{"id":14037,"date":"2020-10-30T07:35:24","date_gmt":"2020-10-30T11:35:24","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=14037"},"modified":"2023-08-16T06:08:37","modified_gmt":"2023-08-16T10:08:37","slug":"data-leakage-of-homeworkers-how-to-reduce-risks","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/","title":{"rendered":"Data Leakage of Homeworkers: How to Reduce Risks"},"content":{"rendered":"<p>In modern days, working remotely is no longer uncommon. Most companies have adapted to this &#8220;new normal,&#8221; a move that has seen over 1.5 billion employees working from home. While this setting may have countless advantages, it can be disastrous to data security.<\/p>\n<p>One of the ways of protecting your data from security breaches is installing an effective endpoint cybersecurity solution. To get the best cybersecurity solution, you need to make comparisons of known antivirus programs. For instance, you can read to learn; is McAfee better than Avast? This gives you a vivid picture of what security solution to go for.<\/p>\n<h2>What&#8217;s The Hype With Virtual Work Settings<\/h2>\n<p>Deriving from the data given by the recent analysis of American Community Service, about 43% of employees in the US work remotely with a certain level of frequency. And also, there was a growth of 173% regular remote work arrangements made since 2005. Some of the reasons why organizations are embracing this set up are:<br \/>\n\u2981 To minimize carbon footprint;<br \/>\n\u2981 To enhance corporate efficiencies;<br \/>\n\u2981 To provide employees a better balance of work and private life;<br \/>\n\u2981 Disease pandemics.<\/p>\n<h2>Common Security Issues Relate to Remote<\/h2>\n<p>The concept of working from home comes with data security challenges. Companies face plenty of unknowns when managing data to-and-from the remote workforce.<\/p>\n<p>\u2981 Unprotected home WiFi networks<\/p>\n<p>To begin with, home WiFi networks used by remote workers may not be very secure. They can easily be compromised, compared to enterprise-grade office equipmeee better than Avast?nt. This makes working from home very unsafe for business. The company can quickly lose its corporate and customer data to fraudsters. Fortunately, this can be prevented.<\/p>\n<p>\u2981 Ineffective corporate VPNs<\/p>\n<p>Developers came up with corporate VPNs to aid in data protection, but the VPN&#8217;s are not robust enough to sustain the ever-growing remote workforce. With a large number of employees overloading a network, it&#8217;s creating a productivity bottleneck. This also is complicating data protection.<\/p>\n<p>\u2981 Phishing vulnerabilities<\/p>\n<p>Since remote work involves less to zero in-person communications, workers increase the use of phone calls and emails. On the one hand, it is a necessity within the improvement of the<a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/maintaining-productivity-and-engagement-while-managing-remote-employees\/\"> engagement and feedback<\/a>. On the other hand, Using these mediums of communication to pass sensitive company information and client&#8217;s data attracts cyber-attacks through phishing malware.<\/p>\n<h2>Managing Remote Work Data<\/h2>\n<p>When managing with a remote workforce, a company should take into account:<br \/>\n\u2981 How its workers are accessing company data;<br \/>\n\u2981 How they are working;<br \/>\n\u2981 The type of tools they are using;<br \/>\n\u2981 How they are handling and creating the content, especially if it&#8217;s the company&#8217;s intellectual property, etc.<br \/>\nIt&#8217;s easy for employees to get carried away when they are using a home office. They can ignore precautions, e.g., using a corporate email for business stuff. Rather, they can end up sending work files via personal email addresses to immediately finish their work. This puts corporate information at significant risk.<\/p>\n<h2>Measures to Ensure Data Security<\/h2>\n<h3>Introduce worker security policies<\/h3>\n<p>Companies should come up with worker security policies to make remote workers understand what&#8217;s required of them. It&#8217;s not wise to assume that they already know what they should or shouldn&#8217;t do. Even workers with good intentions may fail to know what they have to do to protect their sensitive personal information and the corporate&#8217;s data.<\/p>\n<p>Employees working remotely have to understand the risks involved when handling emails, opening unique websites on a computer with administrative rights, and sharing company information to third-parties, whether they are friends, family, or strangers.<\/p>\n<h3>Eliminate workflow roadblocks<\/h3>\n<p>Workflow roadblocks have to be avoided through proactive planning. Most companies may have unnecessary roadblocks in their workflow, especially if they didn&#8217;t configure their remote access systems.