{"id":417,"date":"2017-05-11T06:02:00","date_gmt":"2017-05-11T06:02:00","guid":{"rendered":"https:\/\/testserver.eminenture.co.in\/test\/MultitectIT\/blog\/?p=417"},"modified":"2026-01-02T07:07:33","modified_gmt":"2026-01-02T07:07:33","slug":"viable-tips-for-securing-sensitive-data-from-hackers","status":"publish","type":"post","link":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/","title":{"rendered":"Viable Tips for Securing Sensitive Data from Hackers"},"content":{"rendered":"\n<p>Data security is vital to any organization in the present spectrum of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digitization\"><strong>Digitization<\/strong><\/a>. To nip in the bud of data, it is essential to take up some viable tips for securing sensitive data from hackers. The US economy lost $600 million in the previous year due to breaching.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>In order to combat this security issue, various organizations deploy security hacks. But before that, it must be noteworthy that the outsourcing IT organization should be local. For example,\u00a0IT security\u00a0seeking firm you should <a href=\"https:\/\/www.multitechit.com.au\/it-outsourcing-services-gold-coast.php\"><strong>hire\u00a0local IT company<\/strong><\/a> that can address any data security puzzle instantly.<\/p>\n\n\n\n<p>But there are a few tips that can put the data under the security wall. Stay current on the hacking news that can unfold any exquisite <a href=\"https:\/\/en.tigosolutions.com\/the-essential-cybersecurity-checklist-for-hybrid-work-it-support\"><strong>anti-hacking checklist to sort out cybercrime<\/strong><\/a>. You can join forum of web developers where you can stay current on hacking solutions. Install software and plugin that can scan malware attempt as well as unauthorized access. Protect access through strong password and user name that none of the hackers can imagine easily.<\/p>\n\n\n\n<p>Employ a web application firewall to filter out authorized access only. Another method is to hide admin page from the reach of search engine bots. Add robot.txt file to disallow indexing to that page. Thereby, cyber spies don\u2019t catch the admin details. Take back up on daily basis and store it on multiple places to retrieve it any time. &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>1.<\/strong><strong>Be updated regarding hacking:&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Read hacking news daily<\/li>\n\n\n\n<li>Join forums of web developers<\/li>\n\n\n\n<li>Keep eyes on de-hacking tools<\/li>\n<\/ul>\n\n\n\n<p><strong>2.<\/strong><strong>Upgrade Software<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep watch on software updates<\/li>\n\n\n\n<li>Upgrade software time to time<\/li>\n\n\n\n<li>Don\u2019t delay updating<\/li>\n<\/ul>\n\n\n\n<p><strong>3.<\/strong><strong>Make Access to admin an Ordeal<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce strong user name &amp; password<\/li>\n\n\n\n<li>Edit default database prefix<\/li>\n\n\n\n<li>Don\u2019t share login details on mail<\/li>\n<\/ul>\n\n\n\n<p><strong>4.<\/strong><strong>Secure your network<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set expiry of login session if stays inactive<\/li>\n\n\n\n<li>Change strong password frequently<\/li>\n\n\n\n<li>Install malware scanning plugin<\/li>\n<\/ul>\n\n\n\n<p><strong>5.<\/strong><strong>Set data filtering<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy Web Application Firewall (WAF)<\/li>\n\n\n\n<li>Set cloud as a data tracker<\/li>\n\n\n\n<li>Filter out unwanted traffic<\/li>\n<\/ul>\n\n\n\n<p><strong>6.<\/strong><strong>Install security plugins<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install plugins that promise protection<\/li>\n\n\n\n<li>Install plugin that hides CMS\u2019 identity<\/li>\n<\/ul>\n\n\n\n<p><strong>7.<\/strong><strong>Hide admin using robot.txt files<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Don\u2019t index admin page<\/li>\n\n\n\n<li>Install robot.txt files to stop listing<\/li>\n<\/ul>\n\n\n\n<p><strong>8.<\/strong><strong>Keep file uploading under scanner:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encrypt uploaded files<\/li>\n\n\n\n<li>Store them outside root directory<\/li>\n\n\n\n<li>Decrypt if want that file via script<\/li>\n<\/ul>\n\n\n\n<p><strong>9.<\/strong><strong>Secure file transfer<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install encrypted SLL certificate<\/li>\n\n\n\n<li>Encrypt file if sent by unauthorized person<\/li>\n<\/ul>\n\n\n\n<p><strong>10.<\/strong><strong>Back up<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Take on-site back up<\/li>\n\n\n\n<li>Take off-site back up<\/li>\n\n\n\n<li>Store backup on multiple devices<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Data security is vital to any organization in the present spectrum of Digitization. To nip in the bud of data, it is essential to take up some viable tips for securing sensitive data from hackers. The US economy lost $600 million in the previous year due to breaching.