{"id":4693,"date":"2018-04-07T19:35:42","date_gmt":"2018-04-07T19:35:42","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=4693"},"modified":"2018-04-07T19:58:17","modified_gmt":"2018-04-07T19:58:17","slug":"security-aware-or-prey","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/","title":{"rendered":"Be Security Aware or Prey."},"content":{"rendered":"<p><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-4695 aligncenter\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659-300x200.jpg\" alt=\"\" width=\"568\" height=\"378\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659-300x200.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659-768x512.jpg 768w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg 800w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>What does it mean to be Security Aware?<\/strong><\/p>\n<p>The persistent onslaught\u00a0 of Social Engineering, Phishing scams and Ransomware, warns that we cannot afford to be reactive, clueless, nor\u00a0apathetic about the need to be security aware:<\/p>\n<blockquote><p><em>Security awareness training is a formal process for educating employees about computer security. A good security awareness program should educate employees about corporate policies and procedures for working with information technology (IT). Employees should receive information about who to contact if they discover a security threat and be taught that data is a valuable\u00a0 corporate asset.<\/em><\/p>\n<p><em>Furthermore, regular training is particularly necessary in organizations with high turnover rates and those that rely heavily on contract or temporary staff.<\/em><\/p>\n<p>&nbsp;<\/p><\/blockquote>\n<p style=\"text-align: center;\"><span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"mailto:agibson@abrahamsconsulting.com\">Email us<\/a> or complete the form to schedule your training today\u2192<\/strong><\/span><\/p>\n<p><center><br \/>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/UFpFesrcnvY\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/center>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>It takes an average person 16 years to complete their formal education.\u00a0 In those crucial years, 27% of the time is spent each day learning various subject matter to prepare them for\u00a0 their chosen field.<\/p>\n<p>I am sure Mom and Dad were proud when you received your degree.<\/p>\n<p>But, unless you intend to become prey, learning must continue beyond the confines of\u00a0 formal education. So, to be security aware, is to be a continuous and deliberate student&#8212; a learner.<\/p>\n<p>Jackie Joyner-Kersee, an athletic icon of our time, once said, \u201cI maintained my edge by always being a student; you will always have something new to learn.\u201d<\/p>\n<p>Bill Gates, one of the world\u2019s richest,\u00a0 reads a book once a week.<\/p>\n<p>The evidence that continuous learning is the secret sauce to greatness is overwhelming.<\/p>\n<p>But how about you and your attitude towards being Security Aware?<\/p>\n<p>Have you established\u00a0 a culture of <strong><em>consistent learning<\/em>\u00a0<\/strong> within your organization for Security Awareness?<\/p>\n<p>In the IT world, human beings are the <a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\">weakest link<\/a> in Security.<\/p>\n<p>Consider for example, that regardless of how tight we lock our doors at night, or whether we have installed the most up to date Security alarms in our homes, if each member of your household cannot discern who to allow through the door,\u00a0 your best effort is useless.<\/p>\n<p>Social Engineering and Phishing Scams depend on your employees&#8217; actions.<\/p>\n<p>Knowing who or what to trust is one of the best ways to duck and weave when fiery arrows are launched on the Cyber battlefield.<\/p>\n<p>These thieves do not rely on old methods for stealing your data. They have upgraded their tactics, because they recognize and <strong><em>use<\/em> <\/strong>the benefits of\u00a0 <em>continuous learning.<\/em><\/p>\n<p>Now, they infiltrate the minds, hearts and emotions of your employees. Your people are being enticed to click on malicious links that <em>appears<\/em> harmless.<\/p>\n<p>Hackers go to the bank on the plunder from human interactions.<\/p>\n<p>By then, not only will your organization will have become prey, you will also <a href=\"https:\/\/www.scrypt.com\/blog\/average-cost-data-breach-2017-3-62-million\/\"><strong>need to pray<\/strong>\u00a0<\/a> in order to cope with the backlash of a data breach.<\/p>\n<p>You are reading this post, so I can safely assume you are security aware or at least you recognize its significance.<\/p>\n<p>But,<\/p>\n<p>Have you communicated and implemented a plan of action for <strong><em>continuous learning<\/em><\/strong> for your people to become Security Aware?<\/p>\n<h4>Want to become Security Aware? Consider <a href=\"MAILTO:AGIBSON@ABRAHAMSCONSULTING.COM\">our<\/a> training modules below:<\/h4>\n<p><strong>Common Threats<\/strong>: In this 15-minute module you\u2019ll learn about strategies and techniques hackers use to trick people just like you. We provide you with three real-world-based scenarios that show you how<br \/>\nthese common threats can take place. At the end of each scenario, we will take you behind<br \/>\nthe scenes and reveal exactly how each type of hack is accomplished.