{"id":2477,"date":"2022-07-07T06:38:00","date_gmt":"2022-07-07T06:38:00","guid":{"rendered":"\/cybersecurity-blog\/?p=2477"},"modified":"2022-12-14T07:23:18","modified_gmt":"2022-12-14T07:23:18","slug":"cyber-insurance","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/","title":{"rendered":"What is Cybersecurity Insurance?"},"content":{"rendered":"\n<p>Cyber threats pose a major danger to every organization, regardless of the size and status of the business. Individuals, SMBs, and enterprises develop and improve their cybersecurity to counter potential threats efficiently. However, hackers always have the first strike advantage. So an attack causing a data breach or IT system disaster is a matter of when not if, for an organization.<\/p>\n\n\n\n<p>Cybersecurity insurance is a tool to mitigate security breach consequences for an organization. In this post, we at <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyber_insurance\" target=\"_blank\">ANY.RUN <\/a>decided to find out what cyber insurance is, what it does and doesn\u2019t cover, who needs to develop appropriate policies, and why.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is cybersecurity insurance?<\/h3>\n\n\n\n<p>Cyber insurance (cyber attack insurance, cybersecurity insurance, cyber-liability insurance) is one of the insurance policies that protect organizations from hacking attempts, ransomware attacks, and other <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-threats-2022\/\" target=\"_blank\">cyber threats<\/a>. It serves to avoid or mitigate the disruption of workflows during an attack and the consequences that follow. The potential coverage of financial expenses connected with the <a href=\"https:\/\/www.nakivo.com\/vm-disaster-recovery\/\">site recovery<\/a> can also be included.<\/p>\n\n\n\n<p>Speaking formally, cybersecurity insurance is a contract that an organization concludes with an insurer about protection from IT-related issues. Those issues can be connected with computers, internal and external networks, and software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Who needs cybersecurity insurance?<\/h3>\n\n\n\n<p>In short, every contemporary organization would receive multiple benefits from getting cyber insurance. The reason is that any functioning SMB or enterprise should be present online. That online presence requires IT attributes such as a website, a network, and a digital environment, including various software and hardware solutions.<\/p>\n\n\n\n<p>Organizations store, transfer, and process such data as the personal information of clients or staff members, intellectual property objects, financial reports, contracts, and other documents. That data can be intersecting for hackers to get and use.<\/p>\n\n\n\n<p>The organization\u2019s IT infrastructure can also become a ransomware attack&#8217;s target. Apart from backup ransomware protection software, a cyber insurance policy can bring helpful resources for an organization to recover from a digital disaster after most successful attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What attacks can be a claim reason?<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/07\/What-Is-Included-in-Cyber-Insurance-Coverage_-3.png\" alt=\"What attacks can be a claim reason for cyber insurance?\" class=\"wp-image-2529\"\/><\/figure>\n\n\n\n<p>The list of issues triggering cyber insurance can include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malware incidents<\/li><li>Fund-transfer fraud attempts<\/li><li>Business email compromise (BEC) issues<\/li><li>Ransomware attack cases<\/li><\/ul>\n\n\n\n<p>Contract conditions may also include other IT-related problems that an organization risks facing. Those can be connected with the company\u2019s website, software, network performance, original data, and backups. In short, everything depends on the agreement between an organization and an insurer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is included in cyber insurance coverage?<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/07\/What-Is-Included-in-Cyber-Insurance-Coverage_-1-1.png\" alt=\"What is included in cyber insurance coverage?\" class=\"wp-image-2526\"\/><\/figure>\n\n\n\n<p>The contract is what defines the fields and incidents covered by insurance. But there is a common point in the cyber insurance market. Cyber insurance focuses on compensating expenses following a successful cyber attack on an organization\u2019s IT environment or subsystems. With that in mind, the policies of cyber insurance can cover:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Data recovery<\/li><li><a href=\"https:\/\/any.run\/cybersecurity-blog\/using-sandbox-for-incident-response\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Incident investigation<\/a><\/li><li>Legal defense expenses<\/li><li>Customer reparation payments<\/li><\/ul>\n\n\n\n<p><strong>Note:<\/strong> Though paying ransom to hackers is not recommended by government officials worldwide, an organization\u2019s cybersecurity insurance contract may suppose covering that sum as well.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What does cyber insurance not cover?<\/h3>\n\n\n\n<p>When speaking of cyber insurance as a relatively new and developing market niche, the covered areas remain pretty limited regarding the associated cyber risks. Cyber insurance may not cover particular aspects of cyber incidents that are critical for an organization. Understanding what is not covered, in this case, is as vital as getting that insurance contract for what can be insured. The proper understanding of coverage limitations can help organizations correctly plan and implement <a href=\"https:\/\/any.run\/cybersecurity-blog\/build-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the cybersecurity strategy <\/a>to protect assets that are not insured.<\/p>\n\n\n\n<p>For example, when an organization loses intellectual property or sensitive client data after a cyberattack, no insurance can cover the cost of that property\u2019s development and financial and reputational losses potentially following a data loss disaster.&nbsp;<\/p>\n\n\n\n<p>In other words, cyber insurance can help an organization deal with the financial expenses directly caused by the attack but not the total price of rebuilding cybersecurity systems. Neither does cyber insurance cover the brand reputation decrease and possible client-base-related losses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Major cyber risks and cyber insurance<\/h3>\n\n\n\n<p>Sometimes, cyberattacks are not limited to a single organization but cause disruptions globally. According to <a href=\"https:\/\/www.munichre.com\/landingpage\/en\/global-cyber-risk-and-insurance-survey-2022.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Munich Re\u2019s Survey 2022<\/a>, 86% out of 17 thousand participants claimed that their companies are not protected enough against cyber risks like ransomware, supply chain, and critical infrastructures.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>For instance, <a href=\"https:\/\/any.run\/cybersecurity-blog\/ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ransomware attacks <\/a>successfully breached the cybersecurity of major organizations worldwide, causing multi-billion dollar losses.