<\/p>\n<p>This may occur with firewalls, identity and access management systems, and data loss prevention systems. Workflow roadblocks are the ones that promote shortcuts when workers have to use other tools not provided by the company to make work go faster.<\/p>\n<h3>Use effective endpoint cybersecurity solutions<\/h3>\n<p>To prevent cyberattacks aimed at stealing company data, each endpoint device should have a cybersecurity program installed. These come with special tools that detect malware in real-time. As a result, remote workers&#8217; endpoint devices may not provide hackers loopholes to infiltrate the company&#8217;s networks to steal data.<\/p>\n<h3>Use of monitoring tools<\/h3>\n<p>There are monitoring tools that allow companies to manage remote workers. A company can take advantage of these tools to micro-manage work and ensure that all necessary protocols are observed.<\/p>\n<h2>Bottom line<\/h2>\n<p>Working from home is doable and useful as long as the company pays attention to data security. The organization should have sound policies, practices, and tools to be better protected. It&#8217;s also imperative to have a competent IT team that can easily manage remote worker networks and computer devices. When this is done, and the worker is well-informed of the roles they should play in protecting the company&#8217;s information, there are minimal data leakage chances.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In modern days, working remotely is no longer uncommon. Most companies have adapted to this &#8220;new normal,&#8221; a move that<\/p>\n","protected":false},"author":398,"featured_media":16486,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"Data Leakage of Homeworkers: How to Reduce Risks","_yoast_wpseo_metadesc":"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-14037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Leakage of Homeworkers: How to Reduce Risks<\/title>\n<meta name=\"description\" content=\"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Leakage of Homeworkers: How to Reduce Risks\" \/>\n<meta property=\"og:description\" content=\"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T11:35:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T10:08:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/data-leakage-of-homeworkers-how-to-reduce-risks-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Data Leakage of Homeworkers: How to Reduce Risks\",\"datePublished\":\"2020-10-30T11:35:24+00:00\",\"dateModified\":\"2023-08-16T10:08:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\"},\"wordCount\":815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\",\"name\":\"Data Leakage of Homeworkers: How to Reduce Risks\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-10-30T11:35:24+00:00\",\"dateModified\":\"2023-08-16T10:08:37+00:00\",\"description\":\"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Data Leakage of Homeworkers: How to Reduce Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Leakage of Homeworkers: How to Reduce Risks","description":"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/","og_locale":"en_US","og_type":"article","og_title":"Data Leakage of Homeworkers: How to Reduce Risks","og_description":"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-10-30T11:35:24+00:00","article_modified_time":"2023-08-16T10:08:37+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/data-leakage-of-homeworkers-how-to-reduce-risks-1.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Data Leakage of Homeworkers: How to Reduce Risks","datePublished":"2020-10-30T11:35:24+00:00","dateModified":"2023-08-16T10:08:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/"},"wordCount":815,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/","name":"Data Leakage of Homeworkers: How to Reduce Risks","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-10-30T11:35:24+00:00","dateModified":"2023-08-16T10:08:37+00:00","description":"As more companies move towards virtual home offices, a lot is at stake regarding data security. Identifying how working-from-home can cause leaks of sensitive company information is essential. This may help to come up with practical solutions for mitigating the problem.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/data-leakage-of-homeworkers-how-to-reduce-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Data Leakage of Homeworkers: How to Reduce Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Guest","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14037"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=14037"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14037\/revisions"}],"predecessor-version":[{"id":20075,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14037\/revisions\/20075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16486"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=14037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=14037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=14037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}