{"id":9202,"date":"2023-07-21T15:10:10","date_gmt":"2023-07-21T13:10:10","guid":{"rendered":"https:\/\/callidusprolab.com\/smartfense\/guias-y-whitepapers\/"},"modified":"2024-09-17T11:20:14","modified_gmt":"2024-09-17T09:20:14","slug":"guides-and-whitepapers","status":"publish","type":"page","link":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/","title":{"rendered":"Guides and Whitepapers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"9202\" class=\"elementor elementor-9202 elementor-4310\">\n\t\t\t\t<div class=\"elementor-element elementor-element-baf7a35 e-flex e-con-boxed e-con e-parent\" data-id=\"baf7a35\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0acf31b e-con-full e-flex e-con e-child\" data-id=\"0acf31b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d177bc8 elementor-widget elementor-widget-heading bdevs-el heading\" data-id=\"d177bc8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\n\n \n <div class=\"section__title-wrapper wow fadeInUp2 section-heading p-0\" data-wow-delay=\".3s\">\n\n \n\n\n <h2 class=\"section__title section-title\">Disarming cybercriminals: Free tools to prevent social engineering attacks<\/h2>\n \n <p>Cybercriminals have a variety of techniques in their arsenal to carry out their social engineering attacks. If you act proactively, cybercriminals will find it very difficult to perpetrate on your organization.<\/p>\n\n \n <\/div>\n\n \n\n \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06d4259 elementor-widget elementor-widget-html\" data-id=\"06d4259\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a href=\"https:\/\/smartfense.com\/en\/recursos\/guias-y-whitepapers\/desarmando-a-los-ciberdelincuentes\/\" class=\"w-btn\">\nMore information<\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dae0d6d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"dae0d6d\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1d5304 elementor-widget elementor-widget-image\" data-id=\"a1d5304\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"336\" src=\"https:\/\/smartfense.com\/file\/2023\/07\/desarmando-ciberdelincuentes-comp-1200px-1024x538.jpg\" class=\"attachment-large size-large wp-image-5158\" alt=\"\" srcset=\"https:\/\/smartfense.com\/file\/2023\/07\/desarmando-ciberdelincuentes-comp-1200px-1024x538.jpg 1024w, https:\/\/smartfense.com\/file\/2023\/07\/desarmando-ciberdelincuentes-comp-1200px-300x158.jpg 300w, https:\/\/smartfense.com\/file\/2023\/07\/desarmando-ciberdelincuentes-comp-1200px-768x403.jpg 768w, https:\/\/smartfense.com\/file\/2023\/07\/desarmando-ciberdelincuentes-comp-1200px.jpg 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fbc8a6 e-flex e-con-boxed e-con e-parent\" data-id=\"4fbc8a6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c65dce e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1c65dce\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb1a01b elementor-widget elementor-widget-image\" data-id=\"eb1a01b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"336\" src=\"https:\/\/smartfense.com\/file\/2023\/07\/guia-ransomware-comp-1200px-1024x538.jpg\" class=\"attachment-large size-large wp-image-5153\" alt=\"\" srcset=\"https:\/\/smartfense.com\/file\/2023\/07\/guia-ransomware-comp-1200px-1024x538.jpg 1024w, https:\/\/smartfense.com\/file\/2023\/07\/guia-ransomware-comp-1200px-300x158.jpg 300w, https:\/\/smartfense.com\/file\/2023\/07\/guia-ransomware-comp-1200px-768x403.jpg 768w, https:\/\/smartfense.com\/file\/2023\/07\/guia-ransomware-comp-1200px.jpg 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08a267f e-con-full e-flex e-con e-child\" data-id=\"08a267f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d676fc elementor-widget elementor-widget-heading bdevs-el heading\" data-id=\"6d676fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\n\n \n <div class=\"section__title-wrapper wow fadeInUp2 section-heading p-0\" data-wow-delay=\".3s\">\n\n \n\n\n <h2 class=\"section__title section-title\">OWASP Guide to Prevent RANSOMWARE Infections<\/h2>\n \n <p>This OWASP guide is intended as a checklist in order to prevent Ransomware infections and, ultimately, to create adequate procedures for information recovery.<\/p>\n\n \n <\/div>\n\n \n\n \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00854bf elementor-widget elementor-widget-html\" data-id=\"00854bf\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a href=\"https:\/\/smartfense.com\/en\/recursos\/guias-y-whitepapers\/guia-owasp-ransomware\/\" class=\"w-btn\">\nMore information<\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5c9e6d e-flex e-con-boxed e-con e-parent\" data-id=\"c5c9e6d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e2ec738 e-con-full e-flex e-con e-child\" data-id=\"e2ec738\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b0b4e3 elementor-widget elementor-widget-heading bdevs-el heading\" data-id=\"3b0b4e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\n\n \n <div class=\"section__title-wrapper wow fadeInUp2 section-heading p-0\" data-wow-delay=\".3s\">\n\n \n\n\n <h2 class=\"section__title section-title\">How to develop a user-oriented security layer<\/h2>\n \n <p>In order to develop a user-oriented security layer, it is necessary to perform a User-Hardening process. Learn the basics of this process and how to carry it out in a practical way.