{"id":6042,"date":"2020-01-03T22:55:21","date_gmt":"2020-01-03T22:55:21","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6042"},"modified":"2021-04-08T22:57:39","modified_gmt":"2021-04-08T21:57:39","slug":"are-your-mobile-devices-making-you-vulnerable-email-threats","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats","title":{"rendered":"Are Your Mobile Devices Making You Vulnerable to Email Threats?"},"content":{"rendered":"<p>In our previous blog we covered\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/top-social-engineering-techniques-trending-email\" target=\"_blank\" rel=\"noopener\">Top Social Engineering Techniques Trending on Email<\/a>. We continue to see that email remains the number one attack vector for businesses. According to a study by 451 Research, email security is the biggest problem we\u2019re not paying attention to. In the survey, they found that 46% of respondents still feel email poses the greatest data threat, despite the fact that 87% of organizations have email security solutions in place<sup>1<\/sup>. User behavior (28%) and phishing (24%) were listed as the top two pain points for security teams, however according to the data, phishing prevention is not among the top strategic objectives for CISOs<sup>2<\/sup>.<\/p>\n<p>Cybercrime continues to rise, and cybercriminals are adapting their attack methods. According to Accenture\u2019s Ninth Annual Cost of Cybercrime Study, attackers now see the human layer as the weakest link in a company\u2019s defenses, and are focused on using this as a path to attacks through increased phishing and the exploitation of insiders<sup>3<\/sup>. However, the majority of attacks happen without employees even being aware they\u2019ve done anything wrong. As an example, according to executives surveyed in the study, employees accidentally publicizing confidential information is a huge risk for companies<sup>4<\/sup>.<\/p>\n<p>However, despite best efforts to increase email defenses, the biggest challenge in the fight against cyberthreats and insider attacks could be employees on their mobile devices.<\/p>\n<p>Verizon\u2019s 2019 Data Breach Investigations Report indicates users are significantly more susceptible to social attacks they receive on mobile devices. With many companies allowing employees to use their own devices for work-related purposes, this is something that\u2019s hard to control. While some companies have strict bring your own device (BYOD) policies, many don\u2019t have anything in place to mitigate security risks via employees\u2019 devices.<\/p>\n<h3>Why most mobile devices are left unprotected<\/h3>\n<p style=\"font-weight: 400;\">One of the key problems is perception. Most users believe their mobile devices are relatively secure, so they don\u2019t take extra time to ensure the content they receive via mobile devices is safe. They also don\u2019t put additional security in place to help filter out threats.<\/p>\n<p style=\"font-weight: 400;\">On top of this, restrictions within the mobile device design mean users are more likely to click on malicious links in emails viewed on mobile devices than on laptops. Cybercriminals can easily con users into thinking a website is legitimate by using tricks like URL padding and using the small screen size to their advantage\u2014like how little of the URL a user can see. These techniques are especially successful in the case of email-based spear phishing and spoofing attacks that attempt to mimic legitimate webpages. Furthermore, the majority of smartphones make it difficult for users to review the accuracy of emails due to the limitations in viewing multiple pages side-by-side and navigating between pages and apps. For example, users don\u2019t always have full visibility to email headers and email sources at first glance.<\/p>\n<p style=\"font-weight: 400;\">According to Verizon\u2019s research, the biggest driver making users more susceptible to threats via mobile devices is, in fact, the way in which they interact and use their devices. While the ease and speed with which users can accept, reply to, and send email is highly efficient and user friendly, it also opens the door for threats to creep in. For example, we all use our devices while doing other activities like walking, talking, and consuming other media. We are not always paying careful attention to incoming information, which means we don\u2019t always take the time to review requests thoroughly and can be too quick to respond.<\/p>\n<p style=\"font-weight: 400;\">But what can we do? The use of mobile devices\u2014especially for work purposes\u2014will only continue to rise.<\/p>\n<p style=\"font-weight: 400;\">One of the key solutions is user education. Organizations need to take this into consideration when planning their general cyberhygiene programs.<\/p>\n<p style=\"font-weight: 400;\">Providing ongoing education to employees so they know what to look for\u2014including what a phishing email looks like and the damage cyberattacks can cause\u2014is a key element to include as part of security programs. New work arrangements\u2014such as remote work and BYOD\u2014create urgency around training employees to think and act with security in mind.<\/p>\n<p style=\"font-weight: 400;\">Cyberhygiene should be embedded into an organization\u2019s operations across all departments.<\/p>\n<h3><b><strong>How can SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure help?<\/strong><\/b><\/h3>\n<p style=\"font-weight: 400;\">SolarWinds Mail Assure\u2019s cloud-based email security helps your customers stay in control and protect their inbound and outbound email from email-borne threats. What\u2019s more, you can get Microsoft\u00ae Office 365\u00ae add-in for greater control and visibility into email flows from the Microsoft AppSource at no additional cost\u2014also compatible on mobile devices.