<br />
<b>Notice</b>:  Function _load_textdomain_just_in_time was called <strong>incorrectly</strong>. Translation loading for the <code>wordpress-seo</code> domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the <code>init</code> action or later. Please see <a href="https://developer.wordpress.org/advanced-administration/debug/debug-wordpress/">Debugging in WordPress</a> for more information. (This message was added in version 6.7.0.) in <b>/home/gitaalli/domains/gitaalliedtech.com/public_html/blog/wp-includes/functions.php</b> on line <b>6131</b><br />
{"id":83,"date":"2023-11-11T12:35:28","date_gmt":"2023-11-11T12:35:28","guid":{"rendered":"https:\/\/blog.gitaalliedtech.com\/?p=83"},"modified":"2024-03-14T09:16:04","modified_gmt":"2024-03-14T09:16:04","slug":"7-types-of-cyber-security-threats-everyone-must-know","status":"publish","type":"post","link":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/","title":{"rendered":"7 Types of Cyber Security Threats Everyone Must Know"},"content":{"rendered":"<p style=\"text-align: justify;\">In an era dominated by digital technologies and interconnected systems, the need for robust cybersecurity has never been more critical. As individuals, businesses, and governments continue to rely on the Internet for various aspects of their daily operations, understanding the different types of cyber threats is paramount.<\/p>\n<p style=\"text-align: justify;\">GITA Allied Technologies has gained immense popularity over the past few years for offering the <strong>best cyber security services in the USA<\/strong>. Let&#8217;s delve into the subject below in this blog.<\/p>\n<h2 style=\"text-align: justify;\">Significant Cyber Security Threats Everyone Should Be Aware Of<\/h2>\n<p style=\"text-align: justify;\"><strong>Malware Attacks<\/strong><\/p>\n<p style=\"text-align: justify;\">Malware represents a broad category of cyber threats that includes viruses, worms, trojan horses, and ransomware. Malware infiltrates systems through infected downloads, email attachments, or compromised websites. Once inside, it can wreak havoc by stealing sensitive information, disrupting operations, or encrypting files for ransom.<\/p>\n<p style=\"text-align: justify;\"><strong>Phishing Schemes<\/strong><\/p>\n<p style=\"text-align: justify;\">Phishing attacks involve tricking individuals into revealing sensitive information, such as login credentials or financial details, by posing as a trustworthy entity. These attacks often occur through deceptive emails, fake websites, or social engineering tactics. Vigilance is key in recognizing phishing attempts. Our experts can protect your business from such scams and ensure providing the <a href=\"https:\/\/gitaalliedtech.com\/service_detail?serviceSno=6\"><strong>best cyber security services in the USA<\/strong><\/a>.<\/p>\n<p style=\"text-align: justify;\"><strong>Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks<\/strong><\/p>\n<p style=\"text-align: justify;\">DoS attacks overwhelm a system, network, or website with a flood of traffic, rendering it inaccessible to users. DDoS attacks, an evolved form of DoS, involve multiple sources orchestrating a coordinated assault. These attacks aim to disrupt services, causing financial losses and reputational damage. Employing robust firewalls, intrusion detection systems, and content delivery networks can help organizations defend against such attacks.<\/p>\n<p style=\"text-align: justify;\"><strong>Man-in-the-Middle (MitM) Attacks<\/strong><\/p>\n<p style=\"text-align: justify;\">In MitM attacks, cybercriminals intercept and manipulate communication between two parties without their knowledge. This allows attackers to eavesdrop on sensitive information or alter the content of messages. Common methods include Wi-Fi eavesdropping and session hijacking. Encrypting communications and using secure, trusted networks can help mitigate the risks associated with MitM attacks.<\/p>\n<p style=\"text-align: justify;\"><strong>Insider Threats<\/strong><\/p>\n<p style=\"text-align: justify;\">Not all cyber threats originate externally. Insider threats involve individuals within an organization who misuse their access to compromise data or systems. Implementing strict access controls, monitoring employee activities, and conducting regular cybersecurity training can minimize the risk of insider threats.<\/p>\n<p style=\"text-align: justify;\"><strong>IoT Vulnerabilities<\/strong><\/p>\n<p style=\"text-align: justify;\">With the proliferation of Internet of Things (IoT) devices, the attack surface for cyber threats has expanded. Insecure IoT devices can be exploited to gain unauthorized access to networks or launch attacks. Manufacturers and users alike must prioritize security in IoT devices by regularly updating firmware, changing default credentials, and segmenting IoT networks from critical systems.<\/p>\n<p style=\"text-align: justify;\"><strong>Zero-Day Exploits<\/strong><\/p>\n<p style=\"text-align: justify;\">Zero-day exploits target vulnerabilities in software or hardware that are unknown to the vendor or lack a patch. Cybercriminals capitalize on this window of opportunity to launch attacks before a fix is developed. To mitigate the risk of zero-day exploits, organizations should stay informed about security vulnerabilities, promptly apply patches, and invest in intrusion detection systems.