{"id":5599,"date":"2021-09-07T18:52:22","date_gmt":"2021-09-07T18:52:22","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5599"},"modified":"2021-09-07T19:07:57","modified_gmt":"2021-09-07T19:07:57","slug":"data-encryption","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5599","title":{"rendered":"Data Encryption"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5599\" class=\"elementor elementor-5599\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f3b48e ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f3b48e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-382fa283 ot-flex-column-vertical\" data-id=\"382fa283\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-12a52e1d elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"12a52e1d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-74c8e28f ot-flex-column-vertical\" data-id=\"74c8e28f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c758064 elementor-widget elementor-widget-iheading\" data-id=\"6c758064\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ DATA ENCRYPTION<\/span>\r\n\t        <h2 class=\"main-heading\">Full Disk, File Encryption And Data Protection<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-21ab83bc ot-flex-column-vertical\" data-id=\"21ab83bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-03d81b7 elementor-widget elementor-widget-heading\" data-id=\"03d81b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Encrypting Your Data is Crucial?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-560c39b5 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"560c39b5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-12ff2f10 ot-flex-column-vertical\" data-id=\"12ff2f10\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc8938 elementor-widget elementor-widget-spacer\" data-id=\"9dc8938\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-717b6a05 elementor-widget elementor-widget-text-editor\" data-id=\"717b6a05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-2380\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/data-encryption-768x638-1-300x249.jpg\" alt=\"\" width=\"400\" height=\"332\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/data-encryption-768x638-1-300x249.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/data-encryption-768x638-1-720x598.jpg 720w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/data-encryption-768x638-1.jpg 768w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>Information is the most valuable asset you own, and you may not fully comprehend how sensitive so-called non-sensitive information can be. For example:<br \/>\u2022 your customer contact details can be used to social engineer customers to redirect payments to a different bank account<br \/>\u2022 a criminal can place orders for goods which your company would be liable to pay for by using supplier account details<br \/>\u2022 a \u2018blank\u2019 mobile device can be easily retrieved from lost or stolen devices containing sensitive information like cached domain passwords, stored Wi-Fi passwords, and passwords saved in web browsers<br \/>With mobile and cloud use more common across the workforce, physical and perimeter security is meaningless. Rather than protect networks, your focus needs to be on protecting your data no matter where it\u2019s stored or where it\u2019s used.<br \/>Reduce Risk with Encryption<br \/>Data encryption can be applied in many ways from full disk encryption, to \u2018per record\u2019 encryption on public facing databases and web applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6880f99a ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6880f99a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54fe4a4f ot-flex-column-vertical\" data-id=\"54fe4a4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59effeb elementor-widget elementor-widget-heading\" data-id=\"59effeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data encryption assists to reduce risk across several scenarios including:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fcd783 elementor-widget elementor-widget-spacer\" data-id=\"6fcd783\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4b9ce elementor-widget elementor-widget-text-editor\" data-id=\"2d4b9ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is where DataSecure has a mature methodology when it comes to tailoring data encryption services. It entails performing a data-flow analysis and risk assessment. We then design a formal architecture to ensure we capture your encryption requirements and implement the lightest effective encryption possible.<\/p><p>If you want to protect your data no matter where it is or who has it, contact us today for a free consultation with our expert security architects.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58f23a2 elementor-widget elementor-widget-spacer\" data-id=\"58f23a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dfee31 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8dfee31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-398fc4f8 elementor-widget elementor-widget-toggle\" data-id=\"398fc4f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-9651\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-9651\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Stolen data from hacking<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9651\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-9651\"><p><img decoding=\"async\" class=\"wp-image-2096 size-medium alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/bigstock-Computer-Hacker-Silhouette-Of-97521494-768x512-1-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/bigstock-Computer-Hacker-Silhouette-Of-97521494-768x512-1-300x200.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/bigstock-Computer-Hacker-Silhouette-Of-97521494-768x512-1-720x480.jpg 720w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/bigstock-Computer-Hacker-Silhouette-Of-97521494-768x512-1.jpg 768w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>By managing encryption keys in a hardware security module, even if a hacker copies all data, the data will never be decrypted without the cybercriminal physically accessing the premises where your data is kept.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-9652\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-9652\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Accidental data leak protection<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9652\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-9652\"><p><img decoding=\"async\" class=\"size-full wp-image-2384 alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dataloss-1.png\" alt=\"\" width=\"482\" height=\"398\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dataloss-1.png 482w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/dataloss-1-300x248.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/>There are too many ways for data to be copied for traditional Data Loss Protection (DLP) software to be fully effective. This is where per file encryption controls the capability to decrypt a file, which means data can be safely \u2018leaked\u2019 anywhere, if the decryption keys are managed properly.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-9653\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-9653\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Internal digital rights management <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9653\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-9653\"><p>If an employee has a right to view a file, it can be difficult to revoke that right in the future because the employee may have made a copy outside of company control. However, only giving employees encrypted copies and software to manage decryption can render any copies useless even if they have been copied.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-9654\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-9654\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Mobile device protection<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9654\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-9654\"><p>Even mobile devices which don\u2019t store corporate data usually have sensitive information in the form of reversible passwords for everything including email, active directory and Software as a Service (SaaS) services like Salesforce. With one in nine people using \u20181234\u2019 as their pin, in-built security isn\u2019t enough. Safe, encrypted spaces are needed to access corporate assets.<br \/>Data encryption plays a major role in securing almost all modern enterprises. However, if you want to implement it without impacting your end user\u2019s ability to work and collaborate freely, you need to tap into the right experience and knowledge.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14776709 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14776709\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4be628e1 ot-flex-column-vertical\" data-id=\"4be628e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-670e6fc7 elementor-widget elementor-widget-heading\" data-id=\"670e6fc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Drop us a line! We are here to answer your questions 24\/7<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38ad01ff elementor-widget elementor-widget-heading\" data-id=\"38ad01ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEED CONSULTATION?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52afd449 elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"52afd449\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/datasecc.com\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contact Us<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ DATA ENCRYPTION Full Disk, File Encryption And Data Protection Why Encrypting Your Data is Crucial? Information is the most valuable asset you own, and you may not fully comprehend how sensitive so-called non-sensitive information can be. For example:\u2022 your customer contact details can be used to social engineer customers to redirect payments to a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5599","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5599"}],"version-history":[{"count":7,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5599\/revisions"}],"predecessor-version":[{"id":5608,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5599\/revisions\/5608"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}