{"id":239608,"date":"2023-02-05T15:49:12","date_gmt":"2023-02-05T13:49:12","guid":{"rendered":"https:\/\/shop.thekernel.ua\/academic-account-security"},"modified":"2023-02-28T16:16:09","modified_gmt":"2023-02-28T14:16:09","slug":"academic-account-security","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/academic-account-security","title":{"rendered":"Academic account security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/10\/\u0430\u043a\u0430\u0434\u0435\u043c\u0456\u044f.jpeg&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-170px||||false|false&#8221; custom_padding=&#8221;60px||22px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;146px||0px|||&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;84px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.2em&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; background_enable_color=&#8221;off&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;2%||2%||true|false&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset3&#8243; header_text_shadow_style=&#8221;preset1&#8243; border_radii=&#8221;on|12px|12px|12px|12px&#8221; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>Academic account security \u2013<\/b><\/h1>\n<h2><b> checklist for developers, students, and teachers<\/b><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|5.1%||3%|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>Academic Account Security \u2013 A Checklist for Developers, Students, and Teachers<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">The education sector faces cyberattacks no less than other areas. Over the past 2 years from <\/span><a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/g523b3nmgcfk5r5hc5sns6q\/sophos-state-of-ransomware-in-education-2021-wp.pdf\"><span style=\"font-weight: 400;\">ransomware attacks<\/span><\/a><span style=\"font-weight: 400;\"> 60% of educational institutions in the USA were affected. Microsoft also established that <\/span><b>8 out of 10 registered cyberattacks took place in educational institutions.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The post-pandemic shift to remote and hybrid learning has become the norm, and this has inevitably attracted the attention of attackers. At the same time, thousands of personal devices (smartphones, tablets) are often connected to the university network and immediately to the global network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This inevitably leads to vulnerabilities in the university&#8217;s IT infrastructure. What can intruders do by getting into it:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">get access to the financial part for the purpose of withdrawing funds from accounts;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">disrupt the availability of the platform to receive a reward for its restoration;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">gain access to educational materials in order to resell them on the black market at a lower price;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">get confidential information: thousands of documents, passports, student cards, telephone numbers, addresses and other data can fall into the wrong hands and be used for resale, issuing forged documents or taking out loans;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">gain access to personal data of students&#8217; accounts in an unsecured network, and they can be related to mail, social networks and facilitate access to other data, for example, payment information;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">infect devices with viruses for the purpose of extortion.<\/span><\/li>\n<\/ul>\n<h2><b>Steps to improve security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Knowledge in the field of cybersecurity is becoming increasingly important, especially in the academic field, where databases with sensitive information are stored. Therefore, as cyber security experts, we recommend developing a list of rules that will help increase protection.<\/span><\/p>\n<h3><b>Basic recommendations for developers of web applications for academies<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">R<\/span><span style=\"font-weight: 400;\">egularly conduct a security audit of your platform (can be engaged for this reliable verified agency) to identify vulnerabilities and exploit them in a timely manner;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">use secure cloud services in order to be able to protect against DDos attacks and reduce the cost of data storage in the presence of constantly growing traffic;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">install software (<\/span><a href=\"https:\/\/thekernel.ua\/gluu\/\"><span style=\"font-weight: 400;\">such as Gluu<\/span><\/a><span style=\"font-weight: 400;\">) to identify users and control user access to the system based on their role (administrator or user);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">store all versions of the software product on alternative media (in the same cloud) to be able to quickly restore data even if hackers try to destroy it;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">train and retrain employees to keep abreast of the latest trends in information security;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">use advanced technologies to protect your users&#8217; accounts \u2014 in particular <\/span><a href=\"https:\/\/shop.thekernel.ua\/dvofaktorna-avtentyfikatsiia\"><span style=\"font-weight: 400;\">two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\">: secure accounts with OTP passwords, electronic digital signature, fingerprint or <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/as-a-security-key-yubikey-protects-against-phishing-attacks\"><span style=\"font-weight: 400;\">security keys<\/span><\/a><span style=\"font-weight: 400;\">, that prevent phishing attacks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">develop a security policy in your educational institution for each role and introduce it to everyone involved: administrators, teachers, students.<\/span><\/li>\n<\/ul>\n<h3><b>Basic recommendations for students and teachers<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Always use the most complex passwords possible and change them more often to prevent attackers from picking passwords;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">connect two-factor authentication to your account, if your platform offers this option;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">try not to use public Wi-Fi networks, at least connect via VPN if you need to make payments, and remember to log out of accounts after visiting them;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">store passwords in a safe place to<\/span><a href=\"https:\/\/shop.thekernel.ua\/iak-zakhystyty-parol-vid-kradizhky\"><span style=\"font-weight: 400;\">prevent them from being stolen<\/span><\/a><span style=\"font-weight: 400;\">;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">create separate mailboxes for personal mail and for use in your educational institution, so that an attacker cannot get more important personal information if access to work email is lost;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">carefully check the addresses of links in the newsletters sent to you and do not enter passwords or bank card details on suspicious sites;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">read instructions, undergo training and follow safety recommendations, if such are offered by the administration;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">use security keys to reliably protect against phishing and\/or not worry about where to store passwords.