&nbsp;<br><\/p>\n\n\n\n<p><strong>Largest ransomware cases in 2021<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><tbody><tr><td><strong>Company<\/strong><\/td><td><strong>Losses<\/strong><\/td><\/tr><tr><td>Colonial Pipeline<\/td><td>$4.5m \u2013 ransom paid<\/td><\/tr><tr><td>JBS USA<\/td><td>$11m \u2013 ransom paid<\/td><\/tr><tr><td>CNA Financial<\/td><td>$40m \u2013 ransom paid<\/td><\/tr><tr><td>Kaseya<\/td><td>$70m \u2013 ransom demand&nbsp;&nbsp;<\/td><\/tr><tr><td>HSE Ireland<\/td><td>$600m \u2013 overall damage<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>As the situation with those global ransomware disruptions shows, the cyber insurance market is evolving and facing challenges. Clients think insurance providers can and should cover such cases as common issues. In turn, providers may reasonably believe that the state-sponsored digital catastrophe spread across numerous clients is a force-majeure type of incident. For now, no standard practice regarding global disasters has been developed among insurance companies and legal authorities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Cyber insurance is a policy to help organizations deal with the aftermath of IT-related troubles such as ransomware attacks, fraud transfers, and data loss. Insurance is not a panacea, and organizations\u2019 leaders should not view it as a replacement for cybersecurity and data protection solutions. The most effective approach that can bring the most resilience to the organization\u2019 is the combination of cyber attack insurance and <a href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-for-large-scale-industries\/\">reliable security measures<\/a>. For example, understanding attacks, proper analysis of malware, and network traffic in <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyber_insurance\">ANY.RUN sandbox<\/a> can provide robust defense in the future.<\/p>\n\n\n\n<p>When considering your policies, keep in mind that the cyber insurance market is evolving together with the related risks. For instance, not every contract can guarantee insurance coverage for your organization in case of a global state-sponsored cyberattack. Clarify contract conditions thoroughly and never neglect standard cybersecurity and data protection policies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats pose a major danger to every organization, regardless of the size and status of the business. Individuals, SMBs, and enterprises develop and improve their cybersecurity to counter potential threats efficiently. However, hackers always have the first strike advantage. So an attack causing a data breach or IT system disaster is a matter of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[10],"class_list":["post-2477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-guest-posts","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cybersecurity Insurance - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"The increasing danger of malware targeting everyone online makes organizations go for cybersecurity insurance. See what cyber insurance is and why it is critical.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mariia Lvovych\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\"},\"author\":{\"name\":\"Mariia Lvovych\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"What is Cybersecurity Insurance?\",\"datePublished\":\"2022-07-07T06:38:00+00:00\",\"dateModified\":\"2022-12-14T07:23:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\"},\"wordCount\":978,\"commentCount\":9,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Guest Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\",\"name\":\"What is Cybersecurity Insurance - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-07-07T06:38:00+00:00\",\"dateModified\":\"2022-12-14T07:23:18+00:00\",\"description\":\"The increasing danger of malware targeting everyone online makes organizations go for cybersecurity insurance. See what cyber insurance is and why it is critical.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is Cybersecurity Insurance?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Mariia Lvovych\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/mariia-lvovych.jpeg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/mariia-lvovych.jpeg\",\"caption\":\"Mariia Lvovych\"},\"description\":\"An entrepreneur, freelance writer, and owner at OlmaWritings.com, a business writing service, and GetReviewed.org, a product reviews platform. As a business owner, Mariia knows that having proper cyber insurance is important if you value your business data.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/mariialvovych\/\"],\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cybersecurity Insurance - ANY.RUN&#039;s Cybersecurity Blog","description":"The increasing danger of malware targeting everyone online makes organizations go for cybersecurity insurance. See what cyber insurance is and why it is critical.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/","twitter_misc":{"Written by":"Mariia Lvovych","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/"},"author":{"name":"Mariia Lvovych","@id":"https:\/\/any.run\/"},"headline":"What is Cybersecurity Insurance?","datePublished":"2022-07-07T06:38:00+00:00","dateModified":"2022-12-14T07:23:18+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/"},"wordCount":978,"commentCount":9,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity"],"articleSection":["Cybersecurity Lifehacks","Guest Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/","url":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/","name":"What is Cybersecurity Insurance - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-07-07T06:38:00+00:00","dateModified":"2022-12-14T07:23:18+00:00","description":"The increasing danger of malware targeting everyone online makes organizations go for cybersecurity insurance. See what cyber insurance is and why it is critical.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"What is Cybersecurity Insurance?"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Mariia Lvovych","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/mariia-lvovych.jpeg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/mariia-lvovych.jpeg","caption":"Mariia Lvovych"},"description":"An entrepreneur, freelance writer, and owner at OlmaWritings.com, a business writing service, and GetReviewed.org, a product reviews platform. As a business owner, Mariia knows that having proper cyber insurance is important if you value your business data.","sameAs":["https:\/\/www.linkedin.com\/in\/mariialvovych\/"],"url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2477"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2477"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2477\/revisions"}],"predecessor-version":[{"id":2996,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2477\/revisions\/2996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/2995"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}