{"id":2038,"date":"2012-08-26T15:33:22","date_gmt":"2012-08-26T19:33:22","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=2038"},"modified":"2025-01-15T23:22:01","modified_gmt":"2025-01-16T04:22:01","slug":"august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/","title":{"rendered":"August #biometricchat Summary &#8211; Using Biometrics to Protect Corporate Data with @BiokeyIntl"},"content":{"rendered":"<figure id=\"attachment_2044\" aria-describedby=\"caption-attachment-2044\" style=\"width: 275px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/biometricchat-updated-030612-275-x-182-pixels.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2044\" title=\"M2SYS monthly #biometricchat tweet chat on biometric technology\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/biometricchat-updated-030612-275-x-182-pixels.jpg\" alt=\"August's #biometricchat tweet chat on biometric technology focused on using biometrics to protect corporate data\" width=\"275\" height=\"182\" \/><\/a><figcaption id=\"caption-attachment-2044\" class=\"wp-caption-text\">August&#8217;s #biometricchat recap with @BiokeyIntl<\/figcaption><\/figure>\n<p>This past Thursday marked August&#8217;s #biometricchat tweet chat where we discussed using biometrics to protect corporate data with our special guest Scott Mahnken from Bio-key International. Bio-key are experts in developing and deploying biometric single sign-on identification systems to help businesses protect their data and intellectual property.<\/p>\n<p>There has been a lot of news coverage recently about corporation data breaches and hackers taking advantage of weak user passwords to steal data and compromise database security. With the increasing focus on adopting an alternative to passwords, PINs, key fobs, and other conventional methods of identification, more businesses are evaluating the power of biometric technology to protect data, using it as an exclusive single sign-on solution or part of a multi-factor authentication strategy.<\/p>\n<p>We began our discussion with a look at why Scott felt that biometrics were a more viable alternative to PINs and passwords. He offered that many high profile corporate IT professionals are predicting that passwords will soon be replaced by more advanced single sign-on technology (like biometrics). Passwords and PINs can be easily shared, swapped, or stolen whereas biometrics are something you always carry with you and can&#8217;t be easily shared. Furthermore, resetting passwords can be a tremendous resource drain for IT staff with some predictions that <a title=\"password resets can cost a company anywhere from $15 - $20\" href=\"https:\/\/adaxes.com\/active-directory_self-service-password-reset.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>password resets can cost a company anywhere from $15 &#8211; $20<\/strong><\/a> per reset and consume up to 40% of a workday.<\/p>\n<p>Millions of dollars per year are lost from corporate data breaches and in 2011, at least 558 data breach incidents cost U.S. businesses more than $6.5 billion. The chat discussion talked about the impact of these losses to businesses and why it&#8217;s important for them to address the topic of corporate data breaches proactively before hackers can infiltrate a database.<\/p>\n<p>Scott from Bio-key then explained that the healthcare industry just may stand to lose the most from data breaches because of their mission critical work and the sensitivity and importance of protecting patient information. Scott tweeted:<\/p>\n<p style=\"text-align: center;\">&#8220;Managing patient care and the flow of medicines (for healthcare) requires extremely secure and accurate solutions.&#8221;<\/p>\n<p style=\"text-align: left;\">Not to mention the fact that hospitals can lose their meaningful use revenue if they fail to comply with patient data protection measures and biometrics can provide security and transaction tracking along with the compliance that medical facilities seek.<\/p>\n<p style=\"text-align: left;\">Our thanks to Scott and Bio-key for being our guest on this month&#8217;s chat and for all that participated in the discussion! The next #biometricchat will be held September the 13th &#8211; stay tuned to our blog for more information and details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This past Thursday marked August&#8217;s #biometricchat tweet chat where we discussed using biometrics to protect corporate data with our special<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometrics","_yoast_wpseo_title":"Using Biometrics to Protect Corporate Data - August #biometricchat Summary","_yoast_wpseo_metadesc":"August's #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1791],"tags":[272,273,223,6,275,274,259,219],"class_list":["post-2038","post","type-post","status-publish","format-standard","hentry","category-others","tag-bio-key-international","tag-biometric-tweet-chat","tag-biometricchat","tag-biometrics","tag-eliminate-passwords","tag-protect-corporate-data","tag-single-sign-on","tag-sso"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using Biometrics to Protect Corporate Data - August #biometricchat Summary<\/title>\n<meta name=\"description\" content=\"August&#039;s #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Biometrics to Protect Corporate Data - August #biometricchat Summary\" \/>\n<meta property=\"og:description\" content=\"August&#039;s #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-26T19:33:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-16T04:22:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/biometricchat-updated-030612-275-x-182-pixels.jpg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108\"},\"headline\":\"August #biometricchat Summary &#8211; Using Biometrics to Protect Corporate Data with @BiokeyIntl\",\"datePublished\":\"2012-08-26T19:33:22+00:00\",\"dateModified\":\"2025-01-16T04:22:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\"},\"wordCount\":441,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Bio-key International\",\"biometric tweet chat\",\"biometricchat\",\"biometrics\",\"eliminate passwords\",\"protect corporate data\",\"single sign-on\",\"SSO\"],\"articleSection\":[\"Others\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\",\"name\":\"Using Biometrics to Protect Corporate Data - August #biometricchat Summary\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2012-08-26T19:33:22+00:00\",\"dateModified\":\"2025-01-16T04:22:01+00:00\",\"description\":\"August's #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"August #biometricchat Summary &#8211; Using Biometrics to Protect Corporate Data with @BiokeyIntl\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using Biometrics to Protect Corporate Data - August #biometricchat Summary","description":"August's #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/","og_locale":"en_US","og_type":"article","og_title":"Using Biometrics to Protect Corporate Data - August #biometricchat Summary","og_description":"August's #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.","og_url":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2012-08-26T19:33:22+00:00","article_modified_time":"2025-01-16T04:22:01+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/biometricchat-updated-030612-275-x-182-pixels.jpg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108"},"headline":"August #biometricchat Summary &#8211; Using Biometrics to Protect Corporate Data with @BiokeyIntl","datePublished":"2012-08-26T19:33:22+00:00","dateModified":"2025-01-16T04:22:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/"},"wordCount":441,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Bio-key International","biometric tweet chat","biometricchat","biometrics","eliminate passwords","protect corporate data","single sign-on","SSO"],"articleSection":["Others"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/","url":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/","name":"Using Biometrics to Protect Corporate Data - August #biometricchat Summary","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2012-08-26T19:33:22+00:00","dateModified":"2025-01-16T04:22:01+00:00","description":"August's #biometricchat tweet chat discussed using biometrics for single sign-on to protect corporate data.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/others\/august-biometricchat-summary-using-biometrics-to-protect-corporate-data-with-biokeyintl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"August #biometricchat Summary &#8211; Using Biometrics to Protect Corporate Data with @BiokeyIntl"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Shakib Khan","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2038"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=2038"}],"version-history":[{"count":17,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2038\/revisions"}],"predecessor-version":[{"id":21765,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2038\/revisions\/21765"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=2038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=2038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=2038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}