{"id":701,"date":"2022-11-08T08:37:07","date_gmt":"2022-11-08T08:37:07","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=701"},"modified":"2022-11-08T08:37:07","modified_gmt":"2022-11-08T08:37:07","slug":"when-to-pay-hackers","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/","title":{"rendered":"When To Pay Hackers?"},"content":{"rendered":"<p><b>When To Pay Hackers?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It is always discouraged to pay ransomware hackers in the event your organization has been attacked. However, 58% of firms worldwide which have been victims of ransomware attacks paid the hackers in order to get back their data, a report published earlier in the year suggests. Is there ever a reasonable time to pay hackers?\u00a0<\/span><\/p>\n<p><b>What Are Ransomware Attacks?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware is a type of malicious software designed to encrypt a victim\u2019s files, systems and data. Attackers often threaten to publicly release or block victims\u2019 access to confidential data or a computer system. Cybercriminals then demand a ransom to restore access to the locked data upon payment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Victims of ransomware attacks are often notified by a message displayed on a lock screen. Thanks to the advancements and tremendous growth trends in cryptocurrency, attackers often request the ransom to be settled in Bitcoin or other cryptocurrency, because of its untraceable nature. Once the requested ransom amount is paid, victims can expect to receive the decryption key to unlock their data. However, similar to paying ransom in reality, successful decryption is not guaranteed. Sometimes the payee will never regain access to the system or will see their sensitive data being exposed to the public.\u00a0<\/span><\/p>\n<p><b>Is it Ever Reasonable to Pay?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Negotiating with cyber-criminals in this manner is discouraged by governments and industry, but that hasn&#8217;t stopped some high-profile firms.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When Colonial Pipeline revealed it had paid a $5 million ransom in bitcoin to DarkSide ransomware hackers, its CEO Joe Blount said the company made the right choice for the nation. At the time the ransom demand was made, Blount said it wasn&#8217;t clear how widespread the intrusion was or how long it would take Colonial Pipeline to restore the compromised systems. So Blount decided to pay the ransom, hoping it would speed up the recovery time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While Colonial Pipeline was successful in restoring order, most aren\u2019t so lucky. Theoretically, if organizations pay the ransom, the attackers will provide a decryption tool and withdraw the threat to publish stolen data. However, payment doesn\u2019t guarantee all data will be restored. Executives need to carefully consider the realities of ransomware. On average, only 65% of the data is recovered, and only 8% of organizations manage to recover all data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Encrypted files are often unrecoverable. Attacker-provided decrypters may crash or fail. You may need to build a new decryption tool by extracting keys from the tool the attacker provides.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recovering data can take several weeks, particularly if a large amount of it has been encrypted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is no guarantee that the hackers will delete the stolen data. They could sell or disclose the information later if it has value.<\/span><\/p>\n<p><b>Reputation Costs<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the ransomware costs, there are also associated reputational costs. According to AON\u2019s 2019 Global Risk Management Survey, UK businesses rate brand damage and cyber attacks in the top three risks. The reality is that cyber attacks have enormous potential to damage the reputation of a business, conflating the two risks. The negative impact can be tangible \u2013 a 2019 study reported by Forbes found that a breach can lower a company\u2019s share price by 7%. It can be hard for the organisation to regain customers\u2019 trust, particularly if the breach was widespread or caused by basic security errors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">PricewaterhouseCoopers (PwC), an audit and assurance company that works in cybersecurity, reported that 69% of consumers surveyed believe that the companies they use are vulnerable to being hacked and attacked by cyber criminals. The same survey found that 87% of consumers are even willing to walk away and take their business elsewhere if, or when, a data breach occurs. These numbers highlight that consumers are not only skeptical of the organizations that have their critical assets, but that they are willing to leave a company who goes through a data breach. With consumers being cognizant of both of these, organizations must implement standards to protect its network from bad actors while also preserving its relationship with consumers.<\/span><\/p>\n<p><b>Prevention Better Than the Cure<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While an organization can not fully prevent an attack, there are actions which can be taken to mitigate any risks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is critical that not only backups are made but that they are tested regularly. Assuming the backups work, the cost of recovery will always be less than paying the ransom for an uncertain outcome.