<\/p>\n","protected":false},"author":1,"featured_media":916,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-consulting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Viable Tips for Securing Sensitive Data from Hackers<\/title>\n<meta name=\"description\" content=\"Explore viable cybersecurity tips to safeguard sensitive data from hackers, breaches, and unauthorized access across digital platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Viable Tips for Securing Sensitive Data from Hackers\" \/>\n<meta property=\"og:description\" content=\"Explore viable cybersecurity tips to safeguard sensitive data from hackers, breaches, and unauthorized access across digital platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Multitech Blog - Tech &amp; Business Insights\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-11T06:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-02T07:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1\"},\"headline\":\"Viable Tips for Securing Sensitive Data from Hackers\",\"datePublished\":\"2017-05-11T06:02:00+00:00\",\"dateModified\":\"2026-01-02T07:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\"},\"wordCount\":420,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png\",\"articleSection\":[\"IT Consulting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\",\"name\":\"Viable Tips for Securing Sensitive Data from Hackers\",\"isPartOf\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png\",\"datePublished\":\"2017-05-11T06:02:00+00:00\",\"dateModified\":\"2026-01-02T07:07:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1\"},\"description\":\"Explore viable cybersecurity tips to safeguard sensitive data from hackers, breaches, and unauthorized access across digital platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png\",\"contentUrl\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png\",\"width\":820,\"height\":462},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.multitechit.com.au\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Viable Tips for Securing Sensitive Data from Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#website\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/\",\"name\":\"Multitech Blog - Tech &amp; Business Insights\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.multitechit.com.au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"description\":\"Explore expert articles and resources designed to help businesses leverage technology for success and innovation.\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Viable Tips for Securing Sensitive Data from Hackers","description":"Explore viable cybersecurity tips to safeguard sensitive data from hackers, breaches, and unauthorized access across digital platforms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Viable Tips for Securing Sensitive Data from Hackers","og_description":"Explore viable cybersecurity tips to safeguard sensitive data from hackers, breaches, and unauthorized access across digital platforms.","og_url":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/","og_site_name":"Multitech Blog - Tech &amp; Business Insights","article_published_time":"2017-05-11T06:02:00+00:00","article_modified_time":"2026-01-02T07:07:33+00:00","og_image":[{"width":820,"height":462,"url":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#article","isPartOf":{"@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/"},"author":{"name":"admin","@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1"},"headline":"Viable Tips for Securing Sensitive Data from Hackers","datePublished":"2017-05-11T06:02:00+00:00","dateModified":"2026-01-02T07:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/"},"wordCount":420,"commentCount":0,"image":{"@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png","articleSection":["IT Consulting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/","url":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/","name":"Viable Tips for Securing Sensitive Data from Hackers","isPartOf":{"@id":"https:\/\/www.multitechit.com.au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png","datePublished":"2017-05-11T06:02:00+00:00","dateModified":"2026-01-02T07:07:33+00:00","author":{"@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1"},"description":"Explore viable cybersecurity tips to safeguard sensitive data from hackers, breaches, and unauthorized access across digital platforms.","breadcrumb":{"@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#primaryimage","url":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png","contentUrl":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2017\/05\/fnQIX4gzwndMjWCgcpmBMTXrtCT4kOq841bJUGGs.png.png","width":820,"height":462},{"@type":"BreadcrumbList","@id":"https:\/\/www.multitechit.com.au\/blog\/viable-tips-for-securing-sensitive-data-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.multitechit.com.au\/blog\/"},{"@type":"ListItem","position":2,"name":"Viable Tips for Securing Sensitive Data from Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.multitechit.com.au\/blog\/#website","url":"https:\/\/www.multitechit.com.au\/blog\/","name":"Multitech Blog - Tech &amp; Business Insights","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.multitechit.com.au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g","caption":"admin"},"description":"Explore expert articles and resources designed to help businesses leverage technology for success and innovation.","url":"https:\/\/www.multitechit.com.au\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts\/417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":2,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts\/417\/revisions"}],"predecessor-version":[{"id":917,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts\/417\/revisions\/917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/media\/916"}],"wp:attachment":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/media?parent=417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/categories?post=417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/tags?post=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}