{"id":58352,"date":"2024-06-17T18:11:26","date_gmt":"2024-06-17T18:11:26","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/07\/29\/some-of-your-passwords-appeared-in-a-data-leak\/"},"modified":"2024-06-17T18:11:26","modified_gmt":"2024-06-17T18:11:26","slug":"some-of-your-passwords-appeared-in-a-data-leak","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/","title":{"rendered":"Some Of Your Passwords Appeared In A Data Leak"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>We\u2019ve\u200d all had\u2064 that sinking feeling\u200b of dread- your password appearing in a data\u2064 leak.\u2062 It \u200bleaves you feeling vulnerable, like you\u2019ve lost some of your data privacy. Recent news\u200c reveals that some of your passwords have been found\u200d in a major data leak.\u200d It\u2019s a scary concept, and one that many of us have\u2064 never experienced before. You may be asking yourself, how did this happen? \u2063What can you do now? In this article, we \u2063will answer those questions and provide\u2062 advice on\u2063 how to \u2063stay safe as\u2062 data breaches \u200bbecome increasingly commonplace. It\u2019s important to become aware of data breaches and the\u200b security measures\u200b you can \u2064take to keep your passwords safe, especially when the news reports that \u200dsome of your passwords appeared in a \u2064data leak.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#1_Dont%E2%80%8B_Panic_Handling_a_Data_Leak\" >1. Don\u2019t\u200b Panic! Handling a Data Leak<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#2_Protect_Your%E2%80%8B_Accounts_Password%E2%80%8B_Security_%E2%81%A3Tips\" >2. Protect Your\u200b Accounts: Password\u200b Security \u2063Tips<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#3_Learn_From_Leaks_Keeping_Your_Data_Safe\" >3. Learn From Leaks: Keeping Your Data Safe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#4_Staying_Vigilant_Prevention_is_the%E2%81%A3_Best_Protection\" >4. Staying Vigilant: Prevention is the\u2063 Best Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#Data_Protection_and_Password_Security_Tips\" >Data Protection and Password Security Tips<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#Q_A_About_Some_Of_Your_Passwords_Appeared_In_A_Data_Leak\" >Q&amp;A About Some Of Your Passwords Appeared In A Data Leak<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/some-of-your-passwords-appeared-in-a-data-leak\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-dont-panic-handling-a-data-leak\"><span class=\"ez-toc-section\" id=\"1_Dont%E2%80%8B_Panic_Handling_a_Data_Leak\"><\/span>1. Don\u2019t\u200b Panic! Handling a Data Leak<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Data leaks can be stressful and damaging to business. However, \u2062there \u200dare steps you can take to \u200bminimize the impact. \u2062<\/p>\n<ul>\n<li>Investigate the breach. Find out where \u2063the data was taken from, \u2063who was exposed,\u200c and what information\u2062 was revealed.<\/li>\n<li>Notify \u2062any affected\u200c individuals or organizations that may have had their data\u200d compromised. Keep track of who was informed.<\/li>\n<li>Report the breach to the relevant authorities, if required by law.<\/li>\n<\/ul>\n<p>It\u2019s also important to take\u200d steps to <a href=\"https:\/\/logmeonce.com\/zero-trust\/\">prevent future \u2064data leaks<\/a>. Make sure all data storage systems are secure. Ensure passwords are regularly updated,\u200b and\u200b audit \u2063any third\u200b party service <a href=\"https:\/\/www.troyhunt.com\/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned\/\" target=\"_blank\" rel=\"noopener nofollow\">providers\u200c<\/a> for\u200c their data security practices. Using multi-factor authentication where possible is also\u200b key in protecting\u2063 critical\u200d data. Finally, \u2063create a risk management plan to\u2064 address any\u200c future breaches.\u200c<\/p>\n<ul>\n<li>Implement role-based\u2062 access control.<\/li>\n<li>Conduct regular security audits.<\/li>\n<li>Train employees on data\u2063 security best practices.<\/li>\n<\/ul>\n<p>By taking the appropriate actions,\u200b you can mitigate the damage caused\u2062 by a\u2062 data leak. While it is important to \u200cact quickly, it is also important to remain calm and take the correct steps.