{"id":3823,"date":"2016-11-02T20:38:17","date_gmt":"2016-11-02T20:38:17","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=3823"},"modified":"2016-11-02T20:38:17","modified_gmt":"2016-11-02T20:38:17","slug":"healthcare-embrace-deception-security-technology","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/","title":{"rendered":"Deception Security Technology: Healthcare&#8217;s best medicine?"},"content":{"rendered":"<p><strong>Why your healthcare facility should embrace Deception Security Technology.<a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-medium wp-image-618\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing1-200x300.jpg\" alt=\"Measles-MumpsRubella-Writing1\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing1-200x300.jpg 200w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing1.jpg 267w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/a><\/strong><\/p>\n<p>It&#8217;s flu season. The staff at your healthcare facility is hard at work providing patients with their annual flu shot.<\/p>\n<p>The vaccination process is an interesting one.<\/p>\n<p>A medical professional injects the patient with the inactivated influenza virus. The patient\u2019s immune system learns the disease\u2019s course of action and develops antibodies&#8212; a proactive defense against the real thing.<\/p>\n<p>What if we told you that a similar concept is being used to safeguard data from cyber criminals?<\/p>\n<p>It&#8217;s called Deception Security.<\/p>\n<p>If you haven&#8217;t heard of it, you will soon.<\/p>\n<p>This emerging technology acts as a virtual vaccine\u2014anticipating cyber criminals and stops them before they compromise crucial data.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Here\u2019s how it works.<\/strong><\/p>\n<p>Decoys, disguised as targets are placed throughout the network or on your hosts. A hacker\u2019s presence triggers a series of automated actions that \u00a0entice the hacker. They<em> think<\/em>\u00a0they are close to accessing valuable information. In reality, the Deception Security system has recorded the hacker\u2019s behavior\u00a0and method of attack.<\/p>\n<p>Furthermore, because beacons have been placed in your data,\u00a0even if the hacker gets it, once opened, \u00a0not only will you be alerted but the data will refuse to render. So either way, they get <em>nothing<\/em>.<\/p>\n<p>Isn&#8217;t that great news? And, even better?<\/p>\n<p>Because your data does not have to be on the network to be attacked, the Deception Security platform will protect devices that house your data. So, when they are stolen from your organization, they are protected even if the hacker never connects to the network!<\/p>\n<p>Read on to see three reasons why healthcare should look to Deception Security to protect its vital data and then contact us <a href=\"agibson@abrahamsconsulting.com\">here.<\/a><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong> Healthcare Facilities are Prime Targets for Cyber Attacks <\/strong><\/li>\n<\/ol>\n<p>Your healthcare facility\u2019s database is\u00a0 brimming with patients&#8217; credit card numbers, social security digits, and medical records. It is a magnet for cyber-criminals. In fact, <a href=\"http:\/\/www.bbc.com\/news\/technology-35880610\">three United States hospitals<\/a> are recovering from a spate of ransomware attacks launched earlier this year.<\/p>\n<p>The nature of the industry makes it especially easy for your medical facility to fall victim to a cyber attack\u2014and especially difficult for it to bounce back from one.<\/p>\n<p>Even if data is salvageable, a reputation for upholding the promise of patient confidentiality may not be.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>\u00a0<strong>Deception Security Technology Offers Unprecedented Sophistication<\/strong><\/li>\n<\/ol>\n<p>When viruses like ransomware are detected and dissected in mainstream news articles, you&#8217;d better believe that hackers go back to the drawing board to scheme new ways to access your facility\u2019s data. These new methods may carry them through your facility\u2019s existing defenses, but hackers stand no chance against Deception Security.<\/p>\n<p>As you read this, hackers are hard at work developing increasingly sophisticated ways to sneak into your system. Imagine their surprise when they realize that your system has tricks of its own!<\/p>\n<p>It\u00a0assesses each move a hacker makes and responds with an appropriate diversion to prevent a devastating cyber attack.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong> Deception Security Technology is Cost-Effective <\/strong><\/li>\n<\/ol>\n<p>It \u00a0is built to complement existing cyber security systems\u2014not replace them. Disrupt a hacker&#8217;s incursion without disturbing your facility\u2019s status quo or budget.<\/p>\n<p>Strengthening, rather than replacing, your current cyber-security infrastructure results in substantial short-term savings.<\/p>\n<p>The long-term savings are immeasurable.<\/p>\n<p>Regulatory fines and the massive loss to\u00a0customers, data breach recovery is <a href=\"https:\/\/securityintelligence.com\/cost-of-a-data-breach-2016\/\">significantly more expensive for those in the healthcare industry<\/a>.<\/p>\n<p>Deception Security technology boosts your system\u2019s immunity to an attack. \u00a0After all, an ounce of prevention is <em>always<\/em> worth a pound of cure!