<\/p>\n\n \n <\/div>\n\n \n\n \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9b8f42 elementor-widget elementor-widget-html\" data-id=\"f9b8f42\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a href=\"https:\/\/smartfense.com\/en\/recursos\/guias-y-whitepapers\/hardening-de-usuarios\/\" class=\"w-btn\">\nMore information<\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3dbafa e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e3dbafa\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f23e8c elementor-widget elementor-widget-image\" data-id=\"8f23e8c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"336\" src=\"https:\/\/smartfense.com\/file\/2023\/08\/capa-seguridad-1200-1024x538.jpg\" class=\"attachment-large size-large wp-image-9938\" alt=\"\" srcset=\"https:\/\/smartfense.com\/file\/2023\/08\/capa-seguridad-1200-1024x538.jpg 1024w, https:\/\/smartfense.com\/file\/2023\/08\/capa-seguridad-1200-300x158.jpg 300w, https:\/\/smartfense.com\/file\/2023\/08\/capa-seguridad-1200-768x403.jpg 768w, https:\/\/smartfense.com\/file\/2023\/08\/capa-seguridad-1200.jpg 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Disarming cybercriminals: Free tools to prevent social engineering attacks Cybercriminals have a variety of techniques in their arsenal to carry out their social engineering attacks. If you act proactively, cybercriminals [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10655,"parent":9238,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-9202","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":" \n<title>Guides and Whitepapers - SMARTFENSE<\/title>\n<meta name=\"description\" content=\"Guides and Whitepapers to reduce the risk of your users becoming victims of a Social Engineering attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guides and Whitepapers - SMARTFENSE\" \/>\n<meta property=\"og:description\" content=\"Guides and Whitepapers to reduce the risk of your users becoming victims of a Social Engineering attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/\" \/>\n<meta property=\"og:site_name\" content=\"SMARTFENSE - Awareness in Cyber Security\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-17T09:20:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartfense.com\/file\/2023\/08\/whitepapers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/\",\"name\":\"Guides and Whitepapers - SMARTFENSE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/whitepapers.jpg\",\"datePublished\":\"2023-07-21T13:10:10+00:00\",\"dateModified\":\"2024-09-17T09:20:14+00:00\",\"description\":\"Guides and Whitepapers to reduce the risk of your users becoming victims of a Social Engineering attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/whitepapers.jpg\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/whitepapers.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/guides-and-whitepapers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/smartfense.com\\\/en\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Guides and Whitepapers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\",\"name\":\"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartfense.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#organization\",\"name\":\"SMARTFENSE\",\"url\":\"https:\\\/\\\/smartfense.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"contentUrl\":\"https:\\\/\\\/smartfense.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo-smartfense-240x40-1.png\",\"width\":241,\"height\":40,\"caption\":\"SMARTFENSE\"},\"image\":{\"@id\":\"https:\\\/\\\/smartfense.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n ","yoast_head_json":{"title":"Guides and Whitepapers - SMARTFENSE","description":"Guides and Whitepapers to reduce the risk of your users becoming victims of a Social Engineering attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/","og_locale":"en_US","og_type":"article","og_title":"Guides and Whitepapers - SMARTFENSE","og_description":"Guides and Whitepapers to reduce the risk of your users becoming victims of a Social Engineering attack.","og_url":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/","og_site_name":"SMARTFENSE - Awareness in Cyber Security","article_modified_time":"2024-09-17T09:20:14+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/smartfense.com\/file\/2023\/08\/whitepapers.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/","url":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/","name":"Guides and Whitepapers - SMARTFENSE","isPartOf":{"@id":"https:\/\/smartfense.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/#primaryimage"},"image":{"@id":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/#primaryimage"},"thumbnailUrl":"https:\/\/smartfense.com\/file\/2023\/08\/whitepapers.jpg","datePublished":"2023-07-21T13:10:10+00:00","dateModified":"2024-09-17T09:20:14+00:00","description":"Guides and Whitepapers to reduce the risk of your users becoming victims of a Social Engineering attack.","breadcrumb":{"@id":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/#primaryimage","url":"https:\/\/smartfense.com\/file\/2023\/08\/whitepapers.jpg","contentUrl":"https:\/\/smartfense.com\/file\/2023\/08\/whitepapers.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/smartfense.com\/en\/resources\/guides-and-whitepapers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/smartfense.com\/en\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/smartfense.com\/en\/resources\/"},{"@type":"ListItem","position":3,"name":"Guides and Whitepapers"}]},{"@type":"WebSite","@id":"https:\/\/smartfense.com\/en\/#website","url":"https:\/\/smartfense.com\/en\/","name":"SMARTFENSE - Concienciaci\u00f3n en Ciberseguridad","description":"","publisher":{"@id":"https:\/\/smartfense.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartfense.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/smartfense.com\/en\/#organization","name":"SMARTFENSE","url":"https:\/\/smartfense.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartfense.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","contentUrl":"https:\/\/smartfense.com\/file\/2023\/08\/logo-smartfense-240x40-1.png","width":241,"height":40,"caption":"SMARTFENSE"},"image":{"@id":"https:\/\/smartfense.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/pages\/9202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/comments?post=9202"}],"version-history":[{"count":3,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/pages\/9202\/revisions"}],"predecessor-version":[{"id":29200,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/pages\/9202\/revisions\/29200"}],"up":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/pages\/9238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/media\/10655"}],"wp:attachment":[{"href":"https:\/\/smartfense.com\/en\/wp-json\/wp\/v2\/media?parent=9202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}