<\/p>\n<h2 id=\"2-protect-your-accounts-password-security-tips\"><span class=\"ez-toc-section\" id=\"2_Protect_Your%E2%80%8B_Accounts_Password%E2%80%8B_Security_%E2%81%A3Tips\"><\/span>2. Protect Your\u200b Accounts: Password\u200b Security \u2063Tips<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Set Strong Passwords<\/strong><\/p>\n<p>Creating a strong \u2064password is key to\u200b protecting your accounts.\u200d To create a strong password, it should always be a combination of upper and lower case letters, \u2064numbers, \u2064and special characters and should be at least 8 characters long. When creating a password, make sure not to use \u2063any personal information \u200csuch as your name, address, \u2062or birth date.<\/p>\n<p><strong>Take Steps to Secure Your Passwords<\/strong><\/p>\n<p>To ensure your \u2062passwords are secure from hackers:<\/p>\n<ul>\n<li>Don\u2019t share your passwords \u2062with anyone.<\/li>\n<li>Avoid writing \u2062down passwords\u2014it\u2019s best to \u200dremember them.<\/li>\n<li>Change passwords regularly.<\/li>\n<li>Use \u2062two-factor authentication.<\/li>\n<li>Use different passwords for different accounts.<\/li>\n<\/ul>\n<p>By taking the necessary steps to keep all \u2063of your passwords \u200csecure,\u2063 you can protect your accounts \u200cand online identity.<\/p>\n<h2 id=\"3-learn-from-leaks-keeping-your-data-safe\"><span class=\"ez-toc-section\" id=\"3_Learn_From_Leaks_Keeping_Your_Data_Safe\"><\/span>3. Learn From Leaks: Keeping Your Data Safe<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Staying Vigilant<\/b><br \/>\nData breaches are becoming increasingly common.\u2063 It is important to stay vigilant and keep track of how your data is being used. Learn from the mistakes of others and make sure your data is \u200cas secure as possible.<\/p>\n<p><b>Facts and Figures<\/b><br \/>\nData breaches have been known to \u2063cost companies a large amount of\u200b money. According to research from the Center for Digital \u2063Business, approximately 92% of the \u2062time, a company experiences a data \u2063breach due to a lack of security. The average\u200b cost \u2063of recovering from such deliquencies varies between $958,000 and $3,8 million.<\/p>\n<p><b>Protection Strategies<\/b><br \/>\nTo ensure your data is kept safe, here are some strategies you can implement:\u200c<\/p>\n<ul>\n<li>Regularly update your operating systems, networks and antivirus \u2064software.<\/li>\n<li>Only store data you need.<\/li>\n<li>Implement strict access control.<\/li>\n<li>Encrypt your data.<\/li>\n<li>Monitor your system for any \u200csuspicious\u200c activity.<\/li>\n<\/ul>\n<p>It is of utmost \u200bimportance to take steps necessary to protect your data. Have a well-organized plan and consistently review it. Make sure \u2062to back-up all your data, just in case, and invest in skilled \u200bIT professionals.<\/p>\n<h2 id=\"4-staying-vigilant-prevention-is-the-best-protection\"><span class=\"ez-toc-section\" id=\"4_Staying_Vigilant_Prevention_is_the%E2%81%A3_Best_Protection\"><\/span>4. Staying Vigilant: Prevention is the\u2063 Best Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When \u200cit \u2063comes to protection \u2063against\u2062 possible security threats, being proactive is the best \u200bway to go. Nobody wants\u2062 to become a victim,\u200d so it\u2019s important to be aware and \u2063stay vigilant. Here are a few tips\u2063 for staying safe:<\/p>\n<ul>\n<li><strong>Be aware of phishing emails:<\/strong> Be very skeptical of\u200d emails\u200d from people you do not know or even \u200dthe ones sent from people you do \u200bknow without any prior conversation. Some criminals can build\u200c trust by sending a \u200bfew messages and then try to trick you into revealing sensitive\u200d information. \u2063Even \u200cif the email includes a \u200clink to a real-looking website, it\u2019s best to just delete it.<\/li>\n<li><strong>Inspect downloads:<\/strong> \u2064Even if the download is from \u2062a known source, like \u2064a legitimate app store, check\u200d the \u200creviews and \u200bratings for the particular app. Scour the\u2062 permission list to make sure \u2064the\u200c app\u200b is not \u2062asking for anything it \u2062doesn\u2019t need.<\/li>\n<li><strong>Make secure passwords:<\/strong> Complex \u200dpasswords with a combination of numbers, symbols, \u200bboth lowercase and capital\u2062 letters are key. It\u2019s also important to have a different password for different online accounts to avoid a single point of failure.