{"id":12465,"date":"2021-05-24T10:48:22","date_gmt":"2021-05-24T15:48:22","guid":{"rendered":"https:\/\/sterling.com\/?p=12465"},"modified":"2021-05-24T10:48:22","modified_gmt":"2021-05-24T15:48:22","slug":"the-cybersecurity-pandemic","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=12465","title":{"rendered":"The Cybersecurity Pandemic"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Raging alongside the coronavirus pandemic that has threatened our lives globally has been another scourge, ongoing, threatening our well-being globally and costing us dearly, but with no vaccine. There\u2019s no doubt we\u2019ve been occupied societally with a life-or-death virus, and we\u2019ve had to leave this tech plague \u2013 <em>cybercrime<\/em> \u2013 mainly to IT specialists, but increasingly, we will each (individuals) have to adopt (and re-adopt) new codes of conduct and digital hygiene.<\/p>\n<p>Covid is essentially a natural disaster. In contrast, the theft of data and the disruption of servers and networks is the work of intentional, malicious hackers, out mainly for handsome ransom money, and in some cases, political muscle-flexing and nation-state interference.<\/p>\n<p>In our digital world, a landscape covered with interconnected, vulnerable computer devices (the Internet of Things), there is little safe quarter. The \u2018threat surface\u2019 is vast.<\/p>\n<p>A recent McAfee report estimates that cybercrime in 2019 had already cost the world over one trillion dollars (\u201cmore than 1 percent of the global GDP\u201d). And an assessment by Steve Morgan of CyberVentures, anticipates that financial damage from cybercrime by 2025 could reach a mindboggling 10.5 trillion dollars \u2013 resulting in \u201cthe greatest transfer of wealth in history.\u201d<\/p>\n<p>The damage inflicted on the infrastructure of businesses, institutions, government entities, and others is not only reckoned in brute loss of funds (the extorted money paid out, lost sales revenue, expenses incurred in downtime) but as gravely in the loss of proprietary and sensitive data and intellectual property. The damage to the <em>reputation<\/em> of a stricken enterprise, and the loss of the public or consumer trust are incalculable.<\/p>\n<p>Cybersecurity and preparedness are dire priorities and must be basic considerations for all businesses and organizations. To reiterate a clich\u00e9d fact, it\u2019s not a matter of if, but <em>when<\/em> before your data is threatened (small or large scale, personal bank account or coastal gas-pipeline\u2019s server).<\/p>\n<p>A multifaceted industry of specialists \u2013 including Sterling, its partners, manufacturers, engineers, consultants, academics &#8212; armed with multilayered solutions (no one-shot fix ) has emerged to help mitigate the risks; detect and thwart data-breaches and cyberattacks in the first place via Incident Response Planning; defend the data, once compromised;\u00a0 limit the \u2018dwell time\u2019 (the amount of exposure to hackers); then mitigate the damage and speed the recovery, retrieving data if at all possible.<\/p>\n<p>It\u2019s only a matter of time before the cyber-term \u201czero trust\u201d enters our non-digital daily vocabularies, as we learn to be technically evasive and not to trust (doubting the authenticity of every incoming communique, every device share, every hookup, every app-quisition, the entire Internet, etc.) \u00a0and increase our verified-access requests, use-identification gauntlets, and invest in sophisticated new cyber-solutions like \u2018mini-quarantining\u2019 container software.<\/p>\n<p>The more distributed our workforce, the more dependent we are on mobile devices and on the work from anywhere paradigm.\u00a0 We find ourselves \u2018living in the cloud\/s,\u2019 (hybrid- or multi-), and backing up our data in cloud-native applications. But we must also prepare to know the drill by being able to respond to the worse-case scenarios. By investing in technology and expertise we are more likely to thrive in this new age of data optimization. While we will never achieve herd immunity to cyberattacks, we can become less attractive hosts with diligent cyber-hygiene.<\/p>\n<p><a href=\"https:\/\/sterling.com\/stargazer\/contact-information\/\">Contact Sterling<\/a> to help bolster your defenses and optimize your cyber-hygiene. Sterling can assist with technology updates and advancements, discovery calls, security workshops, and security assessments.[\/vc_column_text][vc_empty_space][vc_custom_heading text=&#8221;The Impact of Cybercrime&#8221; font_container=&#8221;tag:h2|text_align:center|color:%23c82026&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 14pt;\">A STATISTICAL SNAPSHOT OF THE LAST YEAR IN CYBERSECURITY ATTACKS, PREPAREDNESS, AND MITIGATION EFFORTS<\/span><\/p>\n<p style=\"text-align: center;\">Cyberattacks have been increasing at an exponential rate from 2020 to 2021, which means proactive preparedness, risk- mitigation, incident-response plans, and a Zero-Trust cybersecurity resiliency model must all be in place. Don\u2019t be a statistic of the ransomware trap and of cyber breach.\u00a0Assess your cybersecurity preparedness <strong><a href=\"https:\/\/sterling.com\/stargazer\/cybersecurity-assessment-download-form\/\">here<\/a> <\/strong>and then <a href=\"https:\/\/sterling.com\/stargazer\/cybersecurity\/\"><strong>watch the Sterling Cybersecurity Webinar Series.