{"id":22940,"date":"2023-05-04T08:00:12","date_gmt":"2023-05-04T12:00:12","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=22940"},"modified":"2025-04-17T14:40:53","modified_gmt":"2025-04-17T18:40:53","slug":"password-policies","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/security\/password-policies\/","title":{"rendered":"5 ways to strengthen your password policies"},"content":{"rendered":"<p>We&#8217;re all familiar with burden of remembering dozens of passwords, both in our personal and professional lives. The fatigue is real! So much so that many of us are aware of the fact that we don&#8217;t always practice the best password hygiene. According to a recent <a href=\"https:\/\/www.lastpass.com\/resources\/ebook\/psychology-of-passwords-2022\">LastPass report<\/a>, while 89% of survey respondents know reusing the same passwords is a security risk, only 12% actually use different passwords for all their different accounts. At the same time, only 33% of people use strong passwords for their work accounts.<\/p>\n<p>Meanwhile, more than 80% of web application attacks <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">involve stolen credentials<\/a>, and IT security teams spend up to <a href=\"https:\/\/lp-cdn.lastpass.com\/lporcamedia\/document-library\/lastpass\/pdf\/en\/LMI0638c-LastPass-IDaaS-The-SMBs-Guide-to-Modern-Identity-FINAL.pdf\">4 hours a week<\/a> dealing with password-related issues.<\/p>\n<p>So, what does this tell us? Simply put, that all businesses could benefit from tools and best practices for implementing stronger password policies. Fortunately there are plenty of <a href=\"https:\/\/www.sherweb.com\/blog\/security\/password-managers\/\">password management solutions<\/a> on the market in addition to resources to help us all make sure we&#8217;re not leaving our respective organizations vulnerable to breaches and cyberattacks.<\/p>\n<h2>5 ways to improve password policies and keep company data safe<\/h2>\n<h3>#1 Establish a password policy<\/h3>\n<p>One way to strengthen password policies is to make sure they&#8217;re established in the first place! To be clear, password policies are a collection of rules to help companies increase device and network security. This usually means requiring users to create secure and reliable passwords by setting specific standards. Password policies often describe how passwords should be stored and used and how often they should be updated.<\/p>\n<p>Despite the overwhelming amount of evidence out there showing the importance of strong passwords, many businesses and employees don\u2019t comply. For example, more than 60% of people only update their passwords <a href=\"https:\/\/www.goodfirms.co\/resources\/top-password-strengths-and-vulnerabilities\">when and if they&#8217;re prompted to do so<\/a>. A lot of people also tend to use the same, weak passwords over and over again, judging by the fact that <a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\">NordPass<\/a> regularly publishes a list of the 200 most common passwords.<\/p>\n<p><strong>Here are a few password best practices to keep in mind:<\/strong><\/p>\n<ul>\n<li>Make passwords more complex by including digits, uppercase and lowercase letters and special characters<\/li>\n<li>Don\u2019t let users reuse old passwords by changing a single character to create what they think is a new password<\/li>\n<li>Establish forbidden passwords or phrases that are easy to guess such as names, birthdays or usernames<\/li>\n<li>Require users to create different passwords for each system they use<\/li>\n<\/ul>\n<div style=\"text-align: center;\">\n<p><iframe loading=\"lazy\" title=\"Cybersecurity _ Password management best practices\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/kuw3icNU7to?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>Want to learn more about how to build a solid foundation for password management? In this video, Sherweb\u2019s Cybersecurity Technical Fellow Roddy Bergeron covers policy creation, tool selection and the importance of user education.<\/em><\/p>\n<h3>#2 Invest in a password management tool<\/h3>\n<p>Forget about all those passwords you\u2019ve been saving on sticky notes. A <a href=\"https:\/\/www.sherweb.com\/blog\/security\/business-password-management-lastpass\/\">password management tool<\/a> will create and store all your passwords in one safe location. You won\u2019t have to memorize all the login information you use for each site. Instead, you\u2019ll just enter a master password in the tool to access your password vault and it will autofill your login credentials next time you visit the site. Password management tools can also help you generate and save strong, unique passwords when you login to new websites or apps. Since many password managers feature synchronized encryption across devices, you can use your passwords anywhere, even on your phone!<\/p>\n<h3>#3 Take advantage of multi-factor authentication (MFA)<\/h3>\n<p><a href=\"https:\/\/www.sherweb.com\/blog\/security\/multi-factor-authentication\/\">Multi-factor authentication<\/a> is one of the best ways to prevent your passwords from being guessed or hacked. Rather than just using one password to login to websites or apps, users have to provide more information or take a specific action to gain access. This could be as simple as entering a code sent from your phone or a fingerprint scan. MFA protects your account because even if your password does get hacked, the perpetrator will still need to provide at least one more form of authentication to <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-to-spot-suspicious-email\/\">steal your data<\/a>.<\/p>\n<h3>#4 Train your employees<\/h3>\n<p>Once you decide to create new password policies, you have to make sure your staff is trained to use them properly. This applies to both new and existing employees. Everyone has to understand why they should use password management tools and they should know the best ways to use them. Make sure your employees know how to generate new passwords and replace old ones that are too weak or have been used before. If your company uses MFA, make sure your employees understand why it\u2019s so important and know how to use it. Training employees can require additional time and resources, but in the long run, this is money well spent.