<\/span><\/li>\n<\/ul>\n<p><b>Benefits of security keys:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">opening accounts with keys is easy and convenient, it is similar to how you open an apartment or a personal car;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">no one will be able to open the account without the physical key, so even if the password is picked up, stolen or compromised by you on a phishing site, the fraudster will still not be able to access your account;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">hardware keys can have different form factors (if you use YubiKey keys \u2013 an American manufacturer), so they can be easily converted for any devices;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">YubiKeys do not require drivers to be downloaded and &#8220;work right out of the box&#8221;.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">You can read more about security keys<\/span> <a href=\"https:\/\/www.linkedin.com\/pulse\/%25D0%25B7%25D0%25BD%25D0%25B0%25D0%25B9%25D0%25BE%25D0%25BC%25D1%2581%25D1%2582%25D0%25B2%25D0%25BE-%25D0%25B7-yubikey-%25D1%2589%25D0%25BE-%25D0%25BF%25D0%25BE%25D1%2582%25D1%2580%25D1%2596%25D0%25B1%25D0%25BD%25D0%25BE-%25D0%25B7%25D0%25BD%25D0%25B0%25D1%2582%25D0%25B8-%25D0%25BF%25D1%2580%25D0%25BE-%25D0%25BD%25D0%25B0%25D0%25B9%25D0%25BF%25D0%25BE%25D0%25BF%25D1%2583%25D0%25BB%25D1%258F%25D1%2580%25D0%25BD%25D1%2596%25D1%2588%25D1%2596-\/?trackingId=1%2Fj6xEQdS5qxK084abvtFw%3D%3D\"><span style=\"font-weight: 400;\">in our review.<\/span><\/a><\/p>\n<h2><b>Which security keys are better to use<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As security experts with 30 years of experience and as an official distributor of the American company Yubico, we recommend <\/span><a href=\"https:\/\/shop.thekernel.ua\/shop\"><span style=\"font-weight: 400;\">from the list<\/span><\/a><span style=\"font-weight: 400;\"> two main product lines for all educational institutions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">YubiKey FIPS \u2014 keys for administrators or managers who manage the accounts of other participants and have access to critical information;<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/10\/image5.png&#8221; alt=&#8221;YubiKey FIPS&#8221; title_text=&#8221;YubiKey FIPS&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>YubiKey FIPS<\/em><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">YubiKey Security Key \u2014 \u043d\u0430\u0439\u0434\u0435\u0448\u0435\u0432\u0448\u0430 \u0441\u0435\u0440\u0456\u044f, \u044f\u043a\u0430 \u043c\u0430\u0454 \u043c\u0456\u043d\u0456\u043c\u0430\u043b\u044c\u043d\u0438\u0439 \u043d\u0430\u0431\u0456\u0440 \u0444\u0443\u043d\u043a\u0446\u0456\u0439, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u044f\u043a \u0434\u043b\u044f \u0432\u0438\u043a\u043b\u0430\u0434\u0430\u0447\u0456\u0432, \u0442\u0430\u043a \u0456 \u0434\u043b\u044f \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u0456\u0432, \u044f\u043a\u0456 \u0449\u0435 \u043d\u0435 \u043c\u0430\u044e\u0442\u044c \u0434\u043e\u0445\u043e\u0434\u0443.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/02\/YubiKey-Security-Key.png&#8221; alt=&#8221;yubikey security key&#8221; title_text=&#8221;yubikey security key&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>YubiKey Security Key<\/em><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">For IT academies that require the use of more expensive and complex equipment, we recommend the keys of the YubiKey 5 and <a href=\"https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-bio-fido-edition\">YubiKey Bio<\/a> series. The former have more features and a choice of form factors for whatever devices you use. Others have additional protection with a fingerprint sensor.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/10\/image3.png&#8221; alt=&#8221;YubiKey 5&#8243; title_text=&#8221;YubiKey 5&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Yubikey 5<\/em><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/12\/\u0415\u043c\u043a\u043e\u0441\u043d\u0456-\u0441\u043a\u0430\u043d\u0435\u0440\u0438-YubiKey.jpg&#8221; alt=&#8221;Capacitive scanners yubikey&#8221; title_text=&#8221;Capacitive scanners yubikey&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>YubiKey Bio<\/em><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_padding=&#8221;|2%||2%|false|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#7CDA24&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>If you are interested in purchasing keys, but have not decided on the models and need advice, call +38(044)-35-31-999 or send an application <a href=\"https:\/\/shop.thekernel.ua\/en\/contacts\">from this page<\/a>.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;current&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; custom_margin=&#8221;||-85px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Academic account security \u2013 checklist for developers, students, and teachers Academic Account Security \u2013 A Checklist for Developers, Students, and Teachers The education sector faces cyberattacks no less than other areas. Over the past 2 years from ransomware attacks 60% of educational institutions in the USA were affected. Microsoft also established that 8 out of [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":239612,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Security in the academic sphere \u2013 a checklist for developers, students, and teachers","_seopress_titles_desc":"The education sector faces cyberattacks no less than other areas. Learn how to prevent them from our material. ","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403],"tags":[423],"class_list":["post-239608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","tag-yubikey-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/239608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=239608"}],"version-history":[{"count":8,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/239608\/revisions"}],"predecessor-version":[{"id":239626,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/239608\/revisions\/239626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/239612"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=239608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=239608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=239608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}