{"id":1162,"date":"2018-05-17T20:00:22","date_gmt":"2018-05-18T00:00:22","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/"},"modified":"2022-03-02T08:42:08","modified_gmt":"2022-03-02T13:42:08","slug":"dont-give-social-media-hackers-a-chance","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/","title":{"rendered":"Don\u2019t give social media hackers a chance"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-32678\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A.png\" alt=\"\" width=\"170\" height=\"170\" \/>Pranksters, malicious attackers, extremists \u2014 hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don\u2019t fret; there are several things you can do to protect your Facebook or Twitter account.<\/p>\n<h3><span style=\"font-size: 16px;\">Lockscreens exist for a reason<\/span><\/h3>\n<p>Make sure all your computing devices lock the moment you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. As long as your password isn&#8217;t your birthday or anniversary, you&#8217;ll be forcing hackers to work for access to your account.<\/p>\n<h3>Strong passwords are never out of fashion<\/h3>\n<p>Unlocking your phone may be limited to a six-digit passcode, but you&#8217;ll need something much more complicated for your account password. The first thing you&#8217;ll need to do is create a password that isn&#8217;t used for any other account. Because data breaches have become such a regular occurrence, hackers probably have a long list of your favorite passwords from other websites and platforms.<\/p>\n<p>In this case, it is best to use a password manager like an app or online service that allows you to generate and retrieve complex passwords.<\/p>\n<p>Another thing you can do is enable something called two-factor authentication, which requires you to type in a secondary code sent to your phone. Even if hackers have your password, they won&#8217;t be able to log in without your phone.<\/p>\n<h3>Make use of social media features<\/h3>\n<p>Facebook offers functions that help you keep tabs on who&#8217;s accessing your account and from<br \/>\nwhere. To use this feature, click the down arrow in the upper right corner of your Newsfeed and select <em>Settings<\/em>. Then click <em>Security and Login<\/em> to get more information. If you sense an imposter, click the right-hand icon to give you the option of logging out remotely or reporting the person.<\/p>\n<p>From there, turn on <em>Get alerts about unrecognized logins<\/em> to be notified via Facebook, Messenger, or email if someone is logged into your account from an unrecognized browser. Unfortunately, Twitter doesn\u2019t have the same option (that makes the two-factor authentication extremely necessary).<\/p>\n<p>While it may be difficult for a hacker to barge into your Facebook or Twitter account through a third-party service that you have given access to your profile, it&#8217;s still advisable that you check what you have approved.<\/p>\n<ul>\n<li>Facebook: Go to <em>Settings &gt; Apps and Websites<\/em> to view and manage outside service with access to your account<\/li>\n<li>Twitter: Go to <em>Settings and Privacy &gt; Apps<\/em> to check and edit the list<\/li>\n<\/ul>\n<p>Last, be sure to check the permissions mobile apps like Facebook and Twitter have on your smartphone or tablet.<\/p>\n<ul>\n<li>Android: Go to <em>Settings &gt; Apps &gt; tap the icon in the upper right and then tap App permissions<\/em><\/li>\n<li>iOS: Go to <em>Settings &gt; Privacy<\/em> to manage which service can access which parts of your phone<\/li>\n<\/ul>\n<h3>Less personal info, fewer problems<\/h3>\n<p>These steps are just the beginning of what you should be doing. The next thing you should consider is limiting the personal data you input into your social media accounts. If you have to put a ton of information, then be sure you read this blog from the top.<\/p>\n<p>With a little practical knowledge, you can prevent Facebook and Twitter hackers from doing what they do. Cybersecurity is a sprawling issue and social media privacy is such a small sliver of what you need to stay on top of. For 24\/7 support, call our team of experts today.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2018\/05\/dont-give-social-media-hackers-a-chance\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pranksters, malicious attackers, extremists \u2014 hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don\u2019t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1164,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[1070,29,475,222,55,476,179,19,477,478,658],"class_list":["post-1162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-2018may17security_a","tag-android","tag-apps","tag-facebook","tag-ios","tag-login","tag-privacy","tag-security","tag-settings","tag-twitter","tag-two-factor-authentication"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Don\u2019t give social media hackers a chance<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t give social media hackers a chance\" \/>\n<meta property=\"og:description\" content=\"Pranksters, malicious attackers, extremists \u2014 hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don\u2019t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-18T00:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Don\u2019t give social media hackers a chance\",\"datePublished\":\"2018-05-18T00:00:22+00:00\",\"dateModified\":\"2022-03-02T13:42:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/\"},\"wordCount\":615,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg\",\"keywords\":[\"2018may17security_a\",\"android\",\"apps\",\"facebook\",\"ios\",\"login\",\"privacy\",\"security\",\"settings\",\"twitter\",\"two factor authentication\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/\",\"name\":\"Don\u2019t give social media hackers a chance\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg\",\"datePublished\":\"2018-05-18T00:00:22+00:00\",\"dateModified\":\"2022-03-02T13:42:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t give social media hackers a chance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don\u2019t give social media hackers a chance","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Don\u2019t give social media hackers a chance","og_description":"Pranksters, malicious attackers, extremists \u2014 hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, but don\u2019t fret; there are several things you can do to protect your Facebook or Twitter account. Lockscreens exist for a reason Make [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2018-05-18T00:00:22+00:00","article_modified_time":"2022-03-02T13:42:08+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Don\u2019t give social media hackers a chance","datePublished":"2018-05-18T00:00:22+00:00","dateModified":"2022-03-02T13:42:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/"},"wordCount":615,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg","keywords":["2018may17security_a","android","apps","facebook","ios","login","privacy","security","settings","twitter","two factor authentication"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/","name":"Don\u2019t give social media hackers a chance","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg","datePublished":"2018-05-18T00:00:22+00:00","dateModified":"2022-03-02T13:42:08+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018May17Security_A_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-give-social-media-hackers-a-chance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t give social media hackers a chance"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1162"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1162"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1162\/revisions"}],"predecessor-version":[{"id":3794,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1162\/revisions\/3794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1164"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}