{"id":59444,"date":"2024-10-10T11:26:09","date_gmt":"2024-10-10T10:26:09","guid":{"rendered":"https:\/\/www.n-able.com\/?p=59444"},"modified":"2024-10-10T11:31:52","modified_gmt":"2024-10-10T10:31:52","slug":"dont-let-your-msp-become-the-next-big-headline-part-2","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2","title":{"rendered":"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2"},"content":{"rendered":"<p>In part one of this blog series, I looked at the first three lessons I believed MSPs could learn from three recent legal cases to strengthen their cybersecurity practice. <a href=\"https:\/\/www.n-able.com\/blog\/dont-let-your-msp-become-the-next-big-headline-part-1\" target=\"_blank\" rel=\"noopener\">You can read that blog here<\/a>. In this blog, I\u2019m going to look at the remaining three lessons MSPs should take away from these cases.<\/p>\n<p>If you haven\u2019t read the first blog, here are links to the legal cases I\u2019m referencing:<\/p>\n<ul>\n<li>California: <span><a href=\"https:\/\/www.msspalert.com\/news\/msp-sued-by-law-firm-over-black-basta-ransomware-attack\" target=\"_blank\" rel=\"noopener\">Law Firm Sues MSP Over Black Basta Ransomware Attack<\/a><\/span><\/li>\n<li>Maine: <span><a href=\"https:\/\/www.msspalert.com\/news\/it-consulting-firm-blames-msp-for-data-breach\" target=\"_blank\" rel=\"noopener\">IT Consulting Firm Blames MSP for Data Breach<\/a><\/span><\/li>\n<li>Ohio: <span><a href=\"https:\/\/foresite.com\/blog\/msp-sued-by-customer-after-phishing-attack\/\" target=\"_blank\" rel=\"noopener\">MSP Sued By Customer After Phishing Attack<\/a><\/span><\/li>\n<\/ul>\n<p>And lessons 1-3 were:<\/p>\n<ul>\n<li>Ensure you have a signed, written contract in place with Every. Single. Customer<\/li>\n<li>Ensure your agreements clearly define your scope of services to set expectations and limit your exposure<\/li>\n<li>Ensure you build your cybersecurity business in a way that pushes liability and risk back onto the customer<\/li>\n<\/ul>\n<p>And here are the final three lessons:<\/p>\n<h2><strong>4. Ensure your customers have their own cyber insurance<\/strong><\/h2>\n<p>Another way to encourage customers to be accountable for their own risk and to share the cybersecurity responsibility, is to ensure that they each have their own cybersecurity insurance policy in place. More and more MSPs are starting to make it a contractual requirement that their customers invest in their own cyber liability insurance coverage to help mitigate as much risk from their MSP as possible. They are acknowledging that although they are the customer\u2019s MSP, they can\u2019t assume and carry ALL of the liability and cyber-risk for their customers. For this reason, they are mandating that their customers go and source their own cyber-liability insurance coverage to offset part of the risk.<\/p>\n<p>This may be a trend you want to consider as well; insisting your clients obtain their own cyber liability insurance policy, if they don\u2019t have it in place already. Of course, if you do put this requirement in place, to qualify for that insurance policy, the customer will have to be enrolled in your Advanced Cybersecurity Program, as the requirements listed on many cyber liability insurance application forms are requirements that make sense to include in an Advanced Security Program. So, the two align well and can act as an upgrade path for you to transition and standardize your clients into that more comprehensive set of protection services.<\/p>\n<h2><strong>5. Be consistent in your service delivery<\/strong><\/h2>\n<p>Another big takeaway from these court cases is that MSPs need to be disciplined and consistent in how they deliver their recommended security programs to their customers.<\/p>\n<p>This means that whatever services are documented in your managed services statement of work and outlined via your agreement, are actually being delivered as promised. Because when we look at the Ohio court case, it was discovered that a few critically important elements of their agreement were overlooked and were not being delivered as agreed upon. Details of negligence included: Machines missing vital anti-virus software (even though the service order stated that they would provide virus and malware protection); and quarterly business reviews that were never scheduled and completed. These are big oversights in their onboarding and service delivery processes that never should have happened.<\/p>\n<p>The lesson here is to not become complacent in the delivery of your own cybersecurity program and to ensure that you are continually auditing your service delivery processes and the team assigned to completing those tasks, to confirm that your MSP is delivering what it has committed itself to.<\/p>\n<p><strong>And what I believe to be the biggest takeaway of them all\u2026<\/strong><\/p>\n<h2><strong>6. Ensure that you are delivering your quarterly business reviews!<\/strong><\/h2>\n<p><span><a href=\"https:\/\/www.n-able.com\/blog\/msp-quarterly-business-review\" target=\"_blank\" rel=\"noopener\">Quarterly Business Reviews<\/a><\/span> are the cornerstone of any good cybersecurity program. They are needed to keep the lines of communication open, and to ensure that both parties are on the same page in terms of setting and meeting expectations and accountability standards.<\/p>\n<p>Because, if you are not regularly speaking to your clients via a QBR, then they could be feeling \u2013 just by virtue of them paying you a fee every month \u2013 that your MSP is doing everything possible to protect their network from cyber-attacks and that they are completely safe. But if you know that\u2019s not the case \u2013 if you know that they have gaps in their cyber-protection and resiliency coverage &#8211; then this perception needs to be corrected and corrected quickly. In all three of these lawsuits, it seemed apparent that these critical customer engagement meetings were not happening. The clients assumed that they were being properly protected by their respective MSPs, when they really weren\u2019t.<\/p>\n<p>In both the California and Maine cases, in the MSPs\u2019 minds, these clients didn\u2019t sign up for, nor did they agree to pay for, any type of cybersecurity protection coverage &#8211; so they didn\u2019t think they were responsible for it. This resulted in the clients not being sufficiently covered despite thinking that they were.