<\/p>\n<p>The risk of your medical facility falling victim to a data breach is high.<\/p>\n<p>The stakes are even higher. Cutting-edge and cost-effective, Deception Security Technology is your best shot at preventing a cyber attack.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.abrahamsconsulting.com\/contact-us\/\">Schedule an appointment<\/a> with Abrahams Consulting. We will prescribe the best Deception Security Technology for your facility.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why your healthcare facility should embrace Deception Security Technology. It&#8217;s flu season. The staff at your healthcare facility is hard at work providing patients with their annual flu shot. The vaccination process is an interesting one. A medical professional injects the patient with the inactivated influenza virus. The patient\u2019s immune system learns the disease\u2019s course [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":735,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[168],"tags":[37,177],"class_list":["post-3823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-deception-security","tag-data-privacy","tag-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deception Security Technology: Healthcare&#039;s best medicine? - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Deception Security Technology vaccinates data against hackers. It is yet another layer to an effective security strategy in healthcare to protect patients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deception Security Technology: Healthcare&#039;s best medicine? - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Deception Security Technology vaccinates data against hackers. It is yet another layer to an effective security strategy in healthcare to protect patients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-02T20:38:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"267\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Deception Security Technology: Healthcare&#8217;s best medicine?\",\"datePublished\":\"2016-11-02T20:38:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\"},\"wordCount\":656,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg\",\"keywords\":[\"data privacy\",\"healthcare\"],\"articleSection\":[\"Deception Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\",\"name\":\"Deception Security Technology: Healthcare's best medicine? - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg\",\"datePublished\":\"2016-11-02T20:38:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Deception Security Technology vaccinates data against hackers. It is yet another layer to an effective security strategy in healthcare to protect patients.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg\",\"width\":267,\"height\":400,\"caption\":\"Deception security technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deception Security Technology: Healthcare&#8217;s best medicine?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deception Security Technology: Healthcare's best medicine? - TechTonic Times","description":"Deception Security Technology vaccinates data against hackers. It is yet another layer to an effective security strategy in healthcare to protect patients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/","og_locale":"en_US","og_type":"article","og_title":"Deception Security Technology: Healthcare's best medicine? - TechTonic Times","og_description":"Deception Security Technology vaccinates data against hackers. It is yet another layer to an effective security strategy in healthcare to protect patients.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/","og_site_name":"TechTonic Times","article_published_time":"2016-11-02T20:38:17+00:00","og_image":[{"width":267,"height":400,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Deception Security Technology: Healthcare&#8217;s best medicine?","datePublished":"2016-11-02T20:38:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/"},"wordCount":656,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg","keywords":["data privacy","healthcare"],"articleSection":["Deception Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/","name":"Deception Security Technology: Healthcare's best medicine? - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg","datePublished":"2016-11-02T20:38:17+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Deception Security Technology vaccinates data against hackers. It is yet another layer to an effective security strategy in healthcare to protect patients.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/Measles-MumpsRubella-Writing6.jpg","width":267,"height":400,"caption":"Deception security technology"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-embrace-deception-security-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Deception Security Technology: Healthcare&#8217;s best medicine?"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=3823"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3823\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/735"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=3823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=3823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=3823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}