<\/li>\n<li><strong>Update often: <\/strong>Make \u2063sure to regularly \u2062update all your\u2062 software, web browsers, and\u200d antivirus programs to their latest versions. Doing\u2062 so helps protect your computer from any latest viruses.<\/li>\n<\/ul>\n<p>Overall, staying proactive is the best\u2064 way to protect yourself \u200cfrom \u2064potential security threats. Through regular updates,\u2064 secure passwords, \u2064inspecting \u2064downloads, and avoiding phishing and \u2064other online scams, you can stay safe \u200bwhile online.<\/p>\n<p>Data breaches are an increasingly common occurrence in today&#8217;s digital age, with millions of customers&#8217; passwords being compromised every year. When some of your passwords appear in a data leak, it is essential to take immediate action to protect your sensitive details. Compromised accounts can lead to identity theft, financial losses, and reputational implications. It is crucial to use strong, unique passwords across accounts and consider using a trustworthy password manager to enhance security protection. Additionally, implementing extra authentication measures like two-factor authentication can add an extra layer of security to prevent unauthorized access to your personal information.<\/p>\n<p>Security updates and regular password quality checks are also important in reducing the risk of a security breach. It is vital to pay attention to password reset notifications, breach notices, and security warnings to mitigate the risk of password compromise and potential data exfiltration. By being proactive in adopting strong cybersecurity methods and staying informed about security best practices, individuals can better protect themselves from the threat of cyber attacks and data leaks. Sources: www.ibm.com<\/p>\n<p>In the wake of a data leak, concern over the security of personal information has heightened as millions of customers&#8217; passwords have been exposed. The leak includes a list of comma delimited keywords such as iCloud Keychain, login credentials, credit card details, and risk of compromise. This incident underscores the importance of using complex and unguessable passwords, implementing strong encryption algorithms, and being cautious about password reuse.<\/p>\n<p>Security experts advise users to regularly update their passwords, enable password management functions, and be wary of phishing attempts. Failing to take these precautions could leave individuals vulnerable to identity theft, financial fraud, and other cyber threats. As such, it is crucial to stay informed about cybersecurity regulations and best practices to mitigate the risk of data breaches in an increasingly digital world. Source: Security Consultant at Consulting<\/p>\n<p>A data leak revealing some of your passwords can pose a significant risk of identity theft and compromise personal details. By utilizing complex passwords and a single master password, the risk of exposure can be minimized. It is crucial to heed password warnings and utilize a password generator to create secure passwords. In the event of a data breach, prompt remediation is essential to mitigate the impact on financial accounts and credit freeze can be considered to protect against unauthorized access. Managers should exercise caution with user credentials and ensure sub-par data security practices are not in place to prevent brute force attacks or ransomware incidents.<\/p>\n<p>The healthcare sector, in particular, faces hefty fines for mishandling sensitive data such as medical records and personally identifiable information (PII). It is important for users to be aware of common weaknesses in data security and take necessary precautions to safeguard their information. Additionally, keeping abreast of security recommendations and using additional security measures such as two-factor authentication can further protect against breaches and leaks which could potentially lead to identity theft. Sources: Password Manager Security Score 2020 Report: Weak Password\u201d by Dashlane<\/p>\n<h2><\/h2>\n<h2><span class=\"ez-toc-section\" id=\"Data_Protection_and_Password_Security_Tips\"><\/span>Data Protection and Password Security Tips<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>#<\/th>\n<th>Action<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Investigate the breach<\/td>\n<td>Find out where the data was taken from, who was exposed, and what information was revealed<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Set Strong