{"id":25198,"date":"2025-12-30T21:21:14","date_gmt":"2025-12-30T21:21:14","guid":{"rendered":"https:\/\/www.ikusi.com\/?p=25198"},"modified":"2026-01-06T21:03:21","modified_gmt":"2026-01-06T21:03:21","slug":"education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them","status":"publish","type":"post","link":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/","title":{"rendered":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)"},"content":{"rendered":"<div class=\"wp-block-post-date\"><time datetime=\"2026-01-06T20:35:45.940Z\">January 6, 2026<\/time><\/div>\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">Claudia Ibarra<\/p><\/div><\/div>\n\n\n<p>What do banks, hospitals, and universities have in common? They all hold sensitive data on thousands of people. The difference? Banks and hospitals pour millions into security, while educational institutions leave their digital doors wide open. Cybercriminals know this\u2014and they&#8217;re taking full advantage.<\/p>\n\n\n\n<p>Between January and July 2025, educational organizations faced an average of 4,356 cyberattacks per week, according to\u00a0<a href=\"https:\/\/blog.checkpoint.com\/research\/cyber-attacks-surge-against-education-sector-ahead-of-back-to-school-season\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point Research<\/a>. That&#8217;s a 41% jump from the previous year, making education the most heavily targeted industry worldwide\u2014surpassing even finance and healthcare. It&#8217;s no longer a question of whether your institution will be attacked, but when.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:100\">5 Critical vulnerabilities leaving schools exposed<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:100\">1. Untrained staff: Your weakest defense<\/h2>\n\n\n\n<p>Nearly half of all IT directors admit their institutions provide zero cybersecurity training to educators. The result? Every single day, over\u00a0<a href=\"https:\/\/blog.blackbaud.com\/top-cyber-threats-to-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 malicious QR code messages<\/a>\u00a0hunt for victims in education\u2014and they&#8217;re finding them.<\/p>\n\n\n\n<p>These attacks are getting smarter. In August 2025, cybercriminals circulated PDFs disguised as official university communications with names like &#8220;University-Pay Update.pdf,&#8221; requesting authentication updates. The phishing worked: admin credentials were stolen, academic systems breached, and thousands of student records exposed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:100\">2. Outdated tech running on fumes<\/h2>\n\n\n\n<p>Here&#8217;s a sobering reality: schools spend\u00a0<a href=\"https:\/\/www.idsalliance.org\/blog\/the-impact-of-security-breaches-on-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">less than 8%\u00a0<\/a>of their IT budgets on cybersecurity. Meanwhile, they&#8217;re running legacy systems that haven&#8217;t seen critical security updates in years\u2014leaving them defenseless against modern threats.<\/p>\n\n\n\n<p>Consider this: in 2024 alone, security researchers discovered roughly 637 brand-new malware variants every single day. Educational systems? Still stuck in the past.<\/p>\n\n\n\n<p>It gets worse.\u00a0<a href=\"https:\/\/blog.blackbaud.com\/top-cyber-threats-to-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">SonicWall<\/a>\u00a0reports that attacks on smart devices in education jumped 146% in just 2023. Every student tablet, teacher laptop, and IoT sensor on campus is now a potential backdoor for hackers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:100\">3. Password chaos creating easy targets<\/h2>\n\n\n\n<p>Here&#8217;s the reality for educators: they&#8217;re juggling logins for a dozen different platforms, each requiring its own password. What happens? People take shortcuts\u2014simple passwords, reused everywhere, and multi-factor authentication turned off because it&#8217;s &#8220;too much hassle.&#8221;<\/p>\n\n\n\n<p>The damage speaks for itself. According to\u00a0<a href=\"https:\/\/www.edweek.org\/technology\/7-data-breaches-that-left-schools-in-the-lurch\/2023\/08\" target=\"_blank\" rel=\"noreferrer noopener\">EducationWeek<\/a>, 80% of schools dealt with ransomware attacks in 2023, most launched through stolen credentials. Once hackers crack one password, they escalate their access and spread across the entire network like wildfire.