{"id":1006034,"date":"2025-05-06T11:41:58","date_gmt":"2025-05-06T09:41:58","guid":{"rendered":"https:\/\/www.teal-consulting.de\/2025\/05\/06\/cyberhygiene-in-8-stunden\/"},"modified":"2025-05-06T14:38:39","modified_gmt":"2025-05-06T12:38:39","slug":"cyber-hygiene-in-8-hours","status":"publish","type":"post","link":"https:\/\/www.teal-consulting.de\/en\/2025\/05\/06\/cyber-hygiene-in-8-hours\/","title":{"rendered":"Cyber hygiene: 8 hours a month for clean systems"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;30&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text][\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221;]Cyber hygiene sounds like a newfangled IT term at first, but it&#8217;s actually about something that everyone knows from everyday life: <strong>cleanliness and regular maintenance<\/strong>. Just as we want to keep our homes free of dust, companies also need to regularly \u201cdust off\u201d their IT infrastructure in order to avoid security gaps and contain and minimize attacks at an early stage.<\/p>\n<p><em><span style=\"color: #008081;\">Our Managing Director and Security Architect, Fabian B\u00f6hm, was recently on the Stegmann and Company podcast \u201cBits and Bytes\u201d with Alexa Dippold and talked about this often neglected topic. <strong>And the core message is surprisingly simple: it&#8217;s not difficult, everyone actually knows what to do.<\/strong><\/span><\/em>[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221;]\n<p style=\"text-align: center;\"><iframe style=\"border-radius: 12px;\" data-src=\"https:\/\/open.spotify.com\/embed\/episode\/7dabasT9Z9XdkmHGrzUqVu?utm_source=generator&amp;theme=0\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe><\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text css=&#8221;&#8221;]\n<h2>Why cyber hygiene is so important<\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221;]IT in general is becoming increasingly confusing. More networking, cloud services and new technologies are also creating more and more opportunities for attacks. The truth is, and we&#8217;ll be honest: there are countless tools and software products that promise to protect companies from cyberattacks. But the essentials are often forgotten &gt;<strong> the basic maintenance of systems<\/strong>. Only those who continuously clean up systems can prevent security gaps and outdated systems from accumulating. This is less a question of budget than of prioritization. IT teams are often overloaded, and while companies invest in expensive security solutions, simple but effective maintenance is neglected.[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text css=&#8221;&#8221;]\n<h2>The often underestimated basics of IT security<\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221;]Where do we start? For example, <strong>password hygiene<\/strong> is often shockingly poor and comparable to a front door key that has been lying under the doormat for years. This applies to both personal and business accounts, where passwords often NEVER expire. Outdated operating systems are like ticking time bombs, and patching software becomes a matter of luck, where often only hours can decide the success or failure of an attack.<\/p>\n<p>A particularly critical point is the <strong>testing of backups<\/strong>. A backup strategy without regular recovery tests is like an untested emergency kit&#8230; worthless in an emergency. Imagine a fire breaks out and no one has ever been through the fire drill. The consequences of a cyber-attack can be similarly devastating and the recovery of the systems fails.<\/p>\n<p>Another important aspect that is often underestimated: <strong>System hardening<\/strong>, the secure configuration of applications. Many applications and operating systems are delivered with standard configurations that almost always activate unnecessary functions and services. It is therefore important to take preventative measures at an early stage rather than having to react later under pressure.<\/p>\n<p><strong>Identity protection<\/strong> is just as important, especially in the Microsoft environment with Active Directory and its cloud counterpart Entra ID. Basic cyber hygiene is essential here in order to make effective use of the numerous expensive security products that companies purchase and to actually rectify the identified vulnerabilities.<\/p>\n<p>But why this neglect? It is often due to<strong> IT teams being overloaded<\/strong> and a lack of prioritization on the part of management. Infrastructures are becoming increasingly complex, not only due to the cloud, but also due to topics such as AI, while resources often remain limited. &#8220;Security is a matter for the boss&#8221; is not just a saying, but a necessity. After all, investments in basic cyber hygiene pay off many times over in an emergency and are often more effective than blindly buying expensive but unused software. Cleaning up legacy issues also plays an important role here, even if this initially incurs costs.<\/p>\n<p>The good news is that cyber hygiene is not rocket science. It&#8217;s about mastering the basics and applying them consistently.<\/p>\n<p><strong>The pillars of cyber hygiene summarized at a glance:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Use strong passwords and check and change them regularly<\/li>\n<li>Update your systems regularly<\/li>\n<li>Harden your systems, e.g. according to the CIS recommendations<\/li>\n<li>Back up your data and test the recovery<\/li>\n<li>Process messages in your (X)DR systems and recommendations from the last pentest<\/li>\n<li>Sensitize your employees and above all create TIME to process them<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221;]<span style=\"color: #008081;\"><strong>Continuity is the key.