValidity || jQuery(\"#gform_6\")[0].checkValidity()){window[\"gf_submitting_6\"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window[\"gf_submitting_6\"]){return false;} if( !jQuery(\"#gform_6\")[0].checkValidity || jQuery(\"#gform_6\")[0].checkValidity()){window[\"gf_submitting_6\"]=true;}  jQuery(\"#gform_6\").trigger(\"submit\",[true]); }' \/> \n            <input type='hidden' class='gform_hidden' name='is_submit_6' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='6' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_6' value='WyJ7XCIxMC4xXCI6XCJjMGI3MWE2M2IxMTRmYWI4YTA5OTQxZjc3ZDBjN2EwMVwiLFwiMTAuMlwiOlwiMDY3M2Y5ZDg4NTBlZjcyODU4MDNhYThhZmQyMjk2NDlcIixcIjEwLjNcIjpcImRkMDc1NzkzYjk1YmUzMjk5YWIyYzk4YTJiZTEyMGQ3XCIsXCIxMi4xXCI6XCJjMGI3MWE2M2IxMTRmYWI4YTA5OTQxZjc3ZDBjN2EwMVwiLFwiMTIuMlwiOlwiMzliMTlhNmE0ZDdmYjEwZTkyZWFkMTVlYmRlMzQxNzVcIixcIjEyLjNcIjpcImRkMDc1NzkzYjk1YmUzMjk5YWIyYzk4YTJiZTEyMGQ3XCJ9IiwiODY4OTViYzljZTJkNjcwOGI0MzU4ZmM1Njc5MTc1ZDQiXQ==' \/>\n            <input type='hidden' class='gform_hidden' name='gform_target_page_number_6' id='gform_target_page_number_6' value='0' \/>\n            <input type='hidden' class='gform_hidden' name='gform_source_page_number_6' id='gform_source_page_number_6' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n gform.initializeOnLoaded( function() {gformInitSpinner( 6, 'https:\/\/www.ikusi.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_6').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_6');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_6').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_6').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_6').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_6').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_6').val();gformInitSpinner( 6, 'https:\/\/www.ikusi.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [6, current_page]);window['gf_submitting_6'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery('#gform_wrapper_6').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [6]);window['gf_submitting_6'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_6').text());}, 50);}else{jQuery('#gform_6').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger('gform_post_render', [6, current_page]);} );} ); \n\/* ]]> *\/\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.<\/p>\n","protected":false},"author":39,"featured_media":24084,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[320,1],"tags":[364,319,313,332],"temas":[301,303,299],"class_list":["post-24076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","category-sin-categoria","tag-cloud-data-center","tag-cybersecurity","tag-data-security","tag-digital-transformation","temas-cloud-data-center","temas-cybersecurity","temas-digital-transformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - Ikusi<\/title>\n<meta name=\"description\" content=\"Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - Ikusi\" \/>\n<meta property=\"og:description\" content=\"Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IkusiVelatia\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T17:52:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T20:04:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel Michaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:site\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Michaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\"},\"author\":{\"name\":\"Daniel Michaus\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79\"},\"headline\":\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data\",\"datePublished\":\"2025-08-28T17:52:48+00:00\",\"dateModified\":\"2025-09-22T20:04:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\"},\"wordCount\":699,\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg\",\"keywords\":[\"Cloud &amp; Data Center\",\"cybersecurity\",\"data security\",\"digital transformation\"],\"articleSection\":[\"Digital transformation\",\"Sin categor\u00eda\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\",\"url\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\",\"name\":\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - Ikusi\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg\",\"datePublished\":\"2025-08-28T17:52:48+00:00\",\"dateModified\":\"2025-09-22T20:04:47+00:00\",\"description\":\"Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.ikusi.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"name\":\"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikusi.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\",\"name\":\"Ikusi\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"width\":1,\"height\":1,\"caption\":\"Ikusi\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IkusiVelatia\",\"https:\/\/x.com\/ikusi_espana\",\"https:\/\/www.instagram.com\/ikusi.velatia\/\",\"https:\/\/www.linkedin.com\/company\/ikusi\/\",\"https:\/\/www.youtube.com\/user\/IkusiGroup\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79\",\"name\":\"Daniel Michaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g\",\"caption\":\"Daniel Michaus\"},\"url\":\"https:\/\/www.ikusi.com\/en\/author\/daniel-michausuxmarketing-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - Ikusi","description":"Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - Ikusi","og_description":"Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.","og_url":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/","og_site_name":"Ikusi","article_publisher":"https:\/\/www.facebook.com\/IkusiVelatia","article_published_time":"2025-08-28T17:52:48+00:00","article_modified_time":"2025-09-22T20:04:47+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg","type":"image\/jpeg"}],"author":"Daniel Michaus","twitter_card":"summary_large_image","twitter_creator":"@ikusi_espana","twitter_site":"@ikusi_espana","twitter_misc":{"Written by":"Daniel Michaus","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#article","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/"},"author":{"name":"Daniel Michaus","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79"},"headline":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data","datePublished":"2025-08-28T17:52:48+00:00","dateModified":"2025-09-22T20:04:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/"},"wordCount":699,"publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg","keywords":["Cloud &amp; Data Center","cybersecurity","data security","digital transformation"],"articleSection":["Digital transformation","Sin categor\u00eda"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/","url":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/","name":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data - Ikusi","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg","datePublished":"2025-08-28T17:52:48+00:00","dateModified":"2025-09-22T20:04:47+00:00","description":"Cloud misconfigurations drive 92% of data exposures. Discover 3 key vulnerabilities and proven strategies to secure your infrastructure.","breadcrumb":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#primaryimage","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/09\/portada-4.jpg","width":1920,"height":1080,"caption":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikusi.com\/en\/blog\/cloud-security-misconfigurations-why-92-of-organizations-expose-critical-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ikusi.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud Security Misconfigurations: Why 92% of Organizations Expose Critical Data"}]},{"@type":"WebSite","@id":"https:\/\/www.ikusi.com\/en\/#website","url":"https:\/\/www.ikusi.com\/en\/","name":"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad","description":"","publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikusi.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikusi.com\/en\/#organization","name":"Ikusi","url":"https:\/\/www.ikusi.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","width":1,"height":1,"caption":"Ikusi"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IkusiVelatia","https:\/\/x.com\/ikusi_espana","https:\/\/www.instagram.com\/ikusi.velatia\/","https:\/\/www.linkedin.com\/company\/ikusi\/","https:\/\/www.youtube.com\/user\/IkusiGroup"]},{"@type":"Person","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/3da9366c29c7b1236cffbc000b09db79","name":"Daniel Michaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/468b8a99738928b595b853505866cdfd3cb1be9f4100b43a99cad148072a0b06?s=96&d=mm&r=g","caption":"Daniel Michaus"},"url":"https:\/\/www.ikusi.com\/en\/author\/daniel-michausuxmarketing-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/24076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/comments?post=24076"}],"version-history":[{"count":3,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/24076\/revisions"}],"predecessor-version":[{"id":24088,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/24076\/revisions\/24088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media\/24084"}],"wp:attachment":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media?parent=24076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/categories?post=24076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/tags?post=24076"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/temas?post=24076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}