{"id":68754,"date":"2024-06-19T20:39:31","date_gmt":"2024-06-19T20:39:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/example-of-two-factor-authentication-cyber-awareness\/"},"modified":"2024-06-19T20:39:31","modified_gmt":"2024-06-19T20:39:31","slug":"example-of-two-factor-authentication-cyber-awareness","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/","title":{"rendered":"Unlocking the Power of Two-Factor Authentication: Cyber Awareness Gains Momentum"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Cyber security has never been so important, and a great example \u200cof \u200cthis is the need for two-factor \u200bauthentication to increase cyber awareness. Two-factor authentication is\u200c a\u200c process of\u2063 verifying a user\u2019s identity through \u2064two separate identification methods \u2013 something\u2062 you know,\u2062 like a password, as well as something you have, like a code sent to your \u2062mobile device.\u200d This security\u200d measure is gaining popularity\u2064 among businesses and individuals as a reliable way to foil\u2062 hackers and keep data safe from cyber\u2064 attacks. By using two-factor authentication, you can add an extra \u200dlayer of security to\u2063 your online accounts and protect \u200byour data\u200d from potential theft and misuse. With the risks \u2062of <a title=\"Example Of Two Factor Authentication Cyber Awareness\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/\">cyber crime continually rising<\/a>, example of two-factor authentication\u200c cyber awareness is key to staying safe online.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#1_Unlocking_the_Power_of_Two-Factor_Authentication\" >1. Unlocking the Power of Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#2_Keeping_%E2%81%A4Your_Cyber_Data_Secure_%E2%80%8Band_Protected\" >2. Keeping \u2064Your Cyber Data Secure \u200band Protected<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#3_What_is_%E2%80%8CTwo-Factor_Authentication_and_How%E2%80%8B_Does%E2%81%A2_it_Work\" >3. What is \u200cTwo-Factor Authentication and How\u200b Does\u2062 it Work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#4_Put_Yourself_Ahead_of_the_Curve%E2%81%A3_with_Two-Factor%E2%80%8C_Authentication_Cyber_Awareness\" >4. Put Yourself Ahead of the Curve\u2063 with Two-Factor\u200c Authentication Cyber Awareness<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#Authentication_Methods_Overview\" >Authentication Methods Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/example-of-two-factor-authentication-cyber-awareness\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlocking-the-power-of-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Unlocking_the_Power_of_Two-Factor_Authentication\"><\/span>1. Unlocking the Power of Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-Factor Authentication (2FA) is a great way to protect your online accounts and personal information from \u200dhackers and scammers. By taking the extra step \u200cof adding a second \u200blayer of protection to\u200b your login or sign-up process, it gives you added assurance that the\u200c person accessing your account is really you. Here are some benefits that come with\u200d using two-factor authentication:<\/p>\n<ul>\n<li><b> Increased Security <\/b>-\u200d 2FA is an additional step to verify your identity that helps protect your online accounts, like your emails, \u200ccredit cards, banking, and social media accounts from\u2063 malicious actors.<\/li>\n<li><b>Convenience <\/b>\u2013 It\u2019s possible \u2062to manage and link various accounts and devices, letting you easily\u200d move from \u2064one \u200daccount to \u200bthe next with \u200cjust \u2062a few clicks.<\/li>\n<li><b>Peace of Mind <\/b>\u2013 \u2063Even with strong passwords, your accounts may still be open to attack \u2062from a cybercriminal. But setting up two-factor authentication can\u200b make all the difference.<\/li>\n<\/ul>\n<p>With\u2062 the increased \u200bprevalence of cyber crimes, it\u2019s\u2064 imperative\u2062 to take extra security measures to safeguard your accounts. For two-factor authentication\u2062 to be most\u2064 effective, you should \u2062use a variety \u200dof methods \u2064such as SMS-based verification, app-based verification,\u2062 biometrics, hardware keys, and security questions. With these\u2062 extra security\u2062 precautions in place, you can rest assured that\u2064 your online accounts are safe and secure.