{"id":71570,"date":"2024-06-20T10:21:04","date_gmt":"2024-06-20T10:21:04","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/how-can-2fa-protect-users-from-phishing-attacks\/"},"modified":"2024-12-27T16:58:57","modified_gmt":"2024-12-27T16:58:57","slug":"how-can-2fa-protect-users-from-phishing-attacks","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/","title":{"rendered":"How Can 2FA Protect Users From Phishing Attacks"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>From online banking to social networking, we\u2064 are all increasingly\u2062 dependent on the internet for personal activities\u2063 so it is \u2062essential we learn how to protect ourselves from online\u200d threats such as phishing attacks. Two-factor authentication (2FA) is\u200c a great tool but many people are still unaware of how it can protect users \u200dfrom phishing attacks. In this\u200c article, we will explore the topic of How Can 2FA Enhance Protection\u2064 From\u200b Phishing Attacks and the benefits related to \u200cincreased online security. This \u2062is especially important to know with cyber\u2063 security threats becoming more sophisticated and two-factor\u2063 authentication being an \u200beffective way of \u200bsecuring\u200d user accounts. With\u200d 2FA, users will have an enhanced layer of protection from phishing attacks, \u200bwhich is critical for\u2063 online safety.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#1_What_is_Two-Factor_Authentication_and_How_Does_It_%E2%80%8DProtect_You\" >1. What is Two-Factor Authentication and How Does It \u200dProtect You?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#2_Understanding_The_Risks_of_Phishing_Attacks\" >2. Understanding The Risks of Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#3_Why_You_Should_Add_an_Extra_Layer_of_Security_2FA\" >3. Why You Should Add an Extra Layer of Security: 2FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#4_How_to_Use_2FA_to_Secure_Your_Accounts_Against_Phishing\" >4. How to Use 2FA to Secure Your Accounts Against Phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#Benefits_of_Two-Factor_Authentication_2FA\" >Benefits of Two-Factor Authentication (2FA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-can-2fa-protect-users-from-phishing-attacks\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication-and-how-does-it-protect-you\" data-element-id=\"headingsMap-3-0\"><span class=\"ez-toc-section\" id=\"1_What_is_Two-Factor_Authentication_and_How_Does_It_%E2%80%8DProtect_You\"><\/span>1. What is Two-Factor Authentication and How Does It \u200dProtect You?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Two-factor authentication<\/strong> is an extra layer of protection for sensitive data and accounts. It requires users\u2062 to provide additional forms of verification beyond a password to log in \u2062to an account or access \u2063online information.<\/p>\n<p>Two-factor \u2062authentication makes it much harder\u200d for \u200dunauthorized\u2062 individuals to access \u2063your accounts. After \u200bentering a\u2062 valid username and password, an additional \u200dcode will need \u200cto \u2063be provided to access the account. The code can \u2062be sent via \u2063text message, email, \u2063or other methods. Two-factor authentication can also require\u200b users to provide biometric verification \u2063such as \u200dfingerprint\u200c scanning or facial recognition.<\/p>\n<p>This extra layer of protection helps keep your information safe. With two-factor authentication, you\u200d can be \u2063confident that only authorized individuals have access\u2062 to sensitive data \u2064or accounts. \u2064Here are some\u2063 of the benefits of two-factor authentication:<\/p>\n<ul>\n<li>Stronger security<\/li>\n<li>Reduced risk of hacking<\/li>\n<li>Easy to implement<\/li>\n<li>Protection against\u2062 malware<\/li>\n<\/ul>\n<p>Two-factor authentication\u2064 helps \u200bprotect your online\u2063 data and \u2063accounts from being accessed without your permission. It provides an\u2063 extra layer of security that makes it more difficult for unauthorized individuals to \u2062access private information or accounts. The ability \u2064to ensure \u2064online\u2063 safety is invaluable.<\/p>\n<h2 id=\"2-understanding-the-risks-of-phishing-attacks\" data-element-id=\"headingsMap-4-0\"><span class=\"ez-toc-section\" id=\"2_Understanding_The_Risks_of_Phishing_Attacks\"><\/span>2. Understanding The Risks of Phishing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Phishing Attacks Are Increasingly Dangerous<\/strong><\/p>\n<p>Phishing attacks continue to pose a\u2063 major threat to both businesses and the general population. With phishing scams becoming increasingly sophisticated,\u200d it\u2019s important to understand the risks these attacks pose. \u2063Cybercriminals are sending malicious emails, posing as legitimate organizations or people. The goal is to entice \u2063victims to provide personal information, such as usernames and passwords, and access to accounts.