{"id":2832,"date":"2019-03-12T08:46:48","date_gmt":"2019-03-12T13:46:48","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2832"},"modified":"2019-03-11T18:02:51","modified_gmt":"2019-03-11T23:02:51","slug":"your-guide-to-managed-detection-and-response-mdr","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/","title":{"rendered":"Your Guide to Managed Detection and Response (MDR)"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/IT-security-graphic.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2834\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/IT-security-graphic-300x200.jpg\" alt=\"IT security illustration\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/IT-security-graphic-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/IT-security-graphic-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2019\/03\/IT-security-graphic-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Cybersecurity is still a major point of concern for businesses of all kinds, as companies continue to experience data breaches and hackers keep finding newer, more innovative ways to get around <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/4-key-reasons-to-prioritize-cybersecurity-this-year\/\" target=\"_blank\" rel=\"noopener\">IT security<\/a> defenses.<\/p>\n<p>Traditional security tools like <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-updating-anti-virus\/\" target=\"_blank\" rel=\"noopener\">anti-virus programs<\/a> depend on known signatures or definitions of malicious programs. Due to the constant evolution of malware and the emergence of new threats every day, it\u2019s only a matter of time before something makes it past your anti-virus solution.<\/p>\n<p>A malicious program finding its way around your traditional IT security defenses can have serious consequences for your business. First, you\u2019ll have to realize what happened and contain the threat. It takes an average of 197 days to identify a data breach, according to the IBM Security and Ponemon Institute <a href=\"https:\/\/www.prnewswire.com\/news-releases\/ibm-study-hidden-costs-of-data-breaches-increase-expenses-for-businesses-300679124.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2018 Cost of a Data Breach Study<\/a>.<\/p>\n<p>Once the breach is identified, it then takes an average of 69 days to contain. Overall, the average total cost of a data breach worldwide was $3.86 million in 2018, the study found.<\/p>\n<p>Luckily, businesses can take measures beyond traditional defenses like anti-virus solutions and firewalls to reduce their data breach risk level. Managed Detection and Response (MDR) can supplement other cybersecurity solutions and help keep your IT environment <a href=\"https:\/\/www.stratospherenetworks.com\/5-big-it-security-concerns-for-businesses-in-2019.html\" target=\"_blank\" rel=\"noopener\">safe from cybercrime<\/a>. Here\u2019s everything you should know about this IT security tool and how it can potentially benefit your business.<\/p>\n<p><strong>What MDR is and How it Works<br \/>\n<\/strong>Essentially, MDR solutions keep an eye out for suspicious behavior at all times and can identify and take care of any threats before they cause too much damage, according to the D!giltalist article \u201c<a href=\"https:\/\/www.digitalistmag.com\/cio-knowledge\/2017\/09\/22\/5-reasons-to-consider-managed-detection-response-for-cybersecurity-05365754\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">5 Reasons to Consider Managed Detection and Response for Cybersecurity<\/a>.\u201d<\/p>\n<p>Generally, MDR will provide automated responses to any suspicious behavior detected based on threat intel. If the solution can\u2019t categorize a threat that way, it will refer the issue to an analyst at the solution provider\u2019s Security Operations Center (SOC).<\/p>\n<p>Different MDR solutions might focus on specific aspects of your IT environment \u2013 for example, there are network MDR offerings and endpoint MDR solutions. It makes sense to have MDR solutions covering your entire environment for comprehensive security.<br \/>\nMDR offerings commonly include the following features, according to the Masergy blog entry \u201c<a href=\"https:\/\/www.masergy.com\/blog\/managed-security-services-vs-managed-detection-and-response-whats-the-difference\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Managed Security Services vs. Managed Detection and Response: What\u2019s the Difference?<\/a>\u201d<\/p>\n<ul>\n<li>Cloud security<\/li>\n<li>Threat intelligence<\/li>\n<li>Constant proactive monitoring<\/li>\n<li>Machine learning<\/li>\n<li>Team of security analysts<\/li>\n<li>And more<\/li>\n<\/ul>\n<p><strong>Why Your Business Should Consider MDR<\/strong><br \/>\nMDR can make a big difference for businesses with limited in-house cybersecurity expertise, according to D!giltalist. Having access to a SOC full of security analysts can be incredibly helpful for overworked internal IT staff members at your company.<\/p>\n<p>Additionally, MDR can help your business with the following key benefits, Masergy states.<\/p>\n<ul>\n<li>Faster identification of threats<\/li>\n<li>Quicker response to threats<\/li>\n<li>Reduced time between a breach occurring and its identification (a.k.a., dwell time)<\/li>\n<\/ul>\n<p>Overall, at a time when IT security threats evolve rapidly and new ones emerge constantly, you can\u2019t afford to rely on anti-virus, firewall, and other traditional defenses alone to stay ahead of cybercriminals. Consider implementing MDR to achieve the highest level of security possible.<\/p>\n<p>If you\u2019d like to learn more about MDR and other <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">cybersecurity services and solutions<\/a>, don\u2019t hesitate to contact our team of IT security experts. We work with various cybersecurity products from vendors in our partner network, in addition to offering our own multilayered IT security solution. Learn more by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is still a major point of concern for businesses of all kinds, as companies continue to experience data breaches and hackers keep finding newer, more innovative ways to get around IT security defenses. Traditional security tools like anti-virus programs &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Guide to Managed Detection and Response (MDR)<\/title>\n<meta name=\"description\" content=\"Managed Detection and Response (MDR) supplements traditional cybersecurity solutions like anti-virus programs and can reduce your data breach risk level.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide to Managed Detection and Response (MDR)\" \/>\n<meta property=\"og:description\" content=\"Managed Detection and Response (MDR) supplements traditional cybersecurity solutions like anti-virus programs and can reduce your data breach risk level.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-12T13:46:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Your Guide to Managed Detection and Response (MDR)\",\"datePublished\":\"2019-03-12T13:46:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\"},\"wordCount\":584,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\",\"name\":\"Guide to Managed Detection and Response (MDR)\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2019-03-12T13:46:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Managed Detection and Response (MDR) supplements traditional cybersecurity solutions like anti-virus programs and can reduce your data breach risk level.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Guide to Managed Detection and Response (MDR)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Guide to Managed Detection and Response (MDR)","description":"Managed Detection and Response (MDR) supplements traditional cybersecurity solutions like anti-virus programs and can reduce your data breach risk level.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/","og_locale":"en_US","og_type":"article","og_title":"Guide to Managed Detection and Response (MDR)","og_description":"Managed Detection and Response (MDR) supplements traditional cybersecurity solutions like anti-virus programs and can reduce your data breach risk level.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2019-03-12T13:46:48+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Your Guide to Managed Detection and Response (MDR)","datePublished":"2019-03-12T13:46:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/"},"wordCount":584,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/","name":"Guide to Managed Detection and Response (MDR)","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2019-03-12T13:46:48+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Managed Detection and Response (MDR) supplements traditional cybersecurity solutions like anti-virus programs and can reduce your data breach risk level.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/your-guide-to-managed-detection-and-response-mdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Your Guide to Managed Detection and Response (MDR)"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2832"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2832\/revisions"}],"predecessor-version":[{"id":2835,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2832\/revisions\/2835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}