<\/p>\n<h2 id=\"2-keeping-your-cyber-data-secure-and-protected\"><span class=\"ez-toc-section\" id=\"2_Keeping_%E2%81%A4Your_Cyber_Data_Secure_%E2%80%8Band_Protected\"><\/span>2. Keeping \u2064Your Cyber Data Secure \u200band Protected<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Database Security<\/b><\/p>\n<p>The first step in \u2062keeping your cyber data secure \u200bis to make sure your \u200cdatabases are safe from hacker attacks. To do this, you should\u2062 run regular scans and updates, use secure\u2062 passwords, and restrict access to sensitive data. You \u200bshould also \u200cconsider using encryption technology \u2064to protect \u2064data \u200dstored on \u2064and transferred over your networks.<\/p>\n<p><b>Keeping\u2064 Personal Information Safe<\/b><\/p>\n<p>Personal information like passwords, driver\u2019s license numbers, and social security numbers should be kept safe\u2062 and secure from unauthorized access. Knowing \u2062what data is stored and where it is stored is the\u2064 first step in protecting it. As a preventative measure, you should create robust \u200cpasswords that are regularly\u200b updated, restrict access to sensitive data, and consider using two-factor authentication for important accounts. You should also\u200d be\u200d sure \u200dto regularly back up your \u2064data and store\u200d it \u2062in a secure place.<\/p>\n<h2 id=\"3-what-is-two-factor-authentication-and-how-does-it-work\"><span class=\"ez-toc-section\" id=\"3_What_is_%E2%80%8CTwo-Factor_Authentication_and_How%E2%80%8B_Does%E2%81%A2_it_Work\"><\/span>3. What is \u200cTwo-Factor Authentication and How\u200b Does\u2062 it Work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Two-Factor\u2062 Authentication<\/b> is an additional layer of security for your online accounts. It requires you to \u200cprovide an extra piece of \u200cinformation when logging in \u2013 either something you\u2062 know, something you have, or something you are. By incorporating two-factor security, you can help protect your accounts and \u200bpersonal \u2064data, even\u2062 if \u2063your passwords or\u200d other login credentials are compromised.<\/p>\n<p>The most common\u200b two-factor authentication method makes\u200c use of\u200c a <b>unique code that is sent to you via SMS<\/b>. This code\u2063 then must be \u200centered in addition to your usual login credentials to gain access to your\u2064 account. Other forms of two-factor authentication include:<\/p>\n<ul>\n<li>Fingerprint\u2064 scan<\/li>\n<li>Retina scan<\/li>\n<li>Security questions<\/li>\n<\/ul>\n<p>No\u2062 matter which two-factor\u2063 authentication method you use, the end result is the same. Two-factor authentication \u2063means\u2063 your accounts will be\u2063 much harder to hack \u2013 \u2064even if the intruder has your passwords \u2062or credentials. By requiring additional information, you can be sure that only you will be able to access \u200dyour accounts.<\/p>\n<h2 id=\"4-put-yourself-ahead-of-the-curve-with-two-factor-authentication-cyber-awareness\"><span class=\"ez-toc-section\" id=\"4_Put_Yourself_Ahead_of_the_Curve%E2%81%A3_with_Two-Factor%E2%80%8C_Authentication_Cyber_Awareness\"><\/span>4. Put Yourself Ahead of the Curve\u2063 with Two-Factor\u200c Authentication Cyber Awareness<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As the digital environment continues\u2062 to evolve, cyber criminals are getting more creative and sophisticated with \u200ctheir activities. \u200dTo stay ahead of them, \u2064you need to ensure your security processes are up-to-date\u200c with \u2062the latest \u2063advances. \u2062Adding two-factor authentication to your cyber security\u200b strategy is a great way to put yourself ahead of the curve.<\/p>\n<p>Two-factor authentication (2FA) is\u2064 an additional \u200dlayer of security that requires two\u200b forms of\u200b authentication to gain access \u2062to a system, account, \u200cor website. It \u2063combines something\u200b you know (like a password) with\u200c something you have (like a verification code sent to your phone). This\u2062 prevents unauthorized users\u2063 from accessing your information, even if your password is stolen.<\/p>\n<ul>\n<li><strong>Decreased risk:<\/strong> By adding an extra layer\u200d of protection to \u2063your online accounts, 2FA reduces the risk of \u200cbecoming\u200b the victim of\u2062 a data breach\u200b or identity theft.<\/li>\n<li><strong>Convenience:<\/strong> It\u2019s \u200ceasier and \u2063faster to log in \u200dto your online accounts with two-factor authentication,\u200c as you don\u2019t have \u2063to remember multiple passwords or constantly reset them.<\/li>\n<li><strong>Heightened security:<\/strong> With\u200c the added \u2062security of 2FA, there\u2019s less chance of your accounts \u2062being\u2062 compromised and your data being accessed by unauthorized individuals.