<\/p>\n<p style=\"font-weight: 400;\">Interested to learn more about protecting your customers from email-borne threats? Get in touch with a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/quote?pid=mail&amp;poi-ma=1?promo=blog\">solutions provider<\/a>\u00a0today.<\/p>\n<p style=\"font-weight: 400;\">\n<p style=\"font-weight: 400;\"><em>Mia Thompson is the product marketing manager for Mail Assure at SolarWinds MSP.<\/em><\/p>\n<p style=\"font-weight: 400;\">\n<p style=\"font-weight: 400;\"><b><strong>Sources:<\/strong><\/b><\/p>\n<p style=\"font-weight: 400;\">1 \u201cEmail security: the biggest problem you\u2019re not paying attention to,\u201d 451 Research, LLC.\u00a0<a href=\"https:\/\/www.avanan.com\/hubfs\/Content\/Collateral\/451-Avanan-Business-Impact-Brief.pdf\">https:\/\/www.avanan.com\/hubfs\/Content\/Collateral\/451-Avanan-Business-Impact-Brief.pdf<\/a>\u00a0(Accessed December 2019).<\/p>\n<p style=\"font-weight: 400;\">2 \u201cEmail security: the biggest problem you\u2019re not paying attention to,\u201d 451 Research, LLC.\u00a0<a href=\"https:\/\/www.avanan.com\/hubfs\/Content\/Collateral\/451-Avanan-Business-Impact-Brief.pdf\">https:\/\/www.avanan.com\/hubfs\/Content\/Collateral\/451-Avanan-Business-Impact-Brief.pdf<\/a>\u00a0(Accessed December 2019).<\/p>\n<p style=\"font-weight: 400;\">3 \u201cThe Cost of Cybercrime,\u201d Ponemon Institute, LLC.\u00a0<a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf%22%20%5Cl%20%22zoom=50\">https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50<\/a>\u00a0(Accessed December 2019).<\/p>\n<p style=\"font-weight: 400;\">4 \u201cThe Cost of Cybercrime,\u201d Ponemon Institute.\u00a0<a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf%22%20%5Cl%20%22zoom=50\">https:\/\/www.accenture.com\/_acnmedia\/PDF-96\/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50<\/a>\u00a0(Accessed December 2019).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6042","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are Your Mobile Devices Making You Vulnerable to Email Threats? - N-able<\/title>\n<meta name=\"description\" content=\"You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Your Mobile Devices Making You Vulnerable to Email Threats? - N-able\" \/>\n<meta property=\"og:description\" content=\"You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-03T22:55:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T21:57:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mia Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mia Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\"},\"author\":{\"name\":\"Mia Thompson\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\"},\"headline\":\"Are Your Mobile Devices Making You Vulnerable to Email Threats?\",\"datePublished\":\"2020-01-03T22:55:21+00:00\",\"dateModified\":\"2021-04-08T21:57:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\"},\"wordCount\":884,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Mail\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\",\"name\":\"Are Your Mobile Devices Making You Vulnerable to Email Threats? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-01-03T22:55:21+00:00\",\"dateModified\":\"2021-04-08T21:57:39+00:00\",\"description\":\"You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Your Mobile Devices Making You Vulnerable to Email Threats?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\",\"name\":\"Mia Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"caption\":\"Mia Thompson\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are Your Mobile Devices Making You Vulnerable to Email Threats? - N-able","description":"You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats","og_locale":"fr_FR","og_type":"article","og_title":"Are Your Mobile Devices Making You Vulnerable to Email Threats? - N-able","og_description":"You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-01-03T22:55:21+00:00","article_modified_time":"2021-04-08T21:57:39+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Mia Thompson","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Mia Thompson","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats"},"author":{"name":"Mia Thompson","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce"},"headline":"Are Your Mobile Devices Making You Vulnerable to Email Threats?","datePublished":"2020-01-03T22:55:21+00:00","dateModified":"2021-04-08T21:57:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats"},"wordCount":884,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Mail"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats","url":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats","name":"Are Your Mobile Devices Making You Vulnerable to Email Threats? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-01-03T22:55:21+00:00","dateModified":"2021-04-08T21:57:39+00:00","description":"You may have put your email defenses in place to protect your company, but your employees\u2019 mobile devices could be undermining this, warns Mia Thompson.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/are-your-mobile-devices-making-you-vulnerable-email-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"Are Your Mobile Devices Making You Vulnerable to Email Threats?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce","name":"Mia Thompson","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","caption":"Mia Thompson"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6042"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6042\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}