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity Insurance is also something which is worth considering. Cyber insurance (also referred to as cyber risk or cyber liability insurance) is a form of cover designed to protect your business from threats in the digital age, such as data breaches or malicious cyber hacks on work computer systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A business is responsible for its own cybersecurity, but in the event of a cyber attack having the right insurance will mean you aren\u2019t alone. Cyber liability cover will provide crucial support to help your business stay afloat. There are more details: <\/span><a href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\"><span style=\"font-weight: 400;\">Cybersecurity Insurance: All Your Questions Asked<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><b>Ignoring Security Monitoring<\/b><\/p>\n<p><span style=\"font-weight: 400;\">User Activity Monitoring allows you to monitor users to verify that their actions meet good security practices. If a malicious outsider gains access to their log-in information, or if an insider chooses to take advantage of their system access, you will have a record of the suspicious activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your organization is like most others, you don\u2019t have the budget to stand up your own security operations center. But that doesn\u2019t remove the need for around-the-clock monitoring and intelligence that will help you investigate incidents and minimize attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the spirit of preserving your data, session recording software offers a way to protect your organization. Visit <a href=\"https:\/\/www.tsfactory.com\/\">www.tsfactory.com<\/a> to learn more about how we can help you prevent data insider threats and theft.<\/span><\/p>\n<p><strong>Sources:<\/strong><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"9ta8GG7mcp\"><p><a href=\"https:\/\/dataprot.net\/statistics\/hacking-statistics\/\">Hacking Statistics to Give You Nightmares<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Hacking Statistics to Give You Nightmares&#8221; &#8212; \" src=\"https:\/\/dataprot.net\/statistics\/hacking-statistics\/embed\/#?secret=OnWU37fjld#?secret=9ta8GG7mcp\" data-secret=\"9ta8GG7mcp\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\nhttps:\/\/www.cnbc.com\/2021\/06\/30\/what-do-most-companies-think-when-hackers-demand-ransom-time-to-pay.html<br \/>\nhttps:\/\/www.bbc.co.uk\/news\/business-60478725<br \/>\nhttps:\/\/www.telegraph.co.uk\/news\/2022\/07\/07\/stop-paying-ransoms-cyber-hacking-gangs-businesses-urged\/<br \/>\nhttps:\/\/www.gartner.com\/en\/articles\/when-it-comes-to-ransomware-should-your-company-pay<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Pyk8uqltYN\"><p><a href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\">Cybersecurity Insurance: All Your Questions Asked<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Cybersecurity Insurance: All Your Questions Asked&#8221; &#8212; Blogs\" src=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/embed\/#?secret=qHACF3k6xv#?secret=Pyk8uqltYN\" data-secret=\"Pyk8uqltYN\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\nhttps:\/\/www.sangfor.com\/glossary\/cybersecurity\/what-is-ransomware-attack-and-how-does-it-work<br \/>\nhttps:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-Everything-you-need-to-know<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When To Pay Hackers? It is always discouraged to pay ransomware hackers in the event your organization has been attacked. However, 58% of firms worldwide which have been victims of ransomware attacks paid the hackers in order to get back their data, a report published earlier in the year suggests. Is there ever a reasonable [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":702,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When To Pay Hackers? - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When To Pay Hackers? - Blogs\" \/>\n<meta property=\"og:description\" content=\"When To Pay Hackers? It is always discouraged to pay ransomware hackers in the event your organization has been attacked. However, 58% of firms worldwide which have been victims of ransomware attacks paid the hackers in order to get back their data, a report published earlier in the year suggests. Is there ever a reasonable [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-08T08:37:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/\",\"name\":\"When To Pay Hackers? - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg\",\"datePublished\":\"2022-11-08T08:37:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When To Pay Hackers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When To Pay Hackers? - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/","og_locale":"en_US","og_type":"article","og_title":"When To Pay Hackers? - Blogs","og_description":"When To Pay Hackers? It is always discouraged to pay ransomware hackers in the event your organization has been attacked. However, 58% of firms worldwide which have been victims of ransomware attacks paid the hackers in order to get back their data, a report published earlier in the year suggests. Is there ever a reasonable [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-11-08T08:37:07+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/","name":"When To Pay Hackers? - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg","datePublished":"2022-11-08T08:37:07+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/11\/pexels-tima-miroshnichenko-5380664.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/when-to-pay-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"When To Pay Hackers?"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=701"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/701\/revisions"}],"predecessor-version":[{"id":703,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/701\/revisions\/703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/702"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}