<\/p>\n<p>Phishing attacks can\u2063 range from a simple email asking for personal information to something \u200bmore \u200celaborate, such as a\u200d fraudulent website. Here are some of the most common risks associated with phishing:<\/p>\n<ul>\n<li>Impersonation \u2013 Cybercriminals send emails disguised as legitimate organizations, in \u200dan effort to gain victims\u2019 trust and convince\u200d them to provide sensitive information.<\/li>\n<li>Data Loss\u2063 \u2013 Victims may be \u2064tricked into giving away confidential \u2064information or downloading malicious software.<\/li>\n<li>Financial Loss \u2013 Cybercriminals use the personal information they acquire to gain \u2064access to bank \u2062accounts, making unauthorized \u2064purchases.<\/li>\n<li>Identity Theft\u2062 \u2013 Criminals use stolen \u200binformation to access existing accounts, or use it\u2064 to create new accounts in your name.<\/li>\n<\/ul>\n<p>To stay safe from \u200cphishing attacks, never give \u2063out personal information \u200din response to a suspicious email, even\u200d if it appears to be from\u2062 a legitimate source. Be sure to \u2063research\u200b any \u200dorganization\u2063 before providing any information or clicking any links in an email. By keeping these risks in \u2063mind, you can protect yourself from cybercriminals.<\/p>\n<h2 id=\"3-why-you-should-add-an-extra-layer-of-security-2fa\" data-element-id=\"headingsMap-5-0\"><span class=\"ez-toc-section\" id=\"3_Why_You_Should_Add_an_Extra_Layer_of_Security_2FA\"><\/span>3. Why You Should Add an Extra Layer of Security: 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication, or 2FA, is \u2063one of the best ways to add \u2064an extra\u200b layer of security \u2064to your online accounts. It means that, in addition to your password, you\u2019ll be asked to provide a second piece of identifying information\u2014such as a code on\u200c your phone or an \u2064email sent \u200dto your \u200caccount\u2014before you can\u2064 log in to \u2063your account. Here are some\u2064 key \u200dreasons why you should use it:<\/p>\n<ul>\n<li><b>Protect Your Data:<\/b> \u2062 2FA helps protect your data and personal information from\u2062 hackers.\u2062 With the added security\u2062 of 2FA, even\u2062 if a\u200d hacker \u200cwere to gain\u2063 access to\u200c your password, they wouldn\u2019t be able to login unless\u200c they also have access \u2064to the\u200c code or email\u200d you\u2019ve been sent.<\/li>\n<li><b>Peace of \u200dMind:<\/b> Knowing your accounts are \u200beven more\u200c secure gives you greater \u2062peace of mind. You\u2019ll have the confidence \u200dto\u200d freely use your\u2062 online accounts without fear of someone else accessing\u200d them.<\/li>\n<li><b>Ease of Use:<\/b> With \u200bthe technology available \u2062today, setting up 2FA is relatively easy, and can be done quickly with minimal effort. It really\u2063 is worth the few extra \u2063minutes to know\u200d that your data is even better protected.<\/li>\n<\/ul>\n<p>No matter\u2064 your \u200clevel of tech-savviness, setting up two-factor authentication can significantly improve the security of your online accounts. And with today\u2019s technology, it\u2019s easier than ever to \u2062do. If \u2064you\u2019re not already using 2FA, now \u2064is the time to add an \u200bextra layer of security\u2014and peace of\u2062 mind\u2014to your online accounts.<\/p>\n<h2 id=\"4-how-to-use-2fa-to-secure-your-accounts-against-phishing\" data-element-id=\"headingsMap-6-0\"><span class=\"ez-toc-section\" id=\"4_How_to_Use_2FA_to_Secure_Your_Accounts_Against_Phishing\"><\/span>4. How to Use 2FA to Secure Your Accounts Against Phishing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-Factor Authentication (2FA) \u200bis an excellent security \u2063measure to protect your online\u2063 accounts \u2063from phishers. Here\u2019s what you need to know to keep your data safe.<\/p>\n<ul>\n<li><strong>Set up 2FA on your accounts whenever \u200bpossible:<\/strong> Most major sites and services support two-factor authentication, such as Bank accounts, Social Media accounts, Email Accounts, Cloud Storage accounts and\u200c more. It\u2019s important to enable\u200d 2FA \u2063on your accounts to make it harder \u200bfor criminals to guess your \u2063passwords and gain access to your accounts.