<\/li>\n<\/ul>\n<p>By implementing \u200btwo-factor \u2064authentication into your cyber security system,\u200b you can give yourself an\u200b upper hand in the fight against \u2062cyber crimes. It may take an extra step, but the extra layer of protection makes it worth it.<\/p>\n<p>Two-factor authentication (2FA) is a crucial cybersecurity measure that adds an extra layer of security to protect sensitive information and prevent unauthorized access to accounts. It requires users to provide two different authentication factors before granting access, typically something they know (such as a password) and something they have (such as a physical token or authentication code). This multi-factor authentication approach helps prevent common security risks like weak passwords, credential-stuffing attacks, and unauthorized access to valuable assets like financial accounts or business systems. Implementing 2FA is recommended by cybersecurity experts to enhance the security of online accounts and protect against cyber threats. Organizations and individuals can use various authentication methods, such as biometric verification, hardware tokens, or SMS codes, to ensure secure access to digital resources. By incorporating strong authentication alongside security awareness training, businesses can strengthen their cybersecurity repertoire and defend against the dangers of cyber attacks.<\/p>\n<p>Sources:<br \/>\n&#8211; National Cybersecurity Alliance. \u201cTwo-Factor Authentication (2FA): What Is It and Why Should I Use It?\u201d www.staysafeonline.org<br \/>\n&#8211; Microsoft Security. \u201cMulti-Factor Authentication Overview.\u201d docs.microsoft.com<br \/>\n&#8211; Information Systems Audit and Control Association (ISACA). \u201cImplementing Multi-Factor Authentication.\u201d www.isaca.org<\/p>\n<p>Two-factor authentication (2FA) is a crucial cybersecurity measure that adds an extra layer of security to digital accounts and online activities. Password managers are tools that store and manage passwords securely, reducing the risk of unauthorized access. Multifactor authentication, also known as multi-factor authentication or two-step verification, requires users to provide two or more forms of identification before gaining access to their accounts. This can include personal identification such as a fingerprint scan or a security token. Passwordless authentication is a newer approach that eliminates the need for traditional passwords and instead relies on alternative authentication methods such as biometric verification or hardware tokens. The use of strong and secure passwords, along with additional verification factors, helps protect against unauthorized access to email accounts, financial services, and online shopping platforms. It is important for individuals and businesses to implement secure authentication practices to safeguard their sensitive information and assets. (<a href=\"https:\/\/staysafeonline.org\/programs\/cybersecurity-awareness-month\/\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a>: Techopedia)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_Overview\"><\/span>Authentication Methods Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table style=\"width: 100%; text-align: center;\" border=\"1\">\n<tbody>\n<tr style=\"background-color: lightgray;\">\n<th style=\"font-size: 110%; font-weight: bold;\">Authentication Method<\/th>\n<th style=\"font-size: 110%; font-weight: bold;\">Description<\/th>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td>Multi-factor authentication<\/td>\n<td>Requires multiple factors for user verification<\/td>\n<\/tr>\n<tr>\n<td>2-Step Verification<\/td>\n<td>Two-step process for user authentication<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td>Biometric authentication<\/td>\n<td>Uses unique physical characteristics for verification<\/td>\n<\/tr>\n<tr>\n<td>Dual-factor authentication<\/td>\n<td>Combines two authentication factors<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td>Continuous authentication<\/td>\n<td>Ongoing verification during user activity<\/td>\n<\/tr>\n<tr>\n<td>Adaptive multi-factor authentication<\/td>\n<td>Adjusts security measures based on risk assessment<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td>Physical device authentication<\/td>\n<td>Relies on possession of physical device for access<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is two factor authentication?<br \/>\nA: Two\u2062 factor authentication (also known\u2062 as 2FA) is an extra \u2063layer of security \u2063used to help protect your information online. It adds an \u2064additional step of proving\u200d who you are when you log into an account, website, or app.<\/p>\n<p>Q: How does two factor authentication work?