{"id":6311,"date":"2020-08-05T21:10:38","date_gmt":"2020-08-05T20:10:38","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6311"},"modified":"2021-04-09T21:26:29","modified_gmt":"2021-04-09T20:26:29","slug":"keeping-customers-secure-home-or-road","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road","title":{"rendered":"Keeping Customers Secure at Home or on the Road"},"content":{"rendered":"<p>For years, security professionals have cautioned companies against relying on traditional perimeter-based defenses. Trends like the proliferation of mobile devices, employees working remotely, and IoT devices have made it clear that the old castle-and-moat model of protecting the corporate network in a building no longer applies.<\/p>\n<p>The COVID-19 pandemic has only hastened this trend. Companies across the globe had to shift to employees working from home nearly overnight. Cybercriminals increased their activity, hoping to capitalize on confusion and fear surrounding the pandemic. Unfortunately, the sheer lack of control for businesses made combatting attackers much harder. Employees let their guard down and tech teams had even less visibility than before as workers used home networks with varying levels of security.<\/p>\n<p>Ultimately, this unfortunate moment has demonstrated that IT service providers must be able to reduce their customers\u2019 security risks wherever the workforce sits\u2014whether it\u2019s a chair in an air-conditioned company office, sharing a couch at home with a dog seeking attention, or in their hotel room checking their work email on a trip before winding down for the night.<\/p>\n<p>This requires a mindset shift. Today, we\u2019ll focus on two important areas for dealing with this shift\u2014what you control and what your users control.<\/p>\n<h2>What you control<\/h2>\n<p>For starters, let\u2019s talk about hardening your customers\u2019 defenses in the current environment.<\/p>\n<h3>PROTECT ENDPOINTS<\/h3>\n<p>With customers carrying sensitive work information and data wherever they go, endpoints become the new battlefront. Stay up-to-date with endpoint hygiene: force password resets every few months, patch endpoints quickly, back up critical data, and have some level of active\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/malware-protection\" target=\"_blank\" rel=\"noopener\">malware protection<\/a>\u00a0on the machine. This leads me to my next point.<\/p>\n<h3>MONITOR FOR ENDPOINT THREATS<\/h3>\n<p>Antivirus (AV) has traditionally been a major part of endpoint defenses. However, AV is often passive, requiring you to wait for signature updates (and more advanced behavioral AVs can be bypassed). Plus, endpoint threats like weaponized documents or fileless attacks slip by traditional malware protection. For this reason it\u2019s important to use a good endpoint detection and response product. These can monitor for anomalies on an endpoint and alert you when one appears. It offers more complete, active protection and can be key for turning the tide against cybercriminals.<\/p>\n<h3>PROTECT MOBILE DEVICES<\/h3>\n<p>If you\u2019re responsible for mobile devices, then you\u2019ll need to implement controls to protect them. For instance, you\u2019ll want to make sure your\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm?promo=blog\">RMM solution<\/a>\u00a0gives you the ability to remotely lock phones, change passwords, or wipe devices if needed. This should help with lost or stolen devices.<\/p>\n<h2>What your users control<\/h2>\n<p>Of course, people still play a role in cybersecurity. Even if you take the right precautions and put in the right security controls, mistakes can still happen. And with workers being home, even more of the responsibility falls on individual actions from end users. So you\u2019ll need to enlist your customers\u2019 end users\u2019 help in keeping company resources safe.<\/p>\n<p>You\u2019ll need to train your end users on proper behavior. And with workforces being as distributed as they are, it\u2019s worth sending periodic reminders\u2014training simply can\u2019t be a one-off event. When you do train them, make sure to emphasize the following:<\/p>\n<h3>REPORT LOST\/STOLEN DEVICES<\/h3>\n<p>For starters, if an employee loses a device, whether it\u2019s a smartphone or a laptop, they need to report it immediately. This gives you the opportunity to wipe the data and lock the device before a breach occurs. However, this requires you to emphasize that employees won\u2019t get in trouble for losing devices\u2014they need to feel comfortable coming forward. If you have a customer who\u2019s liable to get upset at a lost device, try to remind them that recouping the cost of a lost smartphone is much smaller than taking a major reputational and fiscal hit from a data breach. Mistakes happen\u2014they don\u2019t need to become disasters.<\/p>\n<h3>BE CAREFUL ON EMAIL<\/h3>\n<p>Remind users to be think twice before opening emails and clicking on links. Cybercriminals took advantage of the COVID-19 situation to trick users via phishing emails. Having a healthy skepticism on email matters now more than ever. Make sure to remind customers to check for things like misspellings, odd domain names, mismatched display names, or unusual requests for information.<\/p>\n<h3>THINK TWICE ABOUT MOBILE PERMISSIONS<\/h3>\n<p>We already mentioned the need to manage your company-owned mobile devices. However, it\u2019s also important to get customers to take care of their own personal devices. While they likely know to password protect their devices, far fewer give app permissions a second thought. Remind them to be careful about which apps get access to permissions like location data or in-app purchases. Industry outlets like\u00a0<a class=\"ext\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/mobile-app-fraud-jumped-in-q1-as-attackers-pivot-from-browsers\/d\/d-id\/1338336\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a>\u00a0have reported a major uptick early this year in mobile fraud, including mobile app fraud.