{"id":5678,"date":"2016-10-19T10:00:22","date_gmt":"2016-10-19T14:00:22","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=5678"},"modified":"2016-10-04T05:05:37","modified_gmt":"2016-10-04T09:05:37","slug":"cyber-security-a-total-team-effort","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/","title":{"rendered":"Cyber Security: A Total Team Effort"},"content":{"rendered":"<p>Well-known companies like Facebook<sup>\u00ae<\/sup>, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and sensitive materials, compromised payroll information, and sullied brand reputations. Simply put, the frequency of cyber attacks is not only increasing, but companies of all sizes are susceptible.<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5679 size-full\" style=\"margin-left: 20px;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg\" alt=\"cyber security essentials\" width=\"200\" height=\"125\" \/><\/a>To ward off attacks, it takes a committed effort to security, because relying on the IT department alone won\u2019t be enough to counter all the bad actors online. Only when legal and the marketing team get involved in security decisions can cyber criminals be stopped. A three-pronged defense is the best plan of action for protecting your digital assets.<\/p>\n<p>If IT, legal, and marketing aren\u2019t working together, you could be susceptible to attack. Below, see how each department can do their part in keeping you safe and secure online.<\/p>\n<p><strong>IT Professionals<\/strong><\/p>\n<p>The IT department, typically, is the first line of defense against cyber criminals, and it\u2019s IT\u2019s primary job to stop attacks before they happen. Suffering an attack, having passwords stolen, confidential data downloaded, or the entire network compromised will not only cost the company money, but will most likely cost someone in IT their job.<\/p>\n<p>According to Arbor Networks, which produces an annual Worldwide Infrastructure Security Report, last year saw the largest distributed denial-of-service attack at 500 gigabytes per second (Gbps). And it\u2019ll only get worse. If IT security is not your company\u2019s number one priority, it should be, and it starts with figuring out what size of attack your company can withstand, and how much it can afford to spend on remediation.<\/p>\n<p>Step two is rethinking your domain name system management. Look into outsourcing, but make sure the provider can offer you 100% uptime. Third, educating employees and customers on how to detect phishing attacks is essential, and will go a long way toward reducing human error in the future.<\/p>\n<p>Lastly, you should ensure that your business-critical domain names are protected with <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/multilock-two-factor-authentication-solutions\">two-factor authentication, and registry- and registrar-level locks<\/a> with three-party manual authorization, so you can rest easy at night knowing you\u2019ve done everything in your power to protect your company\u2019s digital assets.<\/p>\n<p><strong>Legal Counsel<\/strong><\/p>\n<p>Each year, millions of bytes of personal data are stolen through security breaches. Depending on where you practice, that kind of cyber crime can be a federal offense. But until whoever is caught and stopped, legal counsels have the ability and expertise to thwart an attack before it happens. Your legal department might also be responsible for registering and managing promotional and defensive domain names and social media usernames. Dealing with security aspects is the next step.<\/p>\n<p>Your first course of action should be to confirm that your service provider offers <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\">security measures<\/a> that can help prevent domain hijacking as well as unauthorized changes and deletions of the business-critical domain names. Once your business-critical domains are secure, it\u2019s important to grasp the various types of attacks and how they could affect clients (for example, bank details, client addresses, and personal details), so you can properly communicate how to proceed in the event of an attack.<\/p>\n<p><strong>Marketing<\/strong><\/p>\n<p>It doesn\u2019t matter if your company\u2019s online presence is informational or used for trading (eCommerce), the threats are real and can cost your business millions of dollars or result in an irreversible public relations crisis. To defend against attacks, you must start by understanding your company\u2019s digital assets: How many domain names does your company own, are they all active, and do some only exist for defensive reasons? How many social media handles do you have, and who takes ownership?<\/p>\n<p>When you know what your portfolio looks like, you can then look into cost-effective security measures for the business-critical domains your company owns. Once those sites are secure, it\u2019s time to get a handle the different types of attacks like <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/anti-phishing\">phishing<\/a>. Reassure your clients that your company would never ask for personal information over email.<\/p>\n<p>&gt;&gt; <strong><a href=\"https:\/\/www.cscdigitalbrand.services\/en\/articles-best-practices\">Download our full Essentials for Cyber Security guide.<\/a><\/strong><br \/>\n&gt;&gt; <strong>For more information<\/strong> on our cybersecurity services, <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\">visit our website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and sensitive materials, compromised payroll information, and sullied brand reputations. Simply put, the frequency of cyber attacks is not only increasing, but companies of all sizes are susceptible. To ward off attacks, it takes [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[506,531,244],"class_list":["post-5678","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email","tag-cyber-security","tag-cybercrime","tag-domain-portfolio-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security: A Total Team Effort | CSC<\/title>\n<meta name=\"description\" content=\"Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security: A Total Team Effort | CSC\" \/>\n<meta property=\"og:description\" content=\"Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-19T14:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Cyber Security: A Total Team Effort\",\"datePublished\":\"2016-10-19T14:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/\"},\"wordCount\":686,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SecurityEssentials_Blogimg.jpg\",\"keywords\":[\"cyber security\",\"Cybercrime\",\"domain portfolio management\"],\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/\",\"name\":\"Cyber Security: A Total Team Effort | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SecurityEssentials_Blogimg.jpg\",\"datePublished\":\"2016-10-19T14:00:22+00:00\",\"description\":\"Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SecurityEssentials_Blogimg.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/SecurityEssentials_Blogimg.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-security-a-total-team-effort\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security: A Total Team Effort\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security: A Total Team Effort | CSC","description":"Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security: A Total Team Effort | CSC","og_description":"Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and","og_url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2016-10-19T14:00:22+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Cyber Security: A Total Team Effort","datePublished":"2016-10-19T14:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/"},"wordCount":686,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg","keywords":["cyber security","Cybercrime","domain portfolio management"],"articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/","url":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/","name":"Cyber Security: A Total Team Effort | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg","datePublished":"2016-10-19T14:00:22+00:00","description":"Well-known companies like Facebook\u00ae, and Mossack Fonseca all have been recently targeted by cyber criminals, resulting in breaches of secure documents and","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2016\/10\/SecurityEssentials_Blogimg.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-security-a-total-team-effort\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security: A Total Team Effort"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=5678"}],"version-history":[{"count":3,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5678\/revisions"}],"predecessor-version":[{"id":5686,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5678\/revisions\/5686"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=5678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=5678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=5678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}