{"id":36,"date":"2019-08-29T07:31:25","date_gmt":"2019-08-29T07:31:25","guid":{"rendered":"http:\/\/digisec360.com\/blog111\/?p=36"},"modified":"2023-02-09T15:58:32","modified_gmt":"2023-02-09T10:28:32","slug":"protect-your-organization-from-cyber-attacks","status":"publish","type":"post","link":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/","title":{"rendered":"Protect Your Organization From Cyber Attacks"},"content":{"rendered":"\n<p>Cyber security is important for organizations of all shapes and sizes. While major businesses work within a strict framework to keep cyber-attacks at bay, same may not be the case with SMEs. Small and medium business organizations often have poor data protection protocol and weak backup systems, causing them to fall prey to hackers, easily.The CSA estimates that 60 percent of small business owners will have to call it quits less than a year after being hit with a cyberattack.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>How?<\/strong><\/p>\n\n\n\n<p>These are some of the weapons used in cyber-attacks related to SMEs-<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Ransomware<\/strong>&#8211; In simple words, hackers use malicious techniques to steal data and encrypt them. They release back the data to the owner, when a certain amount of ransom has been paid using cyber-currency which makes it even tougher to identity the rogue.<\/p>\n\n\n\n<p><strong>Phishing<\/strong>&#8211; Through dubious links or attachments sent via e-mail, hackers access personal information, right from credit card details to other related financial data.<\/p>\n\n\n\n<p><strong>Malware<\/strong>&#8211; Planted through applications in either a computer, phone or other related gadgets, these viruses steal personal data and use it for financial transactions.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Why?<\/strong><\/p>\n\n\n\n<p>Small and medium organizations are more easily prone to attack because of ignorance and nominal funds allocated for cyber security. Some of the weak links include-<\/p>\n\n\n\n<p>\u00b7 Weak e-mail security solutions<\/p>\n\n\n\n<p>\u00b7 Poor or no backup system<\/p>\n\n\n\n<p>\u00b7 Irregular system updates<\/p>\n\n\n\n<p>\u00b7 Poor network security<\/p>\n\n\n\n<p>And most of all, a lack of understanding when it comes to the subject. This is when a market expert in the field can step in with guidance and support.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>How can DigiSec360 help?<\/strong><\/p>\n\n\n\n<p>The team at DigiSec360 is equipped with experience and expertise when it comes to tackling the cyber security loopholes in the Indian scenario. Their curated services and products for SMEs include-<\/p>\n\n\n\n<p>\u00b7 Cybersecurity Awareness workshops for employees<\/p>\n\n\n\n<p>\u00b7 Vulnerability Assessment and Penetration Test (VAPT ) of Websites<\/p>\n\n\n\n<p>\u00b7 Cybersecurity handbook, Infosec policy drafting and guidelines as per NIST and ISO standards<\/p>\n\n\n\n<p>\u00b7 Topia- An application for software vulnerability assessment, threat detection and patchless protection solution which enables remote monitoring and protection of critical organizational assets.<\/p>\n\n\n\n<p>\u00b7 DigiMonitor- A dashboard solution helping management teams monitor the status of cyber data\/ risk points. Performance review at a glance providing metrics on KPIs and analytics.<\/p>\n\n\n\n<p>The good news is that implementing good cybersecurity practices is not a costly affair. You just have to decide to do it. Now would be a good time.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Reach out to us at&nbsp;<a href=\"mailto:contact@digisec360.in\">contact@digisec360.in<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is important for organizations of all shapes and sizes. While major businesses work [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":41,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[4],"tags":[7,25,26],"class_list":["post-36","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-msme","tag-secureyourbusiness"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Organization From Cyber Attacks - Blog | DigiSec360<\/title>\n<meta name=\"description\" content=\"Protect Your Organization From Cyber Attacks - Blog | DigiSec360\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Organization From Cyber Attacks - Blog | DigiSec360\" \/>\n<meta property=\"og:description\" content=\"Protect Your Organization From Cyber Attacks - Blog | DigiSec360\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | DigiSec360\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digisec360\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-29T07:31:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-09T10:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/digisec360.com\/blog\/wp-content\/uploads\/2019\/08\/75659200_1567077190.png\" \/>\n\t<meta property=\"og:image:width\" content=\"342\" \/>\n\t<meta property=\"og:image:height\" content=\"316\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DSec360\" \/>\n<meta name=\"twitter:site\" content=\"@DSec360\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/person\\\/90062614cebf65c6d526c7bde8e40a76\"},\"headline\":\"Protect Your Organization From Cyber Attacks\",\"datePublished\":\"2019-08-29T07:31:25+00:00\",\"dateModified\":\"2023-02-09T10:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/\"},\"wordCount\":407,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/75659200_1567077190.png\",\"keywords\":[\"cybersecurity\",\"MSMe\",\"secureyourbusiness\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/\",\"name\":\"Protect Your Organization From Cyber Attacks - Blog | DigiSec360\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/75659200_1567077190.png\",\"datePublished\":\"2019-08-29T07:31:25+00:00\",\"dateModified\":\"2023-02-09T10:28:32+00:00\",\"description\":\"Protect Your Organization From Cyber Attacks - Blog | DigiSec360\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/75659200_1567077190.png\",\"contentUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/75659200_1567077190.png\",\"width\":342,\"height\":316,\"caption\":\"Cyber Attacks Protections\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/protect-your-organization-from-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Organization From Cyber Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/\",\"name\":\"Blog | DigiSec360\",\"description\":\"The Human Element of Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#organization\",\"name\":\"DigiSec360\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/cropped-digisec360.png\",\"contentUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/cropped-digisec360.png\",\"width\":1484,\"height\":441,\"caption\":\"DigiSec360\"},\"image\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/digisec360\\\/\",\"https:\\\/\\\/x.com\\\/DSec360\",\"https:\\\/\\\/www.instagram.com\\\/dsec360\\\/\",\"https:\\\/\\\/in.linkedin.com\\\/company\\\/digisec360\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/person\\\/90062614cebf65c6d526c7bde8e40a76\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/digisec360.com\\\/blog111\"],\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Organization From Cyber Attacks - Blog | DigiSec360","description":"Protect Your Organization From Cyber Attacks - Blog | DigiSec360","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Organization From Cyber Attacks - Blog | DigiSec360","og_description":"Protect Your Organization From Cyber Attacks - Blog | DigiSec360","og_url":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/","og_site_name":"Blog | DigiSec360","article_publisher":"https:\/\/www.facebook.com\/digisec360\/","article_published_time":"2019-08-29T07:31:25+00:00","article_modified_time":"2023-02-09T10:28:32+00:00","og_image":[{"width":342,"height":316,"url":"http:\/\/digisec360.com\/blog\/wp-content\/uploads\/2019\/08\/75659200_1567077190.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@DSec360","twitter_site":"@DSec360","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/"},"author":{"name":"admin","@id":"https:\/\/digisec360.com\/blog\/#\/schema\/person\/90062614cebf65c6d526c7bde8e40a76"},"headline":"Protect Your Organization From Cyber Attacks","datePublished":"2019-08-29T07:31:25+00:00","dateModified":"2023-02-09T10:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/"},"wordCount":407,"commentCount":0,"publisher":{"@id":"https:\/\/digisec360.com\/blog\/#organization"},"image":{"@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2019\/08\/75659200_1567077190.png","keywords":["cybersecurity","MSMe","secureyourbusiness"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/","url":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/","name":"Protect Your Organization From Cyber Attacks - Blog | DigiSec360","isPartOf":{"@id":"https:\/\/digisec360.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2019\/08\/75659200_1567077190.png","datePublished":"2019-08-29T07:31:25+00:00","dateModified":"2023-02-09T10:28:32+00:00","description":"Protect Your Organization From Cyber Attacks - Blog | DigiSec360","breadcrumb":{"@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#primaryimage","url":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2019\/08\/75659200_1567077190.png","contentUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2019\/08\/75659200_1567077190.png","width":342,"height":316,"caption":"Cyber Attacks Protections"},{"@type":"BreadcrumbList","@id":"https:\/\/digisec360.com\/blog\/protect-your-organization-from-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digisec360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Organization From Cyber Attacks"}]},{"@type":"WebSite","@id":"https:\/\/digisec360.com\/blog\/#website","url":"https:\/\/digisec360.com\/blog\/","name":"Blog | DigiSec360","description":"The Human Element of Cybersecurity","publisher":{"@id":"https:\/\/digisec360.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digisec360.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digisec360.com\/blog\/#organization","name":"DigiSec360","url":"https:\/\/digisec360.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digisec360.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/cropped-digisec360.png","contentUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/cropped-digisec360.png","width":1484,"height":441,"caption":"DigiSec360"},"image":{"@id":"https:\/\/digisec360.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/digisec360\/","https:\/\/x.com\/DSec360","https:\/\/www.instagram.com\/dsec360\/","https:\/\/in.linkedin.com\/company\/digisec360"]},{"@type":"Person","@id":"https:\/\/digisec360.com\/blog\/#\/schema\/person\/90062614cebf65c6d526c7bde8e40a76","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/digisec360.com\/blog111"],"url":"https:\/\/digisec360.com\/blog\/author\/admin\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":2,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts\/36\/revisions"}],"predecessor-version":[{"id":42,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts\/36\/revisions\/42"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/media\/41"}],"wp:attachment":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/media?parent=36"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/categories?post=36"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/tags?post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}