{"id":9777,"date":"2023-07-21T07:00:57","date_gmt":"2023-07-21T07:00:57","guid":{"rendered":"https:\/\/carecomputers.co.uk\/?p=9777"},"modified":"2023-07-21T07:00:57","modified_gmt":"2023-07-21T07:00:57","slug":"demystifying-cybersecurity","status":"publish","type":"post","link":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/","title":{"rendered":"Demystifying Cybersecurity"},"content":{"rendered":"<p>Cybersecurity is one of the most important aspects of modern business. As technology moves forward, the threat of a catastrophic cyber attack looming around the corner becomes more realistic \u2014 and any organisation looking to protect itself will need to answer the call of cybersecurity.<\/p>\n<p>However, the world of cybersecurity may seem tricky or difficult to those who don\u2019t understand the technical ins and outs. This can deter people from investing in significant cybersecurity \u2014 while the reality is that cybersecurity is much more practical to understand than it may seem.<\/p>\n<p>In this article, we\u2019re going to go over the basics of cybersecurity and why your organisation should look into cybersecurity today, in a non-technical fashion.<\/p>\n<h2>Why is Cybersecurity Important<\/h2>\n<p>Much like the key to a house, cybersecurity will act as the primary way to stop any malicious actors from getting into your organisation\u2019s most vulnerable areas, to wreak havoc.<\/p>\n<p>This threat isn\u2019t abstract, either. With <a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/cyber-security-statistics\/#:~:text=Cybersecurity%20statistics%20indicate%20that%20there,cost%20%248%20trillion%20by%202023.\">over 2,000 estimated cyberattacks<\/a> every day worldwide, there is a genuine threat of a cyberattack lurking around every corner. So, ensuring that you\u2019re protected is vital.<\/p>\n<p>This is also why making sure that the cybersecurity solution that you\u2019re implementing is both relevant and potent is critical \u2014 much like ensuring that the lock to your house is strong enough to withstand force, your chosen cybersecurity implementation will act as the secure front to your organisation.<\/p>\n<p>A good cybersecurity solution will be able to monitor, detect, and help you respond to threats in real time \u2014 there are lots of potent cybersecurity solutions that exist to ensure that your organisation is protected. These solutions protect different areas of your organisation, and so utilising multiple of them is the best way to ensure that your business is protected.<\/p>\n<p>If you\u2019re unsure about cybersecurity, feel free to reach out for a helping hand. Our experts will be able to provide you with the help you need to figure out which security solutions work best for your organisation.<\/p>\n<h2>Common Cybersecurity Solutions<\/h2>\n<h3>Application Security (Cybersecurity)<\/h3>\n<p>Application Security exists to protect your applications from any external threats. Vulnerable points within applications can be used to breach organisations, so ensuring your applications are secure is crucial.<\/p>\n<p>This method of security usually takes place within the software development lifecycle and puts the focus on ensuring that vulnerabilities are patched out to reduce the attack surface towards your organisation.<\/p>\n<p>An application firewall is also commonly used in application security. This will create more ways to control incoming and outgoing signals \u2014 meaning that you can ultimately ensure that nothing suspicious can breach your organisation through your applications.<\/p>\n<h3>Data Security (Cybersecurity)<\/h3>\n<p>Data security exists to secure your most important data from external threats \u2014 to ensure that you\u2019re not put into a situation where your most critical data is either stolen or destroyed.<\/p>\n<p>This is especially important when considering compliance regulations. For example, GDPR means that a data breach could also cause compliance issues for your organisation \u2014 resulting in hefty consequences.<\/p>\n<p>Data security exists in two forms \u2014 data security and data backup\/recovery. Where data security is more proactive protection of your data, data backup\/recovery exists to get you back up and running quickly in the event of a catastrophe.<\/p>\n<p>The most common form of data security is encryption. This uses cryptography to scramble your data until a valid encryption key is presented \u2014 meaning that nobody can access your data without decrypting it first.<\/p>\n<p>Encryption is the most powerful and popular form of data security, and most modern technologies have encryption built-in \u2014 but this doesn\u2019t mean that you shouldn\u2019t encrypt your data anyway.<\/p>\n<p>Data recovery and backup are also crucial, as having a secure backup and disaster recovery plan will be able to make sure your organisation is back up and running quickly if something bad does happen. The best form of backup is the 3-2-1 backup \u2014 having three total backups, on two different forms of backup media (hard drive, cloud, etc.), one of which is stored offsite.<\/p>\n<h3>Endpoint Security (Cybersecurity)<\/h3>\n<p>Endpoint security provides security for the devices that connect to your network. This includes devices such as computers, phones, laptops, tablets, and any other endpoint device that your organisation may use.<\/p>\n<p>This is important as endpoint devices give access to your whole organisation, meaning that an endpoint that isn&#8217;t secure could result in a vulnerability for your whole organisation.<\/p>\n<p>Endpoint detection and response (EDR) is the most common form of endpoint security. This kind of security continuously monitors an endpoint to detect incoming threats and allow you to respond to them with ease.<\/p>\n<h3>Network Security (Cybersecurity)<\/h3>\n<p>Network security does as it says \u2014 it secures your network from any unauthorised connections or any other malicious activity targeting your network. Your network is the connections around your organisation, meaning your whole internet setup as well as any other internal networks that you may have.<\/p>\n<p>The easiest way to control your network security is by using a firewall to control access in and out of your organisation\u2019s network \u2014 giving you full control over whatever incoming and outgoing connections have access.<\/p>\n<p>There are also specific tools that allow you to manage exactly who is on your network \u2014 allowing you to block anyone who isn\u2019t specifically authorised to be on there. After all, even if they\u2019re just connected to the internet, this is still a vulnerability.<\/p>\n<h3>Identity Security (Cybersecurity)<\/h3>\n<p>The process of identity security is making sure that those inside your system are the people who should have access to your system \u2014 and that access isn\u2019t handed to anyone who isn\u2019t supposed to have it.