<\/p>\n<p><strong>The Danger Zone<\/strong>: In this 10-minute module, you will learn to spot real-world social engineering attacks by helping to guide Jake Saunders, a typical computer user,through six potential social engineering attacks. Jake needs to make the right decisions or suffer the consequences.<\/p>\n<p><strong>Your Role:<\/strong> Today\u2019s threats are sleek, sophisticated, and very slippery. They can slide right through your organization\u2019s antivirus software and spam filters and go straight to your inbox. This is a high quality,9-minute course that takes you on a tour of the threat landscape and shows you some of the<br \/>\ncommon ways the bad guys try to trick you.<\/p>\n<p><span style=\"color: #000000;\"><em>Source: Knowbe4<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What does it mean to be Security Aware? The persistent onslaught\u00a0 of Social Engineering, Phishing scams and Ransomware, warns that we cannot afford to be reactive, clueless, nor\u00a0apathetic about the need to be security aware: Security awareness training is a formal process for educating employees about computer security. A good security awareness program should educate [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4695,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,1137],"tags":[747,746],"class_list":["post-4693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-security","category-software","tag-continuous-learning","tag-security-awareness"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Be Security Aware or Prey. - TechTonic Times<\/title>\n<meta name=\"description\" content=\"To be Security Aware is to be in continuous learning. It is the best way to escape being the prey on the Cyber battle ground.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Be Security Aware or Prey. - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"To be Security Aware is to be in continuous learning. It is the best way to escape being the prey on the Cyber battle ground.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-07T19:35:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-04-07T19:58:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Be Security Aware or Prey.\",\"datePublished\":\"2018-04-07T19:35:42+00:00\",\"dateModified\":\"2018-04-07T19:58:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\"},\"wordCount\":693,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg\",\"keywords\":[\"continuous learning\",\"Security Awareness\"],\"articleSection\":[\"Data Security\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\",\"name\":\"Be Security Aware or Prey. - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg\",\"datePublished\":\"2018-04-07T19:35:42+00:00\",\"dateModified\":\"2018-04-07T19:58:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"To be Security Aware is to be in continuous learning. It is the best way to escape being the prey on the Cyber battle ground.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg\",\"width\":800,\"height\":533,\"caption\":\"Security Aware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Be Security Aware or Prey.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Be Security Aware or Prey. - TechTonic Times","description":"To be Security Aware is to be in continuous learning. It is the best way to escape being the prey on the Cyber battle ground.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/","og_locale":"en_US","og_type":"article","og_title":"Be Security Aware or Prey. - TechTonic Times","og_description":"To be Security Aware is to be in continuous learning. It is the best way to escape being the prey on the Cyber battle ground.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/","og_site_name":"TechTonic Times","article_published_time":"2018-04-07T19:35:42+00:00","article_modified_time":"2018-04-07T19:58:17+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Be Security Aware or Prey.","datePublished":"2018-04-07T19:35:42+00:00","dateModified":"2018-04-07T19:58:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/"},"wordCount":693,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg","keywords":["continuous learning","Security Awareness"],"articleSection":["Data Security","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/","name":"Be Security Aware or Prey. - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg","datePublished":"2018-04-07T19:35:42+00:00","dateModified":"2018-04-07T19:58:17+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"To be Security Aware is to be in continuous learning. It is the best way to escape being the prey on the Cyber battle ground.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/02\/dreamstime_s_3018659.jpg","width":800,"height":533,"caption":"Security Aware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-aware-or-prey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Be Security Aware or Prey."}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=4693"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4693\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/4695"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=4693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=4693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=4693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}