<\/strong><\/span> Take small steps on a regular basis, for example by giving IT administrators dedicated time each month for cyber hygiene measures, instead of initiating large projects that come to nothing. The use of inexpensive or even open source tools to analyze the environment can also be helpful here.<\/p>\n<p>Our expert summed it up aptly in the podcast: <em>&#8220;Most of the time, there isn&#8217;t enough time, and this is exactly where managers should start. For example, giving your administrators <span style=\"text-decoration: underline;\">just eight hours a month<\/span> to focus exclusively on internal IT security hygiene would be a big step forward. This topic should be given more priority.&#8221;<\/em>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text css=&#8221;&#8221;]\n<h2>Conclusion: Cyber hygiene as an investment in the future<\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;&#8221;]In many cases, it can make sense to bring external service providers on board to take on specialized tasks. Be it patch management, the analysis of system gaps or the implementation of backup solutions. This collaboration takes the pressure off internal teams and brings additional expert knowledge into the company.<\/p>\n<p>Cyber hygiene may not be glamorous, but it is the foundation of any robust IT security strategy. So before you purchase the next \u201cpromising\u201d security tool, make sure you get the basics right. At the end of the day, it&#8217;s like dusting: It may not always be fun, but the result is a much safer and more pleasant environment for everyone in the company \ud83d\ude09.<\/p>\n<p>Curious to find out more? The Bits and podcast takes another look at cyber hygiene from a different angle! &gt;&gt; <a href=\"https:\/\/open.spotify.com\/episode\/7dabasT9Z9XdkmHGrzUqVu?si=91e8804122104b62\" target=\"_blank\" rel=\"noopener\">To the podcast episode<\/a> &lt;&lt;[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;100&#8243;][vc_raw_html css=&#8221;&#8221;]JTNDYSUyMGhyZWYlM0QlMjJqYXZhc2NyaXB0JTNBaGlzdG9yeS5iYWNrJTI4JTI5JTIyJTNFJTNDc3BhbiUyMHN0eWxlJTNEJTIyY29sb3IlM0ElMjAlMjNmZjIwNzAlM0IlMjIlM0UlM0MlM0MlMjBCYWNrJTNDJTJGc3BhbiUzRSUzQyUyRmElM0U=[\/vc_raw_html][vc_empty_space height=&#8221;50&#8243;][vc_separator type=&#8221;small&#8221; position=&#8221;center&#8221; color=&#8221;#eeeeee&#8221; thickness=&#8221;2&#8243; width=&#8221;1100&#8243;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;30&#8243;][vc_column_text]\n<h4>LATEST POSTS<\/h4>\n[\/vc_column_text][vc_empty_space height=&#8221;30&#8243;]\n<div class='latest_post_holder boxes three_columns one_row' >\n    <ul>\n    \n        <li class=\"clearfix\">\n            <div class=\"boxes_image\">\n                                <a itemprop=\"url\" href=\"https:\/\/www.teal-consulting.de\/en\/2026\/04\/01\/logging-in-instead-of-breaking-in\/\"><img decoding=\"async\" width=\"539\" height=\"303\" data-src=\"https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-539x303.jpg\" class=\"attachment-latest_post_boxes size-latest_post_boxes wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-539x303.jpg 539w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-300x169.jpg 300w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-1024x575.jpg 1024w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-768x432.jpg 768w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-1536x863.jpg 1536w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI-700x393.jpg 700w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/03\/blog_headerbild_teal_krux-mit-der-KI_AI.jpg 1920w\" data-sizes=\"(max-width: 539px) 100vw, 539px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 539px; --smush-placeholder-aspect-ratio: 539\/303;\"><\/a>\n            <\/div>\n            <div class=\"latest_post\"  >\n                <div class=\"latest_post_text\">\n                    <div class=\"latest_post_inner\">\n                        <div class=\"latest_post_text_inner\">\n                            <h4 itemprop=\"name\" class=\"latest_post_title entry_title\"><a itemprop=\"url\" href=\"https:\/\/www.teal-consulting.de\/en\/2026\/04\/01\/logging-in-instead-of-breaking-in\/\">\u201cLogging In Instead of Breaking In\u201d: Why Your Identities Are the Biggest Security Risk<\/a><\/h4>\n                            <p class=\"excerpt\">Attackers no longer \u201csimply\u201d break in, they LOG in. If you\u2019re still relying on traditional defenses in 2026, we believe you\u2019ve probably already lost the battle for your data....<\/p>\n                            <span class=\"post_infos\">\n                                                                    <span class=\"date_hour_holder\">\n                                        <span itemprop=\"dateCreated\" class=\"date entry_date updated\">01 April, 2026 <meta itemprop=\"interactionCount\" content=\"UserComments: 0\"\/><\/span>\n                                    <\/span>\n                                                                                                \n                                \n                                                            <\/span>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/li>\n    \n        <li class=\"clearfix\">\n            <div class=\"boxes_image\">\n                                <a itemprop=\"url\" href=\"https:\/\/www.teal-consulting.de\/en\/2026\/03\/03\/passwordless\/\"><img decoding=\"async\" width=\"539\" height=\"303\" data-src=\"https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-539x303.jpg\" class=\"attachment-latest_post_boxes size-latest_post_boxes wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-539x303.jpg 