<\/p>\n<p>The best form of identity security management is a process called \u2018zero trust\u2019 \u2014 which treats everyone within your organisation as though they cannot be trusted until they provide authentication (and keep being authenticated throughout their time within your system).<\/p>\n<p>This is important in modern cybersecurity as zero trust is the only way to protect against modern threats that can spoof credentials and fraudulently gain access to your network \u2014 where before it was easier to trust credentials, zero trust is now the best way to manage identity security.<\/p>\n<h2>How To Improve Your Security Posture<\/h2>\n<p>Cybersecurity is a massively important consideration for any organisation. Much like security tools for physical access to a home or building, cybersecurity tools and procedures will ensure that you have no way for anyone malicious to gain access to your most sensitive data.<\/p>\n<p>If you\u2019re looking to improve your security posture but don\u2019t know where to start, get in touch with us today. Our experts are here to help you through the whole process and will ensure that you\u2019re protected from all of the threats that you could face.<\/p>\n<p><a href=\"https:\/\/carecomputers.co.uk\/contact-care-computers\/\">Contact us<\/a> now and see how we can help.<\/p>\n<p><a href=\"https:\/\/carecomputers.co.uk\/contact-care-computers\/\"><img decoding=\"async\" class=\"alignnone wp-image-8512\" src=\"https:\/\/carecomputers.co.uk\/wp-content\/uploads\/2022\/01\/contact_us_T2-300x89.png\" alt=\"\" width=\"179\" height=\"53\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is one of the most important aspects of modern business. As technology moves forward, the threat of a catastrophic cyber attack looming around the corner becomes more realistic \u2014 and any organisation looking to protect itself will need to answer the call of cybersecurity. However, the world of cybersecurity may seem tricky or difficult [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-9777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Demystifying Cybersecurity<\/title>\n<meta name=\"description\" content=\"Care Computers - Demystifying Cybersecurity - Care Computers\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Care Computers - Demystifying Cybersecurity - Care Computers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Care Computers\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-21T07:00:57+00:00\" \/>\n<meta name=\"author\" content=\"Simon Spencer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Spencer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/\"},\"author\":{\"name\":\"Simon Spencer\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/person\\\/bfcdaddfd6c3617490c1f1693891b74e\"},\"headline\":\"Demystifying Cybersecurity\",\"datePublished\":\"2023-07-21T07:00:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/\"},\"wordCount\":1134,\"publisher\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/\",\"name\":\"Demystifying Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2023-07-21T07:00:57+00:00\",\"description\":\"Care Computers - Demystifying Cybersecurity - Care Computers\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/demystifying-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#website\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\",\"name\":\"Care Computers\",\"description\":\"Managed IT Support and Services Provider in Windsor, Berkshire\",\"publisher\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\",\"name\":\"Care Computers\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/care-computers-logo.svg\",\"contentUrl\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/care-computers-logo.svg\",\"caption\":\"Care Computers\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/person\\\/bfcdaddfd6c3617490c1f1693891b74e\",\"name\":\"Simon Spencer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"caption\":\"Simon Spencer\"},\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/author\\\/simon-spencer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Demystifying Cybersecurity","description":"Care Computers - Demystifying Cybersecurity - Care Computers","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Demystifying Cybersecurity","og_description":"Care Computers - Demystifying Cybersecurity - Care Computers","og_url":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/","og_site_name":"Care Computers","article_published_time":"2023-07-21T07:00:57+00:00","author":"Simon Spencer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simon Spencer","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/"},"author":{"name":"Simon Spencer","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/person\/bfcdaddfd6c3617490c1f1693891b74e"},"headline":"Demystifying Cybersecurity","datePublished":"2023-07-21T07:00:57+00:00","mainEntityOfPage":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/"},"wordCount":1134,"publisher":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#primaryimage"},"thumbnailUrl":"","articleSection":["Cybersecurity"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/","name":"Demystifying Cybersecurity","isPartOf":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#primaryimage"},"thumbnailUrl":"","datePublished":"2023-07-21T07:00:57+00:00","description":"Care Computers - Demystifying Cybersecurity - Care Computers","breadcrumb":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/demystifying-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/creativeideasfactory.co.uk\/carenew\/"},{"@type":"ListItem","position":2,"name":"Demystifying Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#website","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/","name":"Care Computers","description":"Managed IT Support and Services Provider in Windsor, Berkshire","publisher":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/creativeideasfactory.co.uk\/carenew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization","name":"Care Computers","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/logo\/image\/","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/care-computers-logo.svg","contentUrl":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/care-computers-logo.svg","caption":"Care Computers"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/person\/bfcdaddfd6c3617490c1f1693891b74e","name":"Simon Spencer","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","caption":"Simon Spencer"},"url":"https:\/\/creativeideasfactory.co.uk\/carenew\/author\/simon-spencer\/"}]}},"_links":{"self":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/9777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/comments?post=9777"}],"version-history":[{"count":0,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/9777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/media?parent=9777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/categories?post=9777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/tags?post=9777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}