<\/p>\n<p>The unfortunate truth is that all three of these court cases could have been completely avoided if these MSPs had been having regular QBRs with their customers. Because if these MSPs had been speaking to their customers on a regular basis then:<\/p>\n<ol>\n<li>These risk conversations would have been happening<\/li>\n<li>These potential security deficiencies and holes in the organizations\u2019 cybersecurity protection coverage would have been uncovered<\/li>\n<li>And these assumptions would have been dealt with before they translated into real problems with severe financial and reputational consequences for both the client and the MSP<\/li>\n<\/ol>\n<p>So, if you are not having regular interaction with your customers and talking to them about their risk exposure, then as a final lesson here: Commit to reaching out to every one of your customers and start lining up meetings so you can <span><a href=\"https:\/\/www.n-able.com\/blog\/how-get-customer-buy-cybersecurity\" target=\"_blank\" rel=\"noopener\">have these critical risk and security conversations<\/a><\/span>. And resist pre-objecting ahead of time and thinking, \u201cSome of my customers will never buy into my security services so I won\u2019t bother reaching out to them.\u201d Be sure to connect with all of your customers, because there is no room for \u2018assumptions\u2019 when it comes to something as serious as an organization\u2019s cybersecurity protection coverage.<\/p>\n<p><strong>If you are interested in learning more, then consider registering for my upcoming bootcamp <\/strong><span><a href=\"https:\/\/www.n-able.com\/events\/dont-let-your-msp-become-the-next-big-headline\" target=\"_blank\" rel=\"noopener\"><strong>Don\u2019t Let Your MSP Become the Next Big Headline<\/strong><\/a><\/span><strong>.<\/strong><strong>\u00a0 And I also encourage you download a copy of my new security e-book: <\/strong><span><a href=\"https:\/\/www.n-able.com\/resources\/selling-security-playbook\" target=\"_blank\" rel=\"noopener\"><strong>Defend &amp; Prosper: Maximizing the Cybersecurity Opportunity.<\/strong><\/a><\/span><\/p>\n<p><em>Stefanie Hammond is Head Sales and Marketing Nerd at N\u2011able. You can follow her on <\/em><a href=\"https:\/\/www.linkedin.com\/in\/stefanie-hammond\" target=\"_blank\" rel=\"noopener\"><em>LinkedIn<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this second blog, Stefanie Hammond looks at the final three things MSPs must ensure they do when developing their cybersecurity practice.<\/p>\n","protected":false},"author":64,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-59444","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Don\u2019t Let Your MSP Become the Next Big Headline, Part 2 - N-able<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2 - N-able\" \/>\n<meta property=\"og:description\" content=\"In this second blog, Stefanie Hammond looks at the final three things MSPs must ensure they do when developing their cybersecurity practice.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-10T10:26:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-10T10:31:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/100824_BB_Cybesecurity-Lessons-Pt2_PD_Final_1200x628-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefanie Hammond\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Hammond\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\"},\"author\":{\"name\":\"Stefanie Hammond\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\"},\"headline\":\"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2\",\"datePublished\":\"2024-10-10T11:26:09+01:00\",\"dateModified\":\"2024-10-10T10:31:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\"},\"wordCount\":1085,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Head Nerds\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\",\"name\":\"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2024-10-10T11:26:09+01:00\",\"dateModified\":\"2024-10-10T10:31:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\",\"name\":\"Stefanie Hammond\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"caption\":\"Stefanie Hammond\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2 - N-able","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2","og_locale":"it_IT","og_type":"article","og_title":"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2 - N-able","og_description":"In this second blog, Stefanie Hammond looks at the final three things MSPs must ensure they do when developing their cybersecurity practice.","og_url":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-10-10T10:26:09+00:00","article_modified_time":"2024-10-10T10:31:52+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/10\/100824_BB_Cybesecurity-Lessons-Pt2_PD_Final_1200x628-scaled.jpg","type":"image\/jpeg"}],"author":"Stefanie Hammond","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Stefanie Hammond","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2"},"author":{"name":"Stefanie Hammond","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8"},"headline":"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2","datePublished":"2024-10-10T11:26:09+01:00","dateModified":"2024-10-10T10:31:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2"},"wordCount":1085,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Head Nerds","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2","url":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2","name":"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2024-10-10T11:26:09+01:00","dateModified":"2024-10-10T10:31:52+00:00","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/dont-let-your-msp-become-the-next-big-headline-part-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/it\/blog\/category\/head-nerds-it"},{"@type":"ListItem","position":2,"name":"Don\u2019t Let Your MSP Become the Next Big Headline, Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/5dd562750a462fbf021a62a3347250c8","name":"Stefanie Hammond","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","caption":"Stefanie Hammond"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/59444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=59444"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/59444\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=59444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}