<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-12488 aligncenter\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png\" alt=\"\" width=\"583\" height=\"388\" \/><\/h3>\n<h3><\/h3>\n<h3><\/h3>\n<h3><\/h3>\n<h3><\/h3>\n<h4><\/h4>\n<h4><\/h4>\n<h4 style=\"text-align: center;\">Download the complete statistical infographic below.<\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;12487&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; link=&#8221;https:\/\/sterling.com\/stargazer\/Ransomware-Infographic.pdf&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Raging alongside the coronavirus pandemic that has threatened our lives globally has been another scourge, ongoing, threatening our well-being globally and costing us dearly, but with no vaccine. There\u2019s no [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,17,1],"tags":[],"class_list":["post-12465","post","type-post","status-publish","format-standard","hentry","category-blog","category-security","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Cybersecurity Pandemic - Sterling<\/title>\n<meta name=\"description\" content=\"The Cybersecurity Pandemic: Looking at ransomwear, threat actors\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cybersecurity Pandemic - Sterling\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity Pandemic: Looking at ransomwear, threat actors\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=12465\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-24T15:48:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png\" \/>\n<meta name=\"author\" content=\"Sterling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465\"},\"author\":{\"name\":\"Sterling\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\"},\"headline\":\"The Cybersecurity Pandemic\",\"datePublished\":\"2021-05-24T15:48:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465\"},\"wordCount\":706,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware-Infographic-snippet-for-blog.png\",\"articleSection\":[\"Blog\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465\",\"name\":\"The Cybersecurity Pandemic - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware-Infographic-snippet-for-blog.png\",\"datePublished\":\"2021-05-24T15:48:22+00:00\",\"description\":\"The Cybersecurity Pandemic: Looking at ransomwear, threat actors\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#primaryimage\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware-Infographic-snippet-for-blog.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware-Infographic-snippet-for-blog.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=12465#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Cybersecurity Pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\",\"name\":\"Sterling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"caption\":\"Sterling\"},\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cybersecurity Pandemic - Sterling","description":"The Cybersecurity Pandemic: Looking at ransomwear, threat actors","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Cybersecurity Pandemic - Sterling","og_description":"The Cybersecurity Pandemic: Looking at ransomwear, threat actors","og_url":"https:\/\/sterling.com\/stargazer\/?p=12465","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2021-05-24T15:48:22+00:00","og_image":[{"url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png","type":"","width":"","height":""}],"author":"Sterling","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=12465#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=12465"},"author":{"name":"Sterling","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d"},"headline":"The Cybersecurity Pandemic","datePublished":"2021-05-24T15:48:22+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=12465"},"wordCount":706,"commentCount":0,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=12465#primaryimage"},"thumbnailUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png","articleSection":["Blog","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=12465","url":"https:\/\/sterling.com\/stargazer\/?p=12465","name":"The Cybersecurity Pandemic - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=12465#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=12465#primaryimage"},"thumbnailUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png","datePublished":"2021-05-24T15:48:22+00:00","description":"The Cybersecurity Pandemic: Looking at ransomwear, threat actors","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=12465#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=12465"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=12465#primaryimage","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2021\/05\/Ransomware-Infographic-snippet-for-blog.png"},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=12465#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"The Cybersecurity Pandemic"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d","name":"Sterling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","caption":"Sterling"},"url":"https:\/\/sterling.com\/stargazer\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/12465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12465"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/12465\/revisions"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}