<\/li>\n<li><strong>Get a 2FA app:<\/strong> You need to \u200cdownload \u20622FA app, like Google \u2062Authenticator or Microsoft Authenticator,\u200b in order \u200dto use\u200c two-factor authentication. With the app, \u2063you can <a href=\"https:\/\/logmeonce.com\/enterprise-password-management\/\" data-abc=\"true\">generate random\u200b 6-digit passcodes<\/a> or QR codes that you\u2064 can use in combination with password to log in to a\u200b site or service. The app will generate a new\u2063 code every 10-30 seconds \u200dso someone\u200b can\u2019t use\u2062 the \u2063same code again.<\/li>\n<\/ul>\n<p>2FA \u2064makes your accounts much more secure. Whenever\u2063 you log\u200b into an account, you \u2063need\u2062 to \u2062provide the correct\u2063 passcode in addition to your password in order to \u2062gain access. This means a phisher can\u2019t simply\u2064 guess\u200c your password if they get\u200d their hands on it \u2013 it\u200b also stops them from being \u2062able to access your accounts, even if they have\u2062 your\u2064 login details.<\/p>\n<p>Two-factor authentication (2FA) can protect users from phishing attacks by adding an extra layer of security to the login process. When a user attempts to log in to a website or online account, they must provide not only their password but also a second form of authentication, such as a one-time code sent to their mobile device or generated by an authentication app. This additional step helps to prevent unauthorized access by malicious actors who may have obtained a user&#8217;s login credentials through a phishing attempt.<\/p>\n<p>By requiring users to verify their identity with a second factor of authentication, 2FA helps to mitigate the risk of successful phishing attacks and unauthorized access to sensitive accounts or information. Additionally, 2FA can provide a stronger defense against common threats such as brute-force attacks, man-in-the-middle attacks, and credential exploitation. Implementing 2FA as part of a comprehensive security process can enhance protection against cyber threats and potential security breaches.<\/p>\n<p>In today&#8217;s digital landscape, cyber threats such as phishing attacks have become increasingly prevalent. Phishing attempts can trick users into giving away their login credentials, allowing malicious actors to gain unauthorized access to personal or sensitive information. However, multi-factor authentication (2FA) can provide an additional layer of security to protect users from such attacks.<\/p>\n<p>One of the key benefits of 2FA is that it adds an extra step to the authentication process beyond just entering a username and password. This additional factor of authentication can come in various forms, such as a one-time code sent to a mobile device, a security token, or biometric authentication like fingerprint scanners. By requiring users to provide more than one piece of information to verify their identity, 2FA helps to mitigate the risk of unauthorized access from phishing attempts.<\/p>\n<p>Another advantage of 2FA is that it can help to prevent credential exploitation. In a phishing attack, attackers may try to trick users into entering their login credentials on a fake website that looks like a legitimate one. However, with 2FA, even if a user falls victim to a phishing email and enters their username and password on a malicious site, the additional step of entering a one-time code or using a security token can help to block unauthorized access.<\/p>\n<p>In addition, 2FA can also protect against other common threats such as man-in-the-middle attacks and credential stuffing attacks. In a man-in-the-middle attack, a threat actor intercepts communication between the user and a legitimate website, potentially stealing sensitive information. However, 2FA adds an extra layer of protection that can help to prevent such attacks. Similarly, credential stuffing attacks involve using stolen login credentials to gain unauthorized access to accounts. 2FA can help to thwart these attacks by requiring an additional step beyond just entering a username and password.<\/p>\n<p>By implementing 2FA as part of their security process, users can enhance their online authentication and protect their accounts from potential security threats such as phishing attempts. With the added layer of protection that 2FA provides, users can feel more secure in their online interactions and reduce the risk of falling victim to phishing attacks.<\/p>\n<h2 data-element-id=\"headingsMap-7-0\"><span class=\"ez-toc-section\" id=\"Benefits_of_Two-Factor_Authentication_2FA\"><\/span>Benefits of Two-Factor Authentication (2FA)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefit<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Stronger Security<\/td>\n<td>Provides an extra layer of protection for sensitive data and accounts.<\/td>\n<\/tr>\n<tr>\n<td>Reduced Risk of Hacking<\/td>\n<td>Makes it harder for unauthorized individuals to access accounts.<\/td>\n<\/tr>\n<tr>\n<td>Easy to Implement<\/td>\n<td>Setting up 2FA is relatively easy and quick with minimal effort.