<\/p>\n<h3>PROTECT HOME WI-FI<\/h3>\n<p>With customers frequently working from home, they\u2019re often using home Wi-Fi networks that can have dozens of devices on them with varying levels of security\u2014from corporate issued laptops to personal gaming systems to IoT devices like smart speakers. Help customers protect their Wi-Fi from intruders by reminding them to use a\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/blog\/how-to-make-a-strong-password-policy-tips-for-service-providers\" target=\"_blank\" rel=\"noopener noreferrer\">strong password<\/a>\u00a0with WPA2 encryption (or better), and make sure they also change any default passwords on administrator accounts.<\/p>\n<h3>BE CAREFUL ON PUBLIC WI-FI<\/h3>\n<p>Finally, as employees work either on the road or at coffee shops, make sure they\u2019re careful around free Wi-Fi. Remind them that even password protected doesn\u2019t mean secure\u2014if they\u2019re on hotel Wi-Fi, they\u2019re still vulnerable to attacks from people on that network. Also, remind them to turn off autoconnect on mobile devices for Wi-Fi networks\u2014you never know when a hacker may attempt a watering hole attack by creating a fraudulent public Wi-Fi network.<\/p>\n<h2>What you can\u2019t control<\/h2>\n<p>On a final note, it\u2019s worth realizing that you can\u2019t control everything. New threats will crop up. New vulnerabilities will appear as well. Sometimes, we\u2019ll face a seismic change in the way we work\u2014potentially even overnight.<\/p>\n<p>You can\u2019t completely control for these factors. Yet, your customers look to you to as the expert, so you have to remain calm under pressure and when facing the unexpected. Nearly anyone can get stressed during a security event or an overnight shift in infrastructure. It\u2019s human. But trying to remain calm under pressure will help your team make better decisions and instill confidence in your end customers.<\/p>\n<p>One of the most important ways to do this is to develop plans ahead of time for dealing with potential security incidents. Make sure people know the process, their roles, and the steps to take if an incident arises. And above all, practice this and run drills. This can dramatically cut down on the anxiety during an event. You can\u2019t control everything, but you can take as many preparations as possible to reduce your risk.<\/p>\n<p><strong>Earlier in the piece, we mentioned the importance of endpoint detection and response. With endpoints becoming ever more crucial in the fight against cybercrime, it\u2019s important to have more complete protection. SolarWinds<sup>\u00ae<\/sup>\u00a0Endpoint Detection &amp; Response (EDR) helps prevent endpoint threats using AI and machine learning to detect anomalies at the endpoint level\u2014so even if an attacker uses a fileless attack that would normally slip past AV, EDR can catch the issue and take action. It even offers an automatic ransomware rollback to return endpoints to a known safe state without you having to lift a finger.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Learn more about SolarWinds EDR today<\/a>.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6311","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Keeping Customers Secure at Home or on the Road - N-able<\/title>\n<meta name=\"description\" content=\"IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Customers Secure at Home or on the Road - N-able\" \/>\n<meta property=\"og:description\" content=\"IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-05T20:10:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T20:26:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Keeping Customers Secure at Home or on the Road\",\"datePublished\":\"2020-08-05T21:10:38+01:00\",\"dateModified\":\"2021-04-09T20:26:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\"},\"wordCount\":1264,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\",\"name\":\"Keeping Customers Secure at Home or on the Road - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-08-05T21:10:38+01:00\",\"dateModified\":\"2021-04-09T20:26:29+00:00\",\"description\":\"IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keeping Customers Secure at Home or on the Road\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Keeping Customers Secure at Home or on the Road - N-able","description":"IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road","og_locale":"fr_FR","og_type":"article","og_title":"Keeping Customers Secure at Home or on the Road - N-able","og_description":"IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-08-05T20:10:38+00:00","article_modified_time":"2021-04-09T20:26:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Keeping Customers Secure at Home or on the Road","datePublished":"2020-08-05T21:10:38+01:00","dateModified":"2021-04-09T20:26:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road"},"wordCount":1264,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road","url":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road","name":"Keeping Customers Secure at Home or on the Road - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-08-05T21:10:38+01:00","dateModified":"2021-04-09T20:26:29+00:00","description":"IT service providers must be able to reduce their customers\u2019 security risks wherever their workforce are. Learn more about what you can\u2014and can\u2019t\u2014control.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/keeping-customers-secure-home-or-road#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Keeping Customers Secure at Home or on the Road"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6311"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6311\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}