<\/p>\n\n\n\n<p>Common weak spots include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Passwords recycled between personal and work accounts<\/li>\n\n\n\n<li>Credentials scribbled on sticky notes or saved in unencrypted files<\/li>\n\n\n\n<li>No requirements for strong passwords or regular updates<\/li>\n\n\n\n<li>Staff pushback against implementing multi-factor authentication<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:100\">4. A massive attack surface with no boundaries<\/h2>\n\n\n\n<p>Schools don&#8217;t have traditional network perimeters anymore. Students, teachers, staff, and parents are logging in from personal devices scattered everywhere\u2014most completely outside IT&#8217;s control.<\/p>\n\n\n\n<p>The numbers are alarming: in July 2025, one out of every 57 new education-related domains was malicious, per\u00a0<a href=\"https:\/\/blog.checkpoint.com\/research\/cyber-attacks-surge-against-education-sector-ahead-of-back-to-school-season\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point Research<\/a>. Hackers are building perfect replicas of school portals and login pages, then sitting back and waiting for people to hand over their passwords.<\/p>\n\n\n\n<p>Then there&#8217;s the insider angle: tech-savvy students probing system vulnerabilities\u2014sometimes just for kicks, other times to change grades or peek at protected files.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-1024x683.jpg\" alt=\"\" class=\"wp-image-25204\" srcset=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-1024x683.jpg 1024w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-300x200.jpg 300w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-768x512.jpg 768w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-1400x933.jpg 1400w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-1200x800.jpg 1200w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-1000x667.jpg 1000w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-900x600.jpg 900w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-600x400.jpg 600w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3-400x267.jpg 400w, https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/interior_01-3.jpg 1440w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\" style=\"font-style:normal;font-weight:100\">5. Flying blind with no response plan<\/h2>\n\n\n\n<p>Here&#8217;s a startling fact: 40% of K-12 schools have no documented plan for responding to a cyberattack. When something happens, what could&#8217;ve been a manageable incident explodes into a full-scale crisis costing anywhere from $50,000 to $1 million, according to the\u00a0<a href=\"https:\/\/app.productive.io\/27768-uxm\/docs\/doc\/506170?filter=LTE%3D&amp;page=506170\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Government Accountability Office<\/a>.<\/p>\n\n\n\n<p>The academic impact hits just as hard: 3 days to 3 weeks of lost instruction time, with recovery dragging on for 2 to 9 months. Some<a href=\"https:\/\/blog.blackbaud.com\/top-cyber-threats-to-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0recent examples\u00a0<\/a>show just how bad it can get:<\/p>\n\n\n\n<p>Recent High-Profile Incidents:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Western Michigan University (2023): Systems down for 13 straight days<\/li>\n\n\n\n<li>Minneapolis School District: Over 300,000 files leaked and a $1 million ransom demand<\/li>\n\n\n\n<li>MOVEit Attack (May 2023): Education made up more than half of all organizations hit globally<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><thead><tr><th>Vulnerability<\/th><th>The Reality<\/th><th>Primary Impact<\/th><th>Recovery Time<\/th><\/tr><\/thead><tbody><tr><td>Lack of training<\/td><td><a href=\"https:\/\/www.idsalliance.org\/blog\/the-impact-of-security-breaches-on-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">44%<\/a>\u00a0receive no security training<\/td><td>Stolen credentials<\/td><td>Immediate<\/td><\/tr><tr><td>Outdated infrastructure<\/td><td><a href=\"https:\/\/www.idsalliance.org\/blog\/the-impact-of-security-breaches-on-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Under 8%<\/a>\u00a0of IT budget goes to security<\/td><td>Unpatched vulnerabilities<\/td><td>2-9 months<\/td><\/tr><tr><td>Access management<\/td><td><a href=\"https:\/\/www.idsalliance.org\/blog\/the-impact-of-security-breaches-on-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">80%<\/a>\u00a0hit with ransomware in 2023<\/td><td>Data theft<\/td><td>3 days &#8211; 3 weeks<\/td><\/tr><tr><td>Attack surface<\/td><td><a href=\"https:\/\/blog.checkpoint.com\/research\/cyber-attacks-surge-against-education-sector-ahead-of-back-to-school-season\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">1 in 57<\/a>\u00a0domains are malicious<\/td><td>Multiple threat vectors<\/td><td>Varies<\/td><\/tr><tr><td>No response plan<\/td><td><a href=\"https:\/\/www.idsalliance.org\/blog\/the-impact-of-security-breaches-on-educational-institutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">40%<\/a>\u00a0of K-12 schools unprepared<\/td><td>$50K-$1M per incident<\/td><td>Up to 13 days<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:100\">Building resilience without breaking the bank<\/h2>\n\n\n\n<p>The good news? These vulnerabilities can be fixed\u2014even on tight education budgets. Managed security solutions deliver enterprise-grade protection without requiring expensive infrastructure or specialized staff on-site.