{"id":53502,"date":"2016-06-01T18:16:13","date_gmt":"2016-06-01T18:16:13","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53502"},"modified":"2016-06-01T18:16:13","modified_gmt":"2016-06-01T18:16:13","slug":"cyber-security-programs-lacking-efficiency","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/","title":{"rendered":"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>It&#8217;s clear most companies have some type of cybersecurity training; however, it&#8217;s not exactly meeting the standards in teaching employees the dangers of of careless online behavior&#8230;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>In a recent study conducted by <a href=\"http:\/\/www.experian.com\/assets\/data-breach\/white-papers\/experian-2016-ponemon-insider-risk-report.pdf\" target=\"_blank\">Experian<\/a>, although companies invest millions of dollars annually on cybersecurity training for employees, employees&#8217; efforts to maintain a strong security approach seem to be inferior. In fact it was reported that <strong>66% of individuals surveyed confirmed employees are the weakest in securing the company&#8217;s protection<\/strong> posture. In turn, <strong>55% of those surveyed mentioned their organization underwent a security breach or issue due to a careless employee<\/strong>. More than half of the respondents are convinced employees are not properly trained or knowledgeable of the risks at hand.<\/p>\n<p>&nbsp;<\/p>\n<p>So, what are company security training programs lacking? It appears majority of companies have a single course available in security training (only less than half require the training); however, important topics are often overlooked, allowing employees more vulnerable to making mistakes that lead to a security issue. Out of those surveyed by Experian, those critical security areas that are often ignored are topics such as phishing and engineering attacks, mobile device security, and securing cloud services.<\/p>\n<p>&nbsp;<\/p>\n<p>In addition, organizational culture often influences the insider risk of lack of security knowledge. Within the study, it was found senior management often makes security training and privacy a lesser priority. Of those surveyed, only <strong>35% believe senior management within their company prioritizes the responsibility that employees are trained and taught on how security risks affect them<\/strong> and the company. Astonishingly enough, less than half felt a strong security approach was enforced as a piece of the company culture.<\/p>\n<p>&nbsp;<\/p>\n<p>In conclusion, with the growing threat of malicious malware, specifically <a href=\"https:\/\/www.pcmatic.com\/blog\/?s=Ransomware+attacks+2016\" target=\"_blank\">ransomware<\/a>, this year alone, it is apparent stronger security along with continued training is needed at home and in the workplace. Effective measure and focus is required to fight the continued battle on malware. With continued education on privacy and data protection, security breaches and hacks would decrease within the workplace.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; It&#8217;s clear most companies have some type of cybersecurity training; however, it&#8217;s not exactly meeting the standards in teaching employees the dangers of of careless online behavior&#8230;<\/p>\n","protected":false},"author":64,"featured_media":53503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4953,12],"tags":[4460,4672],"class_list":["post-53502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-sentry-blog","category-the-pit-blog","tag-cyber-defense","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Awareness Programs in the Workplace Lacking Efficiency<\/title>\n<meta name=\"description\" content=\"Cybersecurity training is not meeting the standards in teaching employees the dangers of careless online behavior...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity training is not meeting the standards in teaching employees the dangers of careless online behavior...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-01T18:16:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"259\" \/>\n\t<meta property=\"og:image:height\" content=\"194\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erin Allen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erin Allen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/\"},\"author\":{\"name\":\"Erin Allen\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d73cabd52f5f0115725a4514f07eeca\"},\"headline\":\"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency\",\"datePublished\":\"2016-06-01T18:16:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/\"},\"wordCount\":349,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"keywords\":[\"cyber defense\",\"cybersecurity\"],\"articleSection\":[\"Tech Sentry Blog\",\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/\",\"name\":\"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"datePublished\":\"2016-06-01T18:16:13+00:00\",\"description\":\"Cybersecurity training is not meeting the standards in teaching employees the dangers of careless online behavior...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/CyberSecurity.jpg\",\"width\":259,\"height\":194},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cyber-security-programs-lacking-efficiency\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d73cabd52f5f0115725a4514f07eeca\",\"name\":\"Erin Allen\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/erin-allen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency","description":"Cybersecurity training is not meeting the standards in teaching employees the dangers of careless online behavior...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency","og_description":"Cybersecurity training is not meeting the standards in teaching employees the dangers of careless online behavior...","og_url":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-06-01T18:16:13+00:00","og_image":[{"width":259,"height":194,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","type":"image\/jpeg"}],"author":"Erin Allen","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Erin Allen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/"},"author":{"name":"Erin Allen","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/5d73cabd52f5f0115725a4514f07eeca"},"headline":"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency","datePublished":"2016-06-01T18:16:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/"},"wordCount":349,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","keywords":["cyber defense","cybersecurity"],"articleSection":["Tech Sentry Blog","The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/","url":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/","name":"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","datePublished":"2016-06-01T18:16:13+00:00","description":"Cybersecurity training is not meeting the standards in teaching employees the dangers of careless online behavior...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/CyberSecurity.jpg","width":259,"height":194},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cyber-security-programs-lacking-efficiency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Awareness Programs in the Workplace Lacking Efficiency"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/5d73cabd52f5f0115725a4514f07eeca","name":"Erin Allen","url":"https:\/\/www.pcmatic.com\/blog\/author\/erin-allen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53502"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53502\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53503"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}