<\/p>\n<h3>#5 Follow compliance regulations<\/h3>\n<p>If your company deals with sensitive data from sectors such as finance or healthcare, you may be subject to compliance regulations. These types of accounts are often targeted by cyber criminals because of the sensitive data they contain. As a result, organizations such as the Health Insurance Portability and Accountability Act (HIPAA) have specific requirements for password security. Here are a few examples:<\/p>\n<ul>\n<li>Passwords should be at least 12 characters in length<\/li>\n<li>Passwords should contain uppercase and lowercase letters, special characters and numbers<\/li>\n<li>Passwords should be changed every 60 to 90 days<\/li>\n<li>Password reuse should be restricted<\/li>\n<li>The principle of least privilege should be applied<\/li>\n<li>Every user should be assigned a unique identifier (ID)<\/li>\n<\/ul>\n<h2>Take your cybersecurity beyond passwords<\/h2>\n<p>As you can see, implementing a strong password policy isn\u2019t really an option\u2014it\u2019s crucial. Cybercriminals are coming up with new methods and technologies every day to expose your user data.<\/p>\n<p>If you\u2019re looking for more information about password policies, password protection, or how to deliver better cybersecurity for clients, check out <a href=\"https:\/\/www.sherweb.com\/security\/lastpass\/\">LastPass<\/a> or <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/security\/\">get in touch with Sherweb experts<\/a> to talk about how to strengthen your security stack. You can also explore our <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">partner guide<\/a> to see how Sherweb can help support your business with our cloud marketplace and value-added services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re all familiar with burden of remembering dozens of passwords, both in our personal and","protected":false},"author":177,"featured_media":22941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,934,1001],"class_list":["post-22940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-cybersecurity-awareness-month","tag-lastpass"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 ways to strengthen your password policies<\/title>\n<meta name=\"description\" content=\"Without solid password policies to manage and protect your passwords, you\u2019re leaving the door wide open to a data breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 ways to strengthen your password policies\" \/>\n<meta property=\"og:description\" content=\"Without solid password policies to manage and protect your passwords, you\u2019re leaving the door wide open to a data breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-04T12:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T18:40:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\"},\"headline\":\"5 ways to strengthen your password policies\",\"datePublished\":\"2023-05-04T12:00:12+00:00\",\"dateModified\":\"2025-04-17T18:40:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\"},\"wordCount\":987,\"commentCount\":4,\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png\",\"keywords\":[\"Cybersecurity\",\"Cybersecurity Awareness Month\",\"LastPass\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\",\"url\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\",\"name\":\"5 ways to strengthen your password policies\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png\",\"datePublished\":\"2023-05-04T12:00:12+00:00\",\"dateModified\":\"2025-04-17T18:40:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\"},\"description\":\"Without solid password policies to manage and protect your passwords, you\u2019re leaving the door wide open to a data breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage\",\"url\":\"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png\",\"contentUrl\":\"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sherweb.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5 ways to strengthen your password policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\",\"url\":\"https:\/\/www.sherweb.com\/blog\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 ways to strengthen your password policies","description":"Without solid password policies to manage and protect your passwords, you\u2019re leaving the door wide open to a data breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/","og_locale":"en_US","og_type":"article","og_title":"5 ways to strengthen your password policies","og_description":"Without solid password policies to manage and protect your passwords, you\u2019re leaving the door wide open to a data breach.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2023-05-04T12:00:12+00:00","article_modified_time":"2025-04-17T18:40:53+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"5 ways to strengthen your password policies","datePublished":"2023-05-04T12:00:12+00:00","dateModified":"2025-04-17T18:40:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/"},"wordCount":987,"commentCount":4,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png","keywords":["Cybersecurity","Cybersecurity Awareness Month","LastPass"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/","url":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/","name":"5 ways to strengthen your password policies","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png","datePublished":"2023-05-04T12:00:12+00:00","dateModified":"2025-04-17T18:40:53+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Without solid password policies to manage and protect your passwords, you\u2019re leaving the door wide open to a data breach.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/password-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/Password-Policies-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"5 ways to strengthen your password policies"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Cybersecurity","Cybersecurity Awareness Month","LastPass"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/22940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=22940"}],"version-history":[{"count":6,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/22940\/revisions"}],"predecessor-version":[{"id":25422,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/22940\/revisions\/25422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/22941"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=22940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=22940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=22940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}