<\/p>\n<h2 style=\"text-align: justify;\">Hire The Experts<\/h2>\n<p style=\"text-align: justify;\">GITA Allied Technologies ensures adopting a proactive approach to cybersecurity, implementing robust security measures, and fostering a culture of awareness. This helps us create a safer digital environment. Get in touch with us today if you\u2019re looking for <strong><a href=\"https:\/\/gitaalliedtech.com\/service_detail?serviceSno=6\">leading cybersecurity experts<\/a>.<\/strong> Remember, the first line of defence against cyber threats is knowledge and vigilance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an era dominated by digital technologies and interconnected systems, the need for robust cybersecurity has never been more critical. As individuals, businesses, and governments continue to rely on the Internet for various aspects of their daily operations, understanding the different types of cyber threats is paramount. GITA Allied Technologies has gained immense popularity over [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":86,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[14,13],"class_list":["post-83","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leading-cyber-security-experts-in-usa","tag-best-cyber-security-services-in-usa","tag-leading-cyber-security-experts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 Types of Cyber Security Threats Everyone Must Know | Blog<\/title>\n<meta name=\"description\" content=\"Explore 7 cyber threats crucial for everyone&#039;s awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Types of Cyber Security Threats Everyone Must Know | Blog\" \/>\n<meta property=\"og:description\" content=\"Explore 7 cyber threats crucial for everyone&#039;s awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\" \/>\n<meta property=\"og:site_name\" content=\"gitaalliedtech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/fb.me\/gitaalliedtech\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-11T12:35:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-14T09:16:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitaalliedtech.com\/blog\/wp-content\/uploads\/2023\/11\/7-Types-of-Cyber-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"gitaalli-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"7 Types of Cyber Security Threats Everyone Must Know | Blog\" \/>\n<meta name=\"twitter:description\" content=\"Explore 7 cyber threats crucial for everyone&#039;s awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.\" \/>\n<meta name=\"twitter:creator\" content=\"@gitaalliedtech\" \/>\n<meta name=\"twitter:site\" content=\"@gitaalliedtech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gitaalli-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\"},\"author\":{\"name\":\"gitaalli-admin\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/person\/88beb6c324eef48cd57a3d55424f3f8f\"},\"headline\":\"7 Types of Cyber Security Threats Everyone Must Know\",\"datePublished\":\"2023-11-11T12:35:28+00:00\",\"dateModified\":\"2024-03-14T09:16:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\"},\"wordCount\":550,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#organization\"},\"keywords\":[\"best cyber security services in usa\",\"leading cyber security experts\"],\"articleSection\":[\"Leading cyber security experts in usa\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\",\"url\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\",\"name\":\"7 Types of Cyber Security Threats Everyone Must Know | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#website\"},\"datePublished\":\"2023-11-11T12:35:28+00:00\",\"dateModified\":\"2024-03-14T09:16:04+00:00\",\"description\":\"Explore 7 cyber threats crucial for everyone's awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gitaalliedtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Types of Cyber Security Threats Everyone Must Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#website\",\"url\":\"https:\/\/gitaalliedtech.com\/blog\/\",\"name\":\"GIta Allied Technologies\",\"description\":\"Best Managed IT Service Provider in the USA\",\"publisher\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitaalliedtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#organization\",\"name\":\"GIta Allied Technologies\",\"url\":\"https:\/\/gitaalliedtech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitaalliedtech.com\/blog\/wp-content\/uploads\/2023\/09\/gita_logo.png\",\"contentUrl\":\"https:\/\/gitaalliedtech.com\/blog\/wp-content\/uploads\/2023\/09\/gita_logo.png\",\"width\":300,\"height\":100,\"caption\":\"GIta Allied Technologies\"},\"image\":{\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/fb.me\/gitaalliedtech\",\"https:\/\/twitter.com\/gitaalliedtech\",\"https:\/\/linkedin.com\/company\/gitaalliedtech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/person\/88beb6c324eef48cd57a3d55424f3f8f\",\"name\":\"gitaalli-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/853cb879adeffa8b63d85fcffd615994a37878dc504ee97574147ad14d93a670?