<\/td>\n<\/tr>\n<tr>\n<td>Protection Against Malware<\/td>\n<td>Helps protect accounts from malware and other cyber threats.<\/td>\n<\/tr>\n<tr>\n<td>Peace of Mind<\/td>\n<td>Knowing your accounts are even more secure offers greater peace of mind.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\" data-element-id=\"headingsMap-8-0\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is 2FA and how does it protect users from phishing attempts?<br \/>\nA: 2FA, or two-factor authentication, adds an extra layer of security to the authentication process by requiring users to provide two authentication factors before granting access to their accounts. This helps protect users from phishing attacks because even if a malicious actor obtains login credentials through a phishing attempt, they would still need the second factor (such as a one-time code sent to a mobile device) to gain unauthorized access.<\/p>\n<p>Q: How does 2FA provide additional security measures to protect against cyber threats?<br \/>\nA: 2FA requires users to provide not just a password, but an additional form of authentication like a security token or mobile phone confirmation code. This adds a layer of protection that can help prevent successful phishing attacks and unauthorized access, thereby reducing the risk of security breaches and potential threats.<\/p>\n<p>Q: What are some common authentication factors used in 2FA to enhance security?<br \/>\nA: Common authentication factors used in 2FA include something the user knows (like a password), something they have (such as a security token or mobile phone), and something they are (biometric factors like fingerprint scanners). By requiring multiple factors of authentication, 2FA helps verify the identity of the user and make it harder for malicious actors to gain unauthorized access.<\/p>\n<p>Q: How can 2FA help protect against phishing emails and other malicious attempts?<br \/>\nA: 2FA can help protect against phishing emails and other malicious attempts by requiring users to provide an additional security layer beyond just entering a password. By adding an extra step (such as entering a one-time code sent to their mobile device), 2FA helps verify the identity of the user and can help prevent unauthorized access and credential exploitation.<\/p>\n<p>Q: What are some examples of additional security layers that can be implemented with 2FA?<br \/>\nA: Some examples of additional security layers that can be implemented with 2FA include using authentication apps, push notifications, SMS-based authentication, biometric factors, and adaptive authentication solutions. These layers add extra protection against phishing attacks, credential theft, and other potential security threats. Source: &#8220;Two-Factor Authentication: An Overview&#8221; &#8211; National Cyber Security Centre (NCSC)<\/p>\n<h2 id=\"outro\" data-element-id=\"headingsMap-9-0\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The best way to protect your \u200ddata and online accounts against phishing attacks is to\u2064 use\u2064 two-factor authentication. With\u200d LogMeOnce, you can easily enable \u200dtwo-factor authentication and even secure your accounts \u200bwith biometric identity features \u2013 all for\u2064 free. With a password manager \u2063and two-factor authentication, such \u2062as \u200b<a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a>, you can rest\u200b assured that your accounts and data are\u2064 safe from phishing attacks. Get maximum\u2064 protection by signing up for your free\u200c LogMeOnce\u2064 account to be 2FA-protected and stay\u200d secure online.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>From online banking to social networking, we\u2064 are all increasingly\u2062 dependent on the internet for personal activities\u2063 so it is \u2062essential we learn how to protect ourselves from online\u200d threats such as phishing attacks. Two-factor authentication (2FA) is\u200c a great tool but many people are still unaware of how it can protect users \u200dfrom phishing [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1149,939,1740,931,6619],"class_list":["post-71570","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-2fa","tag-phishing","tag-cyber-security","tag-online-security","tag-user-protection"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=71570"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71570\/revisions"}],"predecessor-version":[{"id":240107,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71570\/revisions\/240107"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=71570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=71570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=71570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}