<br \/>\nA: Two factor authentication requires two pieces of \u200dinformation: something you know, like a username and password, and something you have, \u2064like a code sent to you via a \u200dtext message. Together, these two pieces of information are used to confirm your identity.<\/p>\n<p>Q: What are some examples of two \u2063factor authentication?<br \/>\nA: Examples of two factor authentication include having\u2064 a\u2064 code sent to your phone, using a fingerprint scanner, and using a\u2064 smartphone app to \u200bgenerate a security code.\u2063 Additionally, you may also find two factor \u200cauthentication in the form of an email\u200c containing\u200b a unique link.<\/p>\n<p>Q: What is multi-factor authentication?<\/p>\n<p>A: Multi-factor authentication (MFA) is a security system that requires more than one method of authentication for a user to verify their identity and gain access to an online service or account. This can include something the user knows (like a password), something they have (like a hardware token or smartphone), or something they are (like a fingerprint or facial scan).<\/p>\n<p>Q: What are some examples of authentication factors?<\/p>\n<p>A: Authentication factors can include passwords, one-time codes, biometric identifiers (such as fingerprint or facial scan), security keys, hardware tokens, and authenticator apps. These factors provide an additional layer of security beyond just a username and password.<\/p>\n<p>Q: Why is multi-factor authentication important?<\/p>\n<p>A: Multi-factor authentication helps protect against unauthorized access to accounts, phishing attacks, and credential theft. By requiring multiple factors to verify identity, MFA enhances security and reduces the risk of malicious users gaining access to sensitive information.<\/p>\n<p>Q: What are the different types of authentication methods?<\/p>\n<p>A: There are various types of authentication methods, including traditional passwords, biometric authentication, one-time passwords, SMS codes, and hardware tokens. Each method offers a different level of security and can be used in combination for stronger authentication.<\/p>\n<p>Q: How can businesses benefit from implementing multi-factor authentication?<\/p>\n<p>A: Businesses can benefit from implementing multi-factor authentication by reducing the risk of data breaches, protecting sensitive information, and enhancing security for their employees and customers. MFA can also help meet compliance requirements and build trust with clients.<\/p>\n<p>Q: What are some common forms of authentication factors?<\/p>\n<p>A: Common forms of authentication factors include possession factors (like a hardware token or smartphone), knowledge factors (like passwords or PINs), and inherence factors (like biometric identifiers). These factors work together to verify an individual&#8217;s identity.<\/p>\n<p>Q: How can individuals protect themselves from cyber attacks using multi-factor authentication?<\/p>\n<p>A: Individuals can protect themselves from cyber attacks by enabling multi-factor authentication on their accounts, choosing strong passwords, and being cautious of phishing attempts. MFA adds an extra layer of security that can help prevent unauthorized access to personal information.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Protecting yourself online\u200b has never been easier than with Two Factor Authentication! A FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account\u2063 is the perfect way to stay ahead of cyber criminals. By implementing the \u200bexample of Two Factor Authentication Cyber Awareness, you can ensure \u200dthat particularly sensitive \u200band confidential\u2063 information is kept safe \u2063and \u200dsecure, with the added bonus of \u200cgreater peace\u2062 of mind.\u200c Don\u2019t wait\u2064 any longer \u2013 take the necessary\u200b steps and join \u2062today to experience the power of\u200b two-factor authentication!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber security has never been so important, and a great example \u200cof \u200cthis is the need for two-factor \u200bauthentication to increase cyber awareness. Two-factor authentication is\u200c a\u200c process of\u2063 verifying a user\u2019s identity through \u2064two separate identification methods \u2013 something\u2062 you know,\u2062 like a password, as well as something you have, like a code sent [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1149,935,19786,6118,1788],"class_list":["post-68754","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-2fa","tag-cybersecurity","tag-cyber-awareness","tag-example","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68754"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68754\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}