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/853cb879adeffa8b63d85fcffd615994a37878dc504ee97574147ad14d93a670?s=96&d=mm&r=g\",\"caption\":\"gitaalli-admin\"},\"sameAs\":[\"https:\/\/gitaalliedtech.com\/blog\"],\"url\":\"https:\/\/gitaalliedtech.com\/blog\/author\/gitaalli-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Types of Cyber Security Threats Everyone Must Know | Blog","description":"Explore 7 cyber threats crucial for everyone's awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/","og_locale":"en_US","og_type":"article","og_title":"7 Types of Cyber Security Threats Everyone Must Know | Blog","og_description":"Explore 7 cyber threats crucial for everyone's awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.","og_url":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/","og_site_name":"gitaalliedtech","article_publisher":"https:\/\/fb.me\/gitaalliedtech","article_published_time":"2023-11-11T12:35:28+00:00","article_modified_time":"2024-03-14T09:16:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/gitaalliedtech.com\/blog\/wp-content\/uploads\/2023\/11\/7-Types-of-Cyber-Security.jpg","type":"image\/jpeg"}],"author":"gitaalli-admin","twitter_card":"summary_large_image","twitter_title":"7 Types of Cyber Security Threats Everyone Must Know | Blog","twitter_description":"Explore 7 cyber threats crucial for everyone's awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.","twitter_creator":"@gitaalliedtech","twitter_site":"@gitaalliedtech","twitter_misc":{"Written by":"gitaalli-admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#article","isPartOf":{"@id":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/"},"author":{"name":"gitaalli-admin","@id":"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/person\/88beb6c324eef48cd57a3d55424f3f8f"},"headline":"7 Types of Cyber Security Threats Everyone Must Know","datePublished":"2023-11-11T12:35:28+00:00","dateModified":"2024-03-14T09:16:04+00:00","mainEntityOfPage":{"@id":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/"},"wordCount":550,"commentCount":0,"publisher":{"@id":"https:\/\/gitaalliedtech.com\/blog\/#organization"},"keywords":["best cyber security services in usa","leading cyber security experts"],"articleSection":["Leading cyber security experts in usa"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/","url":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/","name":"7 Types of Cyber Security Threats Everyone Must Know | Blog","isPartOf":{"@id":"https:\/\/gitaalliedtech.com\/blog\/#website"},"datePublished":"2023-11-11T12:35:28+00:00","dateModified":"2024-03-14T09:16:04+00:00","description":"Explore 7 cyber threats crucial for everyone's awareness. Our guide empowers you with insights to safeguard against evolving cybersecurity risks.","breadcrumb":{"@id":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gitaalliedtech.com\/blog\/7-types-of-cyber-security-threats-everyone-must-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gitaalliedtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Types of Cyber Security Threats Everyone Must Know"}]},{"@type":"WebSite","@id":"https:\/\/gitaalliedtech.com\/blog\/#website","url":"https:\/\/gitaalliedtech.com\/blog\/","name":"GIta Allied Technologies","description":"Best Managed IT Service Provider in the USA","publisher":{"@id":"https:\/\/gitaalliedtech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitaalliedtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitaalliedtech.com\/blog\/#organization","name":"GIta Allied Technologies","url":"https:\/\/gitaalliedtech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitaalliedtech.com\/blog\/wp-content\/uploads\/2023\/09\/gita_logo.png","contentUrl":"https:\/\/gitaalliedtech.com\/blog\/wp-content\/uploads\/2023\/09\/gita_logo.png","width":300,"height":100,"caption":"GIta Allied Technologies"},"image":{"@id":"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fb.me\/gitaalliedtech","https:\/\/twitter.com\/gitaalliedtech","https:\/\/linkedin.com\/company\/gitaalliedtech"]},{"@type":"Person","@id":"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/person\/88beb6c324eef48cd57a3d55424f3f8f","name":"gitaalli-admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitaalliedtech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/853cb879adeffa8b63d85fcffd615994a37878dc504ee97574147ad14d93a670?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/853cb879adeffa8b63d85fcffd615994a37878dc504ee97574147ad14d93a670?s=96&d=mm&r=g","caption":"gitaalli-admin"},"sameAs":["https:\/\/gitaalliedtech.com\/blog"],"url":"https:\/\/gitaalliedtech.com\/blog\/author\/gitaalli-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/posts\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":5,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/posts\/83\/revisions"}],"predecessor-version":[{"id":164,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/posts\/83\/revisions\/164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/media\/86"}],"wp:attachment":[{"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/media?parent=83"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/categories?post=83"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitaalliedtech.com\/blog\/wp-json\/wp\/v2\/tags?post=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}