539w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-300x169.jpg 300w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-1024x575.jpg 1024w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-768x432.jpg 768w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-1536x863.jpg 1536w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3-700x393.jpg 700w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2023\/06\/chatgpt_teal_blog_part3.jpg 1920w\" data-sizes=\"(max-width: 539px) 100vw, 539px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 539px; --smush-placeholder-aspect-ratio: 539\/303;\"><\/a>\n            <\/div>\n            <div class=\"latest_post\"  >\n                <div class=\"latest_post_text\">\n                    <div class=\"latest_post_inner\">\n                        <div class=\"latest_post_text_inner\">\n                            <h4 itemprop=\"name\" class=\"latest_post_title entry_title\"><a itemprop=\"url\" href=\"https:\/\/www.teal-consulting.de\/en\/2026\/03\/03\/passwordless\/\">Bye-bye, password frustration: Why TEAL is now going passwordless<\/a><\/h4>\n                            <p class=\"excerpt\">As security consultants, we see every day that passwords are not only a security risk, but also slow you down massively in your everyday work. That's why we at TEAL have decided: ...<\/p>\n                            <span class=\"post_infos\">\n                                                                    <span class=\"date_hour_holder\">\n                                        <span itemprop=\"dateCreated\" class=\"date entry_date updated\">03 March, 2026 <meta itemprop=\"interactionCount\" content=\"UserComments: 0\"\/><\/span>\n                                    <\/span>\n                                                                                                \n                                \n                                                            <\/span>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/li>\n    \n        <li class=\"clearfix\">\n            <div class=\"boxes_image\">\n                                <a itemprop=\"url\" href=\"https:\/\/www.teal-consulting.de\/en\/2026\/02\/02\/take-action-with-ntlm\/\"><img decoding=\"async\" width=\"539\" height=\"303\" data-src=\"https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-539x303.jpg\" class=\"attachment-latest_post_boxes size-latest_post_boxes wp-post-image lazyload\" alt=\"\" data-srcset=\"https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-539x303.jpg 539w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-300x169.jpg 300w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-1024x575.jpg 1024w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-768x432.jpg 768w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-1536x863.jpg 1536w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png-700x393.jpg 700w, https:\/\/www.teal-consulting.de\/wp-content\/uploads\/2026\/01\/Blog-Headerbild_ntlm.png.jpg 1920w\" data-sizes=\"(max-width: 539px) 100vw, 539px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 539px; --smush-placeholder-aspect-ratio: 539\/303;\"><\/a>\n            <\/div>\n            <div class=\"latest_post\"  >\n                <div class=\"latest_post_text\">\n                    <div class=\"latest_post_inner\">\n                        <div class=\"latest_post_text_inner\">\n                            <h4 itemprop=\"name\" class=\"latest_post_title entry_title\"><a itemprop=\"url\" href=\"https:\/\/www.teal-consulting.de\/en\/2026\/02\/02\/take-action-with-ntlm\/\">Look, a rainbow! &#8211; Why Google forces you to take action with NTLM<\/a><\/h4>\n                            <p class=\"excerpt\">The alternative to NTLM* is called Kerberos and has been integrated into Active Directory since 2000. The most important difference to NTLM is the integration of a Key Distribution Center (KDC)...<\/p>\n                            <span class=\"post_infos\">\n                                                                    <span class=\"date_hour_holder\">\n                                        <span itemprop=\"dateCreated\" class=\"date entry_date updated\">02 February, 2026 <meta itemprop=\"interactionCount\" content=\"UserComments: 0\"\/><\/span>\n                                    <\/span>\n                                                                                                \n                                \n                                                            <\/span>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/li>\n        <\/ul>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Our Managing Director and Security Architect, Fabian B\u00f6hm, was recently on the Stegmann and Company podcast &#8220;Bits and Bytes&#8221; with Alexa Dippold and talked about this often neglected topic. And the key message is<\/p>\n","protected":false},"author":14,"featured_media":1006032,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-1006034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/posts\/1006034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=1006034"}],"version-history":[{"count":4,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/posts\/1006034\/revisions"}],"predecessor-version":[{"id":1006070,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/posts\/1006034\/revisions\/1006070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/media\/1006032"}],"wp:attachment":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=1006034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/categories?post=1006034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/tags?post=1006034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}