Passwords<\/td>\n<td>Create passwords with combination of upper and lower case letters, numbers, and special characters<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Implement Multi-factor Authentication<\/td>\n<td>Add an extra layer of security to protect against unauthorized access<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Use Password Manager<\/td>\n<td>Securely store and manage all your passwords for different accounts<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Regularly Update Passwords<\/td>\n<td>Change passwords frequently to reduce the risk of password compromise<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A_About_Some_Of_Your_Passwords_Appeared_In_A_Data_Leak\"><\/span>Q&amp;A About Some Of Your Passwords Appeared In A Data Leak<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is a\u2064 data leak?<br \/>\nA:\u2063 A data leak is when personal information, like\u2064 passwords, is accidentally released to\u2062 the public. \u200cIt can happen if \u2063someone\u2019s email address is included on \u200ca website that was hacked.<\/p>\n<p>Q: What should I do if some of my passwords appeared in a data leak?<br \/>\nA: If your passwords have appeared in a data leak, it is crucial to take immediate action to protect your online security and prevent any further compromise of your accounts. Here are some security recommendations to follow:<\/p>\n<p>1. Change your passwords: If any of your passwords have been compromised, it is essential to change them immediately to prevent unauthorized access to your accounts.<\/p>\n<p>2. Use strong passwords: Avoid using weak passwords and common password combinations. Consider using a password manager to generate and store complex, unique passwords for each of your accounts.<\/p>\n<p>3. Enable two-factor authentication: Adding an extra layer of security such as two-factor authentication can help protect your accounts from unauthorized access, even if your passwords are compromised.<\/p>\n<p>4. Monitor your accounts: Regularly check your accounts for any unusual activity or unauthorized access. Consider using a password monitoring feature to alert you of any suspicious behavior.<\/p>\n<p>5. Check your credit reports: Keep an eye on your credit reports for any signs of identity theft or fraudulent activity, especially if your compromised passwords include financial details.<\/p>\n<p>By following these security recommendations and staying vigilant about your online security, you can better protect yourself from the risks of compromised passwords and potential identity theft. Source: www.nortonlifelock.com<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"react-scroll-to-bottom--css-oaoey-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-oaoey-1n7m0yu\">\n<div class=\"flex flex-col text-sm pb-9\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-47\" data-scroll-anchor=\"true\">\n<div class=\"py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"6ce4c129-f698-4aae-861c-160cde395c3b\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>If this unsettling event has left you concerned about data security, create a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account today. LogMeOnce, a secure password manager, ensures top-notch protection against data breaches, preserving the safety and integrity of your passwords. It&#8217;s the ideal solution to shield your data from exposure in a leak. Set up your account for effective password protection and online privacy security. With LogMeOnce&#8217;s user-friendly tools, rest assured your passwords are safeguarded from any breach.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover if your passwords were exposed in a data leak. Stay protected with a FREE LogMeOnce account, offering Identity Theft Protection and Dark Web Monitoring for added security.<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[1740,6737,7157,783,781],"class_list":["post-58352","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-cyber-security","tag-data-breach","tag-data-leak","tag-password","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/58352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=58352"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/58352\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=58352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=58352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=58352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}