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.ikusi.com\/en\/services\/cybersecurity\/it-risk-prevention-advanced-solutions-for-cybersecurity-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ikusi IT Risk Prevention and Response for Organizational Assets<\/a>\u00a0gives schools access to the same level of security major corporations use, with flexible licensing and round-the-clock support from dedicated security operations centers. Core capabilities include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-time malware and ransomware blocking on all endpoints (laptops, tablets, phones)<\/li>\n\n\n\n<li>Automated phishing detection that analyzes emails and attachments before they reach users<\/li>\n\n\n\n<li>Automatic deployment of critical security patches across all systems<\/li>\n\n\n\n<li>24\/7 threat monitoring and anomaly detection<\/li>\n\n\n\n<li>Data loss prevention protecting student records and academic information<\/li>\n\n\n\n<li>Compliance reporting for audits and regulatory requirements<\/li>\n<\/ul>\n\n\n\n<p>This hybrid approach protects both on-campus devices and cloud-based systems, customized to each school&#8217;s specific risk profile. With expert-managed services handling security operations, schools can stop threats before they cause damage\u2014no internal security team needed.<\/p>\n\n\n\n<p>So back to where we started: what should separate a bank from a university? Not the quality of their cybersecurity. As education goes digital, security can&#8217;t be an afterthought\u2014it has to be the foundation. Every school can close those gaping security holes today. After all, investing in prevention costs a fraction of what you&#8217;ll pay to recover from an attack.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-crowdsignal wp-block-embed-crowdsignal\"><div class=\"wp-block-embed__wrapper\">\n<script>var pd_tags = new Array;pd_tags[\"16481918-src\"]=\"poll-oembed-simple\";<\/script><script type=\"text\/javascript\" charset=\"utf-8\" src=\"https:\/\/secure.polldaddy.com\/p\/16481918.js\"><\/script><noscript><iframe title=\"What&#039;s your biggest security concern?\" src=\"https:\/\/poll.fm\/16481918\/embed\" frameborder=\"0\" class=\"cs-iframe-embed\"><\/iframe><\/noscript>\n<\/div><\/figure>\n\n\n<script type=\"text\/javascript\">var gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o){gform.domLoaded&&gform.scriptsLoaded?o():!gform.domLoaded&&gform.scriptsLoaded?window.addEventListener(\"DOMContentLoaded\",o):document.addEventListener(\"gform_main_scripts_loaded\",o)},hooks:{action:{},filter:{}},addAction:function(o,n,r,t){gform.addHook(\"action\",o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook(\"filter\",o,n,r,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,n){gform.removeHook(\"action\",o,n)},removeFilter:function(o,n,r){gform.removeHook(\"filter\",o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+\"_\"+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==n?t.apply(null,r):r[0]=t.apply(null,r)})),\"filter\"==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});<\/script>\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_6' >\n                        <div class='gform_heading'>\n                            <p class='gform_description'>Send us your information and we will contact you.