{"id":115,"date":"2020-05-18T07:03:00","date_gmt":"2020-05-18T07:03:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=115"},"modified":"2020-10-15T21:51:18","modified_gmt":"2020-10-16T01:51:18","slug":"information-security-suffers-burnout","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/","title":{"rendered":"Information Security Suffers From Burnout"},"content":{"rendered":"\n<p>The <a href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">information security<\/a> industry is suffering from burnout. It\u2019s suffering because businesses think they can deal with security \u201clater.\u201d But later only comes when something bad finally happens. <\/p>\n\n\n\n<p>When a company finally does a pen test on its existing publicly available app, and it returns tens of thousands of tickets, the higher ups in the company panic. &#8220;Later\u201d is here, only now they don\u2019t know what to do. They decide to build a team, maybe even hire a bunch of Info Sec pros to come in and fix everything. But they can\u2019t get the amount of talent they need quickly because of budget constraints, so they take the handful of people they can get. They may even call one a CISO or Head of Info Sec, and then try to get this handful of people to do the job of a 20-30 person team.<\/p>\n\n\n\n<p>This company is already starting out behind and with thin resources, things won&#8217;t improve fast enough. The board is now mad because there are so many problems and everyone is worried about getting sued. Have we already been exposed (probably, maybe, who knows)? Are we being hacked, currently? The board wants this five person team to handle these thousands of problems and get it done in under a year. A task which may have been impossible for the 20-30 person team to do, let alone a five person team. <\/p>\n\n\n\n<p>What happens next in this scenario is surprising to no one but the board. The people brought in to fix the problems and close the tickets end up burning out. They\u2019re working almost around the clock to do their job, and there\u2019s a ton of pressure to not only fix the problems but to also figure out how to prevent future problems at the same time. That&#8217;s a hard ask for any team.<\/p>\n\n\n\n<p>But that\u2019s only part of the reason info sec professionals are burning out. When it comes to information security, businesses prioritize funds when it&#8217;s already too late. If an alert comes through and an info sec team sees that there is a vulnerability, they automatically bring it to the attention of higher ups. That\u2019s their job, to notify the company of things that could put the business at risk. <\/p>\n\n\n\n<p>But much of the time, those higher ups say that it\u2019s too expensive, or it will take too long, or it\u2019s not a priority right now just leave it alone. Now your info sec team is in a bind. They\u2019ve taken oaths to do the right thing to protect this information. It might not be the company&#8217;s info, it might be customer&#8217;s info, but they\u2019re being told to ignore a vulnerability that they see as a problem.&nbsp;<\/p>\n\n\n\n<p>Regardless of the reason, now they feel demoralized. They were hired to do a job and they aren&#8217;t being allowed to do it, so why are they there? It starts a cycle of willful ignorance. If the company doesn&#8217;t care, why should I bother? I\u2019m just going to ignore this other alert. I\u2019ll halfway fix it, but not really care how well it\u2019s done. My boss doesn\u2019t care about security, so why should I? They become apathetic about security because they are forced to ignore things that shouldn\u2019t be ignored, or to do things quick and dirty as opposed to thought out and secure. This is a dangerous path for a security expert to be on, and directly leads to burnout.<\/p>\n\n\n\n<p>While it is possible to contract out your information security duties when something hits the fan, it is far more efficient to do things in a secure fashion from the beginning. It is more effective to listen to your own staff and handle security according to their recommendations than it is to ignore them. Ignoring your info sec specialists will lead to problems down the road. You don\u2019t want to incur the cost of making something secure from the start? Imagine the cost when it breaks or gets hacked. You lose business and reputation, profits shrink, you\u2019re paying out more in labor, either for overtime or for a contractor to fix the problem, and it was all preventable.&nbsp;<\/p>\n\n\n\n<p>Creating a culture around information security is so important. It\u2019s not just to keep your business running effectively and securely. It\u2019s also to keep your employees from becoming apathetic and burning out because they can\u2019t properly do their job. A secure culture starts at the top.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.<\/p>\n","protected":false},"author":1,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[4],"tags":[576,40,570,575,577,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Suffers From Burnout - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Suffers From Burnout\" \/>\n<meta property=\"og:description\" content=\"Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-18T07:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-16T01:51:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Information Security Suffers From Burnout\",\"datePublished\":\"2020-05-18T07:03:00+00:00\",\"dateModified\":\"2020-10-16T01:51:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg\",\"keywords\":[\"Burnout\",\"Info Sec\",\"Information\",\"Information Security\",\"pen testing\",\"Security\"],\"articleSection\":[\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\",\"name\":\"Information Security Suffers From Burnout - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg\",\"datePublished\":\"2020-05-18T07:03:00+00:00\",\"dateModified\":\"2020-10-16T01:51:18+00:00\",\"description\":\"Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg\",\"width\":2560,\"height\":1920,\"caption\":\"Photo by Jorge Jesus from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Suffers From Burnout\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security Suffers From Burnout - PWV Consultants","description":"Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Suffers From Burnout","og_description":"Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-05-18T07:03:00+00:00","article_modified_time":"2020-10-16T01:51:18+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Information Security Suffers From Burnout","datePublished":"2020-05-18T07:03:00+00:00","dateModified":"2020-10-16T01:51:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/"},"wordCount":765,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg","keywords":["Burnout","Info Sec","Information","Information Security","pen testing","Security"],"articleSection":["Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/","url":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/","name":"Information Security Suffers From Burnout - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg","datePublished":"2020-05-18T07:03:00+00:00","dateModified":"2020-10-16T01:51:18+00:00","description":"Information security is often put aside until something bad happens. This causes burnout, leading to turnover in IT departments worldwide.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/abstract-achievement-bright-business-614117.jpg","width":2560,"height":1920,"caption":"Photo by Jorge Jesus from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/information-security-suffers-burnout\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Information Security Suffers From Burnout"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/115"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=115"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/115\/revisions"}],"predecessor-version":[{"id":963,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/115\/revisions\/963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}