<\/p>\n\t\t\t\t\t\t\t<p class='gform_required_legend'><\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_6'  action='\/en\/wp-json\/wp\/v2\/posts\/25198' data-formid='6' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_6' class='gform_fields top_label form_sublabel_above description_below'><div id=\"field_6_1\"  class=\"gfield gfield--type-text gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_1\"><label class='gfield_label gform-field-label' for='input_6_1' >Full name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_1' id='input_6_1' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_6_4\"  class=\"gfield gfield--type-email gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_4\"><label class='gfield_label gform-field-label' for='input_6_4' >Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_4' id='input_6_4' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_6_5\"  class=\"gfield gfield--type-text field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_5\"><label class='gfield_label gform-field-label' for='input_6_5' >Company<\/label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_6_5' type='text' value='' class='large'      aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_6_6\"  class=\"gfield gfield--type-phone gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_6\"><label class='gfield_label gform-field-label' for='input_6_6' >Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_6' id='input_6_6' type='tel' value='' class='large'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_6_7\"  class=\"gfield gfield--type-text gfield--width-full field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_7\"><label class='gfield_label gform-field-label' for='input_6_7' >Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_6_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_6_9\"  class=\"gfield gfield--type-textarea gfield_contains_required field_sublabel_above gfield--no-description field_description_below gfield_visibility_visible\"  data-js-reload=\"field_6_9\"><label class='gfield_label gform-field-label' for='input_6_9' >Message<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_9' id='input_6_9' class='textarea large'     aria-required=\"true\" aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_6_10\"  class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible\"  data-js-reload=\"field_6_10\"><legend class='gfield_label gform-field-label gfield_label_before_complex'  >Recibir informaci\u00f3n<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_6_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_6_10_1' >I wish to receive information on Velatia products and services.<\/label><input type='hidden' name='input_10.2' value='I wish to receive information on Velatia products and services.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='3' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_6_12\"  class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible\"  data-js-reload=\"field_6_12\"><legend class='gfield_label gform-field-label gfield_label_before_complex'  >Pol\u00edtica de privacidad<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_12.1' id='input_6_12_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_6_12_1' >I confirm that I have read the privacy policy.<span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/label><input type='hidden' name='input_12.2' value='I confirm that I have read the privacy policy.' class='gform_hidden' \/><input type='hidden' name='input_12.3' value='3' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_6_13\"  class=\"gfield gfield--type-captcha gfield--width-full field_sublabel_above gfield--no-description field_description_below hidden_label gfield_visibility_visible\"  data-js-reload=\"field_6_13\"><label class='gfield_label gform-field-label' for='input_6_13' >CAPTCHA<\/label><div id='input_6_13' class='ginput_container ginput_recaptcha' data-sitekey='6Ld_bpMrAAAAACrOQplbK1Wh3uZ4CM8idmAl4fM7'  data-theme='light' data-tabindex='0'  data-badge=''><\/div><\/div><\/div><\/div>\n        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_6' class='gform_button button' value='Send'  onclick='if(window[\"gf_submitting_6\"]){return false;}  if( !jQuery(\"#gform_6\")[0].checkValidity || jQuery(\"#gform_6\")[0].checkValidity()){window[\"gf_submitting_6\"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window[\"gf_submitting_6\"]){return false;} if( !jQuery(\"#gform_6\")[0].checkValidity || jQuery(\"#gform_6\")[0].checkValidity()){window[\"gf_submitting_6\"]=true;}  jQuery(\"#gform_6\").trigger(\"submit\",[true]); }' \/> \n            <input type='hidden' class='gform_hidden' name='is_submit_6' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='6' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_6' value='WyJ7XCIxMC4xXCI6XCJjMGI3MWE2M2IxMTRmYWI4YTA5OTQxZjc3ZDBjN2EwMVwiLFwiMTAuMlwiOlwiMDY3M2Y5ZDg4NTBlZjcyODU4MDNhYThhZmQyMjk2NDlcIixcIjEwLjNcIjpcImRkMDc1NzkzYjk1YmUzMjk5YWIyYzk4YTJiZTEyMGQ3XCIsXCIxMi4xXCI6XCJjMGI3MWE2M2IxMTRmYWI4YTA5OTQxZjc3ZDBjN2EwMVwiLFwiMTIuMlwiOlwiMzliMTlhNmE0ZDdmYjEwZTkyZWFkMTVlYmRlMzQxNzVcIixcIjEyLjNcIjpcImRkMDc1NzkzYjk1YmUzMjk5YWIyYzk4YTJiZTEyMGQ3XCJ9IiwiODY4OTViYzljZTJkNjcwOGI0MzU4ZmM1Njc5MTc1ZDQiXQ==' \/>\n            <input type='hidden' class='gform_hidden' name='gform_target_page_number_6' id='gform_target_page_number_6' value='0' \/>\n            <input type='hidden' class='gform_hidden' name='gform_source_page_number_6' id='gform_source_page_number_6' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n gform.initializeOnLoaded( function() {gformInitSpinner( 6, 'https:\/\/www.ikusi.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_6').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_6');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_6').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_6').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_6').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_6').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_6').val();gformInitSpinner( 6, 'https:\/\/www.ikusi.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [6, current_page]);window['gf_submitting_6'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery('#gform_wrapper_6').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [6]);window['gf_submitting_6'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_6').text());}, 50);}else{jQuery('#gform_6').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger('gform_post_render', [6, current_page]);} );} ); \n\/* ]]> *\/\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.<\/p>\n","protected":false},"author":45,"featured_media":25199,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,317],"tags":[319,332,482],"temas":[303,299],"class_list":["post-25198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","category-aplicacion-de-soluciones-en","tag-cybersecurity","tag-digital-transformation","tag-education","temas-cybersecurity","temas-digital-transformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them) - Ikusi<\/title>\n<meta name=\"description\" content=\"Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them) - Ikusi\" \/>\n<meta property=\"og:description\" content=\"Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IkusiVelatia\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-30T21:21:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-06T21:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Claudia Ibarra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:site\" content=\"@ikusi_espana\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudia Ibarra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\"},\"author\":{\"name\":\"Claudia Ibarra\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/e9597dad79a8217f82a1d1a3bb39e6f6\"},\"headline\":\"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)\",\"datePublished\":\"2025-12-30T21:21:14+00:00\",\"dateModified\":\"2026-01-06T21:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\"},\"wordCount\":917,\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg\",\"keywords\":[\"cybersecurity\",\"digital transformation\",\"Education\"],\"articleSection\":[\"Sin categor\u00eda\",\"Solutions Application\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\",\"url\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\",\"name\":\"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them) - Ikusi\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg\",\"datePublished\":\"2025-12-30T21:21:14+00:00\",\"dateModified\":\"2026-01-06T21:03:21+00:00\",\"description\":\"Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.ikusi.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#website\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"name\":\"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikusi.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#organization\",\"name\":\"Ikusi\",\"url\":\"https:\/\/www.ikusi.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"contentUrl\":\"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg\",\"width\":1,\"height\":1,\"caption\":\"Ikusi\"},\"image\":{\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IkusiVelatia\",\"https:\/\/x.com\/ikusi_espana\",\"https:\/\/www.instagram.com\/ikusi.velatia\/\",\"https:\/\/www.linkedin.com\/company\/ikusi\/\",\"https:\/\/www.youtube.com\/user\/IkusiGroup\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/e9597dad79a8217f82a1d1a3bb39e6f6\",\"name\":\"Claudia Ibarra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c1e08e91858c40aee843042b93af497d58f9d9412bb2ba41ed6db6827a38384e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c1e08e91858c40aee843042b93af497d58f9d9412bb2ba41ed6db6827a38384e?s=96&d=mm&r=g\",\"caption\":\"Claudia Ibarra\"},\"url\":\"https:\/\/www.ikusi.com\/en\/author\/claudia-ibarra\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them) - Ikusi","description":"Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/","og_locale":"en_US","og_type":"article","og_title":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them) - Ikusi","og_description":"Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.","og_url":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/","og_site_name":"Ikusi","article_publisher":"https:\/\/www.facebook.com\/IkusiVelatia","article_published_time":"2025-12-30T21:21:14+00:00","article_modified_time":"2026-01-06T21:03:21+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg","type":"image\/jpeg"}],"author":"Claudia Ibarra","twitter_card":"summary_large_image","twitter_creator":"@ikusi_espana","twitter_site":"@ikusi_espana","twitter_misc":{"Written by":"Claudia Ibarra","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#article","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/"},"author":{"name":"Claudia Ibarra","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/e9597dad79a8217f82a1d1a3bb39e6f6"},"headline":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)","datePublished":"2025-12-30T21:21:14+00:00","dateModified":"2026-01-06T21:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/"},"wordCount":917,"publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg","keywords":["cybersecurity","digital transformation","Education"],"articleSection":["Sin categor\u00eda","Solutions Application"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/","url":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/","name":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them) - Ikusi","isPartOf":{"@id":"https:\/\/www.ikusi.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg","datePublished":"2025-12-30T21:21:14+00:00","dateModified":"2026-01-06T21:03:21+00:00","description":"Schools are prime cyber targets. Discover 5 key education security vulnerabilities and practical solutions to protect your institution.","breadcrumb":{"@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#primaryimage","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2026\/01\/portada-3.jpg","width":1920,"height":1080,"caption":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikusi.com\/en\/blog\/education-under-siege-5-critical-vulnerabilities-putting-schools-at-risk-and-how-to-fix-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ikusi.com\/en\/"},{"@type":"ListItem","position":2,"name":"Education under siege: 5 Critical vulnerabilities putting schools at risk (and how to fix them)"}]},{"@type":"WebSite","@id":"https:\/\/www.ikusi.com\/en\/#website","url":"https:\/\/www.ikusi.com\/en\/","name":"Ikusi - Servicios de Digitalizaci\u00f3n y Ciberseguridad","description":"","publisher":{"@id":"https:\/\/www.ikusi.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikusi.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikusi.com\/en\/#organization","name":"Ikusi","url":"https:\/\/www.ikusi.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","contentUrl":"https:\/\/www.ikusi.com\/wp-content\/uploads\/2025\/06\/logo-ikusi.svg","width":1,"height":1,"caption":"Ikusi"},"image":{"@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IkusiVelatia","https:\/\/x.com\/ikusi_espana","https:\/\/www.instagram.com\/ikusi.velatia\/","https:\/\/www.linkedin.com\/company\/ikusi\/","https:\/\/www.youtube.com\/user\/IkusiGroup"]},{"@type":"Person","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/e9597dad79a8217f82a1d1a3bb39e6f6","name":"Claudia Ibarra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikusi.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c1e08e91858c40aee843042b93af497d58f9d9412bb2ba41ed6db6827a38384e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c1e08e91858c40aee843042b93af497d58f9d9412bb2ba41ed6db6827a38384e?s=96&d=mm&r=g","caption":"Claudia Ibarra"},"url":"https:\/\/www.ikusi.com\/en\/author\/claudia-ibarra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/25198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/comments?post=25198"}],"version-history":[{"count":3,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/25198\/revisions"}],"predecessor-version":[{"id":25208,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/posts\/25198\/revisions\/25208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media\/25199"}],"wp:attachment":[{"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/media?parent=25198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/categories?post=25198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/tags?post=25198"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/www.ikusi.com\/en\/wp-json\/wp\/v2\/temas?post=25198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}